paper_id
stringlengths
9
16
version
stringclasses
26 values
yymm
stringclasses
311 values
created
timestamp[s]
title
stringlengths
6
335
secondary_subfield
sequencelengths
1
8
abstract
stringlengths
25
3.93k
primary_subfield
stringclasses
124 values
field
stringclasses
20 values
fulltext
stringlengths
0
2.84M
1801.06703
1
1801
2018-01-20T17:37:25
Decision Rules for Robotic Mobile Fulfillment Systems
[ "cs.MA" ]
The Robotic Mobile Fulfillment Systems (RMFS) is a new type of robotized, parts-to-picker material handling system, designed especially for e-commerce warehouses. Robots bring movable shelves, called pods, to workstations where inventory is put on or removed from the pods. This paper simulates both the pick and replenishment process and studies the order assignment, pod selection and pod storage assignment problems by evaluating multiple decision rules per problem. The discrete event simulation uses realistic robot movements and keeps track of every unit of inventory on every pod. We analyze seven performance measures, e.g. throughput capacity and order due time, and find that the unit throughput is strongly correlated with the other performance measures. We vary the number of robots, the number of pick stations, the number of SKUs (stock keeping units), the order size and whether returns need processing or not. The decision rules for pick order assignment have a strong impact on the unit throughput rate. This is not the case for replenishment order assignment, pod selection and pod storage. Furthermore, for warehouses with a large number of SKUs, more robots are needed for a high unit throughput rate, even if the number of pods and the dimensions of the storage area remain the same. Lastly, processing return orders only affects the unit throughput rate for warehouse with a large number of SKUs and large pick orders.
cs.MA
cs
Decision Rules for Robotic Mobile Fulfillment Systems M. Merschformann T. Lamballais M.B.M. de Koster L. Suhl January 23, 2018 Abstract The Robotic Mobile Fulfillment Systems (RMFS) is a new type of robotized, parts-to-picker material handling system, designed especially for e-commerce warehouses. Robots bring movable shelves, called pods, to workstations where inventory is put on or removed from the pods. This paper simulates both the pick and replenishment process and stud- ies the order assignment, pod selection and pod storage assignment problems by evaluating multiple decision rules per problem. The dis- crete event simulation uses realistic robot movements and keeps track of every unit of inventory on every pod. We analyze seven performance measures, e.g. throughput capacity and order due time, and find that the unit throughput is strongly correlated with the other performance measures. We vary the number of robots, the number of pick stations, the number of SKUs (stock keeping units), the order size and whether returns need processing or not. The decision rules for pick order assign- ment have a strong impact on the unit throughput rate. This is not the case for replenishment order assignment, pod selection and pod storage. Furthermore, for warehouses with a large number of SKUs, more robots are needed for a high unit throughput rate, even if the number of pods and the dimensions of the storage area remain the same. Lastly, pro- cessing return orders only affects the unit throughput rate for warehouse with a large number of SKUs and large pick orders. 1 Introduction The rise of e-commerce has created the need for new warehousing systems. Traditional, manual picker-to-parts systems work best when orders are large, i.e. consist of many SKUs so that consolidation has to be organized well. How- ever, e-commerce orders are typically small and e-commerce warehouses are often large as they need to contain large assortments of products, which results in long walking distances for the pickers. In contrast to manual picker-to-part 1 systems, automated parts-to-picker systems eliminate the time pickers spend traveling. Thus, they can achieve higher pick rates. The Robotic Mobile Fulfillment System (RMFS) is an automated parts-to- picker system. Robots transport movable shelves, called "pods", that contain the inventory, back and forth between the storage area and the workstations. As RMFSs eliminate picker walking time, high pick rates can be expected. Implementations suggest that pick rates can improve substantially compared to manual picker-to-parts operations, see also [17]. The systems are mainly used by Amazon, which bought the company that invented the RMFS, Kiva Systems, and has since deployed it in its warehouses (see [3]). Recently, com- petitors such as Swisslog, Interlink, GreyOrange, Mobile Industrial Robots and Scallog have been rolling out their versions of an RMFS. The RMFS is described in more detail in [5] and [18]. They mention that numerous operational decisions problems are yet to be examined in depth, for example the assignment of customer orders to workstations or of pods to a storage locations. Each of these decision problems comes with a trade-off. An order may be assigned to a workstation if it is nearing its due time, but as- signing another order that has lines in common with other orders assigned to that workstation may result in more picks per pod and hence a reduction in the number of pod trips. Furthermore, assigning a pod to a storage location that is close to the workstation reduces travel time, but keeping the inventory sorted by assigning pods to favorable storage location if they are likely to be needed in the near future may reduce travel times more. These trade-offs are linked to the number of robots in the system. As an example, with more robots, more trips can be done and hence the order due times can become a more important criterion than the number of picks per pod when selecting a pod to be transported to a workstation. The trade-offs are also linked to the resources and conditions in the warehouse. For example, the more SKUs a warehouse contains, the more difficult it becomes to assign orders to pick stations in such a way that multiple products can be picked from a single pod. As these examples indicate, a need exists for finding methods to address the de- cision problems in an RMFS, for research on the performance of RMFSs across performance measures, and for examining performance while varying aspects like the number of robots. This paper addresses this need. We study the pick order assignment, replenishment order assignment, pick pod selection, re- plenishment pod selection, and pod storage assignment decision problems and propose several decision rules for each. To see which trade-offs in performance may exist, we use different performance measures. Furthermore, we vary three aspects of the RMFS, namely whether or not return orders need to be pro- cessed, the size of the orders, and the number of SKUs in the warehouse. This study focuses on both the pick process and the replenishment process, because a more efficient replenishment process frees up robots for pick tasks. Lastly, the number of pick stations and the number of robots per pick station is varied. 2 Varying these numbers shows how many pick stations and robots are needed to provide pickers with a near continuous supply of pods. Section 2 describes the RMFS in more detail, Section 3 points out related work, Section 4 the decision problems, Section 5 the decision rules, and Sec- tion 6 describes the realistic simulation built for evaluating the decision rules, while Section 7 explains the evaluation framework, Section 8 shows the results of the analysis, and Section 9 provides conclusions and directions for future research. 2 The Robotic Mobile Fulfillment System An RMFS consists of shelves on which products are stored (called pods), robots that can move underneath and also carry them (see Figure 1a), and work stations. After handling a pod at a station it can be returned to a different storage location than where it was retrieved from, hence, inventory can be sorted continuously throughout the day. (a) Robot carrying a pod (see [5]) (b) The internal storage / retrieval process in RMFSs (red: robot & pod movement Figure 1: The essential elements of an RMFS Figure 1b shows the storage and retrieval processes, where the robots transport pods between the workstations and the storage area. Starting at the replen- ishment station, in the example, two replenishment orders with 4 and 8 units of two SKUs (green & orange) are stored on a pod that was retrieved from the inventory by a robot. The blue SKU also relevant to the process is already available on the pod in focus. After the pod was handled at the station it is stored in inventory again. Next, if the pod is selected for picking at a pick station, it is brought to that station. The operator at the station then picks the units matching the open order lines at the station from the pod and puts them into the bins for the respective pick orders. As soon as a pick order is completed it leaves the pick station and is handled by further warehouse sys- tems. If zoning is in place at the warehouse, the pick order may only be a part of a larger customer order and must be consolidated further with the other 3 ReplenishmentStorage tripInventoryRetrieval tripOrder pickingRetrieval tripStorage trip2 replenishmentorders received1 pick ordercompleted partial pick orders in a following sortation process. If the customer order is already completely fulfilled at the pick station, it may be packed into a carton and prepared for shipping immediately with no further handling. The latter may only be possible in e-commerce operations where lines per order are small. Each pair of storage and retrieval trip is one robot cycle in an RMFS. During one cycle the robot does not set-down or leave the rack until it is returned to a storage location. Note that, the pod may be brought to further replenishment or pick stations between the retrieval and the storage trip, if further replen- ishment or immediate picking can be done with it. For the sake of clarity we limited the visits per cycle to one station in the example above. While the operation of the robot is cyclic the flow of the inventory units through the system starts at a replenishment station (by storing a replenishment order) and exits at a pick station (by fulfilling a pick order). However, in contrast to other systems there is quite some overhead inventory movement, because all contained units, not only needed ones, are moved when a pod is brought to a station. The same happens during replenishment operations, if non-empty pods are moved to a replenishment station. Robots navigate their paths through the warehouse using a waypoint system, which is laid out as a grid. A path is a sequence of connected waypoints and all robots have to be guided concurrently along their paths while avoiding collisions and deadlocks. Robots that are not carrying a pod can move under- neath stationary pods and hence take other paths than robots that do carry pods, because the latter cannot use occupied storage locations. The system layout is depicted in Figure 2 and consists of a storage area where the pods are stored, pick and replenishment stations grouped around the storage area, maneuvering areas between the storage area and the workstations, and per workstation a buffer area. A robot carries a pod from the storage area, via the maneuvering area, to the buffer area of the destination workstation. Only one pod is picked or replenished simultaneously. Workers at the replenishment stations replenish the pods with new inventory. In contrast, workers at the pick stations pick product units to fulfill orders. A picker picks for multiple unfinished/incomplete pick orders at the same time. For both operations the robots need to stop with a pod at a waypoint representing the access point of the respective station. In the buffer area next to each workstation, robots carrying pods can wait for their turn. In the middle of the layout a number of waypoints is used as possible storage locations where pods can be put when they are not used. Every storage location is directly reachable from an aisle and access to a storage location cannot be blocked by stored pods. Travel in the aisles is single-directional to avoid gridlock and reduce congestion. The system has the ability to adapt to changing demand conditions. E.g., if order arrival rates of some SKUs drop, pods containing those SKUs can be relocated further away from the pick stations. This relocation frees up storage locations near the pick stations for pods containing SKUs with high order ar- 4 rival rates. Pods can be relocated when returning from a workstation, hence the inventory can be continually sorted in response to changing demand. Figure 2: A top view of an RMFS layout 3 Related Work To this date no detailed discrete event simulation based research has been done for RMFS. Moreover, most research on RMFSs to date uses queueing networks to study design questions on the strategic level. This work aims to close the gap by delivering insights about RMFS using a very detailed simula- tion framework that integrates most dynamic effects an operator faces. Next, we first outline the queuing network based research and close this section with simulation based work. [14] create queueing networks similar to earlier queueing networks used for autonomous vehicle storage and retrieval systems (AVS/RS) and automated storage and retrieval systems (AS/RS) (see [8] and [16]). Their queueing net- works capture both pick and replenishment operations but cannot model robot movement realistically. They estimate the order throughput time for single-line orders. [10] create a different queueing network for both single- and multi-line orders, with and without zoning in the storage area, that captures only the pick operations, but that does include realistic robot movement. Their model can accurately estimate the expected order cycle time, workstation utilization and robot utilization. [10] determine how the storage area dimensions and the workstation placement around the storage area affect the maximum order throughput, by evaluating a large number of possible designs. [11] develop a queueing network that addresses problems on a tactical level. They show the 5 bu(cid:31)er area pathsmaneuvering area pathsstorage area pathsrobotpodreplenishment stationpick stationwaypoint effect of the number of pods per SKU and of the replenishment level of a pod on order throughput, and they show what the optimal ratio of the number of pick stations to the number of replenishment stations is. They find that it is better to replenish pods before they are entirely empty, even with multiple pods per SKU. [19] use semi-open queueing networks to analyze the policy for assigning robots to pick stations. The authors find that the random policy is significantly outperformed by the proposed handling-speeds-based assignment rule when facing varying service rates of the pickers. [20] build a semi-open queueing network for evaluating the effects of battery management in RMFS. The strategies of battery swapping, automated plug-in charging and inductive charging at the pick station are compared. The authors come to the conclusion that battery swapping is generally more expensive than plug-in charging while inductive charging outperforms both in throughput and costs, if robot prices and retrieval times are low. [5] and [18] mention several decision problems on the operational level that they encountered in practice. One of the few studies that address decision problems on the operational level is by [2]. They provide methods for opti- mally batching the pick orders and sequencing both the pick orders and the pods transported to the stations. They show that an optimized pick order processing requires only half the number of robots that a pick order process based on simple decision rules would need. [15] utilize a simulation based ap- proach in order to optimize the warehouse layout of a manual order picking system for an industrial partner. The authors devise an integrated approach taking on to certain design decisions as well as selecting control policies. The simulation is thereby used "as a solution tool and an evaluation system" (see [15]). [4] use a simulation based approach for evaluating the performance of policy sets for manual order picking systems. The authors make use of DEA as a tool for obtaining a comparable performance indicator among the policy sets. [1] use a discrete event simulation approach similar to this work for assessing storage policies for Automated Grid-based Storage systems. The authors find that even simple strategies improve the system efficiency, which encourages research on more complex strategies. [9] develop a Markow decision process (MDP) model for addressing the resource reallocation problem, i.e., the prob- lem of deciding how many workers and robots to allocate to the pick process and replenishment process continually throughout time. The assumptions re- lated to replenishment differ strongly across the papers mentioned above, and the number of approaches to replenishment in practical applications is diverse as well. 4 Decision Problems This section introduces the decision problems considered in this paper and places them within the context of other decision problems in an RMFS. Re- quests to the system occur via pick orders or replenishment orders. Upon 6 Figure 3: Hierarchical overview of the decision problems and their relations receipt, pallets are broken up into smaller parts consisting of multiple units of one SKU. A replenishment order is a request to place one such part, i.e. a number of units of one specific product, on a pod. We structure the decisions at the operational level in four steps: (1) Order Assignment (OA), the assignment of pick or replenishment orders to worksta- tions, (2) Task Creation (TC), the creation of tasks for the robots, (3) Task Allocation (TA), the allocation of tasks to robots, and (4) Path Planning (PP), the creation of paths along which the robots will move. There are two kinds of Order Assignment decisions: the assignment of pick orders to pick stations, called the Pick Order Assignment (POA) problem, and the assignment of re- plenishment orders to replenishment stations, called the Replenishment Order Assignment (ROA) problem. In the second step, a task is defined as trans- porting a specific pod to a specific workstation and back to a specific storage 7 StrategicLevel-DecisionsattimeofwarehouseconstructionTacticalLevel-Decisionsatstartworkweek,workdayorshiftOperationalLevel-Decisionsinreal-time(1)OrderAssignment(OA)(2)TaskCreation(TC)(3)TaskAllocation(TA)(4)PathPlanning(PP)WorkstationPlacementStorageAreaDimensioningReplenishmentPodSelection(RPS)(2.2)PodStorageAssignment(PSA)PickOrderAssignment(POA)ReplenishmentOrderAssignment(ROA)RatiobetweenNo.ofpickandNo.ofreplenishmentstationsResourceReallocationNumberofPodsperSKUReplenishmentLevel(2.1)PodSelection(PS)PickPodSelection(PPS) location. Therefore, for each workstation, the Task Creation decision prob- lem includes the two subproblems of (2.1) deciding which pod to select for transportation, the Pod Selection (PS) decision problem, and (2.2) deciding at which storage location to return the pod, the Pod Storage Assignment (PSA) decision problem. The Pod Selection (PS) decision problem differs for the pick and replenishment process, because for the pick process the due times of the pick orders is important in selecting a pod. Pod selection in the pick pro- cess is called Pick Pod Selection (PPS) and pod selection in the replenishment process is called Replenishment Pod Selection (RPS). Task Creation uses the pick order and replenishment order assignments to select suitable pods and subsequently converts the requests for the selected pods into tasks for pod transportation between the workstations and the storage area. Task Alloca- tion creates a trip by building a sequence of tasks for the robots to execute. These sequenced tasks implicitly define trips and serve as input for the Path Planning algorithms, where a path is generated for a robot to follow. Figure 3 shows an overview of the decision problems at the strategic, tactical and operational level in an RMFS, with the problems addressed in this paper in bold. As can be seen in Figure 3, this paper focuses on decision prob- lems at the operational level. We use the term "decision rule" to refer to a fairly simple method to solve a decision problem. The aim of this paper is to evaluate several decision rules per decision problem. Some decision rules may closely resemble common best practices, whereas others may be more specific to RMFS. The Task Allocation decision problem is intertwined with the Path Planning decision problem, which has been addressed by [12]. Therefore we do not consider the Task Allocation and Path Planning decision problems. We do address Pick Order Assignment (POA), Replenishment Order Assignment (ROA), Pick Pod Selection (PPS), Replenishment Pod Selection (RPS), and Pod Storage Assignment (PSA). For Pick Order Assignment, we assume there is a constant backlog, and the pick stations are always filled to full capacity with pick orders. Whenever a pick order is fulfilled and leaves its pick sta- tion, a pick order has to be selected from the backlog and assigned to the pick station. For replenishment orders, we assume that the sequence of re- plenishment orders inbound to the system cannot be altered anymore. This assumption resembles the situation in conventional conveyor-based material handling components that do not allow sequence modification but only load routing. Moreover, we aim to avoid taking decision problems outside of the system's boundaries into account, e.g., different dispatching rules of preceding systems. The replenishment stations have a finite capacity. If a replenishment order arrives and multiple replenishment station have capacity left, the ROA decision rule determines to which replenishment station the replenishment or- der is assigned. If no place is available, replenishment orders are put in a replenishment order backlog. When a replenishment order is fulfilled at one of the replenishment stations, a new replenishment order is chosen from the replenishment order backlog according to the FCFS rule. Table 1 summarizes 8 the decision problems addressed in this paper. At this point we also introduce the concept of "pile-on" (sometimes also called "hit-rate"). Pile-on as a concept refers to the average number of units that are picked from a pod every time a pod is presented to a picker at a pick station. Pile-on as a metric measures the number of units (across all SKUs) picked from a pod when presented to a picker at a pick station, averaged across every visit of a pod to a pick station during the entire time horizon. In other words, pile-on is measured in "units picked per pod visit to a pick station". The higher the pile-on is, the fewer pods need to be transported between the pick stations and the storage area, which may reduce the number of robots needed. Table 1: Decision Problems Abb. Name POA Pick Order Assignment Description Choosing a pick order from the backlog ROA Replenishment Order Assignment PPS Pick Pod Selection RPS Replenishment Pod Selection PSA Pod Storage Assignment Selecting the replenishment station for the next replen- ishment order Selecting a pod to transport to a pick station Select a pod for the next re- plenishment order Choosing a storage location for a pod Trigger When another pick order is fulfilled and leaves the pick station, creating room for the next pick order to be assigned When a replenishment order arrives at the system and one or more replenish- ment stations have capacity left When a robot working for a pick station needs a new task Depends on the ROA decision rule When a pod leaves a workstation 5 Decision Rules To solve the operational problems, we define several decision rules per decision problem that are evaluated in a realistic simulation. Several Path Planning algorithms for the RMFS are compared in [12], therefore this decision prob- lem will not be addressed in this paper. Thus, we selected WHCA∗ v, one of the best performing algorithms from the paper, as the path planning engine for this work. Additionally, we fix the Task Allocation algorithm to a simple method that first assigns two-thirds of the robots to pick operations and the rest to replenishment operations. Then, it aims to equally distribute the robots across the respective stations. This means a robot will only do tasks related to the station it is assigned to. This section will therefore only describe decision rules for the Pick Order Assignment, Replenishment Order Assignment, Pick Pod Selection, Replenishment Pod Selection and Pod Storage Assignment de- cision problems. While replenishment and pick operations are similar in the sense that high 9 throughput should be achieved with few resources, the main asymmetry be- tween both is that for the former the goal is to fill the inventory as quickly as possible and for the latter to empty it as quickly as possible. This means that for replenishment operations we aim to replenish pods fast to have them available for pick operations early while preparing pod content such that it allows for a high pile-on during pick operations. For pick operations we aim to achieve a high pile-on and keeping trips short to fulfill as many orders as pos- sible while also considering due times of the pick orders. Furthermore, we do not allow the sequence of replenishment orders to be modified. In contrast, for pick orders we allow to arbitrarily choose one order from the backlog. Lastly, pick orders have due times. All of this leads to different strategies we focus on per decision problem, instead of fully symmetric rules between pick and replenishment decision problems. For a more precise description of some of the rules we introduce the notation shown in Table 2. Table 2: Overview of the symbols used in the rule descriptions s s Required units necessary to fulfill line i of order o Set of all pods Set of pods heading to station s Set of all SKUs Set of pick orders in backlog Set of pick orders assigned to station s Symbol Explanation P P I I OB OS C(p, i) Number of units of SKU i contained in pod p L(o, i) D(o, i) Remaining units necessary to fulfill line i of order o tD o tS o t Due time of order o Time of assignment to the station of order o Time of deciding 5.1 Pick Order Assignment Rules A pick station has to be chosen for every pick order submitted to the system and the pick order itself has to be chosen from the order backlog. In this work, we consider a pick order backlog of constant size, i.e., as soon as an order is removed from the backlog a new one is generated to replace it. This and the immediate replacement of orders completed at a station lead to only one option available to assign any pick order to: the slot of the just completed order. Hence, the choice of station is not a degree of freedom in this work. The rare occasions of multiple orders to be completed at the same time are handled by assigning the orders to the pick stations randomly. Hence, we only investigate rules for selecting the next pick order from the backlog to fill the only open slot 10 at a station. We devise six rules to solve this problem: "Random", "FCFS", "Due-Time", "Fast-Lane", "Common-Lines" and "Pod-Match": Random The Random rule randomly selects a next pick order from the back- log and is used as a benchmark. FCFS The FCFS rule assigns the pick order that was first received. The rationale behind this is to keep pick order throughput times short. Due-Time The Due-Time rule selects the pick order with the earliest due time from the backlog and assigns it to a station. This is a greedy approach aiming to finish the pick orders before their deadline. Fast-Lane The Fast-Lane rule randomly selects a pick order from the back- log like the Random rule, but keeps one slot at each pick station open for immediately completeable pick orders. I.e., only pick orders (o), for whom all lines and all units of inventory are available on the next pod (pn) will be assigned to this station's "fast-lane" order slot (see Equa- tion (1)). Thus, orders assigned to the "fast-lane" slot are processed shortly after assignment. The next pod of the station is either a not completely processed pod the picker is currently working on or the next pod in the station's queue, if no such pod is available. In cases where no pod reached the station's queue yet, we consider the pod with the shortest remaining path to estimate the next pod. When facing multiple options we use a random tie-breaker. Note that this rule can be com- bined with any other proposed POA rule. The reason we combine it with random selection is to better assess the impact of the idea itself. ∀i ∈ I : L(o, i) ≤ C(pn, i) (1) Common-Lines The Common-Lines rule compares the station's (s) currently assigned pick orders with all orders from the backlog and selects the one with most lines in common for assignment (see Equation (2)). The rationale behind this is to increase pile-on by exploiting synergies among the pick orders. When facing multiple options we use a random tie- breaker. (cid:33) 1 L(o, i) > 0 ∧ L(o(cid:48), i) > 0 0 otherwise (2) (cid:32)(cid:40) (cid:88) (cid:88) o(cid:48)∈OS s i∈I argmax o∈OB Pod-Match The Pod-Match rule selects the pick order from the backlog that matches best the pods heading to the station (s) at the moment of assign- ment best. I.e., the more units of the pick order are already available in the pods the better the match (see Equation (3)). When facing multiple options we use a random tie-breaker. (min (C(p, i), D(o, i))) (3) argmax o∈OB (cid:88) (cid:88) p∈P I s i∈I 11 5.2 Replenishment Order Assignment Rules As a result of the assumptions that replenishment orders arrive in a fixed sequence, we investigate only two different approaches for assigning replenish- ment orders to the stations, i.e., immediate Random assignment and batching of customer orders that go on the same pod. Hence, we construct two rules for replenishment assignment: "Random" and "Pod-Batch": Random The Random rule randomly selects a next station with sufficient remaining capacity to allocate incoming replenishment orders to. If no such station is available, the order will wait until one becomes available again. Pod-Batch The Pod-Batch rule tries to use a pod already selected to go to a replenishment station for assigning the next replenishment order. In other words, the Pod-Batch rule first waits for the Replenishment Pod Selection (Section 5.4) rule to decide which orders are assigned to which pod, and then uses the same replenishment station for the orders of one pod. If the replenishment orders do not fit one station, they wait until a station with sufficient capacity becomes available. During this time all consecutive orders are also blocked, because the sequence cannot be altered. 5.3 Pick Pod Selection Rules Every time a robot working for a pick station s requests a next task, a pod suitable for picking at pick station s must be selected. We require for all rules that at least one unit can be picked from the pod. This means that no pod is brought to a station completely in vain and additionally it implies a pile-on of at least 1. The six PPS rules used in this paper are the "Random", "Nearest", "Pile-on", "Demand", "Lateness", and "Age" rules: Random The Random rule randomly selects a pod that offers at least one useful unit for picking. Nearest The Nearest rule selects the pod which has the least estimated path time towards the station according to the path planning algorithm and that offers at least one useful unit for picking. Pile-on The Pile-on rule selects the pod that offers most units necessary to fulfill the orders at the station (see Equation (4)). Ties are broken by favoring pods with which more orders can be completed. If ties still persist, they are broken randomly. argmax p∈P i∈I o∈OS s (min (C(p, i), D(o, i))) (4) (cid:88) (cid:88) 12 Demand The Demand rule selects the pod whose content is most demanded considering the current pick order backlog situation, i.e. the pod with most units demanded in the backlog is chosen (see Equation (5)). Ties are broken randomly. min (C(p, i), D(o, i)) (5) (cid:88) (cid:88) i∈I o∈OB argmax p∈P (6) (7) Lateness The Lateness rule aims to finish late pick orders by selecting a pod that offers units needed to fulfill open order lines with most lateness at the station, i.e., for one order the time the order is late is summed as fractions of the open picks (see Equation (6)). If no order is late, the resulting ties are broken by using the same metric but replacing o , thus, selecting pods for orders whose due times max(cid:0)t − tD (cid:18)min (C(p, i), D(o, i)) (cid:80) i(cid:48)∈I D(o, i(cid:48)) o , 0(cid:1)(cid:19) max(cid:0)t − tD are most imminent. o , 0(cid:1) with tD (cid:88) (cid:88) argmax p∈P i∈I o∈OS s Age The Age rule aims to finish the oldest pick orders of a station by selecting a pod that offers units needed to fulfill the oldest open order lines, i.e. for one order the time the order spent assigned to the station is summed as fractions of the open picks (see Equation (7)) (cid:88) (cid:88) i∈I o∈OS s (cid:18)min (C(p, i), D(o, i)) (cid:80) i(cid:48)∈I D(o, i(cid:48)) (cid:1)(cid:19) (cid:0)t − tS o argmax p∈P 5.4 Replenishment Pod Selection Rules For every replenishment order, a suitable pod with sufficient remaining storage capacity needs to be chosen. The decision is taken right before the replenish- ment order is assigned to a replenishment station. Depending on the selected ROA and RPS rules both are either invoked simultaneously or, if there is a de- pendency between the two, one after the other. An example for the latter case is the combination of the PodBatch ROA rule with the Emptiest RPS rule, because the PodBatch rule relies on an already selected pod for the replenish- ment order. Since Replenishment Pod Selection determines the composition of the pods, it offers many possibilities to create pods with different features, e.g. high frequency pods that combine frequently ordered products, or family-based pods combining products that are often ordered together. If all replenishment orders assigned to the same pod are assigned to the same replenishment sta- tion, only one trip is necessary to place all replenishment orders on the pod, which reduces the number of robot movements. The five RPS rules used in this paper are the "Random", "Emptiest", "Near- est", "Least-Demand" and "Class" rules: 13 Random The Random rule selects a random pod with sufficient remaining capacity. Emptiest The Emptiest rule assigns replenishment orders to the emptiest pod and reuses the same pod for subsequent replenishment orders until it is full or used at a station. Nearest The Nearest rule assigns an incoming replenishment order to the nearest pod with sufficient remaining capacity. Least-Demand With the Least-Demand rule an incoming replenishment or- der is assigned to the pod currently offering the least demanded inventory, i.e. the pod with the least units offered when compared to the aggre- gated demand by assigned and backlogged pick orders is selected. Thus, this pod is not useful for pick-operations at the time of selection and by this it is not disadvantageous to block it for replenishment operations. Class The Class rule assigns incoming replenishment orders to a pod of the same class as the replenishment order, i.e. fast moving SKUs to pods with other fast moving SKUs. The classes are built by a background mechanism for which the cumulative relative amount of pods per class are given. For this work we use "0.1, 0.3, 1.0", i.e., three classes where the first class holds 10 % of the pods for the highest frequency SKUs, the second class holds 20 % and the last class holds the remaining ones, which are the ones with the lowest frequency SKUs. To assign a replenishment order of a certain class, the emptiest pod is selected from the pods of that particular class. Similar to the Emptiest rule, a selected pod is used for the subsequent incoming replenishment orders of the same class until no more replenishment orders fit the pod or until the respective pod completes its visit to a replenishment station. 5.5 Pod Storage Assignment Rules For each pod an unoccupied storage location has to be selected, every time after visiting a pick or replenishment station. PSA is an important aspect of the RMFS, because being able to change the storage location of pods after every visit to a workstation is what makes continuous automatic sorting possible. For PSA, five decision rules are examined, namely the "Random", "Fixed", "Nearest", "Station-Based" and "Class" rules. Random The Random rule chooses a random free storage location. Fixed The Fixed rule maintains the initially assigned storage location for all pods. 14 Nearest The Nearest rule stores pods at the nearest unoccupied storage lo- cation in terms of shortest estimated path time. This path time is de- termined using an A∗ algorithm that takes the time needed for turning the robot (with or without pod) into account. Station-Based The Station-based rule is a variant on the Nearest rule, i.e. instead of bringing the pod to a storage location that is nearest to the robot's position the storage location with shortest path time to a pick station is selected. The greatest difference with the Nearest rule is in the storage locations chosen for pods returning from a visit to a replenish- ment station. Class The Class rule brings pods back to storage locations of the same class, where classes are constructed in a similar fashion as in the RPS decision problem, but based on the shortest path time to a pick station. Within a class, a storage location for a pod is selected analogously to the Nearest rule. Table 3 provides an overview of the decision rules per decision problem and shows how the decision rules are labeled across decision problems. Note that choosing a rule for one decision problem may jeopardize strategies chosen for others. For example, a random Pick Order Assignment may have a negative impact on a Turnover-based approach for assigning replenishment orders to storage locations, because it does not respect the units currently positioned near the pick station while assigning orders to it. Hence, a selection respecting mutual influences has to be done to provide an efficient compilation of rules that is able to adequately overcome the planning problems in such a system. Table 3: Overview of the Decision Rules per Decision Problem Decision Problem Decision Rules POA Random, FCFS, Due-Time, Fast-Lane, Common-Lines, Pod-Match ROA Random, Pod-Batch PPS Random, Nearest, Pile-on, Demand, Lateness, Age RPS Random, Emptiest, Nearest, Least-Demand, Class PSA Random, Fixed, Nearest, Station-Based, Class 6 Simulation Framework In this work we use our simulation framework, called "RAWSim-O", which is inspired by the work of [7]. A more detailed description of the framework can be found in [13] while the source code is available at https://github.com/ merschformann/RAWSim-O. Similar to [7], we use an agent-based and event- driven simulation focusing at a detailed view of the system. The basic simula- tion process is managed by the core simulator instance (see Figure 4a), which 15 (a) Overview of the simulation process. (b) Visualization screenshot Figure 4: RAWSim-O simulation framework is responsible for obtaining the next event and updating the agents. Agents can either represent real entities like robots and stations or virtual entities like process managers, e.g. for emulating order processes. Every decision that has to be made is passed to the corresponding controller. The controller can either immediately decide or can buffer multiple requests in order to optimize and release the decision later on. However, in this work we only consider ad-hoc decision rules with the former approach. To allow visual feedback, the ongoing simulation can optionally be rendered in 2D and 3D. The implementation was done in C#. The level of detail of the simulation is especially high for the simulated move- ment behavior of the robots. We consider the robot's momentum by emulating acceleration and deceleration behavior, collision avoidance and turning speed (see Table 5). The emulation employs a continuous time-horizon. The times for activities other than robot movement, e.g. lifting or storing a pod, or pick- ing one unit at a pick station, are constant (see Table 5). The waypoints allow the emulated robot behavior to match real robot behaviour. Robots that do not carry a pod can traverse underneath stored pods by using the waypoints at which the pods are stored. Furthermore, in the buffers of the workstations, robots can take short-cuts if the buffer is (partially) empty. Information about the system's state is tracked in a high level of detail, be- cause some decision rules differ with regard to the information they require. For example, all pods and all units on all pods are tracked exactly. Incoming information is divided into a static and a dynamic category. Static informa- tion includes everything describing a system instance and is completely given at start. Static information therefore includes the number and composition of pick stations and replenishment stations, the pods, the robots, and the way- point system used for robot navigation. All of the decision rules proposed in this work differ in their computational complexity and therefore also in the computational time they require to reach decision. They are, however, simple enough to be considered as ad-hoc decisions even for large system sizes. 16 StartEndInitializeSimulatorControllerVisualizerFrameworkDecision imminentDecideRenderOutput resultsFetch informationAgentUpdateOptimize In contrast to static information, the dynamic information is not completely known beforehand, but becomes available over time. This is the case for in- coming pick orders and replenishment orders submitted to the system over time by external processes. While each replenishment order consists of a num- ber of physical units of one SKU, each pick order consists of a set of order lines, each for one SKU, with corresponding units necessary to fulfill the line. We assume for both pick and replenishment orders, that there is a constant order backlog. A constant order backlog means that when an order from the backlog is assigned to a workstation, it is immediately replaced by a newly generated order. By keeping the order backlogs constant, we aim to analyze the system's behavior under constant pressure. However, it also leads to the phenomenon that the system's storage space utilization (utilized space divided by total space available) in the storage area is affected by the performance of the decision rules controlling it, because no further virtual manager steers the process. E.g., if a combination of rules is replenishing quickly, the storage space utilization will increase. In contrast, it will decrease, if the rules are re- plenishing slowly. Situations in which the storage space utilization is nearing 100%, and only few storage places for new replenishment orders are available, lead to an inefficient replenishment process. To avoid such situations, we pause replenishment order generation, if storage space utilization exceeds 85 % and it is continued after it drops below 65 % again. Analogously, we pause the pick order generation, if storage space utilization drops below 10 % and re- sume after it exceeds 60 % again. The latter is done to avoid draining the inventory completely. Since in both cases either the replenishment stations or the pick stations will become inactive due to no further orders to process, the robots will be reassigned to the remaining active stations. This redistribution of robots across the active stations is done at any time a station becomes active or inactive, i.e. at the beginning and end of order generation pauses. If a new replenishment order is received, first the rules for ROA and RPS are responsible for choosing a replenishment station and a pod (see Figure 5). The time the decision is taken depends on the active rules. The execution of the assignment can earliest be done as soon as there is sufficient capacity on a pod and a station available. The commit of the assignment technically results in an insertion request (shown as red cylinders), i.e. a request that requires a robot to bring the pod to the workstation. Multiple of these requests are then combined to an insertion task and assigned to a robot by a TA rule. Similarly, after the POA rule selects a pick order from the backlog and the assignment is committed to a pick station, an extraction request (shown as blue cylinders) is generated, i.e. a request that requires bringing a suitable pod to the chosen station. Up to this point, the physical units of SKUs for fulfilling the pick order are not yet chosen. Instead, the decision is postponed and taken right before combining different requests to extraction tasks by PPS and assigning them to robots by TA. This allows the implemented rules to exploit more information when choosing a pod for picking. Hence, in this work we consider PPS as a 17 decision closely interlinked with TA. Furthermore, the system generates store requests (shown as orange cylinders) each time a pod has to be transported to a storage location. The PSA rule only decides the storage location for a pod that is not needed anymore and has to be returned to the storage area. If all requests are already being handled by other robots, the robot will be assigned an idle task, thus, the robot dwells at a dwelling point until needed. Dwelling points can be used to reduce congestion effects if there are only a few active stations compared to the number of robots, e.g. robots waiting at a storage location block others that try to pass by. For this, the robot will park at a free storage location to avoid causing conflicts with other robots. The dwell point policy uses locations in the middle of the storage area to avoid blocking prominent storage locations next to the stations. Another type of task would be charging, which is necessary when robots run low on battery, however, in this work we assume the battery capacity to be infinite, so this type of task is ignored. All of the tasks result in trips (shown as green cylinders), which are planned by a path planning algorithm and executed by the robots. The only exception is when a pod can be used for another task at the same station. The trips are planned by a PP algorithm and the resulting paths are executed by the robots. Figure 5 shows an abstract overview of these dependencies. The exact times at which the decisions are taken depend on the respective rules, e.g. the Pod-Batch ROA rule assigns a batch of replenishment orders to the first pick station offering sufficient space while the Random ROA rule imme- diately assigns single replenishment orders to the first station with sufficient capacity available. However, all of the rules have in common that they make assignments greedily while adhering to certain capacity constraints (station capacity, pod capacity, etc.). Figure 5: Order of decisions to be done induced by receiving pick and replen- ishment orders 18 InsertExtractStoreRequests:Trips:RPSROAPOATAPPPSAPPSRepl. orderreceivedPick orderreceived 7 Evaluation Framework This section describes the evaluation framework used to carry out the research in this paper. Two central concepts to the evaluation framework are the Rule Configuration (RC) and the Warehouse Scenario (WS). The RC specifies for each decision problem, which decision rule is used. The WS specifies the warehouse layout, number of robots, number of workstations, number of SKUs, whether or not return orders are part of the operations of the warehouse, and pick order size. During one simulation run the RC and WS do not change, so they can be seen as an input to a simulation run. The evaluation framework consists of two phases, one varying the RCs, the other varying the WSs. Phase 1 evaluates all 1620 possible RCs on one WS. For phase 1, we compare eight performance measures: (1) unit throughput rate, (2) pick order throughput rate, (3) order turnover time, (4) distance traveled per robot, (5) order offset, (6) fraction of orders that are late, (7) pile-on (8) the pick station idle time. Unit throughput rate is the number of picked units of all SKUs per hour. Pick order throughput rate is the number of pick orders fulfilled per hour. Order turnover time is the average time between submitting a pick order to the backlog and fulfilling it. Order offset is the average time between the due time and the completion time of the pick orders. Thus, a value smaller than zero shows how much in advance pick orders are completed. The rationale behind this is that follow-up processes at the distribution center are not deterministic, hence, pick orders completed earlier may improve the overall service level. The pick station idle time is measured as an average across all pick stations in the system. Phase 1 selects the RCs with the highest unit throughput rate. However, among these selected best RCs, the variety in the decision rules may be low. For a particular decision problem, all of the selected RCs may use the same decision rule. To ensure more diversity in the RCs in phase 2, we define 6 so- called "benchmark RCs", see Table 4. The benchmark RCs were chosen such, that all decision rules across all decision problems appear in at least one of the benchmark RCs. Each benchmark RC has been given a name that reflects a characteristic that the decision rules have most in common. Phase 2 evaluates Table 4: Benchmark RCs Benchmark RC Demand Speed Nearest Class Greedy Random POA ROA PPS RPS Due-Time Pod-Batch Demand Least-Demand Emptiest Fast-Lane Pod-Batch Lateness Nearest Random Nearest Age Class Pod-Match Pod-Batch Pile-on Random Random Random PSA Fixed Nearest Nearest Class Emptiest Station-Based Random Random FCFS Common-Lines Pod-Batch 19 the selected RCs from phase 1 and the benchmark RCs, while varying the warehouse scenarios. Since we are specifically interested in efficiency of RCs we neglect layout decisions for this work. Thus, we choose one specific layout, using the style described in Section 2. The concrete layout instance comprises 1149 pods and 1352 storage locations ( 85% filled) and is shown in Figure 6. When varying the number of pick stations during phase 2 we add workstations in the order given in Figure 6. Figure 6: Top view of the layout, including pick station indices, with the storage area in the middle, replenishment stations to the left, and pick stations to the right 7.1 Parameters In the following we describe the used parameters in more detail. The pa- rameters shared for both phases are outlined in Table 5. We set a continuous simulation horizon of 48 hours in order to decrease the impact of side effects like recurring replenishment overflows, which cause replenishment pauses described previously. Within a duration of 48 hours we observe sufficient repetitions of such patterns to achieve a reasonable mitigation of these side effects. Furthermore, for each RC and WS combination in phase 1 and in phase 2 we conduct 10 runs to lessen the effect of randomness. To keep the system under continuous pressure, like described above, we keep a constant pick and replenishment order backlog of 200 orders each. At simulation start inventory is generated until 70 % overall storage utilization to avoid cold starting the system. This is done using the same process used for generating replenishment orders during simulation and using assignment rules suiting the respective RPS rule in place. The storage capacity of a pod is set to 500 slots while the storage consumption of one SKU unit is drawn from a uniform distribution between 20 5π rad s with acceleration and deceleration rates of 0.5 m 2 and 8 slots, thus, a full pod contains 100 units in average. The popularity of the SKUs is determined by drawing a value from an exponential distribu- tion with parameter λ = 1 2 for each SKU to emulate a typical ABC curve in e-commerce. This popularity is the relative frequency parameter between all SKUs, thus, the frequency (if divided by the sum of all frequencies) is the probability of choosing a particular SKU when generating an order line for both replenishment and pick orders. One replenishment order restocks be- tween 4 and 12 units of one SKU following a uniform distribution. To emulate due times we distinguish between priority and normal orders that have to be completed in 30 minutes respectively 120 minutes. This reflects the need for preferring important orders. The movement behavior of the robots is emulated by using a maximum ve- locity of 1.5 m s2 . We set the rotational speed to 4 s , i.e., 2.5s for a full turn. Turning takes the same amount of time regardless of whether a robot is carrying a pod. The time for lifting and setting down a pod is set to 3s. This should reflect the capabilities of mobile robots used in similar industry applications reasonably close. For the actual pick operation of one unit at a pick station we assume a constant time of 8s. The complete time for handling one unit including additional operations, like putting the product unit in the correct pick order tote, is set to 15s. This distinction is considered to allow for an early release of the robot, such that no unnecessary robot waiting times are caused. This is not distinguished for replenishment operations, since we assume that a robot can only leave after fully completing the put operation to the pod. The time of a put operation of one replenishment order is set to 20s. The parameters in Table 5 are shared across all conducted experiments, while the parameters in Table 6 are depending on phase and scenario. For the first phase we assess all possible RCs for one fixed warehouse scenario. Note that the RPS rule Nearest and the ROA rule Pod-Batch both wait for the other one to decide first leading to no decision at all, hence, the combination of these rules is forbidden. For the fixed warehouse scenario we set the number of robots to 4 per pick station, i.e. 8 robots in the system at whole. Furthermore, we set the number of pick stations to 2, the number of SKUs to 1000 and exclude the processing of return orders. The order setting is set to Mixed. This means the number of lines per pick order and the number of units per order line are generated following truncated normal distributions with parameters shown in Table 6. This is done to resemble e-commerce pick order characteristics of generally small orders with occasional larger ones in between. Equation (8) shows that phase 1 has 1620 RCs, and since phase 1 has 1 WS and 10 runs are conducted per RC and WS combination, this results in 16200 simulation runs for phase 2. Phase 2 has 10 RCs (see Table 6) and Equation 21 Table 5: Parameters shared across all simulations Parameter Simulation Simulated duration of warehouse operations Number of simulation repetitions Size of pick order backlog Size of repl. order backlog Layout Value 48 hours 10 repetitions 200 pick orders 200 repl. orders 1149 pods, 1352 storage locations in 2 × 4 blocks, 12 aisles and 12 cross-aisles Orders uniform distribution between 4 and 12 units Number of units per repl. order 20 % Amount of priority orders in pick orders backlog submission time + 30 min. Priority pick order due time backlog submission time + 120 min. Normal pick order due time 60% of inventory capacity of the storage area Threshold when pick order generation starts Threshold when pick order generation stops 10% of inventory capacity of the storage area Threshold when repl. order generation starts 65% of inventory capacity of the storage area Threshold when repl. order generation stops 85% of inventory capacity of the storage area Inventory Initial inventory in the storage area 70% of the inventory capacity of the storage area 500 slots Exponential distribution, λ = 1 2 uniform distribution between 2 and 8 slots Space on a pod SKU frequency / popularity SKU size Robot movement Robot acceleration/deceleration Robot maximum velocity Time needed for a full turn of a robot Time needed for lifting and storing a pod Time needed for picking a unit Time needed for handling a unit at pick sta- tion Time needed for putting a repl. order on a pod Stations Repl. station capacity Pick station capacity 0.5 m s2 1.5 m s 2.5s 3s 8s 15s 20s two times pod capacity 8 pick orders 22 (8) shows that it has 360 WSs, which together with 10 runs per RC and WS combination leads to 36000 simulation runs for phase 2. {(roa, poa, rps, pps, psa) (roa = Pod-Batch) ∧ (rps = Nearest)}(cid:12)(cid:12) = 1620 #RC in phase 1 =(cid:12)(cid:12){ROA} × {P OA} × {RP S} × {P P S} × {P SA}\ #W S in phase 2 =(cid:12)(cid:12){number pick station} × {robots per pick station} ×{number of SKUs} × {return orders} × {pick order size}(cid:12)(cid:12) = (8) 6 × 5 × 2 × 2 × 3 = 360 (9) For phase 2 we limit the RCs to the 6 benchmark RCs and the 4 best ones from phase 1, i.e., the 4 RCs with highest throughput rate. Moreover, we vary the number of pick stations from 1 through 6 and the number of robots per pick station from 2 through 6. This leads to a range from 2 robots in the system to 36 robots across all WSs. In addition to WSs with 1000 SKU, we also assess WSs with 10000 SKUs stored in the system. For the order size we define two additional settings of small and large orders. For the Small pick order size, only single line / single unit pick orders are generated. For the Large pick order size, the distributions from the Mixed order setting are used but the min parameter for both is set to 2. Lastly, in WSs where we emulate the processing of return orders, 30 % of the generated replenishment orders are single unit. The total number of RC and WS combinations for the phase 2 is therefore 3600, which leads to 36000 simulation runs. 8 Computational Results This section shows the results from phase 1 and phase 2 of the evaluation framework. Throughout this section, the unit throughput rate is presented as a percentage of the upper bound on the unit throughput rate. The unit throughput rate is presented in this way to facilitate interpretation and com- parison of results across experiments. Moreover, the RMFS is supposed to have high pick rates as it eliminates the need of walking for the workers, while the robots are supposed to supply the pickers with a constant stream of pods to pick from. Presenting the unit throughput rate as a percentage shows clearly to what extent these aims are achieved. The upper bound is discussed in more detail in Appendix A. The length of the confidence intervals is always less than 1% of the mean, based on 10 runs per RC and WS combination, and therefore does not add much information. 23 Table 6: Varied parameters for phase 1 and 2 Phase 1 values Phase 2 values 1620 RCs 6 Benchmark RCs + 4 best RCs from phase 1 Parameter Rule configurations (RCs) Number of pick stations Robots per pick station Number of SKUs Return orders 2 4 1000 0 % 1, 2, 3, 4, 5, 6 2, 3, 4, 5, 6 1000, 10000 0 %, 30 % Small - line & unit distributions: min = 1, max = 1 min = 1, max = 1 Mixed - line & unit distributions: µ = 1, σ = 1, min = 1, max = 4 µ = 1, σ = 0.3, min = 1, max = 3 Large - line & unit distributions: µ = 1, σ = 1, min = 2, max = 4 µ = 1, σ = 0.3, min = 2, max = 3 10 360 3600 36000 Pick order size Mixed - line & unit distributions: µ = 1, σ = 1, min = 1, max = 4 µ = 1, σ = 0.3, min = 1, max = 3 # RC # WS # RC×WS # simulation runs 8.1 Phase 1 1620 1 1620 16200 The first phase aims to investigate throughput performance and the impact per decision problem of decision rules on throughput. Furthermore, we assess the behavior of the different output measures depending on decision rule selection. For this, Table 7 shows how across these simulations the seven previously introduced performance measures correlate with each other. At first, we can observe that as the unit throughput rate score improves, the other performance measures improve as well. As the unit throughput rate score increases, pick order throughput rate and pile-on increase as well, whereas the order turnover time, the distance that robots travel, the order offset, the fraction of orders that miss their due time, and the station idle time decreases. Although it is 24 Table 7: Correlations between the different performance measures for first phase e m i t r e v o n r u t r e d r O d e l e v a r t e c n a t s i D t u p h g u o r h t r e d r O e m i t e l d i n o i t a t S n o - e l i P t e s ff o r e d r O s r e d r o e t a L t u p h g u o r h t t i n σ U - Unit throughput Order throughput Order turnover time Distance traveled Order offset Late orders Pile-on Station idle time µ 0.556 241.963 0.187 2.438 0.450 3549.625 1220.445 -0.950 -0.950 122598.768 19433.860 -0.952 -0.952 0.880 -2565.458 1224.985 -0.950 -0.950 1.000 0.880 - - - - - 0.189 82.234 1.000 - - - - - - 0.115 -0.590 -0.591 0.685 0.549 0.684 1.450 0.899 0.899 -0.802 -0.796 -0.802 -0.448 - 0.186 -1.000 -1.000 0.950 0.952 0.950 0.591 -0.899 - - - - - - - - - - - - - - - - - - - - - - - not clear what the exact causal relationships are, the correlations suggest that pile-on and the distance traveled by the robots are the main drivers behind these improvements. With higher pile-on, more units are picked per pod, so order lines are fulfilled more quickly and fewer trips are needed to fulfill the pick orders. This also causes longer processing times for each pod at the pick station, which in turn increases the time for the next robot to queue and become ready at the station. In other words: a more continuous input of inventory at the pick station is achieved. Additionally, fewer trips for the pick process free up robots to do more replenishment tasks. With less distance traveled by the robots we expect pods to be presented at the pick stations more continuously. Similar to the pile-on this effect enables more continuous picking, which in turn increases the overall unit throughput rate. Both measures, pile- on and the traveled distance, are intermediate measures affected by the choice of strategy for the different decision problems, i.e., a better score in both helps decreasing the idle time at the stations, which in turn helps increasing the throughput. An increased throughput, in the constant pick order backlog setting of this work, also decreases the turnover time of pick orders and the due time offset. Only the number of orders being late is not strongly correlated with the two main throughput drivers. The two main throughput drivers can also be observed when looking at a scatter plot of all simulation runs of the first phase (see Figure 7). Here we can see the best results in unit throughput rate score are achieved with a high pile-on and less distance traveled per robot. The group of simulation runs with least distance traveled per bot and a pile- on around 4 are RCs involving the Nearest PPS rule, while the simulation runs with highest pile-on (greater 5) at the top of the plot are RCs involving the Demand PPS rule. In both groups we find runs with the highest unit throughput rate score, hence, a higher throughput is not only achieved by a 25 high pile-on. In particular within the top ten RCs in terms of unit throughput rate score the pile-on ranges between 3.84 and 6.36, while the distance traveled per bot ranges between 68.04 km to 80.36 km. Hence, pile-on and the traveled distance enable higher throughput, but may also compensate for each other. This is particularly interesting, because both come at operational costs. For traveled distance this is energy consumption and robot wear, while for pile-on it may be costs arising from potentially more complex replenishment processes. Furthermore, within both groups better results are obtained with RCs also involving the Pod-Match POA rule, which causes an additional boost in pile- on. In Figure 7 we also observe a 'cutoff' of simulation runs in the upper right and bottom left areas. This can be explained by the longer handling time at the station resulting from a higher pile-on. I.e., the longer a robot needs to wait at a station for the picking to finish the less it can travel in the meantime. Thus, rules increasing pile-on may help reducing the necessary travel distance, and by this also robot wear and energy consumption. Figure 7: Scatter plot for pile-on vs. traveled distance per robot colored by the achieved throughput rate score for all simulation runs of the first phase The pick order throughput rate is neglected completely in the remainder of this work, because it almost completely aligns with the unit throughput rate score. The reason for this is the constant backlog of 200 pick orders over 48 hours: with a pick order throughput rate of 241.963 completed orders per hour in average, omitting certain pick orders is almost impossible. Hence, we cannot observe a potential temporary throughput gain by preferring smaller or larger orders. In order to investigate the trade-off between picking many units and completing more pick orders an experiment with a fixed set of backlogged pick orders over a fixed period of time should be devised. For this, the possibly 26 1 2 3 4 5 6 7 60 70 80 90 100 110 120 130 140 150Pile-onDistance traveled per robot (in km)Simulation runs 20 30 40 50 60 70 80 90 100Unit throughput score (in %) tedious processing of leftover pick orders, which are presumably harder to pick quickly, needs to be investigated. We leave this work for future research. Table 8: Average unit throughput rates as percentages of the upper bound for all rules, together with the best / worst performance multiplier per decision problem Mult. (cid:0) best worst (cid:1) POA Common-Lines Due-Time Fast-Lane 41.93% 76.13% 50.93% FCFS 41.81% Pod-Match Random 81.18% 41.71% ROA PPS RPS PSA Random Pod-Batch 53.71% 57.99% Nearest Age Demand Lateness 52.70% 48.63% 62.16% Nearest Emptiest Least-Demand 58.42% 59.63% 57.71% Fixed Nearest 54.08% 58.79% 61.50% Class 56.16% Class 55.91% Random 47.56% Random Station-Based 53.60% 55.70% Pile-on Random 59.82% 48.88% 1.946 1.080 1.278 1.254 1.097 Table 8 shows for each decision problem the unit throughput rate score for each of the decision rules, averaged across all simulations in phase 1. We calculate the multiplier by dividing the highest unit throughput rate by the lowest. As the multiplier in unit throughput rates is rather large for the POA decision problem, system integrators and RMFS suppliers may benefit from carefully selecting a POA decision rule and from investigating better decision rules for this decision problem. The multiplier for the Replenishment Order Assignment is near 1, indicating that using a different decision rule does not offer much performance improvements. However, we note that we keep the sequence of incoming replenishment orders fixed at all times in this work, which limits improvement potential. Nevertheless, we expect limited degrees-of-freedom in replenishment operations to be more realistic, because the sequence will typically be a result of preceding operations or systems. Moreover, the limited number of replenishment stations diminishes the impact of ROA decision rules even more. Furthermore, the impact of the Pod Storage Assignment selection rule seems to be fairly low. This may be a reason of the quite small layout. We expect the impact of PSA decision rules to increase with the size of the instance layout, because the effect on the traveled distance would grow by a large amount. In the following we analyze the achieved throughput performance per decision rule. For this, Figure 8 shows the box-plots of unit throughput rate scores for each decision problem grouped per decision rule. The boundaries of the boxes are determined by the upper and lower quartile while the line in the middle indicates the median value. The whiskers extend from the boxes to the minimum and maximum values. The first observation is that throughput performance of the RMFS is most sensitive to the choice of POA decision rule among the defined decision rules. This aligns with the previously observed correlations, because the choice of POA immediately affects the pile-on, which 27 Figure 8: Unit throughput rate performance of all runs grouped per rule is identified as a major performance driver. The best performing POA strate- gies are FastLane and PodMatch, which both look at the incoming pods at a pick station when assigning new pick orders from the backlog. This suggests that a strategy aligning pick orders with the content of incoming pods seems most promising for throughput efficiency. This backs up the findings of [2]. Although the Common-Lines rule exploits a similar greedy strategy, it achieves substantially less throughput. Hence, only matching pick orders to each other but not to the content of the pods squanders throughput capabilities of the system. All other POA decision rules achieve similar throughput performance, since they do not consider order characteristics that would affect pile-on or traveled distance. When looking at the PPS rule box-plots the average best throughput perfor- mance with least variance is achieved by the Age, Nearest and Pile-on rules. All of them focus either on maximizing the pile-on or minimizing the trav- eled distance. Although the Age rule does only indirectly maximize pile-on, it achieves a higher average pile-on of 2.92 among all RCs containing it than the 28 20 %30 %40 %50 %60 %70 %80 %90 %100 %Common-LinesDue-TimeFast-LaneFCFSPod-MatchRandomunit throughput rate scorePOA rules20 %30 %40 %50 %60 %70 %80 %90 %100 %RandomPod-Batchunit throughput rate scoreROA rules20 %30 %40 %50 %60 %70 %80 %90 %100 %AgeDemandLatenessNearestPile-onRandomunit throughput rate scorePPS rules20 %30 %40 %50 %60 %70 %80 %90 %100 %ClassClosestEmptiestLeast-DemandRandomunit throughput rate scoreRPS rules20 %30 %40 %50 %60 %70 %80 %90 %100 %ClassFixedNearestRandomStation-Basedunit throughput rate scorePSA rules actual Pile-on rule, which achieves an average pile-on of 2.79. The Demand rule has the highest spread across PPS rules with a very low median, but also provides some top performing RCs (see Table 9). This suggests that the throughput performance of the rule has a higher dependency on the selection of other rules. Although the variation among the ROA decision rules is small, we observe a slightly better throughput performance by the Pod-Batch rule. This is a reason of the smaller number of trips necessary when batching replenishment orders. Many of the top performing RCs contain the Emptiest or Closest RPS decision rule. The main reason for the good throughput performance again seems to rely on fewer and shorter trips. The Emptiest rule decreases the number of trips, because more replenishment orders are stored in pods at once until it is full. E.g., only 31.03 % pods need to be brought to replenishment stations in average when compared to the Random rule. The Closest rule benefits from a similar effect since the same (closest) pod is used for further replenishment or- ders even while it is already approaching. Furthermore, Closest decreases the distance per replenishment trip, because nearer pods are used. The Random rule performs worst for RPS. The main reason for this is that too many trips are caused by randomly selecting pods while only storing few replenishment orders per trip. Among the PSA decision rules we observe the best throughput performance for the Nearest strategy. This is again mainly caused by the shorter trips for the robots. When comparing the Nearest and the Station-based rule we see an overall benefit when ... shorter trips for replenishment operations too, and not using the robots working for replenishment operations to prepare pods for pick operations. However, this depends on the queue length at stations and the distribution of robots between replenishment and picking. I.e., if longer queue times are expected at replenishment stations, moving pods nearer to the pick stations when returning them to the inventory may improve overall throughput performance. The Fixed and Random decision rules differ little in their performance. The main reason for this is that the storage location per pod in the Fixed rule is randomly selected. Thus, leading to a very similar behavior. Due to the large sample sizes, the results of ANOVA and Tukey's range tests rejected the hypotheses that the means were equals at the 0.05 significance level within groups and pair-wise, with five exceptions. The null hypothesis of equal means was not rejected at the 0.05 significance level for POA rules FCFS and Due-Time, for Random and Due-Time, and for Random and FCFS. Fur- thermore, for PPS rules Random and Lateness the hypothesis of equal means could not be rejected, and for PSA rules Station-Based and Class. 29 Table 9: RCs with best throughput score selected from first phase (performance is unit throughput rate score) RC rank 1 2 3 4 PPS POA ROA RPS Pod-Match Pod-Batch Demand Emptiest Nearest Pod-Match Pod-Batch Demand Emptiest Station-Based Pod-Match Pod-Batch Nearest Emptiest Nearest Class Pod-Match Pod-Batch Demand Emptiest PSA performance 94.81 % 94.63 % 94.43 % 94.00 % 8.2 Phase 2 From the 1620 RCs in phase 1, the four with the highest unit throughput rate (see Table 9) together with the benchmark RCs form the set of ten RCs used in phase 2. The main purpose of phase 2 is to examine how well the RCs perform under different circumstances. In the following we analyze the results obtained for the 12 warehouse scenarios and 30 resource settings described before (see Section 7.1). Table 10: Best unit throughput rate score for all scenarios, robots per pick station and numbers of pick stations. Scenario abbreviations: [SKU count: 1000 (1K), 10000 (10K)]-[Order size: Small (S), Medium (M), Large (L)]- [Return orders: yes (R), no (N)] 4 5 6 3 2 1 Stations Robots 2 3 4 5 6 2 3 4 5 6 2 3 4 5 6 2 3 4 5 6 2 3 4 5 6 2 3 4 5 6 1K-S-N 44 82 91 97 97 59 89 94 97 98 64 90 95 97 98 60 87 93 97 98 57 87 93 97 98 59 87 94 97 98 1K-S-R 46 82 92 97 97 59 89 94 97 98 63 90 95 97 98 61 88 93 97 98 56 87 93 97 98 55 86 93 97 98 1K-M-N 45 83 92 97 98 60 90 95 98 98 64 90 95 98 98 60 88 93 98 98 57 88 94 98 98 59 88 94 98 98 1K-M-R 45 82 92 97 98 59 89 95 98 98 63 91 96 98 98 62 89 93 98 98 56 88 94 98 98 56 87 94 98 98 1K-L-N 54 83 93 99 99 66 90 97 99 99 68 91 96 99 99 67 88 94 99 99 63 86 94 98 99 63 87 94 99 99 1K-L-R 50 80 92 99 99 64 88 96 99 99 65 90 97 99 99 67 88 94 99 99 62 86 93 98 99 62 84 94 98 99 10K-S-N 21 39 55 68 78 27 44 59 72 81 28 46 61 73 80 29 47 59 69 77 30 47 57 68 77 31 45 58 68 76 10K-S-R 20 40 56 70 80 27 45 61 74 82 29 47 62 74 82 30 48 61 70 78 31 48 58 67 76 31 46 57 66 74 10K-M-N 23 41 58 71 81 28 46 61 75 84 29 48 64 76 83 30 49 61 71 80 31 48 60 71 80 32 47 60 71 79 10K-M-R 21 41 59 73 83 28 48 63 76 85 30 49 65 77 84 31 50 63 72 81 32 49 60 70 79 32 47 59 69 77 10K-L-N 36 63 84 94 98 44 71 89 96 99 46 73 87 94 98 47 69 83 92 97 46 67 84 91 97 45 68 83 91 97 10K-L-R 30 52 76 89 96 37 62 81 92 97 40 64 83 91 96 41 64 76 87 94 42 61 74 84 93 41 59 73 84 92 Table 10 shows the results, with the entries being the unit throughput rate as a percentage of the upper bound. In each cell the result of the best performing RC for the respective scenario and station / robot configuration is shown. The unit throughput rate scales well when adding more pick stations, the scaling is (almost) completely independent of the scenario characteristics. However, the necessary number of robots to achieve a given unit throughput rate greatly depends on the scenario characteristics, e.g., for more SKUs more robots are necessary to achieve a high unit throughput rate. The number of SKUs, does have a major impact on performance overall, where the main reason is that 30 pile-on is considerably lower for the 10000 SKU scenarios. A reason for this is the lower likeliness to have a pod with a good combination of SKUs matching the orders of the pick stations available. Thereby, if larger orders have to be processed with the system, this helps mitigating the negative effect of handling lots of SKUs. The main reason for this are the larger number of order lines ac- tive at a station when picking larger orders. I.e., more open order lines increase the likeliness of having a well matching pod available for the inventory required at a pick station. Processing return orders has an increased negative effect, if the order size of customer orders is large. However, in general, whether return orders are processed has a lesser effect on throughput performance than the other warehouse scenario variations. The reason behind this may be that even though approximately 19.76 % more time is spent on replenishment operations by the robots when compared to the scenarios without return order processing, replenishment operations are overall quick enough to mitigate the effect. Re- plenishment operations only consume 20.29 % out of the overall time consumed by the robots in average across all phase 2 simulation runs. Furthermore, we can conclude that with 1000 SKUs, the unit throughput rates are close to their theoretical maximum even with relatively few robots per stations. Table 11 shows the unit throughput rate score for the RCs for all combina- tions of number of robots (nr) and number of stations (ns), averaged across WSs and presented as whole percentages. From Table 11 we can see that the Ranked RCs from phase 1 perform similarly and better than the benchmark RCs. Among the benchmark RCs, the Greedy benchmark outperforms the oth- ers consistently across all settings and is the only one whose unit throughput rate scores approached those of the ranked RCs. 9 Conclusion In this work we studied the throughput performance of decision rules for mul- tiple decision problems occurring in the control of RMFS. By analyzing a total of eight output measures for a total of 1620 RCs, we found strong correla- tions between these. Most interestingly a high pile-on and a short distance traveled by the robots together almost immediately account for the success of a decision rule applied to RMFS. Hence, we propose using these two output measures as the key tactics when designing decision strategies for RMFS that aim to achieve high throughput. In the investigated high pressure situation further performance measures like the turnover time of pick orders were also highly correlated with the unit throughput rate, which is why we focused on the throughput itself as the main metric for a successful RMFS. Furthermore, we found that varying the decision rule used for solving the Pick Order Assignment affected the unit throughput rate the most. The average unit throughput rate was twice as high for the best decision rule as it was for the worst. This finding indicates that system engineers and warehouse operators should pay most attention to the Pick Order Assignment decision 31 Table 11: Unit throughput rate scores for the RCs in phase 2 (green ≡ best, red ≡ worst) Ranked RCs Benchmark RCs (ns , nr) 1 2 3 4 Demand Speed Nearest Class Greedy Random (1 , 2) (1 , 3) (1 , 4) (1 , 5) (1 , 6) (2 , 2) (2 , 3) (2 , 4) (2 , 5) (2 , 6) (3 , 2) (3 , 3) (3 , 4) (3 , 5) (3 , 6) (4 , 2) (4 , 3) (4 , 4) (4 , 5) (4 , 6) (5 , 2) (5 , 3) (5 , 4) (5 , 5) (5 , 6) (6 , 2) (6 , 3) (6 , 4) (6 , 5) (6 , 6) 30 28 32 28 60 59 61 58 76 75 76 74 86 86 86 84 91 91 91 90 42 41 43 39 68 67 68 65 81 80 80 78 88 88 88 86 92 92 92 91 45 43 46 42 70 69 70 66 81 81 81 79 88 88 88 86 92 92 92 90 45 44 47 42 68 67 69 65 78 78 78 76 86 86 86 84 91 90 90 89 43 42 45 40 67 66 68 64 78 76 77 75 85 84 85 83 90 90 90 88 44 42 45 41 66 64 66 63 77 76 77 75 85 84 85 83 90 89 89 88 18 34 49 62 73 25 40 55 67 77 27 43 57 68 77 29 44 56 66 74 29 44 55 63 72 30 43 53 62 70 11 23 23 34 45 11 23 29 37 47 15 23 31 41 50 14 23 34 43 53 14 24 35 45 54 15 25 35 45 53 25 42 55 66 74 32 47 59 69 76 32 48 60 69 76 34 49 59 68 74 35 48 58 66 73 35 48 58 65 71 34 57 72 82 87 42 64 76 84 89 44 65 77 84 89 45 64 74 82 87 43 63 73 81 86 43 62 73 80 85 14 24 37 47 58 18 29 40 51 62 19 30 42 52 62 20 31 42 51 60 20 31 41 49 58 20 31 40 48 55 23 40 57 70 79 28 47 63 74 83 32 50 65 75 83 34 51 64 74 81 34 51 63 72 80 35 51 62 71 79 32 problem. Moreover, the unit throughput rate score ranges from 25.24% for the worst RC assessed in phase 1 to 94.81% for the best scoring RC. Hence, the right combination of decision rules plays a crucial role when controlling an RMFS. We propose that future research may assess how to scale beyond the throughput performance of the merely simple decision rules investigated in this work. However, we observe some cross-dependencies between different strate- gies for the core decision problems featured in this paper, e.g., the Demand PPS rule is part of the best performing and the worst performing RC. Thus, an integrated and realistic evaluation or validation of new decision methods for RMFS is highly important, since dependencies exist and side-effects should not be neglected. Additionally, we found that the number of different SKUs in the system has a strong impact on the unit throughput rate. This finding is probably due to a decrease in pile-on for a higher number of SKUs. This effect is considerably less for larger orders, presumably because for larger pick orders pile-on tends to be higher. Having to process return orders seems to affect the unit throughput rate more, if the pick orders are large. Moreover, we found that the performance of the "greedy" benchmark consistently came close to the best ranked configurations of decision rules. This paper has studied solutions to several operational problems, which lead towards promising directions for future research. Each decision rule in this study has looked at an operational problem in isolation, but heuristics that try to integrate multiple operational problems and optimize these problems jointly could achieve substantial increases in order throughput or reductions in resources used. Investigating rules and heuristics that increase pile-on, i.e. the number of picks per handled pod, would also be of great use to practition- ers. While many decision rules and parameters were varied to deliver insightful re- sults we expect even more insight when varying the layout itself. For example, we expect a larger impact of the PSA rule selection when facing huge layout instances. This was not done in this work in order to keep a certain focus and to keep computational resource utilization for the conducted experiments tractable. RMFSs are a new category of automated systems and concepts spe- cific to RMFSs have not received much scholarly attention. An example would be cache zoning / priority zoning, that is the implementation of special zones near the workstations where pods are stored that will be needed in the near future, see also [6]. Another example would be a study of the automatic sorting of the system without explicit zones. Since pods can be relocated to another storage location each time they are transported to and from a workstation, the inventory can be sorted automatically to some degree during operations. It is not clear at which speed automatic sorting takes place or how much perfor- mance benefits from it. Automatic sorting is a unique feature of RMFSs, but as with so many other aspects of RMFSs, it remains to be explored. 33 Acknowledgements We would like to thank the Paderborn Center for Parallel Computing (PC2) for the use of their HPC systems for conducting the experiments. Marius Merschformann is funded by the International Graduate School - Dynamic Intelligent Systems, University of Paderborn. References [1] Michaela Beckschafer, Simon Malberg, Kevin Tierney, and Christoph Weskamp. Simulating storage policies for an automated grid-based ware- house system. In Tolga Bektas, Stefano Coniglio, Antonio Martinez- Sykora, and Stefan Voss, editors, Computational logistics, Lecture Notes in Computer Science, pages 468–482. Springer, Cham, 2017. [2] Nils Boysen, Dirk Briskorn, and Simon Emde. Parts-to-picker based order processing in a rack-moving mobile robots environment. European Journal of Operational Research, 262(2):550–562, 2017. [3] Business Wire. Amazon unveils its eighth generation fulfillment center. www.businesswire.com/multimedia/home/20141130005031/en, February 2015. [Accessed September 23rd, 2016]. [4] C. M. Chen, Y. Gong, M. B. M. de Koster, and J. A. E. E. van Nunen. A flexible evaluative framework for order picking systems. Production and Operations Management, 19(1):70–82, 2010. [5] J. J. Enright and P. R. Wurman. Optimization and coordinated autonomy in mobile fulfillment systems. Working paper, 2011. [6] M. Flipse. Altering and improving Kiva. Working Paper, 2011. [7] Christopher J. Hazard, Peter R. Wurman, and Raffaello D'Andrea. Al- phabet soup: A testbed for studying resource allocation in multi-vehicle systems. In Proceedings of AAAI Workshop on Auction Mechanisms for Robot Coordination, pages 23–30. Citeseer, 2006. [8] S. S. Heragu, X. Cai, A. Krishnamurthy, and C. J. Malmborg. Analytical models for analysis of automated warehouse material handling systems. International Journal of Production Research, 49(22):6833–6861, 2011. [9] T. Lamballais, M. Merschformann, D. Roy, L. Suhl, and M. B. M. De Koster. Optimal policies for resource reallocation in a robotic mo- bile fulfillment system. Working paper, 2017. [10] T. Lamballais, D. Roy, and M. B. M. de Koster. Estimating performance in a robotic mobile fulfillment system. European Journal of Operations Research, 256:976–990, 2017. 34 [11] T. Lamballais, D. Roy, and M. B. M. de Koster. Inventory allocation in robotic mobile fulfillment systems. Working Paper, available at SSRN, 2017. [12] M. Merschformann, L. Xie, and D. Erdmann. Path planning for robotic mobile fulfillment systems. Working paper, available at arXiv, https://arxiv.org/abs/1706.09347, 2017. [13] Marius Merschformann, Lin Xie, and Hanyi Li. RAWSim-O: A simula- tion framework for robotic mobile fulfillment systems. Working Paper, available at arXiv, https://arxiv.org/abs/1710.04726, 2017. [14] S. Nigam, D. Roy, M. B. M. de Koster, and I. J. B. F. Adan. Analysis of class-based storage strategies for the mobile shelf-based order pick system. In Progress in Material Handling Research: 2014, 2014. [15] Kees Jan Roodbergen, Iris F.A. Vis, and G. Don Taylor. Simultaneous International determination of warehouse layout and control policies. Journal of Production Research, 53(11):3306–3326, 2014. [16] D. Roy, A. Krishnamurthy, S. S. Heragu, and C. J. Malmborg. Per- formance analysis and design trade-offs in warehouses with autonomous vehicle technology. IIE Transactions, 44:1045–1060, 2012. [17] M. Wulfraat. bution center? http://www.mwpvl.com/html/kiva systems.html, 2012. for your distri- Is Kiva systems a good fit An unbiased distribution consultant evaluation. [18] P. R. Wurman, R. D'Andrea, and M. Mountz. Coordinating hundreds of cooperative, autonomous vehicles in warehouses. AI Magazine, 29(1):9– 19, 2008. [19] Bipan Zou, Yeming Gong, Xianhao Xu, and Zhe Yuan. Assignment rules International in robotic mobile fulfilment systems for online retailers. Journal of Production Research, 90:1–18, 2017. [20] Bipan Zou, Xianhao Xu, Yeming Yale Gong, and Ren´e de Koster. Eval- uating battery charging and swapping strategies in a robotic mobile ful- fillment system. European Journal of Operational Research, 2017. A Upper bound on the unit throughput rate In the following we introduce an upper bound for the number of units picked per hour. This can be done by considering the constant time for picking (T P ) and the constant time for handling (T O) a unit at a pick station. For an overview of all necessary times see Table 12. If a robot is queueing in the buffer of a pick station, it is assumed that it already turns the right pick face 35 Table 12: Times for determining the upper bound on unit throughput (all times in seconds) Symbol Explanation T P T O T DI T T O T DO Time for picking one unit from the pod (after which the robot can be released, if no further picks are necessary) Time for handling one unit at a station (including picking, putting, pack- ing, etc.) The time for the robot to move up within the queue to the pick station's waypoint The time for the robot to prepare for leaving the station (turning towards exit) The time for the robot to clear the station's waypoint (time to cover the minimal distance) of the pod towards the side where the picker will be. Since the robot is waiting in the queue, this happens in the best case without any additional loss of time. During the actual pick process, the robot is occupied for T P seconds. After this time the robot is allowed to leave the station while the overall handling time for one unit at a station of T O can be longer. (a) Sample times for both mentioned cases (b) Times of the different steps involved in picking units There are two cases to distinguish for obtaining a performance upper bound. First, if the time for picking a unit from the pod plus the time for moving up the next robot (i.e. the time to turn and drive away from the station and the time for the next robot to approach the station from the queue area) is smaller than the overall handling time of a unit at the station, there is a surplus of time available on the system side and the performance is limited by the handling time of the picker (see case 1 in Figure 9a). In the second case we face a longer time for moving up the next robot, hence, in this case we have a loss of time on the system's side and the system is limiting the throughput performance of the picker (see case 2 in Figure 9a). For the sake of clarity we define the time for moving up the next robot in queue as T M U := T DI + T T O + T DO. 36 Robot 1:Human:Robot 2:WaitTurnDriveTPTTOTDODriveTDIWaitTPHandlingTOHandlingTORobot 1:Human:Robot 2:WaitTurnDriveTPTTOTDODriveTDIWaitTPHandlingTOHandlingTOCase 1Case 2LossPlusTDITTOTDOTPTO  U B := (cid:12)(cid:12)MO(cid:12)(cid:12) 3600 (cid:12)(cid:12)MO(cid:12)(cid:12) IPO T O 3600 T P + T M U − T O + IPOT O T P + T M U ≤ T O else (10) Considering both cases we can determine an upper bound on the unit through- put rate, i.e. the number of units picked per hour (see Equation 10). For the first case we only need to consider the unit handling time of the picker to determine the maximum throughput rate of one station and multiply it with the overall count of pick stations(cid:12)(cid:12)MO(cid:12)(cid:12). The second case is slightly more com- plicated, because we also need to consider the pile-on. In the denominator we first calculate the loss of time seen in Figure 9a and add it to the average handling time of a pod based on the estimated number of picks from it (IPO). We calculate how many pods are handled in one hour and multiply this by the IPO and the number of stations overall to get the overall upper bound. We recognize that this upper bound on the unit throughput rate relies on some heavy assumptions for real systems, but still propose it as a rule-of-thumb for practitioners, since it is useful for implementations where the time for moving the next robot, the handling times and the pile-on can be estimated. It is a natural limit of the system's performance that the system cannot exceed, even if the number of robots is more than sufficient to supply a continuous stream of pods and all rules are performing well. For this work, the upper bound is correct, because all mentioned times can be accurately determined or are constant and are not subject to random influence within the simulation. 37
1605.04360
1
1605
2016-05-14T01:20:25
Variational Inference with Agent-Based Models
[ "cs.MA" ]
In this paper, we develop a variational method to track and make predictions about a real-world system from continuous imperfect observations about this system, using an agent-based model that describes the system dynamics. By combining the power of big data with the power of model-thinking in the stochastic process framework, we can make many valuable predictions. We show how to track the spread of an epidemic at the individual level and how to make short-term predictions about traffic congestion. This method points to a new way to bring together modelers and data miners by turning the real world into a living lab.
cs.MA
cs
Variational Inference with Agent-Based Models Wen Dong Department of Computer Science and Engineering & Institute of Sustainable Transportation and Logistics State University of New York at Buffalo [email protected] 6 1 0 2 y a M 4 1 ] A M . s c [ 1 v 0 6 3 4 0 . 5 0 6 1 : v i X r a ABSTRACT In this paper, we develop a variational method to track and make predictions about a real-world system from con- tinuous imperfect observations about this system, using an agent-based model that describes the system dynamics. By combining the power of big data with the power of model- thinking in the stochastic process framework, we can make many valuable predictions. We show how to track the spread of an epidemic at the individual level and how to make short- term predictions about traffic congestion. This method points to a new way to bring together modelers and data miners by turning the real world into a living lab. Keywords Social simulation, interactive simulation, novel agent and multi-agent applications, epidemic dynamics, short term traf- fic forecasting, discrete event simulation, stochastic kinetic model, variational methods, expectation propagation, Bethe variational principle, Markov process. 1. INTRODUCTION Agent-based modeling has been employed by researchers in many disciplines to specify the elements of a complex sys- tem and their interactions, to check their understandings of a system, to conduct thought experiments and to inform de- sign and analysis [16, 47, 6, 21]. With the availability of big data in recent years [10, 30, 12], we hope to track and make predictions about a real world system from the data that represent the continuous observations of this system and an agent-based model that specifies how the system evolves, and consequently to turn our world into a living lab. In this paper, we identify the agent-based model as a discrete-event Markov process, and develop a variational inference method that searches the latent state trajectories of the elements of the system in the probability space that are most compat- ible with the noisy observations by minimizing the Bethe variational principle [4]. Data have traditionally been used by agent-based mod- elers to calibrate model parameters, drive model execution, and validate the model. The inquiry in this paper is instead about how continuous imperfect observations about a real- Appears in: Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2016), J. Thangarajah, K. Tuyls, C. Jonker, S. Marsella (eds.), May 9 -- 13, 2016, Singapore. Copyright c(cid:13) 2016, International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved. world system can help us make inferences about the system here and now. Instead of simulating traffic jams at rush hours using road network data and agent trips synthesized from census data [32, 42], we are more interested in predict- ing whether today's traffic jams will be formed earlier or last longer from the trajectories of probe vehicles, and how the knowledge about future traffic states will help drivers use the road network more efficiently. Instead of constructing the S- shaped curve of an infectious population from simulation [8, 31], we are more interested in who got a sniffle from his dynamic social network and how we can prevent epidemics from further spreading [29, 14, 18]. Instead of showing the emergence of cities and roads from how people explore and exploit resources [2, 44, 19], We are more interested in iden- tifying poverty and extracting census information from how people make phone calls [5, 10, 38]. Predictions with an agent-based model about real-world data are interpretable in terms of how agents interact with one another and change states, and are amenable to reason regarding non-recurrent scenarios. This transparency about the predictions is lack- ing in non-parametric approaches. Our approach is to identify an agent-based simulator as a Markov process, and to search in the probability space spec- ified by the simulator for agent behaviors and interactions that best match the continuous observations about our real- world system. The key observation behind this approach is that an agent-based simulator generates different sample paths with different probabilities -- it therefore defines a stochastic process with a probability measure assigned to the space of the sample paths that describe the interactions among the elements of the system. In this stochastic pro- cess, the system state as a function of time is composed of the states of its elements. This stochastic process is driven by a number of events that change the system state and happen with event rates that are functions of the current system state. A sample path of the stochastic process is de- fined by a sequence of events and the corresponding times when those events happened, from which we can unambigu- ously recover the system state as a function of time. An agent-based simulator therefore iteratively samples the next event according to event rates then changes the world state according to the sampled state starting from the initial state, until the required amount of simulated time has passed. To find out the maximum likelihood probability distribu- tion of the system state Xt for t1 ≤ t ≤ t2 from observed system state xt1 at time t1 and xt2 at time t2, we follow the forward-backward algorithm: we first let the probability mass diffuse from xt1 in the forward step according to how this system evolves from t1 to t2, and then we iteratively trace backwards from t2 to t1 in the backward step how the probability mass ended at system state xt2 instead of an- other state. After the forward step and the backward step, we get the probability distribution of system state Xt for t1 ≤ t ≤ t2 conditioned on both of its states xt1 and xt2 . The challenge in making probabilistic inferences about an agent-based model is that we have to deal with an exploding state space -- for just a simple task of tracking the binary states of 50 agents, we must cope with 250 combinatorial states because the agents interact with one another. And, of course, a real-world system is much larger. To cope with this exploding state space, we use mean field approximation: the probabilistic evolution of an agent state is determined by the mean field (average) effect of the states of the other agents. The variational framework for making inferences about stochastic processes was developed in the field of ma- chine learning [45] as minimizing Bethe variational principle [4] with applications to expectation propagation [33, 24] and loopy belief propagation [34]. This paper therefore advocates that we should combine the power of big data and the power of model-thinking in the stochastic process framework. Agent-based modeling is a physicist's approach for modeling human societies when data are unavailable and experiments impossible [16], and we believe that big data will transform agent-based model- ing from speculation into a physical science. This paper also offers a solution that fits to big time-series data any agent- based model defined by a production rule system based on mean-field approximation. Hence, this system brings to- gether modelers and data miners. We have benchmarked our solution on systems of hundreds of agents, and our bench- marking gives meaningful results. The rest of this paper is organized as follows. In Section 2 we introduce a probabilistic production (rule) system to describe the microscopic dynamics of a generative model, and identify the production system as a stochastic process. In Section 3 we derive a mean-field solution to the gener- ative model under the constraint of data. In other words, given a simulator and noisy observational data about a pro- cess generated by the simulator logic, our algorithm infers the probabilities on a per-agent basis of all possible out- comes. In Section 4 we give examples and benchmark this algorithm against other algorithms. We summarize what we have accomplished and offer our speculation about big data in Section 5. 2. STOCHASTIC PROCESS INDUCED BY AGENT-BASED MODELS In this section, we introduce the stochastic kinetic model described by the Gillespie algorithm [22] to make inferences about social dynamics from information about individuals in the social system. A "stochastic kinetic model" is a chemist's way of describing the temporal evolution of a system with M agent species driven by V events (or chemical reactions) parameterized by rate constants c = (c1, . . . , cV ). At any specific time t, the populations of the species are xt = (x(1) ). An event v happens with rate hv(xt, cv), changing the populations by ∆v. The V events are mutually independent. , . . . , x(M ) t t Gillespie algorithm 1. Initialize the system at time t = 0 with rate constants c1, . . . , cV and initialize the populations of the species as x(1), . . . x(M ). 2. Simulate the time τ to the next event according to exponential distribution τ ∼ Exponential(h0(x, c) = (cid:80)V v=1 hv(x, cv)). 3. Simulate the event v according to categorical distribu- tion v ∼ Categorical( h1 , . . . , hV h0 ). h0 4. Update and output time t ← t + τ and populations x ← x + ∆v. 5. Repeat steps 2-5 until the termination condition is sat- isfied. The stochastic kinetic model specified by the Gillespie al- gorithm assigns a probability measure to a sample path of the system induced by a sequence of events v1, . . . , vn, hap- pening between time 0 and time T , 0 = t0 < t1 < ··· < tn < T , which is P (v1, . . . , vn, t1, . . . , tn, x) n(cid:89) n(cid:89) i=1 = = hvi (xti−1 , cvi ) exp hvi (xti−1 , cvi ) exp (cid:32) (cid:18) − n(cid:88) i=1 − (cid:33) h0(xti−1 , c)(ti − ti−1) (1) (cid:19) d t h0(xt, c) . i=1 The stochastic kinetic model was designed to explain the macroscopic properties of a system via the microscopic in- teractions among particles in the system [47]. If we are able to observe particles, we expect not only to improve our esti- mation of the system properties but also to make inferences about the particles. When this model is applied to a so- cial system, the particles are the individuals in the system, and the capability to make inferences about these particles becomes even more important. An event in the Gillespie algorithm looks like the following: (1) v X(1)+···+α α (1) v X(1)+···+β (M ) v X(M ), (M ) v X(M )→β (cid:81)M hv (x,ck)=cv gv (x)=cv ∆v = (β(1) v − α(1) v ,··· , β(M ) m=1 g (m) v (x(m))=cv v − α(M ) v ). (cid:81)M m=1(x(m))α (2) (3) (m) v , v individuals of species 1, α(2) When α(1) individuals of species 2 ... meet, they trigger event v with rate constant cv, which result in β(1) individuals of species 2, and so on. The rate hv(x, cv) for this event to (m) v happen is rate constant cv times a total of(cid:81)M individuals of species 1, β(2) x(m)(cid:17)α (cid:16) v v v m=1 different ways for the individuals to meet. When the components of the agent-based model X (1), ··· , X (M ) lose meaning as the populations of agent species, we can find the probability distribution of a component state among a finite partition of the component's state space. When the event rates cannot be expressed as the multipli- cations of component contributions in the form of Eq. 3, we take Taylor expansions of the event rates around the mean value of the system state hv(x, cv) = ∂αhv(Ex, cv), (cid:88) (x − Ex)α α≥0 α! with each term being in the form of Eq. 3. α is a multi-index and E is the expectation operator. Although the stochastic kinetic model is a continuous time model, we work with a discrete time stochastic model in the rest of this paper, because our goal is to track stochastic kinetic dynamics from observations of populations or indi- viduals with countably many computational steps. There are two ways to turn a continuous stochastic process into a discrete one, both of which involve Jensen's uniformiza- tion/randomization method [23]. p(x0 → xτ ) =(cid:80)∞ The first method for discretizing a continuous time stochas- tic system is through approximating the continuous time process with a discrete time process on a countable set of equally spaced time points 0, τ, 2τ, . . . , with a time interval so small that the probability of more than one event happen- ing in the interval τ is negligible. This approximation works because the state transition kernel from time 0 to time τ is according to the uniformization method, where γ is a uniformization rate, I is the identity matrix and Q is the infinitesimal generator defined by hk, k = 1, . . . , V . With γ → ∞ and γτ = 1, we get a first-order approximation of the state transition kernel I + Q · τ . exp(−γτ ) (γτ )n (cid:17)n I + Q γ (cid:16) n=0 n! Specifically, let v1, . . . , vT be a sequence of events in the discrete time stochastic kinetic system, x1, . . . , xT be a se- quence of states (populations of species), and y1, . . . , yT be a set of observations about the populations. Our goal is to make inferences about {vt, xt : t = 1, . . . T} from {yt : t = 1, . . . , T} according to the following probabil- ity measure, where indicator function 1(xt − xt−1 = ∆vt ) is 1 if the previous state is xt−1 and the current state is xt = xt−1 + ∆vt , and 0 otherwise. P (xt, yt, vtxt−1), (4) P (v1,...,T , x1,...,T , y1,...,T ) = where P (xt, yt, vtxt−1) (cid:40) = P (vtxt−1)1(xt − xt−1 = ∆vt )P (ytxt), (5) ckτ · gk (xt−1) 1 −(cid:80) j cjτ gj (xt−1) if vt = k if vt = ∅ . (6) and P (vtxt−1) = The second way to discretize a continuous time stochas- tic system is by introducing a uniformization rate γ that is faster than all event rates in Q and inspecting a discrete time Markov chain defined by the state transition matrix I + Q λ , with the transitions happening at time t1, t2, . . . , sampled according to a uniform Poisson process with rate γ. This works because according to the uniformization method the uniformised continuous time process has the same probabil- ity measure as the original process. We employ a stochastic kinetic model to simplify the state space transition kernel for several reasons. First, the stochas- tic kinetic model already successfully describes the time evo- lution of reaction systems in many areas, including chem- istry and cell biology [1, 22]. It is therefore a more natural model for describing and tracking the spatio-temporal pro- cess driven by events. Second, the event based transition T(cid:89) t=1 kernel is more general and flexible -- we can define the num- ber of events based on the complexity of real transitions. 3. MAKING INFERENCES WITH AN AGENT-BASED MODEL In this section, we derive a mean-field solution to infer the probabilities on a per-agent basis of all possible paths of system evolution, given a simulator and noisy observational data about this system generated by the simulator logic. 3.1 Variational Inference Recall the forward-backward algorithm to make inferences with a state space model [39]. Let Xt be the hidden states and yt be the observations of a discrete-time state-space model (Kalman filter and hidden Markov model) identified by a transition probability P (Xt+1Xt) and an observation model P (YtXt), where t = 1,··· , T . The forward-backward algorithm for making inferences about hidden states Xt from observations yt is comprised of a forward/filtering sweep to compute the forward statistics α(xt) = P (xty1,··· , yT ) and a backward/smoothing sweep to estimate the one-slice statistics γ(yt) = P (xt y1,··· , yT ). From the forward statis- tics and the one-slice statistics we can extract the backward statistics β(xt) = γ(xt)/α(xt) and the two-slice statistics ξ(xt, xt+1) = α(xt)P (yt+1, xt+1 xt)β(xt+1)P (yt+1y1,··· ,t). Here we follow the tradition, use upper case letters for ran- dom variables and use lower case letters for the values of random variables. t t , X (2) ,··· , X (M ) The challenge with making inferences about a non-trivial agent-based model is that we have to search in a formidable state space -- Xt = (X (1) ), where the su- perscripts 1,··· , M represent the states of the interacting elements of the system. We therefore estimate the state dis- tributions of the hidden states in an amenable state space with mean field approximation γt(xt) =(cid:81) (cid:88) minimize over ξt(xt−1,t, vt) : (x(m) t ): (7) ξt(xt−1,t, vt) log ξt(xt−1,t, vt) m γ(m) t t P (xt, vt−1, ytxt−1) t;xt−1,t;vt (cid:89) −(cid:88) (cid:89) γ(m) t (x(m) t ) log γ(m) t (x(m) t ) t;xt m m ξt(xt−1, xt, vt) = γ(m) t (x(m) t ), for all t, m, x(m) t , (8) ξt(xt−1, xt, vt) = γ(m) t−1 (x(m) t−1), for all t, m, x(m) t−1, γ(m) t (x(m) ) = 1, for all t, m, x(m) t . subject to:(cid:88) (cid:88) (cid:88) xt: fixed x t (m) t vt;xt−1,t: fixed x (m) t vt;xt−1,t: fixed x (m) t−1 (cid:88) (9) (10) We apply the method of Lagrange multipliers to solve this optimization problem, which begins with forming the La- grange function to be optimized: t;xt−1,t;vt ξt(xt−1,t, vt) log −(cid:88) (cid:89) ξt(xt−1,t, vt) P (xt, vt−1, ytxt−1) (cid:89) γ(m) t (x(m) t ) log γ(m) t (x(m) t ) (11) t;xt m m (cid:88) (cid:88) (m) t t;m;x + + t;m;x (m) t−1 (cid:88) (cid:88) β(m) t,x (m) t ( ξt(xt−1, xt, vt) − γ(m) t (x(m) t )) vt;xt−1,t: fixed x (m) t α(m) t−1,x (m) t−1 ξt(xt−1, xt, vt) − γ(m) t−1 (x(m) t−1)). ( vt;xt−1,t: fixed x (m) t−1 t =i)) is associated with the marginal- t t t t (x (x (m) (m) (m) i β i α (m) t (m) t (m) t (x(m) (x(m) t,i ·1(x t,i ·1(x ) = α(m) )=exp((cid:80) )=exp((cid:80) Taking the derivative of the expression involving Lagrange ), we see that multipliers over ξt(xt−1, xt, vt) and γ(m) α (m) (m) ized forward probabilities, β t =i)) t is associated with the marginalized backward probabilities, with γ(m) ). The dual opti- mization problem is to find the marginal forward statistics α(m) (x(m) ) to maximize the approximate partition function given by Eq. 12, and the solution is the fixed point of Eq. 13, where nor- malization constant Zt = P (yty1,··· ,t−1): log P (y1,··· ,T )=(cid:80) ) and the marginal backward statistics β(m) t−1)P (xt,vtxt−1)(cid:81) log (cid:80) )β(m) (x(m) (x(m) (x(m) (m) t−1(x (cid:81) (m) t (m) t (m) (x α β ) t t t t t t t t m t xt−1,t m m P (cid:17)(cid:89) (cid:16) (cid:16) y(m) t α(m) t−1 x(m) 1 Zt x(m) t−1 ξt(xt−1, xt, vt) = P (xt, vtxt−1) (cid:17) ·(cid:89) where P (xt, vtxt−1) = (cid:17)·(cid:81) t−1))·(cid:81) ·(cid:89) ckτ(cid:81) (1−(cid:80) Marginalizing Eq. 13 over all chains X (m(cid:48)) (cid:16) k ckτ(cid:81) t −x m 1(x m 1(x (m) (m) m g k (cid:40) (m) (m) t−1=∆ k t −x (m) (m) t−1=0) (m) k (m) t−1 m g (m) (x m m x ) t (12) (13) (cid:17) (cid:16) β(m) t x(m) t , (14) vt = k (cid:54)= ∅ vt = ∅. for m(cid:48) (cid:54)= m and t, we find that the solution to the Bethe variational principle is the mean field approximation of the original dynamics with marginal two-slice statistic given by Eq. 15. From the mean field approximation, α(m) can be solved by forward-backward algorithm and fixed point iteration. t,i and β(m) t,i t t , vtx(m) P (x(m) t−1) t−1) · P (y(m) t x(m) t (15) )β(m) t (x(m) t ), (m) t −x (m) t−1=∆ (m) k ) 1(x (m) t −x (m(cid:48)) (x t )β t (m) t−1=0) (m(cid:48) ) (m(cid:48) ) k )g v (m) (16) t =k(cid:54)=∅ t = ∅, v(m) (m(cid:48)) t−1 ) (x ξt(x(m) t−1, x(m) t where P (x(m) t (m) k ckτ g 1−(cid:80) (cid:80) k g(m(cid:48)) k,t−1 = , vt) = 1 Zt · α(m) t−1(x(m) , vtx(m) t−1) ∝ t−1) (cid:81) (m(cid:48) ) k,t−1·1(x g t−1) (cid:81) m(cid:48)(cid:54)=m (m) k (m) (m) (x (x ckτ g α (m(cid:48) ) x t (cid:80) x t α (m(cid:48) ) (m(cid:48) ) k,t−1 g (m(cid:48) ) m(cid:48)(cid:54)=m (m(cid:48)) t t t k x (cid:80) (m(cid:48) ) (m(cid:48)) t−1 )P (y t−1 (x (m(cid:48) ) (m(cid:48)) t−1 ≡∆ −x t−1 )P (y(m(cid:48)) α(m(cid:48)) t−1 (x(m(cid:48)) (m(cid:48) ) (m(cid:48) ) t−1 ≡0 −x x t (m(cid:48) ) (m(cid:48)) t−1 (x t−1 )P (y (m(cid:48) ) −x t−1 ≡0 α(m(cid:48)) t−1 (x(m(cid:48)) (m(cid:48) ) (m(cid:48) ) −x t−1 ≡0 x t t−1 )P (y(m(cid:48)) j,t−1 + 1 −(cid:88) (cid:80) (cid:89) g(m) (m(cid:48)) (m(cid:48) ) cjτ x t t t g(m(cid:48)) k,t−1 = (cid:88) Zt = cjτ , , x(m(cid:48)) t )β(m(cid:48)) t (x(m(cid:48)) t ) (m(cid:48)) (m(cid:48) ) t (m(cid:48) ) k )g (m(cid:48)) t−1 ) (x (x )β t x(m(cid:48)) )β(m(cid:48)) t (x(m(cid:48)) t ) t (cid:89) g(m) j,t−1. j m j m The above is a factorized stochastic kinetic model. The , vt) in Eq. 15 marginal two-slice probability ξt(x(m) t−1, x(m) t t , vtx(m) takes the same form as the coupled two-slice probability ξt(xt−1, xt, vt) in Eq. 13. The marginal state transition ker- nel P (x(m) t−1) in Eq. 16 consists of choosing an event (or no event) vt according to event probability P (vtx(m) t−1) and changing the state x(m) in a deterministic way, similar to the joint state transition kernel P (xt, vtxt−1) in Eq. 14, except that we marginalize over all x(m(cid:48)) for m(cid:48) (cid:54)= m. t Hence the solution to the above Bethe variational princi- ple through Legendre-Fenchel transform [40] is one in which the interacting elements of the system evolve their states marginally according to the average effects of the other el- ements. As such, instead of searching the joint probability space of of (X1,··· , XT ), we search the marginal probability spaces of (X (m) ,··· , X (m) ). 1 T 3.2 Graphical Model Representation The stochastic kinetic model with its distinct graphical model structure is more suitable than traditional models for modeling complex interactions in social dynamics. To illus- trate this point, we compare its graphical model with the coupled hidden Markov model. A coupled hidden Markov model (CHMM, Figure 1(a)) combines a number of conventional hidden Markov models (HMMs) to model the dynamics of interacting processes [7, 35]. In CHMM the latent state of HMM at time t depends on the latent states of all HMMs at time t − 1. Traditional ways to simplify the state transition kernel include the fac- torial hidden Markov model which decouples the inter-chain probability dependence [28] and the hidden Markov decision tree which assumes fixed and sparse inter-chain probability dependence [20]. A stochastic kinetic model has a graphical model repre- sentation different from CHMM, as shown in Figure 1(b). First, we define a set of stochastic events to summarize the complex interactions and decouple direct dependencies be- tween nodes. Second, while the system can move from any state to any other state in a CHMM, in any infinitesimal time interval no more than one out of V possible events is happening in a stochastic kinetic model. Third, conditioned on the system state x(1) t−1 describing the popula- tions of species 1, . . . , M , the latent state at the next time step x(1) could be dependent. (Consider an event that changes population m1 and population m2 simultane- , . . . , x(M ) ously.) at time t are conditionally independent given the states t−1 at time t − 1. Thus the inference algorithms x(1) t−1, . . . , x(M ) of CHMM are not applicable for modeling the complex in- teractions in social dynamics driven by events. In contrast, in a CHMM the states x(1) t−1, . . . , x(M ) , . . . , x(M ) t t t t The factorial stochastic kinetic model has a graphical model similar to the stochastic kinetic model except that it fac- torizes stochastic events to individual species (Figure 1(c)). The new graphical model further simplifies the inference al- gorithm. 3.3 Parameter Learning In order to find the rate constants cv in a stochastic ki- netic model and in a factorial stochastic kinetic model, we maximize the expected log likelihood and the Bethe entropy approximation respectively over these rate constants. The likelihood of rate constants cv in a continuous time stochastic kinetic model with respect to a sample path iden- (a) CHMM (b) SKM (c) FSKM Figure 1: In comparison of coupled hidden markov model (a), a stochastic kinetic model (b) decouples inter-chain interactions with events v and allows factorization (c). tified by events v1,··· , vn, system states to xt1 ,··· , xtn and times t1,··· , tn is given in Eq. 1, and the event rates are given in Eq. 3. To find the maximum likelihood estimate of the rate constants, we set the partial derivatives of the log-likelihood over the rate constants to 0: log P = (cid:80) log P = i i log cvi +log gvi (xti−1 )−(cid:80) (cid:80) (cid:80) −(cid:88) j cj gj (xti−1 )·(ti−ti−1), gv(xti−1 ) · (ti − ti−1), (cid:80) (cid:80) (cid:80) ´ i gv(xti−1 )(ti − ti−1) i 1(vi = v) T 0 d t gv(x(t)) i 1(vi = v) i 1(vi = v) cv = . i ∂ ∂cv cv = ´ Hence, the maximum likelihood estimate of the rate con- stants cv is such that the numbers of events that are ex- pected to happen according to the event rates along the T sample path 0 dt cvgv(x(t)) match the numbers of events i 1(vi = v) that happened in the sample path. Indicator function 1(vi = v) takes value 1 if vi = v and 0 if vi (cid:54)= v. (cid:80) The likelihood of rate constants cv in a discrete time stochas- tic kinetic model with respect to a sample path identified by events v1,··· , vT , system states x1,··· , xT and observations y1,··· , yT is given in Eq. 4. To find the maximum likelihood estimate of the rate constants, we similarly set the partial derivatives of the log-likelihood over the rate constants to 0: log P = log p(ytxt) + log p(vtxt−1)1(xt−xt−1=∆vt ) (cid:88) (cid:80) ∂ ∂cv cv = log P = t (cid:80) 1−(cid:80) (cid:80) t t 1(vt = v) cv t 1(vt = v) τ gv (xt−1)·1(vt=∅) j cj τ gj (xt−1) (cid:88) −(cid:88) t t τ gv(xt−1)1(vt = ∅) j cjτ gj(xt−1) 1 −(cid:80) (cid:80) (cid:80) τ→0−→ ber of events that happened ((cid:80) j cjτ gj(xt−1)) and the fraction of null events ((cid:80)T (cid:80) extrapolated from the times of null events) with the num- t 1(vt = v)). As the in- terval τ approaches 0, the probability of a null event (1 − t=1 1(vt = ∅)/T ) both approach 1, and the maximum likelihood esti- mate of the rate constants in the discrete time stochastic kinetic model approaches the maximum likelihood estimate in the continuous time stochastic kinetic model. When the events v1,··· , vT and the system states x1,··· , xT are unobserved latent variables, we use the expectation max- imization (EM) algorithm to iteratively search for the rate constants that maximize the expected log likelihood over the probability distribution of the latent variables. EM is an it- erative method for finding the maximum likelihood estimate of the parameters in statistical models involving unobserved latent variables [11]. It alternates performing the expecta- tion (E) step, which constructs the expected log likelihood as a function of the parameters over the probability dis- tribution of the latent variables using the current estimate for the parameters, with the maximization (M) step, which computes the parameters to maximize the expected log like- lihood function constructed in the E step. The estimated parameters are used to determine the probability distribu- tion of the latent variables in the next E step. The expected log likelihood over the posterior probabil- ity of events v1,··· , vT and system states x1,··· , xT condi- tioned on the observations y1, . . . , yT takes the form in Eq. 17. Maximizing this expected log likelihood by setting its partial derivatives over the rate constants gives the updated estimate of rate constants in Eq. 18. Hence, the maximum likelihood estimate of the rate con- stants cv in a discrete-time stochastic kinetic model simi- larly matches the numbers of events that are expected to cv τ gv (xt−1)1(vt=∅) j cj τ gj (xt−1) , happen according to the event rates ((cid:80) 1−(cid:80) t ∂cv (cid:80) cv = t;xt−1 t ξ(vt = v) τ gv (xt−1)·ξ(xt−1,vt=∅) j cj τ gj (xt−1) t 1(vt = v) t τ gv(xt−1) . ∂E(log P ) E (log P ) = ξt(xt−1,t,vt;cold)·log P (xt,yt,vtxt−1;c) t;xt−1,t;vt ξ(vt=v) cv −(cid:88) t;xt−1 1 −(cid:80) τ gv (xt−1)ξ(xt−1,vt=∅) j cjτ gj(xt−1) (17) set = 0, (18) (cid:88) (cid:88) t = (cid:80) 1−(cid:80) x1,t-1x2,t-1x3,t-1x1,tx2,t-1x3,t-1y1,t-1y2,t-1y3,t-1y1,t-1y2,t-1y3,t-1t-1tHMM 1HMM 2HMM 3x1,t+1x2,t-1x3,t-1y1,t-1y2,t-1y3,t-1Time..................t+1x1,t-1x2,t-1x3,t-1x1,tx2,tx3,ty1,t-1y2,t-1y3,t-1y1,ty2,ty3,tt-1tHMM 1HMM 2HMM 3x1,t+1x2,t+1x3,t+1y1,t+1y2,t+1y3,t+1Time..................t+1vtvt+1x1,t-1x2,t-1x3,t-1x1,tx2,tx3,ty1,t-1y2,t-1y3,t-1y1,ty2,ty3,tt-1tHMM 1HMM 2HMM 3x1,t+1x2,t+1x3,t+1y1,t+1y2,t+1y3,t+1Time..................t+1v1,tv1,t+1v2,tv3,tv2,t+1v3,t+1 (cid:80) ξ(vt = v) t τ γ(xt−1)gv (xt−1) . t;xt−1 (cid:80) τ→0−→ ) according to the event rates (cjτ gj(xt−1)) along the sample path with the expected num- As such, the rate constant cv for event v matches the expected number of times this event could have happened t cv τ gv (xt−1)ξ(xt−1,vt=∅) ((cid:80) 1−(cid:80) ber of times the events happened ((cid:80) αt−1(xt−1) =(cid:81) Using Bethe entropy approximation, t−1) and βt(xt) =(cid:81) t−1(x(m) j cj τ gj (xt−1) m α(m) ), and setting the discretization time interval τ to be small enough, the rate constants cv can be updated according to Eq. 19. t i ξ(vi = v)). m β(m) t (x(m) (cid:80) (cid:80) τ(cid:81) (cid:80) t m cv = ξ(vt = v) t (m) t−1 γ(m)(x (m) t−1)g x where ξ(vt = v) = (cid:80) j cold j τ(cid:81) m g , (x (m) v (m) t−1) (cid:81) m g(m) j,t−1+1−(cid:80) v,t−1 j cold (m) cold v j (19) τ(cid:81) m g (m) j,t−1 . Therefore, the rate constant for event v is the expected number of occurrences of this event summed over all times, divided by the total cross-section of this event also summed over all times. To summarize, we provide the variational agent-based in- ference algorithm below. Variational Inference with Gillespie Algorithm Given observations y(m) for t = 1, . . . , T and m = 1, . . . , M , and the stochastic kinetic model of a complex system de- fined by Eq. 4, find x(m) and rate constants ck for k = 1, . . . , V . , v(m) t t t • Latent state inference. , vtx(m) Iterate through the follow- ing forward pass and backward pass until convergence, where P (x(m) t−1) is given by Eq. 16. t -- Forward pass. For t = 1, . . . , T and m = 1, . . . , M , (x(m) t ) according to α(m) t−1(x(m) t−1)P (x(m) t , vtx(m) t−1)P (y(m) t x(m) t ). t (cid:88) update α(m) ) ← 1 Zt x (m) t−1,vt α(m) t (x(m) t -- Backward pass. For t = T, . . . , 1 and m = 1, . . . , M , update β(m) t−1 (x(m) t−1) according to β(m) t−1 (x(m) t−1) ← 1 Zt P (x(m) t , vtx(m) t−1)P (y(m) t x(m) t )β(m) t (x(m) t ). (cid:88) vt,x (m) t • Parameter estimation. Iterate through latent state in- ference (above) and rate constants estimate of ck ac- cording to Eq. 19, until convergence. 4. EXPERIMENTAL RESULTS In this section, we evaluate the performance of variational agent-based inference for two applications: epidemic dynam- ics and traffic dynamics. We selected these because they are important applications with significant practical value. 4.1 Epidemic Dynamics In this section, we infer the progression of common cold in a dynamic social network using an agent-based susceptible- infectious-susceptible (SIS) model at the individual level through a small numbr of volunteers who report their symp- toms, and estimate the total number of infectious individu- als. Being able to estimate the outbreak of an epidemic in advance and determine who has the highest probability of infection is important for health-care providers and health policy researchers who must optimize limited medical re- sources. Conventional agent-based epidemic simulators [17, 26, 41, 27, 15] lack the capability to infer epidemic spread- ing with symptoms observations in the social network, and thus the sample paths given by these simulators can differ significantly from the truth. In the SIS dynamics, each individual is either infectious (I) or susceptible (S), and the system has three events: a) an in infectious individual in the network infects a susceptible individual and turns that person infectious in the network with rate constant c1 (probability per unit time), b) an in- fectious individual recovers and becomes susceptible again with rate constant c2, and 3) a susceptible individual be- comes infectious by contacting an infectious individual from outside the system with rate constant c3. I + S → 2 × I, infection, rate constant = c1, I → S, recover, rate constant = c2, S → I, infection from outside, rate constant=c3. To model the SIS dynamics at the individual level with Gille- spie algorithm, we assign two "species" to each person p: I (p) ∈ {0, 1}, S(p) ∈ {0, 1} and I (p) + S(p) = 1. The proba- bility for a susceptible person p to become infectious through one unit time of contact with an infectious person q is thus h(x, c1) = c1 · s(p) · i(q) = c1. The mean field probability for the susceptible person p to become infectious is thus c1 · s(p) · EI (q) = c1 · s(p) (cid:88) (cid:88) EI (q), q∈neighbor of p q∈neighbor of p i.e., the average total number of infectious neighbors in the individual's social network times the probability of infection per infectious neighbor. If infection happens, we change S(p) from 1 to 0 and change I (p) from 0 to 1. We benchmark the performance of the variational agent- based inference algorithm using the Dartmouth College cam- pus data set [29]. This data set contains the locations of 13,888 on-campus WiFi users from April 2001 to June 2004. On top of this dynamic social network we synthesized epi- demic progression using the SIS model and set parameters such that an individual is on average infected twice per year and takes one week on average to recover. We ran- domly select 10% of individuals as volunteers who report their daily symptoms and from these we infer the daily in- fectious/susceptible state of the other 90% individuals. As far as we know, there is no real data set with both a large amount of sensor data and symptom reports; we hope our research encourages data collection and analysis in this di- rection. Figure 2(a) compares the receiver operating characteristic (ROC) curve of predicting whether an individual is infec- tious using either a variational agent-based inference algo- rithm or a support vector classifier [37]. The support vec- (and the parameters specifying the modeling details). From these data, the simulator will proceed to execute travel, to score daily itineraries, and to perturb daily itineraries in an attempt to improve them, and then repeat the three steps until equilibrium is reached. Simulation without continu- ous observtations about a real-world transportation network however doesn't tell us whether today's traffic jams will be formed earlier or last longer. Many existing algorithms to track and predict real-time traffic dynamics on the other hand -- vector ARIMA [3], state space models [46], neural networks [48], and Bayesian network models [25, 13] -- have difficulty in coping with noisy and missing data, with making predictions in non- recurrent scenarios, and with explaining predictions in terms of agent trips. According to Vlahogianni [43], the challenge in short-term traffic forecasting is not only to predict but also to explain phenomena at the city network level -- to fuse new data sources such as those from telematics units and to easily incorporate the effects of non-recurrent condi- tions. To join the event model of a discrete-event simulator with continued observations about real-world social systems, we make use of the fact that all discrete event simulators (at least, to the best of our knowledge) have a way to dump the events happening in a simulation run. As such, we can re- construct simulation runs according to the event sequences and so reconstruct the stochastic discrete-event model from simulation runs outside the simulator, instead of hacking the source code of a specific simulator over many man-months. MATSIM, for example, has about 140 thousand lines of code, and hacking its source code to make real-time infer- ences with real-world data wouldn't be easy. In this way, we dump four events: vehicle leaving a build- ing, vehicle entering a link, vehicle leaving a link and vehicle entering a building. From these four events, we have con- structed a data frame representing continued observations of the locations (the link or building) of all vehicles at equally spaced time steps. From the data frame we constructed a state transition matrix to represent vehicle dynamics (with each row and column representing a link/building), along with entries giving the state transition probabilities accord- ing to how long a vehicle stays at a link/building and how frequently a vehicle chooses the next link/building. By uni- formly sampling a given fraction of tracked vehicles, we have constructed an observation model that provides the proba- bility distribution of observed vehicles at a location given the total number of vehicles there. This system has only one event pi ◦ lj → pi ◦ lk, a vehicle i moving from link/building j to link/building k with rate constant plj ,lk , changing the location of vehicle from X (pi) t+1 = lk, chang- ing the number of vehicles on link li from X (li) to t − 1, and changing the number of vehicles on X (li) link lk from X (lk) t +1. But the infer- ence is much more complex due to the interactions between vehicles and links. = lj to X (pi) t+1 = x(li) to X (lk) t+1 = x(lk) t = x(li) t t t = x(lk) t We employ the mobility traces of more than 500 taxi cabs collected over 30 days in the San Francisco metropolitan area [36] to benchmark the advantages of considering possible future traffic conditions for individual transportation plan- ning. We extract the road network from OpenStreetMap, a collaborative project to create a free editable map of the world. We obtain population distribution and daily trip (a) Detecting infections (b) Estimating infectious population Figure 2: Statistical inference in Dartmouth data tor classifier (SVC) estimates the probability that an indi- vidual is infectious based on the percentage of his contacts reporting symptoms. Since only 10% of individuals are re- porting symptoms in the experiment setup, the likelihood that an individual is infected can be only roughly estimated by SVC. In addition, infectious individuals make different contributions to epidemic progression because infectious dis- eases from randomly infected individuals go first to the hubs of a social network then spread to the other nodes from those hubs [9], and SVC has difficulty in capturing such network- related features. Variational agent-based inference, on the other hand, can correctly predict 60% of infections with only a 20% false positive rate. Figure 2(b) compares the performance in estimating the number of infectious persons in the 90% of individuals who do not report their daily symptoms from daily symptoms reported by the 10%. A scaling-based method missed the rapid increase of infectious individuals in early September and overestimated the number of infectious individuals in mid-October and November. This occurred because not all infectious individuals contribute to epidemic progression the same way. 4.2 Traffic Dynamics In this experiment, we predict road traffic up to one hour ahead of time from a large set of tracked vehicle locations in conjunction with an agent-based transportation simulator called MATSIM [32]. While tracked vehicle locations from car telematics systems are already being exploited to provide drivers with real-time traffic information, the chaotic nature of transportation networks means that an incident at one location might affect the traffic condition of another location up to a hundred miles away. A decision made according to current travel times might therefore be suboptimal, and can in certain cases even lead to global system breakdown. Researchers employ a transportation simulator to explain the macroscopic phenomena of transportation dynamics by simulating how individuals travel in a real-world transporta- tion network. Such a simulator takes three primary compo- nents as its input: a road network like the one used in a GPS navigator, a population specification that lists the lo- cation and travel of individuals on a typical day synthesized from census data and trip surveys with the number of sim- ulated vehicles matching the number of vehicles in the real world, and a control file specifying how daily itineraries are scored and how individuals improve their daily itineraries 0.20.40.60.80.00.20.40.60.8False Positive RateTrue Positive RateABMSVM(%. reported symptoms)050100150timeinfectious populationSepOctNovDecgroundtruthABMscaling In this paper, we have developed a variational method to make inferences about a real-world system from continuous imperfect observations about the system, using an agent- based model that describes the dynamics of this system. To demonstrate the value of combining the power of big data and the power of model-thinking in the stochastic process framework, we show how we can track epidemics at the in- dividual level from only a small number of volunteers who report their symptoms, and we make short-term predictions about road traffic from sporadically observed probe vehi- cles. This is just a taste of what this powerful combination of approaches can do, and we expect to see further applica- tions and theoretical development to test the bounds of this methodology. APPENDIX The duality between Eq. 7 and Eq. 12 is a duality between maximum relative entropy and maximum pseudo-likelihood. To get the dual form of the Bethe variational problem in Eq. 12, we set the derivatives of Eq. 11 over ξt(xt−1,tvt) and γ(m) t (x(m) ) to 0. t ∂L ∂ξt(xt−1,t,vt) =log ⇒ ξt(xt−1,t,vt)∝exp = log γ(m) ∂L (x(m) t ) t ∂γ(m) ⇒ γ(m) t (x(m) t ) ∝ exp α m t,x (m) m β (m) t ξt(xt−1,t,vt) −(cid:80) p(xt,vt,ytxt−1) exp (cid:32)(cid:80) − α(m) (m) t−1 ) + 1 − β(m) p(xt,vt,ytxt−1) +1−(cid:80) (cid:80) (cid:18) (m) t−1,x (x(m) (cid:19) (m) t t,x t,x m m α t t (m) t (m) t−1,x (m) t−1 set= 0 (cid:33) , (m) β t,x (m) t set = 0 α(m) t,x (m) t + β(m) t,x (m) t . get Eq. 12. After taking ξt(xt−1,t, vt) and γ(m) ) into Eq 7, we To derive Eq. 15, we marginalize Eq. 13 over all x(m(cid:48)) t−1,t (x(m) t t for m(cid:48) (cid:54)= m. t ) (cid:80) t−1, vt, x(m) ξ(x(m) = 1 Zt ∝ ckτ(cid:81) p(xt,vtxt−1)(cid:81) (m) (cid:80) t−1,t (m(cid:48)) t−1 g(m(cid:48) )(x xt−1,t,vt:fix x m(cid:48)(cid:54)=m α (m(cid:48)) t−1,t x ,vt (m(cid:48) ) t−1 )β m α(m)(x (m) t−1)β(m)(x (m) t )p(m)(y (m) t x (m) t ) (m(cid:48) ) t (m(cid:48) ) p(y t x (m(cid:48) ) t )1(∆x (m(cid:48) ) t (m(cid:48) ) k ) =∆ ·α (m) t−1(x (m) t−1)g(m)(x (m) (m) t−1)β t (x (m) t )p(y (m) t (m) t =∆ )1(∆x (m) t x if vt = k (cid:54)= ∅, (m(cid:48) ) (m(cid:48) ) x )1(∆x t t =0) (m) k ) (20) (cid:80) ∝ (cid:81) m(cid:48)(cid:54)=m α (m(cid:48) ) t−1,t x (m(cid:48) ) t−1 (x (m(cid:48) ) t−1 )β t (m(cid:48) ) (m(cid:48) ) t (x )p(y t (m(cid:48) ) (m) t−1)β (m) t (m) t ·α −(cid:80) k (x ckτ(cid:81) m(cid:48)(cid:54)=m (cid:80) α (m(cid:48)) t−1,t x (m) )p(y t (m) t (x (m(cid:48) ) t−1 g(m(cid:48) )(x x (m(cid:48) ) t−1 )β (m) t t (m(cid:48) ) (m) t =0) (m(cid:48) ) x t p(y t )1(∆x (m(cid:48) ) (m(cid:48) ) )1(∆x t =0) ·α (m) t−1(x (m) t−1)g(m)(x (m) (m) t−1)β t (x (m) t )p(y (m) t )1(∆x (m) t x if vt = ∅. (m) t =0) (21) After deviding Eq. 20 and Eq. 21 by (m(cid:48) ) t−1 (x (m(cid:48) ) t−1 )β t (m(cid:48) ) (m(cid:48) ) t (x (m(cid:48) ) )p(y t x (m(cid:48) ) t )1(∆x (m(cid:48) ) t =0) (cid:81) m(cid:48)(cid:54)=m (cid:80) α (m(cid:48) ) t−1,t x we get Eq. 15, g(m) k,t−1, g(m) k,t−1 and Zt. Figure 3: Considering future traffic reduces the rel- ative error of travel time versus actual travel time from 35% when future traffic is not considered to 29% when it is. statistics from the U.S. Census, and obtain the state transi- tion matrices from one link/building to another at equilib- rium from simulations. We map the latitudes and longitudes of tracked vehicle locations to links and buildings because our stochastic inference is at the link/building level. To benchmark how the estimation of travel time can be improved by considering future traffic conditions even though traffic conditions vary significantly, we extract the 20% of trips with the highest difference between actual travel time and estimated travel time according to traffic at the time of departure, then estimate the average travel time according to our probabilistic model. Such travel often occurs at the rising edge of overall traffic volume, during bad weather, and on less developed roads. Figure 3 compares these estimated travel times according to only traffic at the time of departure with the same data considering possible future traffic estimations through a ran- dom sample of 128 trips. The travel estimations that do not project future traffic exhibit on average a 35% relative error (in comparison with a 29% when projecting future traffic), and therefore occasionally differ significantly from the actual travel time. As such, we can combine the sporadically observed vehicle locations with the large compilation of typical trip plans to continuously estimate current and future traffic conditions. Starting from the number and behavior of tracked vehicles in a road link, we can determine the total number of vehicles in the link by scaling and estimating traffic conditions. If we trace the origins and destinations of the estimated number of vehicles through the factorial stochastic process model (filling any gaps with prior individual travel behaviors), we can extract information about the traffic at other road links. If we then iterate estimations between the traffic at links and the trip choices of simulated vehicles, we improve our estimation of both. 5. CONCLUSIONS AND DISCUSSIONS llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll102030405060102030405060actual leg time (minutes)estimated leg time (minutes)lnot considering future trafficconsidering future traffic REFERENCES [1] Adam Arkin, John Ross, and Harley H McAdams. Stochastic kinetic analysis of developmental pathway bifurcation in phage λ-infected escherichia coli cells. Genetics, 149(4):1633 -- 1648, 1998. [2] M. Batty. Cities and Complexity: Understanding Cities With Cellular Automata, Agent-Based Models, and Fractals. Mit Press, 2007. [3] Moshe Ben-Akiva, Michel Bierlaire, Haris Koutsopoulos, and Rabi Mishalani. Dynamit: a simulation-based system for traffic prediction. In DACCORS short term forecasting workshop, The Netherlands. Citeseer, 1998. [4] HA Bethe. Statistical theory of superlattices. In Proc. Roy. Soc. London A, volume 150, pages 552 -- 575, 1935. [5] Vincent D Blondel, Adeline Decuyper, and Gautier Krings. A survey of results on mobile phone datasets analysis. EPJ Data Science, 4(1):1 -- 55, 2015. [6] Andrei Borshchev. The Big Book of Simulation Modeling: Multimethod Modeling with AnyLogic 6. AnyLogic North America, 2013. [7] Matthew Brand, Nuria Oliver, and Alex Pentland. Coupled hidden markov models for complex action recognition. In Proc. of CVPR, pages 994 -- 999, 1997. [8] Claudio Castellano, Santo Fortunato, and Vittorio Loreto. Statistical physics of social dynamics. Reviews of Modern Physics, 81(2):591 -- 646, 2009. [9] Nicholas A. Christakis and James H. Fowler. The spread of obesity in a large social network over 32 years. The New England Journal of Medicine, 357:370 -- 379, 2007. [10] Yves-Alexandre de Montjoye, Zbigniew Smoreda, Romain Trinquart, Cezary Ziemlicki, and Vincent D Blondel. D4d-senegal: the second mobile phone data for development challenge. arXiv preprint arXiv:1407.4885, 2014. [11] Arthur P Dempster, Nan M Laird, and Donald B Rubin. Maximum likelihood from incomplete data via the em algorithm. Journal of the royal statistical society. Series B (methodological), pages 1 -- 38, 1977. [12] Wen Dong, Bruno Lepri, and Alex Sandy Pentland. Modeling the co-evolution of behaviors and social relationships using mobile phone data. In Proceedings of the 10th International Conference on Mobile and Ubiquitous Multimedia, pages 134 -- 143. ACM, 2011. [13] Wen Dong and Alex Pentland. A network analysis of road traffic with vehicle tracking data. In AAAI Spring Symposium: Human Behavior Modeling, pages 7 -- 12, 2009. [14] Wen Dong, Alex Pentland, and Katherine A. Heller. Graph-coupled hmms for modeling the spread of infection. In Nando de Freitas and Kevin P. Murphy, editors, UAI, pages 227 -- 236. AUAI Press, 2012. [15] Stefan B Edlund, Matthew A Davis, and James H Kaufman. The spatiotemporal epidemiological modeler. In Proceedings of the 1st ACM International Health Informatics Symposium, pages 817 -- 820. ACM, 2010. [16] Joshua M. M. Epstein. Generative Social Science: Studies in Agent-Based Computational Modeling (Princeton Studies in Complexity). Princeton University Press, 2007. [17] Stephen Eubank, Hasan Guclu, VS Anil Kumar, Madhav V Marathe, Aravind Srinivasan, Zoltan Toroczkai, and Nan Wang. Modelling disease outbreaks in realistic urban social networks. Nature, 429(6988):180 -- 184, 2004. [18] Kai Fan, Marisa Eisenberg, Alison Walsh, Allison Aiello, and Katherine Heller. Hierarchical graph-coupled hmms for heterogeneous personalized health data. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 239 -- 248. ACM, 2015. [19] Jay Wright Forrester and Jay W Forrester. Urban dynamics, volume 114. mIt press Cambridge, 1969. [20] Zoubin Ghahramani and Michael I Jordan. Factorial hidden markov models. Machine learning, 29(2-3):245 -- 273, 1997. [21] Nigel Gilbert. Agent-Based Models (Quantitative Applications in Social Sciences). Sage Publications, Inc., 2007. [22] Daniel T Gillespie. Stochastic simulation of chemical kinetics. Annu. Rev. Phys. Chem., 58:35 -- 55, 2007. [23] Winfried Karl Grassmann. Transient solutions in markovian queueing systems. Computers & Operations Research, 4:47 -- 53, 1977. [24] Tom Heskes and Onno Zoeter. Expectation propogation for approximate inference in dynamic bayesian networks. In Adnan Darwiche and Nir Friedman, editors, UAI, pages 216 -- 223. Morgan Kaufmann, 2002. [25] Eric J Horvitz, Johnson Apacible, Raman Sarin, and Lin Liao. Prediction, expectation, and surprise: Methods, designs, and study of a deployed traffic forecasting service. arXiv preprint arXiv:1207.1352, 2012. [26] Lars Hufnagel, Dirk Brockmann, and Theo Geisel. Forecast and control of epidemics in a globalized world. Proceedings of the National Academy of Sciences of the United States of America, 101(42):15124 -- 15129, 2004. [27] Lorenzo Isella, Juliette Stehl´e, Alain Barrat, Ciro Cattuto, Jean-Fran¸cois Pinton, and Wouter Van den Broeck. What's in a crowd? analysis of face-to-face behavioral networks. Journal of theoretical biology, 271(1):166 -- 180, 2011. [28] Michael I Jordan, Zoubin Ghahramani, and Lawrence K Saul. Hidden markov decision trees. In Proc. of NIPS, pages 501 -- 507, 1996. [29] David Kotz, Tristan Henderson, Ilya Abyzov, and Jihwang Yeo. CRAWDAD data set dartmouth/campus (v. 2007-02-08). Downloaded from http://crawdad.org/dartmouth/campus/, 2007. [30] Kalev Leetaru and Philip A Schrodt. Gdelt: Global data on events, location, and tone, 1979 -- 2012. In ISA Annual Convention, volume 2, page 4, 2013. [31] Thomas Liggett. Interacting particle systems, volume 276. Springer Science & Business Media, 2012. [32] MATSim development team (ed.). MATSIM-T: Aims, approach and implementation. Technical report, IVT, ETH Zurich, Zurich, 2007. [33] Thomas P. Minka. Expectation propagation for approximate bayesian inference. In Jack S. Breese and Daphne Koller, editors, UAI, pages 362 -- 369. Morgan Kaufmann, 2001. [34] Kevin P Murphy, Yair Weiss, and Michael I Jordan. Loopy belief propagation for approximate inference: An empirical study. In Proceedings of the Fifteenth conference on Uncertainty in artificial intelligence, pages 467 -- 475. Morgan Kaufmann Publishers Inc., 1999. A high-resolution human contact network for infectious disease transmission. Proceedings of the National Academy of Sciences, 107(51):22020 -- 22025, 2010. [42] Laron Smith, Richard Beckman, and Keith Baggerly. Transims: Transportation analysis and simulation system. Technical report, Los Alamos National Lab., NM (United States), 1995. [35] Wei Pan, Wen Dong, Manuel Cebrian, Taemie Kim, [43] Eleni I Vlahogianni, Matthew G Karlaftis, and John C James H Fowler, and Alex Sandy Pentland. Modeling dynamical influence in human interaction: Using data to make better inferences about influence within social systems. Signal Processing Magazine, IEEE, 29(2):77 -- 86, 2012. [36] Michal Piorkowski, Natasa Sarafijanovic-Djukic, and Matthias Grossglauser. CRAWDAD data set epfl/mobility (v. 2009-02-24). Downloaded from http://crawdad.org/epfl/mobility/, February 2009. [37] John Platt et al. Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Advances in large margin classifiers, 10(3):61 -- 74, 1999. [38] Neeti Pokhriyal, Wen Dong, and Venu Govindaraju. Virtual networks and poverty analysis in senegal. arXiv preprint arXiv:1506.03401, 2015. Golias. Short-term traffic forecasting: Where we are and where we're going. Transportation Research Part C: Emerging Technologies, 43:3 -- 19, 2014. [44] Paul Waddell. Urbansim: Modeling urban development for land use, transportation, and environmental planning. Journal of the American Planning Association, 68(3):297 -- 314, 2002. [45] Martin J. Wainwright and Michael I. Jordan. Graphical models, exponential families, and variational inference. Foundations and Trends in Machine Learning, 1(1-2):1 -- 305, 2008. [46] Yibing Wang, Markos Papageorgiou, and Albert Messmer. Real-time freeway traffic state estimation based on extended kalman filter: Adaptive capabilities and real data testing. Transportation Research Part A: Policy and Practice, 42(10):1340 -- 1358, 2008. [39] Lawrence R Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257 -- 286, 1989. [47] Darren James. Wilkinson. Stochastic modelling for systems biology. Taylor & Francis, Boca Raton, FL, 2006. [40] Ralph Tyrell Rockafellar. Convex analysis. Princeton [48] Hongbin Yin, S C Wong, Jianmin Xu, and CK Wong. university press, 2015. [41] Marcel Salath´e, Maria Kazandjieva, Jung Woo Lee, Philip Levis, Marcus W Feldman, and James H Jones. Urban traffic flow prediction using a fuzzy-neural approach. Transportation Research Part C: Emerging Technologies, 10(2):85 -- 98, 2002.
1402.3735
3
1402
2019-10-03T17:30:27
Decentralized Goal Assignment and Safe Trajectory Generation in Multi-Robot Networks via Multiple Lyapunov Functions
[ "cs.MA", "cs.RO", "eess.SY" ]
This paper considers the problem of decentralized goal assignment and trajectory generation for multi-robot networks when only local communication is available, and proposes an approach based on methods related to switched systems and set invariance. A family of Lyapunov-like functions is employed to encode the (local) decision making among candidate goal assignments, under which a group of connected agents chooses the assignment that results in the shortest total distance to the goals. An additional family of Lyapunov-like barrier functions is activated in the case when the optimal assignment may lead to colliding trajectories, maintaining thus system safety while preserving the convergence guarantees. The proposed switching strategies give rise to feedback control policies that are computationally efficient and scalable with the number of agents, and therefore suitable for applications including first-response deployment of robotic networks under limited information sharing. The efficacy of the proposed method is demonstrated via simulation results and experiments with six ground robots.
cs.MA
cs
Decentralized Goal Assignment and Safe Trajectory Generation in Multi-Robot Networks via Multiple Lyapunov Functions Dimitra Panagou, Matthew Turpin and Vijay Kumar 9 1 0 2 t c O 3 ] A M . s c [ 3 v 5 3 7 3 . 2 0 4 1 : v i X r a Abstract -- This paper considers the problem of decentralized goal assignment and trajectory generation for multi-robot net- works when only local communication is available, and proposes an approach based on methods related to switched systems and set invariance. A family of Lyapunov-like functions is employed to encode the (local) decision making among candidate goal assignments, under which a group of connected agents chooses the assignment that results in the shortest total distance to the goals. An additional family of Lyapunov-like barrier functions is activated in the case when the optimal assignment may lead to colliding trajectories, maintaining thus system safety while preserving the convergence guarantees. The proposed switching strategies give rise to feedback control policies that are com- putationally efficient and scalable with the number of agents, and therefore suitable for applications including first-response deployment of robotic networks under limited information shar- ing. The efficacy of the proposed method is demonstrated via simulation results and experiments with six ground robots. I. INTRODUCTION Task (target) assignment problems in multi-agent systems have received great interest within the robotics and controls communities in the past couple of years, in part because they encode the accomplishment of various objectives in applications such as surveillance, exploration and coverage [1]. A common thread towards solving assignment prob- lems is the development of algorithms that assign targets to agents by optimizing a predefined criterion [2] -- [6]. Standard goal assignment strategies are the greedy assignment [7], the iterative assignment [8], the multiple Traveling Salesman assignment [9], the MinPoS assignment [10] and market-based mechanisms [11] -- [13]. The main focus in this line of research is mostly related to the optimization aspects of the problem and the associated computational complexity, so that suboptimal solutions with certain performance guarantees are derived. A hybrid control solution to multi-robot goal assignment is given in [14], while a game-theoretic approach is presented in [15]. More recently, Dimitra Panagou is with the Department of Aerospace Engineering, Uni- versity of Michigan, Ann Arbor, MI, USA. [email protected] Matthew Turpin was with the GRASP Lab, School of Engineering and Ap- plied Science, University of Pennsylvania, Philadelphia, PA, USA when this work was done. He is now with Qualcomm. [email protected] is with the GRASP Lab, School of Engineering and Applied Science, University of Pennsylvania, Philadelphia, PA, USA. [email protected] Vijay Kumar We gratefully acknowledge the support of ARL grant W911NF-08-2- 0004, ONR grant N00014-09-1-1051, and TerraSwarm, one of six centers of STARnet, a Semiconductor Research Corporation program sponsored by MARCO and DARPA. the problem of assigning a group of mobile robots to an equal number of static targets under the assumption that the robots have limited range-based communication and target-sensing capabilities was studied in [16], and in [17], respectively. Nevertheless, such optimization-based techniques are often derived under relaxed assumptions, such as point or static agents, which are in principle not acceptable in realistic settings. For instance, first-response or search-and-rescue mis- sions using robotic agents (e.g., aerial robots) typically involve multiple tasks that, on one hand, may need to be performed as quickly as possible, yet on the other hand they can be accomplished only when information sharing is available, and under tight safety guarantees. In response to this challenge, in our earlier work [18], [19] we proposed a centralized approach on the Concurrent Assignment and Planning of Trajectories (CAPT) for multi-robot systems, that produces minimum distance traveled trajectories for non-point robots, that are ad- ditionally collision-free under mild assumptions on the initial locations of the robots and the locations of the goals. Hence we simultaneously addressed two challenges: (i) the combina- torially complex problem of finding a suitable assignment of robots to goal locations, and (ii) the generation of collision- free trajectories for every robot under given assumptions. More specifically, we considered unlabeled (interchangeable) robots and goal locations, and proposed algorithmic solutions for the centralized CAPT problem, as well as a decentralized implementation of the centralized algorithm that produces suboptimal solutions in terms of total distance traveled. It should be noted that although the combinations of N robots to N goals result in intractable enumeration for all but the smallest problems, fortunately, the O(N 3) Hungarian Algo- rithm from the Operations Research community [20] optimally solves this problem in a centralized manner, while extensions to distributed systems have been also developed [21]. An extensive treatment of assignment problems and algorithms can be found in [22]. Our simulated teams of N robots under the CAPT algorithm on a single computer take approximately 10−7N 3 seconds to compute the optimal assignment, i.e., a team of 100 robots takes about 0.1 seconds to plan its trajectories. This is efficient for the considered multi-robot applications. However, the decentralized implementation of the CAPT algorithm does not in general ensure safety for the multi-robot system, i.e., that the trajectories of the robots are collision-free. Let us note that some technical ingredients of the problem considered here might be applicable or useful to other types of decentralized/distributed multi-robot planning and control problems as well, such as, for instance, robotic team reconfig- uration [23], control of modular robots, or formation/flocking control. However, the main novel characteristics that differ- entiate our work from similar problems and approaches are: (i) the casting of both the assignment and safety problems for a dynamic multi-agent/multi-robot system into a switched systems stability problem, and (ii) the development of decen- tralized feedback control algorithms that generate convergent and collision-free trajectories with provable guarantees. The contributions of this work are described in more detail in the following section. A. Overview and Contributions In this paper we build upon our earlier work [18], [19] that considers a computationally efficient way of safely assigning goals in a multi-robot system in a centralized manner, and we focus on the problems of concurrently assigning goals and generating collision-free trajectories for the decentralized case, i.e., for when the robots have limited sensing and communication capabilities and hence exchange information only locally, i.e., when they become connected. We develop algorithms that concurrently address the problems of: (P1) Assigning goal locations to agents by minimizing a cost function expressing distance to the goals. (P2) Designing feedback control policies guaranteeing: (i) the convergence of the agents to their assigned goals, (ii) that the resulting trajectories are collision-free. The key specifications in the proposed formulation are: (S1) Agents and goal locations are interchangeable, which means that the mission is considered accomplished when each agent has converged to some goal location. (S2) Information exchange between a pair of agents is feasible and reliable only when they lie within a certain commu- nication range, which means that the decision making on the optimal goal assignment (in terms of distance to the goals) can be performed only locally, i.e., in a decentralized fashion. (S3) Agents are modeled as non-point robots. The adopted decentralized formulation and the underlying goal assignment and control design techniques in the current paper offer several improvements compared to the earlier work of the authors' in the conference paper [24], namely: The conservative conditions on the initial positions of the agents and of the goal locations in [24] are now relaxed via the design of vector-field controllers instead of gradient-based controllers. The proposed vector fields are always well-defined everywhere in each agent's state space, opposed to the barrier functions utilized in [24] that exhibit some pathological situations when the distances between neighbor agents and goal locations become smaller than a certain distance. This way, the overall switched system can be implemented by forcing the agents switch among two control policies (described below), instead of three in [24], where the third controller was taking care of the pathological situations of the barrier functions. In addition, the initial positions of the robots can be selected to be R apart, compared to the conference version that required them to be 2 apart. More specifically, the novelties of the proposed 2R approach are as follows: √ is, that Contribution 1: We consider the goal assignment and trajec- tory generation problem posed in [19] that seeks to minimize the distance traveled by all robots, and formulate it into a switched systems framework [25]; this provides a novel and natural way of encoding multiple tasks via Lyapunov-like functions, and obtaining guarantees on the accomplishment of the encoded control objectives. We build our approach based on multiple Lyapunov-like functions [26] and set invariance [27] techniques. We first encode the decision making on the optimal goal assignment (which in the sequel we call the Optimal Goal Assignment (OGA) policy) as a state-dependent switching logic among a family of candidate Lyapunov-like functions. Each Lyapunov-like function encodes a cost under a candidate goal assignment, the sum of squared distances to the goals. The switching logic dictates that, when a set of agents becomes connected at some time instant t, they decide to switch to the Lyapunov-like function of minimum value at time t. We show that this decision making gives rise to a Globally Asymptotically Stable (GAS) switched system which furthermore does not suffer from Zeno trajectories. Then, based on our recent work in [28], [29], we build an additional state-dependent switching logic which employs a family of Lyapunov-like barrier functions and vector fields encoding both inter-agent collision avoidance and convergence to the goal locations determined by the OGA policy. This control policy (in the sequel called the Collision Avoidance (CA) policy) provides sufficient conditions on determining whether the OGA policy is safe, and furthermore serves as a supervisor that takes action only when safety under the OGA policy is at stake. We show that the switching between the OGA policy and the CA policy results in safe and almost globally attractive trajectories for the multi-robot system, at the expense of possibly resorting to suboptimal paths in terms of total distance traveled; this situation appears only in the cases when the CA policy forces the agents to deviate from their optimal (straight line) paths to the goals, in order to maintain system safety. To the best of our knowledge, the proposed approach of encoding assignment and motion tasks via Lyapunov-like functions is a novel approach in multi- robot task and motion planning, and introduces a framework of correct-by-construction switched (hybrid) systems that satisfy the encoded tasks, along with the feedback control policies that accomplish the encoded tasks. Contribution 2: Part of this work appeared in [24]. Com- pared to the conference paper, here we develop a different conflict resolution and collision avoidance strategy that is based on directly defining feedback vector fields for each one of the agents, instead of barrier functions. The method generates safe reference directions and feedback controllers for the agents, and alleviates (i) the issues often raised in pure gradient-based solutions, where the behavior of the gradient- based controller is hard to tune, as well as (ii) the use of the third family of Lyapunov-like functions in the switching strategy in [24]. Furthermore, (iii) the new design provides safety and convergence guarantees for the decentralized multi- robot system under less restrictive assumptions on the spatial distributions of the agents and the goal locations, compared to the assumptions adopted in [19], [24]. Finally, (iv) we provide a robustness result on the safety of the resulting multi-robot trajectories in the case of communication failures, and (v) we implement and verify the effectiveness of the proposed algorithms experimentally with six ground robots. The paper is organized as follows: Section II presents the mathematical formulation of the problem, while the adopted notions and tools from switched systems theory are reviewed in Section III. The proposed goal assignment and collision avoidance policies are given in Sections IV and V, respec- tively, along with the mathematical proofs that verify their correctness. Simulation results to evaluate their efficacy are included in Section VI, along with a comparison with the results in the conference version [24], and a discussion on the communication requirements and planning times in the connected groups of agents. Experimental results with six ground robots are provided in Section VII. Section VIII summarizes our conclusions and thoughts on future research. II. PROBLEM FORMULATION We consider N agents i and equal number of goal locations Gi, i ∈ N = {1, 2, . . . , N}. The objective of each agent i is to safely converge to some goal Gi, while collaborating with its locally connected agents (see definition below) so that their total traveled distance is minimized. The motion of each agent i is governed by single integrator dynamics: where ri =(cid:2)xi ri = ui, (cid:3)T is the position vector of agent i with (1) yi respect to (w.r.t.) a global Cartesian coordinate frame G, and ui is its control vector comprising the velocities uxi, uyi w.r.t. the frame G. We denote the speed of agent i, i.e., the magnitude of the velocity vector ui, as ui = (cid:107)ui(cid:107) = (cid:113) yi. u2 xi + u2 We assume that each agent i: (i) has access to its position ri and velocities ui via onboard sensors, (ii) can reliably exchange information with any agent j (cid:54)= i which lies within its communication region Ci : {ri ∈ R2, rj ∈ R2 (cid:107)ri − rj(cid:107) ≤ Rc}, where Rc is the communication range. In other words, a pair of agents (i, j) is connected as long as the distance dij = (cid:107)ri − rj(cid:107) ≤ Rc. Remark 1: Note that maintaining connectivity for the entire network is not fundamental for the proposed assignment and collision avoidance strategies; in other words, maintaining a connected graph is neither necessary, nor a control objective in the proposed problem and approach. Remark 2: The consideration of equal number of robots and goal locations is mainly due to the fact that we do not consider the problem of globally assigning goals to robots at the initial time of the deployment, but rather we consider the problem of locally re-assigning goals to robots whenever/if the robots get connected along with safety and convergence guarantees. The initial goal assignment is random and hence, suboptimal in terms of total traveled distance in general. In the case of M goal locations and N robots with M > N, our approach would be initialized by randomly assigning a goal location per robot, and from there on the selected N goals would remain the same over the evolution of the system (i.e., the remaining M − N would never be selected by any robot). Similarly, in the case of M < N, only M robots would be randomly assigned a goal location each, while the remaining N−M robots would not be assigned any goal. The task is considered completed as long as each agent converges to some goal location, with goal locations being interchangeable -- each agent can converge to any goal loca- tion. This specification defines N! possible goal assignments k ∈ {1, 2, . . . , N!}. Each goal assignment can be encoded via an assignment matrix:  α11 ... αN 1  , . . . α1 N ... ... . . . αN N Ak = {αim} = with the rows representing agents and the columns repre- senting goal locations. For agent i ∈ {1, . . . , N} assigned to goal Gm, m ∈ {1, . . . , N}, one has αim = 1 and the remaining elements of the i-th row equal to zero. For instance, for 2 agents and 2 goal locations, the possible N! = 2 goal assignments are encoded via the assignment matrices: (cid:20)1 0 (cid:21) 0 1 (cid:20)0 1 (cid:21) 1 0 . A1 = , A2 = In this case, the matrix A1 encodes that agent 1 goes to G1 and agent 2 goes to G2, while the matrix A2 encodes that agent 1 goes to G2 and agent 2 goes to G1. (cid:3)T the position vectors of the goal locations Gm w.r.t. the global frame. Then, the assigned goal position for agent i under the Ak assignment matrix (or under the k-th goal assignment) can be expressed as: Denote rGm =(cid:2)xGm yGm N(cid:88) r(k) gi = α(k) im rGm , m=1 where α(k) im is the i-th row of Ak. The next lemma establishes that under any assignment, the robots will converge to the respective goal locations. This is essential for the switching control strategy developed later. Lemma 1: The position trajectories ri(t) of agent i are the k-th goal Globally Exponentially Stable (GES) w.r.t. assignment under the control law: (cid:16) (cid:17) ri − r(k) gi , (2) i = −λi u(k) where i ∈ {1, . . . , N}, λi > 0. Proof: Consider the candidate Lyapunov function V (k) i for each agent i under the k-th assignment as: (cid:13)(cid:13)(cid:13)ri − r(k) gi (cid:13)(cid:13)(cid:13)2 , V (k) i = which encodes the distance of agent i from its goal r(k) gi under the goal assignment k. The function V (k) is continu- ously differentiable, positive definite, and radially unbounded. Furthermore, the closed-loop system vector field (1) under the control law (2) is globally Lipschitz continuous. Given that i rGi = 0, one has that the time derivative of V (k) system trajectories under the control law (2) reads: (cid:13)(cid:13)(cid:13)ri − r(k) gi i (cid:13)(cid:13)(cid:13)2 ≤ −2λiV (k) i , i = −2λi V (k) yielding that the position trajectories ri(t) of each agent i are GES w.r.t. the assigned goal r(k) gi . Furthermore, by considering the Lyapunov function: N(cid:88) i=1 V (k) = V (k) i , (3) along the Σ along with (4) completely describes the trajectory of the switched system according to the following rule: (kn, tn) means that the system evolves according to: x(t) = fkn(x(t), t) for tn ≤ t < tn+1. Equivalently, for t ∈ [tn, tn+1) one has that the kn-th subsystem is active. We assume that the switching sequence is minimal in the sense that kn (cid:54)= kn+1. Now, for any subsystem k ∈ K, denote: Σ k = {t0k, t1k, . . . , tnk, tn+1k, . . . ,} encoding the sum of distances of the agents to their assigned goals, one has that (2) render its time derivative: the sequence of switching times when the k-th subsystem is switched on or switched off. Hence, V (k) i = I(Σ k) = [tnk, tn+1k] (cid:91) n∈N N(cid:88) i=1 V (k) = −2λiV (k) {λi} N(cid:88) i=1 {λi}V (k), i ≤ −2 min = −2 min i i is GES to zero. which implies that the sum of squared distances of agents i to their assigned goals r(k) gi Problem Description: Our goal is to develop decentralized algorithms that force Nc ≤ N connected agents to decide whether they keep their current goal assignment or swap goals. The criterion on the decision making is to choose the assignment k ∈ {1, . . . , Nc!} which minimizes the sum of total distance (i.e., results in the shortest paths) to the goal locations. In the sequel, we refer to this assignment as the optimal assignment. The challenge in the case of non- point robots is to ensure that the optimal assignment results not only in stable, but also in collision-free trajectories w.r.t. the assigned goal locations. We develop a switching policy between optimal (shortest) and safe (collision-free) trajectories with provable guarantees. This policy is realized via switching between the OGA and CA policies defined in the sequel, while the switched systems and control framework is employed to facilitate the stability and safety analysis for the resulting trajectories of the multi-robot system. We first review some basic results on switched systems theory. III. NOTIONS FROM SWITCHED SYSTEMS THEORY Following [26], let us consider the prototypical example of a switched system: k ∈ K = {1, 2, . . . , K}, x(t) = fk(x(t)), (4) where x(t) ∈ Rn, each fk is globally Lipschitz continuous and the k's are picked in such a way that there are finite switches in finite time. Consider a strictly increasing sequence of times: T = {t0, t1, . . . , tn, . . . ,}, n ∈ N, the set: I(T ) =(cid:83) n∈N[tn, tn+1] denoting the interval comple- tion of the sequence T , and the switching sequence: Σ = {x0; (k0, t0), (k1, t1), . . . , (kn, tn), . . .}, time, x0 is the initial state, N is where t0 is the initial the set of nonnegative integers, and the elements in the set {k0, k1, . . . , kn, . . .} take values in K. The switching sequence is the set of times that the k-th subsystem is active. Denote E(T ) = {t0, t2, t4, . . . ,} the even sequence of T ; then, E(Σ k) = {t0k, t2k, . . . , tnk, . . . n ∈ N} denotes the sequence of the switched on times of the k-th subsystem. In the sequel, the notation tnk will be equivalent to k(tn), denoting the time instance tn when the k-th subsystem becomes active. [26] A C 1 function V : Rn → R+ with Definition 1: V (0) = 0 is called a Lyapunov-like function for a vector field f (·) and the associated trajectory x(·) over a strictly increasing sequence of times T if: (i) (ii) V is monotonically non-increasing on E(T ). [26] If for each k ∈ K, Vk is a Lyapunov- like function for the k-th subsystem vector field fk(·) and the associated trajectory over Σ k, then the origin of the system is stable in the sense of Lyapunov. If in addition, for any tp, tq ∈ E(Σ k), where p < q, Vk(tq)(x(tq)) − Vk(tp)(x(tp)) ≤ −W (x(tp)) , V (x(t)) ≤ 0, ∀t ∈ I(T ), Theorem 1: (5) holds for some positive definite continuous function W , then the origin of the system is GAS [30]. The theorem essentially states that: Given a family of functions {Vk k ∈ K} such that the value of Vk decreases on the time interval when the k-th subsystem is active, if for every k the value of the function Vk at the beginning of such interval exceeds the value at the beginning of the next interval when the k-th system becomes active (see Fig. 1), then the switched system is GAS. A fundamental assumption of the theorem is the decreasing condition of V on E(Σ k). This is quite conservative and, in general, hard to check [32]. The concept of generalized Lyapunov-like functions relaxes this condition. [32] A C 0 function V : Rn → R+ with V (0) = 0 is called a generalized Lyapunov-like func- tion for a vector field f (·) and the associated trajectory x(·) over a strictly increasing sequence of times T = {t0, t1, . . . , tn, . . . ,}, n ∈ N, if there exists a function h : R+ → R+ satisfying h(0) = 0, such that: V (x(t)) ≤ h(V (x(tn))), for all t ∈ [tn, tn+1) and all n ∈ N. Definition 2: inter-agent distance happens to remain always greater than the communication range Rc, i.e., if dij(t) > Rc, ∀t ∈ [0,∞), we say that the agents are never involved in a meeting event, and as thus, no decision on the goal assignment needs to be made. Out of Lemma 1, the position trajectories ri(t), rj(t) are GES w.r.t. the assigned goal locations. Clearly, in such cases, no inter-agent collisions occur. Assume now that the agents initiate at t0 = 0 such that dij(t0) ≤ Rc, or that at some time instant td > 0 they lie within distance dij(td) ≤ Rc under some goal assignment k ∈ {1, 2} (again, not necessarily the optimal one). We say that the agents are involved in a meeting event and a decision regarding on the goal assignment has to be made. The proposed decision making strategy is defined as follows: The agents: Fig. 1. Branicky's "decreasing sequence" condition. Image from [31]. Theorem 2: [32] Consider the prototypical switched sys- tem (4) and assume that for each k ∈ K there exists a pos- itive definite generalized Lyapunov-like function Vk(x) w.r.t. fk(x(t)) and the associated trajectory x(t), t ∈ [tn, tn+1). Then: (i) The origin of the switched system is stable if and only if there exist class GK functions αk(·) satisfying Vk(x(t2qk)) − Vk(x(t0k)) ≤ αk((cid:107)x0(cid:107)), q ≥ 1, k = 1, 2, ..., K. (6) (ii) The origin of the switched system is asymptotically stable if and only if (6) holds and there exists k such that Vk(x(t2qk)) → 0 as q → ∞. The theorem essentially states that stability of the switched system is ensured as long as Vk(x(t2qk))−Vk(x(t0k)), which is the change of Vk between any "switched on" time t2qk and the first active time t0k, is bounded by a class GK function, regardless of where Vk(x(t0k)) is. Remark 3: The condition (6) is equivalently rewritten as: (cid:0)Vk(x(t2qk)) − Vk(x(t2(q−1)k))(cid:1) ≤ αk((cid:107)x0(cid:107)), ∞(cid:88) q=1 for any k ∈ K. Note that here Vk(x(t2qk))−Vk(x(t2(q−1)k)), q ≥ 1, stands for the change of Vk(x) at two adjacent "switched on" times. Thus, the condition means that Vk is allowed to grow on E(Σ k) but the total such change on any finite time interval should be bounded from above by a class GK function. Remark 4: Theorem 2 relaxes the decreasing requirement of Vk(x(t)) on the corresponding active intervals. Instead, we only need that Vk(x(t)) on an active interval does not exceed the value of some function of Vk at the "switched on" time. IV. THE OPTIMAL GOAL ASSIGNMENT POLICY A. The N = 2 Robot Case For simplicity, we first consider N = 2 agents i, j that need to safely move towards goal locations G1, G2, and build a switching logic that locally decides on the OGA. Assume that the agents initiate at t0 = 0 such that dij(t0) > Rc under a random assignment k ∈ {1, 2} (i.e., not necessarily the optimal one) and move under the control laws (2). If the 1) Exchange information on their current positions ri(td), rj(td) and goal locations rgi(td), rgj (td). 2) Compare the values of the Lyapunov functions V (k)(td) given out of (3) for each possible assignment k ∈ {1, 2}. 3) Move under: V (td) = min(cid:8)V (k)(td) : k ∈ {1, 2}(cid:9) . In other words: Without loss of generality, let k = 1 be the goal assignment before the decision making. The agents implement the following switching logic: • If V (1)(td) ≤ V (2)(td), then: V (td) = V (1)(td), i.e., they keep the same goal assignment, • If V (1)(td) > V (2)(td), then: V (td) = V (2)(td), i.e., they switch goal assignment. In the sequel, we refer to the decision making based on the logic described above as to the OGA policy. Note that in general for N > 2 agents, this policy results in locally optimal paths since it re-assigns goals among the connected agents only (which may be Nc < N in number), while it does not necessarily apply at the initial time t0, hence to the initial positions of the robots, but rather is triggered at any time td ≥ t0 that Nc ≤ N robots may happen to become connected. Problem 1: Establish that the OGA policy renders asymp- totically stable trajectories for the multi-robot system, i.e., that each agent does converge to some goal location. B. Stability Analysis on the Switched Multi-robot System We resort to control analysis tools for switched systems. The closed-loop dynamics of agent i read: ri(t) = u(k) i = −λi ri(t) − r(k) gi , (7) (cid:16) (cid:17) while similarly one may write the closed-loop dynamics for the trajectories rj(t) of agent j. The OGA policy gives rise to switched dynamics for each agent, in the sense that for k = 1 each agent moves under assignment matrix A1, while for k = 2 each agent moves under assignment matrix A2. Denote r =(cid:2)ri T(cid:3)T the state vector of the multi-robot (cid:34) (cid:35) (8) system, which is governed by the switched dynamics: r(t) = fk(r(t)), T rj where fk = , k ∈ K = {1, 2}. i u(k) u(k) j Assumption 1: We assume for now that there are only a finite number of switches per unit time. Denote n ∈ N and consider the sequence of switching times T = {t0, t1, t2, t3, . . . , tn, . . .} and the switching se- quence: Σ = {r0; (k0, t0), (k1, t1), . . . , (kn, tn), . . .}, kn ∈ K,∀n ∈ N. Assuming that the switching sequence is min- imal, imply a se- quential switching between the same subsystems1, it follows that kn (cid:54)= kn+1. Without loss of generality, assume that k0 = 1. Then the (minimal) switching sequence reads: Σ = {r0; (1, t0), (2, t1), (1, t3), (2, t4), . . .}. the switching signal does not that i.e., gi , r(k) gj . Theorem 3: The trajectories r(t) of the switched multi- robot system (8) are GAS w.r.t. the goal assignment k under the OGA policy. This implies that agents i, j converge to their goal locations r(k) Proof: We consider the candidate Lyapunov-like func- tions V (k), k ∈ {1, 2}, given out of (3), which encode the motion of the agents under the goal assignment k. Out of Lemma 1 one has that each individual k-th subsystem, i.e., the motion of the multi-robot system under the k-th assignment, is GES i.e., each V (k) is decreasing during the time intervals when the k-th subsystem is active. Furthermore, the OGA policy dictates that at the switching times {t0, t1, t2, t3, . . . ,} one has: V (1)(t0) > V (2)(t1) > V (1)(t2) > V (2)(t3) > . . . , i.e., the value of each Lyapunov-like function V (k) at the beginning of the time intervals when the k-th subsystem becomes active satisfies the decreasing condition. This proves that the switched system is stable. To draw conclusions on asymptotic stability, consider the time intervals [t2n, t2n+1), [t2n+1, t2n+2), n ∈ N, when the k = 1 and k = 2 subsystems are active, respectively. Then the following inequalities hold: V (1)(t0) > V (1)(t1), V (1)(t1) ≥ V (2)(t1), V (2)(t1) > V (2)(t2), V (2)(t2) ≥ V (1)(t2), V (1)(t2) > V (1)(t3), V (1)(t3) ≥ V (2)(t3), ... since the subsystem 1 is active on [t0, t1) and GES out of the OGA Policy since the subsystem 2 is active on [t1, t2) and GES out of the OGA Policy since the subsystem 1 is active on [t2, t3) and GES out of the OGA Policy which imply that: V (1)(t2n+2) < V (1)(t2n), ∀n, i.e.,: 0 < ρ1 < 1. Then: V (1)(t2n+2) = ρ1V (1)(t2n), V (1)(t2n+2) − V (1)(t2n) = −(1 − ρ1) V (1)(t2n) , (cid:124) (cid:123)(cid:122) (cid:125) W (r,r(1) g ) 1Note that this condition is met in our case since in the stability analysis we consider only those switching times when the goal assignment does change. (cid:16)(cid:107)r − r(1) g (cid:107)2(cid:17) where 1 − ρ1 > 0, and W (r, r(1) is a continuous, positive definite function w.r.t. the goals r(1) imposed by the k = 1 assignment. Similarly we obtain: V (2)(t2n+1) < V (2)(t2n+3), ∀n, which leads to g ) = g g V (2)(t2n+3) − V (2)(t2n+1) = −(1 − ρ2) V (2)(t2n+1) , (cid:124) (cid:123)(cid:122) W (r,r(2) g ) (cid:125) where 0 < ρ2 < 1. Therefore, the switched system is GAS. C. Avoiding Zeno Behavior In the sequel we establish that the switching policy does not result in Zeno trajectories [33], i.e., in trajectories that converge to some point or switching surface other than the desired equilibrium; such trajectories in practice would result in robots not converging to their respective goal locations. Given the sequence T = {t0, t1, . . . , tn, . . .}, n ∈ N, of switching times, a switched system is Zeno if there exists some finite time tZ such that: ∞(cid:88) n=0 lim n→∞ tn = (tn+1 − tn) = tZ. Zeno behavior means that the switching times have a finite accumulation point, i.e., that infinite amount of switchings occurs in a finite time interval. In general, the task of detecting possible Zeno trajectories and extending them beyond their accumulation points is far from trivial [25] and depends on the problem at hand. tn+1 − tn = 0 for all n > C. The definition above results in two qualitatively different types of Zeno behavior. A Zeno switched system is [33]: (i) Chattering Zeno if there exists a finite C ∈ N such that (ii) Genuinely Zeno if tn+1 − tn > 0 for all n ∈ N. The difference between these is prevalent especially in their detection and elimination. Chattering Zeno behavior results from the existence of a switching surface on which the vector fields "oppose" each other. This behavior can be eliminated by defining either (i) Filippov solutions which force the flow to "slide" along the switching surface; this results in a sliding mode behavior, or (ii) hysteresis switching, in order to, not only approximate a sliding mode, but also to maintain the property that two consecutive switching events are always separated by a time interval of positive length. The proposed OGA policy dictates that a switch among vector fields fk may occur when (cid:107)ri(t) − rj(t)(cid:107) ≤ Rc, i.e., when the multi-robot system trajectories r(t) hit the surface time instant when the system trajectories lie on the surface Sc(td) and the agents are involved in the decision making, t− d , t+ d the time instants before and after the decision making, Sc(t) := (cid:8)r ∈ R2 N (cid:107)ri(t) − rj(t)(cid:107) = Rc respectively, and k(cid:0)t− (cid:1) = k(cid:0)t+ k(cid:0)t− (cid:9). Denote td the (cid:1) the assignment before and (cid:1), k(cid:0)t+ (cid:1), in which case no switching occurs. after the decision making, respectively. The decision making on Sc(td) results in two different cases: 1) The agents decide to keep their goal assignment, i.e., d d d d 2) The agents decide to swap goals, i.e., k(cid:0)t− (cid:1) (cid:54)= k(cid:0)t+ d (cid:1) d and a switching occurs. Theorem 4: The switched multi-robot system (8) under the OGA policy does not suffer from Zeno points. d d d d yG2 yG1 (cid:1) = ∇Sc(¯r)fk (cid:0)t− Denote rG1 =(cid:2)xG1 (cid:0)t− (cid:0)t+ (cid:1) = fk (cid:1)}, and (cid:0)t+ (cid:1) = 0, where td is (cid:3)T , rG2 =(cid:2)xG2 (cid:3)T where Proof: We employ the results in [34], Theorem 2. Let us assume that the switched multi-robot system (8) has a Zeno point ¯r. Then it holds that: ¯r ∈ Sc(td), ¯r is an accumulation point of the set S = {r ∈ Sc(td) : fk satisfies: ∇Sc(¯r)fk a decision making and switching time instant. rG1 (cid:54)= rG2 the position vectors of the goal locations G1, G2, assigned to the agents i, j respectively, at time t− d . The agents implement the OGA policy at time td and decide to swap goals. (cid:21) (cid:20)−λi(ri − rG2 ) (cid:0)t+ (cid:1) = Then, the corresponding vector fields read: T(cid:3), where rij = (ri− rj). It is −λj(rj − rG1 ) (cid:1) ⇒ rG1 = (cid:0)t+ (cid:1) = fk (cid:0)t− (cid:0)t− while ∇Sc(td) =(cid:2)rij easy to verify that S = ∅, since fk rG2, a contradiction. Thus, the set of accumulation points of S is empty, which implies that no Zeno points ¯r are contained there, a contradiction. Thus, the OGA policy does not suffer from Zeno points. (cid:20)−λi(ri − rG1) (cid:21) −λj(rj − rG2) T −rij (cid:1) = , fk fk d d d d , This result establishes that the decision making under the OGA renders trajectories that do not accumulate on, i.e., always escape, the switching surface Sc(td); hence the robots do not get stuck away from their assigned goals. Finally, to maintain the property that there always will be a positive time interval τ > 0 between consecutive switching times, we implement a hysteresis-like switching logic; the idea is that after the (i, j) decision making at time td and while connected, the agents i, j do not get involved in a new (i, j) decision making, unless the agents have become disconnected first. Note that in addition, this hysteresis logic validates our Assumption 1 on finite amount of switches per unit time interval. D. The N > 2 Robot Case The results on the stability and non-Zeno behavior of the multi-robot system extend to the case of N > 2 agents. Con- sider N agents that need to converge to N goal locations. This gives rise to N! possible goal assignments k ∈ {1, 2, . . . , N!}, or in other words, N! candidate switched subsystems fk for the switched multi-robot system:  , fk = r1 ... rN u(k) ... u(k) N 1  , k ∈ K = {1, . . . , N!}. (9) r(t) = fk(r(t)), where: r = For N > 2 agents the decision making on the optimal goal assignment involves the Nc ≤ N connected agents at time td. The agents exchange information on their positions and goal locations at time td, compare the values of the Nc! Lyapunov functions V (k)(td), where k ∈ Kc(td) ⊆ K, and pick the goal assignment k which corresponds to min{V (k)(td)}. 1) Stability Analysis: Consider the sequence of switching times T = {t0, t1, . . . , tn, . . .} and the switching sequence Σ = {r0; (k0, t0), (k1, t1), . . . , (kn, tn), . . .}, kn ∈ K. Then, the reasoning and analysis followed in Theorem 3 apply to the N > 2 case as well. Theorem 5: The trajectories r(t) of the switched multi- robot system (9) are GAS w.r.t. the goal assignment k. Proof: We consider the candidate Lyapunov-like func- tions V (k), k ∈ {1, . . . , N!}, encoding the motion of the agents under goal assignment k. Out of Lemma 1, each individual k- th subsystem, i.e., the motion of the multi-robot system under the k-th assignment, is GES. This implies that each V (k) is decreasing on the time intervals that the k-th subsystem is active. Furthermore, the OGA policy dictates that at the switching times {t0, t1, t2, t3, . . . ,} one has: V (k(t0))(t0) > V (k(t1))(t1) > V (k(t2))(t2) > . . . , where k(tn) denotes the k-th subsystem that becomes active at time tn, n ∈ N; in other words, the value of each Lyapunov- like function V (k) at the beginning of the time intervals when the k-th subsystem becomes active satisfies the decreasing con- dition, i.e., the switched system is Lyapunov stable. To draw conclusions on the asymptotic stability, consider any pair of switching times tn1 < tn2 when the k-th subsystem becomes active, the corresponding time intervals [tn1, tm1 ), [tn2, tm2) while the k-th subsystem remains active, with tm1 < tn2, and follow the reasoning as in Theorem 3, i.e.,: V (k)(tn1) > V (k)(tm1 ), V (k)(tm1) ≥ V (l)(tm1), V (l)(tm1) ≥ V (k)(tn2), V (k)(tn2) > V (k)(tm2 ), since the subsystem k is active on [tn1, tm1) and GES out of the OGA Policy, l (cid:54)= k out of the OGA Policy since the subsystem k is active on [tn2 , tm2) and GES which imply that: V (k)(tm2) < V (k)(tm1), i.e., that: V (k)(tm2 ) = ρkV (k)(tm2), V (k)(tm2 ) − V (k)(tm1 ) = −(1 − ρk) V (k)(tm1 ), 0 < ρk < 1. Then: where 1−ρk > 0. Following the same reasoning as in Theorem 3, we have that the switched system is GAS. 2) Non-Zeno Behavior: Finally, following the same pattern as for the N = 2 case, one may verify that: Theorem 6: The switched multi-robot system (9) under the d (cid:0)t+ (cid:0)t− (cid:1) = fk (cid:1)}, where Sc(td) OGA policy does not suffer from Zeno behavior. Proof: Assume that the switched system (9) has a Zeno point ¯r. Then, ¯r ∈ Sc(td) and ¯r is an accumulation point of the set S = {r ∈ Sc(td) : fk is the switching surface at the decision and switching time td. The OGA policy dictates that at least one pairwise goal swap occurs at time td, since if the agents decided to keep the goals they had at time t− d , then td would not have been a switching time, a contradiction. Since at least one pair of agents (i, j) switches goal locations, denoted as rGi, rGj , the condition fk only when rGi = rGj , see the analysis in Theorem 4, i.e., (cid:1) on the switched vector fields holds true (cid:1) = fk (cid:0)t− (cid:0)t+ d d d a contradiction by construction. Thus, the set S = ∅, which furthermore implies that the set of its accumulation points is empty, implying that no Zeno points can be contained there. Thus, the switched multi-robot system (9) does not exhibit Zeno behavior. V. COLLISION AVOIDANCE POLICY The OGA policy does not ensure that inter-agent collisions, realized as keeping dij(t) ≥ ds, where ds is a safety distance, are avoided ∀t ∈ [0,∞) (see also [18], [19]). Problem 2: Establish (sufficient) conditions under which the OGA policy is collision-free. A. Detecting Conflicts We are referring to time t > td, i.e., after Nc ≤ N connected agents have decided on a goal assignment k based on the OGA policy, and move towards their goal locations r(k) gi . In the sequel we drop the notation ·(k), in the sense that the goal assignment k is kept fixed. We would like to identify a metric (a "supervisor") deter- mining whether the OGA policy results in collisions. Let us consider the collision avoidance constraint: cij(ri, rj) = (xi − xj)2 + (yi − yj)2 − ds (10) encoding that the inter-agent distance dij = (cid:107)ri − rj(cid:107) should always remain greater than a safety distance ds. 2 > 0, To facilitate the analysis using Lyapunov-like approaches, we encode the constraint (10) as a Lyapunov-like function. Recall that a barrier function [35] is a continuous function whose value on a point increases to infinity as the point approaches the boundary of the feasible region; therefore, a barrier function is used as a penalizing term for violations of constraints. The concept of Recentered Barrier Function (RBF) in particular was introduced in [36] in order to not only regulate the solution to lie in the interior of the constrained set, but also to ensure that, if the system converges, then it converges to a desired point. We define the logarithmic barrier R2 × R2 → R for the constraint (10) as: function bij(·) : T(cid:12)(cid:12)rgi bij(ri, rj) = − ln (cij(ri, rj)) , (11) which tends to +∞ as cij(·) → 0, i.e., as dij → ds. The RBF of (11) is defined as [36]: rij = bij(ri, rj) − bij(rgi, rj) − ∇bij (cid:3)T is the goal location for agent i, (ri − rgi), (12) bij(rgi, rj) is the value of (11) evaluated at rgi, ∇bij = is the gradient vector of the function bij(·), and ∇bij is the transpose of the gradient vector, evaluated at rgi. To ensure that we have a nonnegative function to be used as a Lyapunov-like function, we define [28]: wij(·) = (rij(ri, rj, rgi ))2 , where rgi = (cid:2)xgi (cid:105)T (cid:104) ∂bij T(cid:12)(cid:12)rgi ∂bij ∂yi (13) ygi ∂xi which now is a positive definite function. To furthermore encode that the position trajectories of agent i remain bounded in a prescribed region (for reasons that will be explained in the technical analysis later on), for each agent i we define the workspace constraint: ci0(ri, r0) = R2 0 − (xi − x0)2 − (yi − y0)2 > 0, which encodes that the position ri = (cid:2)xi r0 = (cid:2)x0 (cid:3)T of agent (cid:3)T and radius R0 > Rc. This can be thought i should always lie in the interior of a circle of center (14) as the workspace where the agents operate. Then, in the same reasoning followed before, we define the barrier function: y0 yi bi0(ri, r0) = − ln (ci0(ri, r0)) , (15) and its corresponding RBF: (ri − rgi), (16) ri0 = bi0(ri, r0) − bi0(rgi, r0) − ∇bi0 which vanishes only at the goal location rgi and tends to infinity as the position ri tends to the workspace boundary. To get a positive definite function we consider: wi0(·) = (ri0(ri, r0, rgi ))2 . (17) Therefore, an encoding that agent i stays ds away from all its neighbor agents j, while staying within the bounded workspace, can be now given by an approximation of the maximum function of the form: T(cid:12)(cid:12)rgi (wi0)δ + (cid:88) j∈Ni  1 δ wi = (wij)δ , (18) where δ ∈ [1,∞), and Ni ⊆ N is the set of connected (neighbor) agents j (cid:54)= i of agent i. The function wi vanishes at the goal location rgi and tends to +∞ as at least one of the terms wi0, wij tends to +∞, i.e., as at least one of the inter-agent distances dij tends to ds, or as agent i tends to the workspace boundary. Finally, to ensure that we have a Lyapunov-like function for agent i which uniformly attains its maximum value on constraints' boundaries we take: Wi = wi 1 + wi , (19) which is zero for wi = 0, i.e., at the goal position rgi of agent i, and equal to 1 as wi → ∞. For more details on the analytical construction the reader is referred to [28], [37]. The level sets of the Lyapunov-like function (19) can now be used as a sufficient criterion on determining whether the control inputs out of the OGA policy jeopardize safety. Let us consider the time derivative of (19): (cid:21) (cid:105)(cid:20) xi (cid:16) (cid:88) yi ∂Wi ∂yi j∈Ni + ∂xj j∈Ni (cid:18)(cid:104) ∂Wi (cid:88) (cid:17) , ζij (cid:44)(cid:104) ∂Wi , ζij T uj (cid:105)T (cid:105)(cid:20) xj (cid:21)(cid:19) yj ∂Wi ∂yj = (20) (cid:105)T (cid:104) ∂Wi ∂xi Wi = T ui + = ζi where ζi (cid:44)(cid:104) ∂Wi ∂xi ∂Wi ∂yi . This time derivative is defined almost everywhere, except for a set of measure zero corresponding to the case when the gradient term ∇bijrgi is undefined (namely, this corresponds to rj = rgi). Not surprisingly, the evolution of the time derivative (20) ∂Wi ∂yj ∂xj along the trajectories of agent i depends not only on its own motion (through ui), but also on the motion of its neighbor agents j (cid:54)= i through their velocities uj. This time derivative provides sufficient conditions on establishing safety under the OGA policy. To see how, let us consider the following Lemma. Lemma 2: If the control inputs ui, uj, where j ∈ Ni, out of the OGA policy satisfy the following condition for all i ∈ {1, . . . , N}: ζi T ui + ζij T uj < 0, (21) (cid:17) (cid:88) (cid:16) j∈Ni then the OGA policy is asymptotically stable w.r.t. the current goal assignment k and furthermore collision-free. Proof: To verify the argument, consider the properties of the Lyapunov-like function (19) and denote the constrained set for each agent i as Ki = {r ∈ R2 N cij(·) ≥ 0}, where j ∈ Ni ∪ {0}. The set Ki is by construction compact (i.e., closed and bounded), with the level sets of Wi being closed curves contained in the set Ki. Then, the condition (21) implies that the system trajectories ri(t) under the OGA control input ui evolve along the negative direction of the gradient vector ∇Wi = of Wi, i.e., always remain in the interior of the constrained set Ki; this further reads that the inter-agent distances dij(t) never become smaller than ds. (cid:104) ∂Wi ∂Wi ∂yi (cid:105) ∂xi Problem 3: Seek a policy that becomes active when the OGA policy is about to result in colliding trajectories, and ensures that the inter-agent distances dij remain greater than the critical distance ds. We develop the CA policy described in the following section. B. Resolving Conflicts (cid:88) (cid:16) (cid:17) Let us consider the switching surface: Qi = ζi . ζij T uj j∈Ni T ui + (22) Then for Qi < 0 one has out of Lemma 2 that the OGA policy is both GAS and collision-free. For Qi > 0 one has Wi > 0, which implies that the position trajectories ri(t) evolve along the positive direction of the gradient vector ∇Wi. This condition may jeopardize safety and dictates the definition of an additional policy to ensure that the trajectories ri(t) remain in the constrained set Ki. At this point, one may be tempted to use a CA control law for agent i along the gradient-descent direction of Wi, to render the trajectories of the multi-robot system collision-free in the set Qi > 0. However, such control laws typically grow unbounded for system trajectories approaching local minimum points, i.e., as (cid:107)∇Wi(cid:107) → 0. This may lead to implementation issues when it comes to realistic robotic agents and therefore is undesirable from a practical point-of-view. We thus emulate the gradient descent performance along the level sets of (19) with control inputs that are always well- defined. We define a vector field Fi : R2 → R2 to be used as a feedback motion plan for each agent i, in the spirit developed in our earlier work [29]. The analytical expression is given as: (23) (1 − σij)Fi (cid:88) (cid:89) σijFi Fi = g + oj, j∈N(cid:105) j∈N(cid:105) for ds ≤ dij ≤ Rs; for Rs < dij < Rc; for dij ≥ Rc; (24) (cid:3)T vector ygi σij = where: field Fi a dij 0, 3 + b dij 2 + c dij + d,  1, the attractive to the goal position rgi = (cid:2)xgi (cid:112)(x − xgi)2 + (y − ygi)2 (cid:112)(x − xgi)2 + (y − ygi)2 (cid:112)(xi − xj)2 + (yi − yj)2 (cid:112)(xi − xj)2 + (yi − yj)2 g is defined as: xg = − Fi yg = − Fi the repulsive vector field Fi defined as: x − xgi y − ygi xoj = yoj = Fi Fi , (25b) oj around each agent j (cid:54)= i is xi − xj yi − yj (26a) , , (26b) , (25a) Rs the radius of the circle where the repulsive vector field is active, the coefficients a, b, c and d have been computed as: a = − 2 (Rs − Rc)3 , c = − 6 RsRc (Rs − Rc)3 , b = d = 3(Rs + Rc) (Rs − Rc)3 , 2(3Rc − Rs) Rc (Rs − Rc)3 , so that (24) is a C1 function. The vector field (23) for each agent i has integral curves that are: 1) convergent to the goal location rgi as long as dij > Rc for all j (cid:54)= i, i.e., when no agent j lies in the communi- cation region Ci of agent i, and 2) repulsive w.r.t. agents j which lie within distance dij < Rs w.r.t. agent i, i.e., within the communication region Ci of agent i. x, Fi Most importantly, the integral curves of (23) are always well- defined within the constrained set Ki of agent i, in contrast to the gradient vector field out of the Lyapunov-like barrier function (19) that is undefined at the points where the function (19) is not defined. The vector field (23) by construction vanishes only at the goal location rgi. Thus, the vector field (23) dictates a safe reference direction φi = atan2(Fi y, Fi x) everywhere on Ki \ {rgi}, where Fi y are the components of (23). Furthermore, one can show ( [29], Theorem 5) that the vector field (23) is an almost globally convergent feedback motion plan for agent i, i.e., all agent trajectories along the integral curves of (23) converge to the goal location rgi, except for those starting from a set of initial conditions of measure zero. For more details, the reader is referred to [29]. Now, in the ideal case of a static environment, i.e., when agents j (cid:54)= i are not moving, the control policy on the linear speed ui of agent i can naturally be independent of the linear speeds uj of other agents j (cid:54)= i, in the sense that these are identically zero. In the practical case of dynamic environments however, i.e., when agents j (cid:54)= i are moving, the control policy on the magnitude ui of the linear velocity vector ui of each agent i should take into account the motion of neighbor agents Under the control law (27), agent i adjusts its linear speed ui according to the velocity profile shown in Fig. 2, given analytically out of (27), so that the distance dij w.r.t. the worst case neighbor j remains greater than ds. The worst case neighbor is the agent j ∈ {Ni Ji < 0} towards whom the rate of change of relative distance dij given by (29), due to the motion of agent i, is maximum. More specifically: The term j ∈ {Ni Ji < 0} describes the set of neighbor agents j of agent i towards whom agent i is moving [28]. Agent i computes safe velocities uij given out of (28) w.r.t. each neighbor in this set, and picks the minimum min{uij} of the safe velocities uij so that the first term in (29) is as small as possible. Now, the value of the safe velocity uij (28) when . Plugging this value dij = ds is equal to εiuisj = εi into (29) reads: T uj T ηi rij rij (cid:12)(cid:12)dij =ds dij = (εi − 1)uj rij T ηj ≥ 0. dij To see why this condition is true, recall that εi−1 < 0, uj > 0, T ηj ≤ 0: this is because agent j is either following a and rij vector field Fj that points away from agent i, or happens to move away from agent i in the first place. This implies that the inter-agent distance dij can not become less than ds, i.e., that collisions are avoided. C. Ensuring both Stability and Safety We now define the switching policy that collision-free motion for each agent i as follows: realizes the Let Nc ≤ N agents become connected at some time instant td ≥ 0 while moving under some goal assignment k ∈ {1, . . . , Nc!}. Define Ri(td) = cos(θi(td)) cos(φi(td)) the decision-making surface for agent i, where θi(td) is the direction of the velocity vector ui at time td given out of the OGA controller (2), and φi(td) is the direction of the vector field vector Fi at time td, given out of (23). Then: • If Ri(td) > 0, the trajectories under the OGA policy are safe, and agent i keeps moving under (2). • If Ri(td) ≤ 0, the trajectories out of the OGA policy might violate safety, and agent i moves under (27). The switching between the OGA policy and the CA policy across the switching surface Ri = 0 gives rise to closed-loop dynamics with discontinuous right-hand side for each agent i: ri(t) = v(p) i , (30) i where p ∈ P = {1, 2}, and v(p) is the closed-loop dynamics of agent i under the OGA policy (2) and the CA policy (27), respectively. More specifically, for p = 1, agent i moves under the OGA policy, while for p = 2, agent i moves under the CA policy. We formalize the switching logic between the resulting closed-loop subsystems via a hysteresis technique, similar to the one used in Section IV-C; i.e., after making the decision be- tween either subsystem p = 1 or subsystem p = 2, the agents do not get involved in a new decision making unless they become disconnected first. The hysteresis logic gives rise to If Jj (cid:44) rij Fig. 2. T ηi < 0, i.e., if agent i moves towards agent j, then agent i adjusts its linear speed according to the velocity profile shown here, given analytically by (27). (cid:18) (cid:19) as well, so that the inter-agent distances dij(t) are guaranteed to remain greater than the lower bound ds, ∀t ≥ 0. We use the following velocity coordination protocol to govern the speed ui for each agent i: Lemma 3: Let Nc ≤ N agents become connected at some time instant td ≥ 0 while moving under some goal assignment k ∈ {1, . . . , Nc!}. The motion of each agent i in the connected group is collision-free under the control law: ui = where: ηi = (cid:2)cos φi min j∈NiJi<0 {uij} ηi, (cid:3)T is the unit vector along the (27) sin φi direction of the vector field (23), rij = ri − rj, Ji = rij uisj = rij rij , 0 < εi < 1, and T uj T ηi T ui, uij = ui dij − ds Rc − ds + εi Rc − dij Rc − ds . (28) rij rij T uj T ηi (cid:124) (cid:123)(cid:122) (cid:125) uisj Remark 5: In effect, the control law (27) forces agent i to adjust its speed w.r.t. the worst-case neighbor j ∈ Ni, i.e., w.r.t. the neighbor j towards whom the rate of change of inter- agent distance dij is maximized via the motion of agent i. Proof: Our goal is to show that the constrained set Ki encoded via the outermost level set of the Lyapunov-like barrier (19) is rendered a positively invariant set under the control law (27). We employ the fundamental characterization of positively invariant sets [27] through the necessary and suf- ficient conditions of Nagumo's theorem on the boundary of the dt cij(ri, rj) ≥ constrained set Ki of each agent i, namely: d 0, ∀rj ∈ ∂Ki, ∀(i, j). Consider that at some time td ≥ 0, the distance dij(td) between a pair of connected agents (i, j) is dij(td) ≤ Rc. Consider the time derivative of the inter-agent distance, which after some calculations reads: T (ui − uj) (1) = dij rij d dt dij . (29) a switching sequence of times T = {τ1, τ2, τ3, . . . , τn, . . . ,}, where the time interval τn − τn−1 is finite ∀n ∈ N, and to the switching sequence: Σ(cid:63) = {ri(τ0); (1, τ0), (2, τ1), . . . , (1, τ2q), (2, τ2q+1), . . . ,}, where τ0 > td, q ∈ N, τ2q are the time instants when the subsystem p = 1 (OGA policy) is "switched on", τ2q+1 are the time instants when the subsystem p = 2 (CA policy) is "switched on". Problem 4: Establish that the proposed switching strategy Σ(cid:63) between the OGA policy and the CA policy renders the multi-robot trajectories asymptotically stable w.r.t. to the as- signed goals, and also collision-free. For the stability analysis of this switching strategy, it is inefficient to employ Branicky's decreasing condition on the "switched-on" time intervals of each individual subsystem; the main reason is that in principle the CA strategy might result in trajectories that either are not monotonically decreasing, or are even increasing with a bounded growth for a finite amount of switches. Therefore we resort to results on the stability of switched systems that remove this condition in order to draw conclusions on asymptotic stability. Theorem 7: The trajectories of the switched multi-robot system under the switching logic Σ(cid:63) are (i) collision-free, and (ii) (almost globally)2 asymptotically stable w.r.t. the assigned goals. Proof: The first argument is proved in Lemmas 2 and 3. The second argument can be verified by directly applying Theorem 2. To this end, let us first note that Lemma 1 implies that the function Vi for each agent i serves as generalized Lyapunov-like function for the subsystem p = 1. Furthermore, is a valid generalized Lyapunov-like function almost Wi everywhere for each agent i for the subsystem p = 2. To see why, consider that the vector field (23) is by construction transverse to the boundary of the constrained set Ki, and convergent to the goal location rgi, except for a set of initial conditions of measure zero [29]. Hence, during the time intervals when the subsystem p = 2 is active, the growth, if any, of the function Wi along the system trajectory is bounded. Furthermore, the stability condition (6) for each subsystem p is satisfied out of the boundedness of the solutions ri(t) within the constrained set Ki, which is by construction closed and bounded. Therefore, the switched system is stable. To establish (almost global) asymptotic stability, it should hold that for at least one of the individual subsystems p, the value of the corresponding generalized Lyapunov-like function decreases along the sequence of switching times. Let us assume that this is not the case; then this would imply that , p ∈ {1, 2}, oppose the closed-loop switched vector fields v(p) each other and cancel out on the switching surface Ri, forcing the system trajectories to get stuck there. In other words, this would imply that the switching policy Σ(cid:63) exhibits Zeno tra- jectories. A Zeno point ¯r ∈ Sc(td) would be an accumulation point of the set S = {r ∈ Sc(td) : v(p)(cid:0)t− (cid:1) = v(p)(cid:0)t+ (cid:1)}, i d d 2The almost global characterization is added for completeness due to the set-measure initial conditions from which at least one of the agents is forced to their respective goal under the CA policy. and satisfies: ∇Sc(¯r)v(p)(cid:0)t− (cid:1) = ∇Sc(¯r)v(p)(cid:0)t+ (cid:1) = 0, d d where td is a decision making and switching time instant. For each agent i, the first condition reads: −λi(¯ri − rgi) = uij(¯ri, ¯rj) ηi(¯ri, ¯rj), j ∈ Ni, (31) where the left-hand side is given out of (2) and the right-hand side is given out of (27), with ηi(¯ri, ¯rj) the unit vector along the direction φi of the vector field (23); recall that φi depends by construction on the states of the neighbor agents j ∈ Ni, hence the dependence on ¯rj in the right-hand side of (31). Geometrically, the condition (31) implies that the candidate set S of Zeno points lies on the line that connects the position of the agent with its goal location and is concurrently collinear with the vector field (23). The second set of conditions reads: ∇(cid:0)uij(¯ri, ¯rj)ηi(¯ri, ¯rj)(cid:1) = 0. (32a) (32b) The former one reduces to λi = 0, ∀i, which is a contradiction. Hence the candidate set of Zeno points is empty, i.e., the switching strategy between the OGA policy and the CA policy does not exhibit infinite switching between the OGA and the CA policies around an accumulation point. Therefore, the switched multi-robot system under the switching strategy Σ(cid:63) does not exhibit Zeno trajectories, and is almost globally asymptotically stable. −λi∇ (¯ri − rgi) = 0, D. Robustness against Communication Failures We note that establishing robustness against uncertainty (e.g., against sensor noise, communication dropouts and/or delays) is beyond the scope of the current paper. As a special case, we only consider how the case of failed communication can be handled within the centralized version of the proposed approach. Note that finding the set of initial conditions that result in collision-free trajectories for a given distribution of goals and for every possible decentralized assignment is essen- tially a backwards reachability problem, which is intractable for even low-dimensional systems, i.e., for teams of no more than 2-3 robots. However, the centralized case as treated in the earlier work of the authors [18] offers a (conservative, yet guaranteed) robustness measure for the case of failed communication in a decentralized setting; more specifically, we have the following corollary: Corollary 1: Let the multi-robot system under switched agent dynamics given by (30), and the switching sequence Σ(cid:63). If for all ri(0), rj(0), rGi, rGj , i, j ∈ {1, . . . , N}, it holds that (cid:107)ri(0) − rj(0)(cid:107) ≥ 2R 2, where R is the radius of the robots, then under failed communication the multi-robot trajectories are collision-free. 2, and (cid:107)rGi − rGj(cid:107) ≥ 2R √ √ Proof: The corollary states that if the initial robot po- 2 apart, then the result- sitions and goal locations are 2R ing multi-robot trajectories are collision-free, even when the agents' communication fail and no goal swap or collision avoidance controllers are implemented. Note that under failed communication, the affected agents will not be involved in any decision on re-assigning their goals (i.e., will keep their current goals), and will not update their control laws. Hence, whether the trajectories will be collision-free depends on the initial √ conditions (positions) of the robots and the spatial distribution of the goal locations. The analysis of the centralized version of the OGA policy in [18] proves that under the stated assump- tions, the OGA policy results in collision-free trajectories. This completes the proof. VI. SIMULATION RESULTS A. Simulations for N = 15 and N = 40 agents Simulation results are provided to evaluate the performance of the switched multi-robot system under the proposed switch- ing logic and control policies. In the interest of space, and given that the representation of large groups of robots results in rather congested figures, here we consider only two scenarios involving N = 15 and N = 40 agents, respectively. The initial positions and the assigned goal locations are selected in very close proximity so that the OGA policy on its own is not sufficient to ensure collision-free trajectories, see Fig. 3 and 4, respectively. The agents start from the initial con- ditions shown in Fig. 3(a), 4(a) towards goal locations marked with "x"; as discussed earlier, the initial goal assignment is not necessarily the optimal one. The communication ranges are denoted by the rings around each agent, and set equal to Rc = 4R, where R is the radius of the agents. The straight line paths from the starting locations to the initially assigned goals are depicted as the dotted lines, whereas the actual paths followed by the switching strategy are shown in Fig. 3(b) and 4(b), respectively. The final locations of the robots are shown in Fig. 3(c) and 4(c), respectively. As indicated by the colors of the initially assigned goals, the followed paths, and the final goal locations of the robots, the robots performed goal swaps during the duration of the simulation under the OGA policy, while they also moved under the CA policy during the path segments that are not straight. Figures 5 and 6, respectively, show the minimum distance between any two pairs of agents at each time instance of the simulations. As this distance is always greater than the safety distance ds, there is never a collision between any robots. Additional videos with teams of 6, 30, 80, 100, and 150 agents are available through the following links: https://www.dropbox.com/s/a5hykza2wla7x3n/6.mp4?dl=0 https://www.dropbox.com/s/1gazjlt7nell0mn/30.avi?dl=0 https://www.dropbox.com/s/48bnwsnlqibkgaj/80.avi?dl=0 https://www.dropbox.com/s/e6wljow9ft2ziap/100.avi?dl=0 https://www.dropbox.com/s/uif0yahjlhv0bsf/150.avi?dl=0 It is noteworthy that the simulation videos demonstrate the expected performance of the overall algorithm in terms of the convergence rate; more specifically, the slower convergence of the agents to their goal locations towards the end of the simulation, compared to their faster motion in the beginning of the simulation, is consistent with the exponential convergence rate of the OGA policy. 3 3Note however that the videos run at different frames-per-second or have deliberate pauses to explain the algorithm, and as thus the time lengths of the videos shall not be used for a direct comparison of the convergence time among the cases of different N. (a) Initial positions of the agents and the straight paths to the goals determined by the random initial goal assignment. (b) The actual paths to the goals under the proposed control strategy. (c) The final locations of the agents. Fig. 3. A simulation with N = 15 robots. The paths followed are straight when in the OGA segments, but are potentially curved when using the CA control law. -15-10-505101520-20-15-10-50510-10-5051015-15-10-505-15-10-5051015-15-10-505 (a) Initial positions of the agents and the straight paths to the goals determined by the random initial goal assignment. Fig. 5. The minimum inter-agent distance between any two robots for a simulated trial with N = 15. Note that as this is always greater than the allowable safety distance, there were never any collisions between robots. (b) The actual paths to the goals under the proposed control strategy. (c) The final locations of the agents. Fig. 4. A simulation with N = 40 robots. The paths are straight during the OGA segments, but are potentially curved when using the CA control law. Fig. 6. The minimum inter-agent distance between any two robots for a simulated trial with N = 40. Note that as this is always greater than the allowable safety distance, there were never any collisions between robots. B. Comparison with earlier work in [24] √ As discussed earlier, the current approach dominates our earlier work [24] in the following aspects: (i) The initial positions of the robots and the goal locations can be close as ds = 2R, in contrast to [24] that requires the initial locations 2 apart for safety. (ii) The collision-free and goals to be 2R trajectories of the current approach are rendered via switching among two control policies, opposed to [24] that involves switching among three control policies. The approach here nevertheless does not consider the initially optimal assignment, and as thus, depending on the connected subcomponents at initial time and throughout the evolution of the system, might result in suboptimal paths in terms of total distance. For completeness, we include simulation results between the current approach and [24]; in the scenario illustrated in Fig. 7, the resulting paths are suboptimal; the total computational time -20-100102030-20-15-10-505101520-20-15-10-5051015202530-20-15-10-5051015-20-100102030-25-20-15-10-505101520Time [sec]00.10.20.30.40.50.60.70.8Minimum Pairwise Inter-agent Distance dij1.51.551.61.651.71.751.81.851.91.952Minimun Pairwise Interagent DistanceSafety DistanceTime [sec]00.10.20.30.40.50.60.70.8Minimum Pairwise Inter-Agent Distance dij1.51.551.61.651.71.751.81.851.9Minimum Pairwise Interagent DistanceSafety Distance it follows that the number of re-plan operations, and hence the number of messages that are exchanged among the connected agents on deciding whether they swap goals, depends greatly on the communication range, the number of robots, and their initial distribution, i.e., the quality (in terms of sub-optimality) of the initial assignment. Note that for sufficiently large radius Rc, which results in all agents being connected at the same time, the centralized case is recovered, meaning that the agents decide among N! assignments. The time for a re-plan operation also directly depends on the number of agents in the connected component. Planning times on simulated teams of Nc robots using a single computer take approximately 10−7Nc 3 seconds, which reads that a component of 100 connected robots takes about 0.1 seconds to re-plan. The required computational time is typically sufficient for the proposed multi-robot applications. VII. EXPERIMENTAL RESULTS The proposed switching logic and control policies were also evaluated in experimental trials with six ground robots (AION R1 Rovers) in the Distributed Aerospace Systems and Control Lab, University of Michigan. The position of the robots was acquired via a VICON motion capture system. The Robot Operating System (ROS) was used to exchange data among the agents, as well as to convert the high-level control commands to low-level motor voltage commands that drive the robots' wheels. The control loop was closed at approximately every 30 msec. Since the robots are differentially-driven, hence closer modeled via the unicycle nonholonomic kinematics rather than single integrators, the proposed controllers were implemented by steering the robots' orientations along the direction of the velocity vector computed from either the control law (2) or the control law (27), and applying the corresponding linear velocity along this direction. This corresponds in part to the discrepancy in the resulting paths between the simulation results in Fig. 7(a) and experimental results as described below. The experiments demonstrate that the proposed switching logic and corresponding policies are applicable in practice, and produce results that are consistent with the expected theoretical performance. The controller parameters were set equal to: R = 0.35 m (robot radius), Rc = 1.1 m (communication radius), Rs = 0.9 m, ds = 0.7 m (minimum allowable distance). The video of experiment is available at https://www.dropbox.com/s/ujrtzn1aolc0yul/6-exp.mp4?dl=0. The derived paths of the robots under the proposed approach are shown in Fig. 8(a). Fig. 8(b) depicts the distance of each robot w.r.t. its corresponding goal over time, and furthermore illustrates the time instances where the OGA becomes active and invokes goal swaps along with concurrent reduction in the cost (distance-to-the-goal). The minimum pairwise distance among the robots over time is shown in Fig. 8(c), and demonstrates that the trajectories are always collision-free. VIII. CONCLUDING REMARKS We presented a switched systems approach on the decen- tralized concurrent goal assignment and trajectory generation for multi-robot networks which guarantees safety and global (a) Initial positions (red), goal locations (green) and the paths resulting from the current approach. (b) Initial positions (red), goal locations (green) and the paths resulting from the approach in [24]. Fig. 7. Comparison of the paths resulting from the current approach versus the approach in [24]. for the entire simulation in the former case is was 2.625 sec, while in the latter case was 1.375 sec. This demonstrates that even with suboptimal paths, the algorithm is computationally efficient for the considered applications. C. Notes on communication requirements and planning time The implementation of the proposed algorithm in a realistic setting requires the capability of exchanging messages (e.g., via wireless communication links) among the subset of agents that are considered connected at some time instance, i.e., among robots that lie within Rc distance and their neighbor agents. Once a connected group is formed, the OGA policy runs in a synchronous manner. Recall that in our approach the initial assignment is random, i.e., the focus of this work is not on determining the globally optimal assignment of the robots to the goals, but instead we focus on re-assigning goals among connected robots. Thus, since the decision-making mechanism (i.e., the OGA policy) on re-determining the goal assignment is triggered whenever (a subset of) agents become connected, stability to interchangeable goal locations. The proposed switching logic relies on multiple Lyapunov-like functions that encode goal swap among locally connected agents based on the total traveled distance, avoidance of inter-agent collisions, and convergence to the assigned goal locations. As such, the proposed methodology renders feedback control policies with local coordination only, and therefore is suitable for applica- tions such as in first-response deployment of robotic networks under limited information sharing. The proposed algorithms were evaluated via simulation results and experiments with six robots. Our future work will focus on agents with more complicated dynamics, as well as on the robustness of our algorithms under communication failures and uncertainty. REFERENCES [1] Z. Yan, N. Jouandeau, and A. A. Cherif, "A survey and analysis of multi- robot coordination," Int. Journal of Advanced Robotic Systems, vol. 10, pp. 1 -- 18, 2013. [2] S. Kloder and S. Hutchinson, "Path planning for permutation-invariant multirobot formations," IEEE Transactions on Robotics, vol. 22, no. 4, pp. 650 -- 665, Aug. 2006. [3] S. L. Smith and F. Bullo, "Monotonic target assignment for robotic networks," IEEE Trans. on Automatic Control, vol. 54, no. 9, pp. 2042 -- 2057, Sep. 2009. [4] L. Liu and D. Shell, "Multi-level partitioning and distribution of the task allocation," in assignment problem for large-scale multi-robot Proceedings of Robotics: Science and Systems, Los Angeles, CA, USA, June 2011. [5] N. Jouandeau and Z. Yan, "Improved trade-based multi-robot coor- dination," in Proc. of the 6th IEEE Joint International Information Technology and Artificial Intelligence Conference (ITAIC), vol. 1, Aug 2011, pp. 500 -- 503. [6] W. Zhao, Q. Meng, and P. W. H. Chung, "A heuristic distributed task allocation method for multivehicle multitask problems and its application to search and rescue scenario," IEEE Transactions on Cybernetics, vol. 46, no. 4, pp. 902 -- 915, Apr. 2016. [7] B. Yamauchi, "Decentralized coordination for multirobot exploration," Robotics and Autonomous Systems, vol. 29, pp. 111 -- 118, 1999. [8] B. Werger and M. Mataric, "Broadcast of local eligibility: behavior- based control for strongly cooperative robot teams," in Proc. of the 4th Int. Conference on Autonomous Agents, New York, 2000, pp. 21 -- 22. [9] J. Faigl, M. Kulich, and L. Preucil, "Goal assignment using distance cost in multi-robot exploration," in Proc. of the 2012 IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, Vilamoura, Algarve, Portugal, Oct. 2012, pp. 3741 -- 3746. [10] A. Bautin, O. Simonin, and F. Charpillet, "MinPos: A novel frontier allocation algorithm for multi-robot exploration," ser. Lecture Notes in Computer Science; Intelligent Robotics and Applications, C.-Y. Su, S. Rakheja, and H. Liu, Eds. Springer, Heidelberg, 2012, vol. 7507, pp. 496 -- 508. [11] M. G. Lagoudakis, M. Berhault, S. Koenig, P. Keskinocak, and A. J. Kleywegt, "Simple auctions with performance guarantees for multi-robot task allocation," in Proc. of the 2002 IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, Sendai, Japan, Sep. 2004, pp. 698 -- 705. [12] H.-L. Choi, L. Brunet, and J. P. How, "Consensus-based decentralized auctions for robust task allocation," IEEE Trans. on Robotics, vol. 25, no. 4, pp. 912 -- 926, Aug. 2009. [13] J. Hawley and Z. Butler, "Hierarchical distributed task allocation for multi-robot exploration," in Distributed Autonomous Robotic Systems, ser. Springer Tracts in Advanced Robotics, 2013, vol. 83, pp. 445 -- 458. [14] M. M. Zavlanos and G. J. Pappas, "Dynamic assignment in distributed motion planning with local coordination," IEEE Trans. on Robotics, vol. 24, no. 1, pp. 232 -- 242, Feb. 2008. [16] J. Yu, S. Chung, and P. Voulgaris, "Target assignment [15] G. Arslan, J. R. Marden, and J. S. Shamma, "Autonomous vehicle-target assignment: A game-theoretical formulation," ASME Journal of Dynamic Systems, Measurement, and Control, vol. 129, pp. 584 -- 596, Sep. 2007. in robotic networks: Distance optimality guarantees and hierarchical strategies," IEEE Trans. on Automatic Control, vol. 60, no. 2, pp. 327 -- 341, 2015. [17] X. Bai, W. Yan, M. Cao, and J. Huang, "Target assignment for robots constrained by limited communication range," 2017. [Online]. Available: https://arxiv.org/pdf/1702.04700.pdf (a) The resulting paths to the goals under the proposed control strategy. (b) The distances of the agents w.r.t. their goals over time, and the invoked goal swaps when the OGA becomes active. (c) The minimum clearance between any two robots over time. Fig. 8. Experimental results with N = 6 robots. [18] M. Turpin, N. Michael, and V. Kumar, "Trajectory planning and as- signment in multirobot systems," in Proc. of Int. Workshop on the Algorithmic Foundations of Robotics (WAFR), Boston, MA, Jun. 2012. [19] -- -- , "CAPT: Concurrent assignment and planning of trajectories for multiple robots," The Int. Journal of Robotics Research, vol. 33, no. 1, pp. 98 -- 112, 2014. [20] J. Munkres, "Algorithms for the assignment and transportation prob- lems," Journal of the Society for Industrial & Applied Mathematics, vol. 5, no. 1, pp. 32 -- 38, 1957. [21] S. Giordani, M. Lujak, and F. Martinelli, "A distributed algorithm for the multi-robot task allocation problem," in Trends in Applied Intelligent Systems. Springer, 2010, pp. 721 -- 730. [22] D. P. Bertsekas, Network Optimization: Continuous and Discrete Mod- els. Athena Scientific, 1998. [23] R. Fitch, A. Alempijevic, and T. Peynot, "Global reconfiguration of a team of networked mobile robots among obstacles," in Advances in Intelligent Systems and Computing, E. Menegatti, N. Michael, K. Berns, and H. Yamaguchi, Eds. Springer, 2016, pp. 639 -- 656. [24] D. Panagou, M. Turpin, and V. Kumar, "Decentralized goal assignment and trajectory generation in multi-robot networks: A multiple Lyapunov functions approach," in Proc. of the 2014 IEEE Int. Conf. on Robotics and Automation, Hong Kong, China, Jun. 2014, pp. 6757 -- 6762. [25] D. Liberzon, Switching in Systems and Control. Birkhauser, 2003. [26] M. S. Branicky, "Multiple Lyapunov functions and other analysis tools for switched and hybrid systems," IEEE Trans. on Automatic Control, vol. 43, no. 4, pp. 475 -- 482, Apr. 1998. [27] F. Blanchini and S. Miani, Set-Theoretic Methods in Control. Birkhauser, 2008. [28] D. Panagou, D. M. Stipanovi´c, and P. G. Voulgaris, "Distributed coordi- nation and control of multi-robot networks using Lyapunov-like barrier functions," IEEE Trans. on Automatic Control, vol. 61, no. 3, pp. 617 -- 632, 2016. [29] D. Panagou, "A distributed feedback motion planning protocol for multiple unicycle agents of different classes," IEEE Trans. on Automatic Control, vol. 62, no. 3, pp. 1178 -- 1193, 2017. [30] P. Peleties and R. DeCarlo, "Asymptotic stability of m-switched systems the American Control using Lyapunov-like functions," in Proc. of Conference, Boston, MA, Jun. 1991, pp. 1679 -- 1684. [31] J. Zhao and D. a general multiple Lyapunov function method." [Online]. Available: http://cecs.anu.edu.au/seminars/media/ switched systems: "Stability of J. Hill, [32] -- -- , "On stability, L2-gain and H∞ control for switched systems," Automatica, vol. 44, pp. 1220 -- 1232, 2008. [33] A. D. Ames and S. Sastry, "Characterization of Zeno behavior in hybrid systems using homological methods," in Proc. of the 2005 American Control Conference, Portland, OR, USA, Jun. 2005, pp. 1160 -- 1165. [34] F. Ceragioli, "Finite valued feedback laws and piecewise classical solutions," Nonlinear Analysis, vol. 65, no. 5, pp. 984 -- 998, 2006. [35] Y. Nesterov and A. Nemirovskii, Interior Point Polynomial Algorithms in Convex Programming. SIAM Studies in Applied Mathematics, 2001. [36] A. G. Wills and W. P. Heath, "A recentred barrier for constrained receding horizon control," in Proc. of the American Control Conference, Anchorage, AK, USA, May 2002, pp. 4177 -- 4182. [37] D. M. Stipanovi´c, C. J. Tomlin, and G. Leitmann, "Monotone ap- proximations of minimum and maximum functions and multi-objective problems," Applied Mathematics and Optimization, vol. 66, pp. 455 -- 473, 2012. Dimitra Panagou received the Diploma and PhD degrees in Mechanical Engineering from the Na- tional Technical University of Athens, Greece, in 2006 and 2012, respectively. Since September 2014 she has been an Assistant Professor with the De- partment of Aerospace Engineering, University of Michigan. Prior to joining the University of Michi- gan, Dr. Panagou was a postdoctoral research as- sociate with the Coordinated Science Laboratory, University of Illinois, Urbana-Champaign (2012- 2014), a visiting research scholar with the GRASP Lab, University of Pennsylvania (June 2013, fall 2010) and a visiting research scholar with the University of Delaware, Mechanical Engineering Department (spring 2009). Her research interests include the fields of planning, coor- dination, and distributed control and estimation for complex systems, with applications in unmanned aerial systems, robotic networks and autonomous multi-vehicle systems (ground, marine, aerial, space). She was a recipient of the NASA 2016 Early Career Faculty Award and of the Air Force Office of Science Research 2017 Young Investigator Award. Matthew Turpin received his BS degree in Mechan- ical Engineering from Northwestern University in 2009, and his PhD degree in Mechanical Engineer- ing from University of Pennsylvania in 2014. During his doctoral studies at the University of Pennsylvania he focused on formation control as well as on the coupling of task assignment and motion planning in multi-robot systems. He is currently a research sci- entist at Qualcomm Technologies Inc. where he has worked on research and development of software for multi-rotor MAVs, and currently works on planning and control for autonomous cars. Vijay Kumar is the Nemirovsky Family Dean of Penn Engineering with appointments in the De- partments of Mechanical Engineering and Applied Mechanics, Computer and Information Science, and Electrical and Systems Engineering at the Univer- sity of Pennsylvania. He served as the assistant director of robotics and cyber physical systems at the White House Office of Science and Technology Policy (2012-2014) and is the founder of Exyn Technologies, a company that develops solutions for autonomous flight. Dr. Kumar is a Fellow of the American Society of Mechanical Engineers (2003), a Fellow of the Institute of Electrical and Electronic Engineers (2005) and a member of the National Academy of Engineering (2013). Among his recent awards are the 2012 World Technology Network award, a 2013 Popular Science Breakthrough Award, a 2014 Engelberger Robotics Award, the 2017 IEEE Robotics and Automation Society George Saridis Leadership Award in Robotics and Automation and the 2017 ASME Robert E. Abbott Award. He has won best paper awards at DARS 2002, ICRA 2004, ICRA 2011, RSS 2011, RSS 2013, and BICT 2015 and has advised doctoral students who have won Best Student Paper Awards at ICRA 2008, RSS 2009, and DARS 2010.
cs/0604110
1
0604
2006-04-27T23:33:25
Modeling and Mathematical Analysis of Swarms of Microscopic Robots
[ "cs.MA", "cs.RO" ]
The biologically-inspired swarm paradigm is being used to design self-organizing systems of locally interacting artificial agents. A major difficulty in designing swarms with desired characteristics is understanding the causal relation between individual agent and collective behaviors. Mathematical analysis of swarm dynamics can address this difficulty to gain insight into system design. This paper proposes a framework for mathematical modeling of swarms of microscopic robots that may one day be useful in medical applications. While such devices do not yet exist, the modeling approach can be helpful in identifying various design trade-offs for the robots and be a useful guide for their eventual fabrication. Specifically, we examine microscopic robots that reside in a fluid, for example, a bloodstream, and are able to detect and respond to different chemicals. We present the general mathematical model of a scenario in which robots locate a chemical source. We solve the scenario in one-dimension and show how results can be used to evaluate certain design decisions.
cs.MA
cs
MODELING AND MATHEMATICAL ANALYSIS OF SWARMS OF MICROSCOPIC ROBOTS Aram Galstyan1, Tad Hogg2, Kristina Lerman1 1. USC Information Sciences Institute 4676 Admiralty Way Marina del Rey, CA 90292, USA 2. HP Labs 1501 Page Mill Road, MS 1U-19 Palo Alto, CA 94304, USA ABSTRACT The biologically-inspired swarm paradigm is being used to design self-organizing systems of locally interacting artifi- cial agents. A major difficulty in designing swarms with desired characteristics is understanding the causal relation between individual agent and collective behaviors. Math- ematical analysis of swarm dynamics can address this dif- ficulty to gain insight into system design. This paper pro- poses a framework for mathematical modeling of swarms of microscopic robots that may one day be useful in med- ical applications. While such devices do not yet exist, the modeling approach can be helpful in identifying various de- sign trade-offs for the robots and be a useful guide for their eventual fabrication. Specifically, we examine microscopic robots that reside in a fluid, for example, a bloodstream, and are able to detect and respond to different chemicals. We present the general mathematical model of a scenario in which robots locate a chemical source. We solve the sce- nario in one-dimension and show how results can be used to evaluate certain design decisions. 1. INTRODUCTION Swarm Intelligence is a relatively new concept for design- ing multi-agent systems [4]. Swarms are decentralized sys- tems composed of many simple agents with no central con- troller. Instead, swarms are self-organizing: constructive collective behavior emerges from local interactions among the agents and between agents and their environment. Self- organization is ubiquitous in nature: Aggregation into multi- cell organisms in Dictyostelium discoideum colony, trail for- mation in ants, hive building by bees, and mound construc- tion by termites, are a few examples. The success of these organisms has inspired the design of distributed problem- solving systems. A major difficulty in designing self-organizing swarms with desired characteristics is understanding the causal rela- tion between individual agent characteristics and collective behavior. One approach is experiments with real agents, e.g., robots, to evaluate behavior under real conditions. How- ever, fabricating enough agents to exhibit swarm behavior is often too expensive or not feasible with current technology. Simulations, such as sensor-based simulations of robots, are usually much faster and less costly than experiments. But these require good models of the robots and their environ- ments, which are often not yet available. Moreover, sim- ulations still require many repetitions to systematically ex- amine consequences of various choices for individual agent behaviors. Mathematical modeling and analysis offer an alternative to the time-consuming and costly experiments and simula- tions. Mathematical analysis can be used to study swarm dynamics, predict long-term behavior of even very large systems, and gain insight into system design: e.g., how indi- vidual agent characteristics affect the swarm behavior. Such analysis can suggest parameters that optimize group perfor- mance, prevent instabilities, etc. These particular choices could then be examined in more detail through simulations or experiments. This mathematical approach is particularly useful for preliminary evaluation of design trade-offs for robots that cannot yet be built and will operate in poorly characterized environments. As one such application, robots with sizes comparable to bacteria ("nanorobots") could provide many novel capabilities through their ability to sense and act in microscopic environments. Of particular interest are medi- cal applications, where robots and nanoscale-structured ma- terials inside the body could significantly improve disease diagnosis and treatment [9, 19, 20, 15]. Typically, each such robot will have dimensions of a few microns so could read- ily travel through even the tiniest blood vessels, will be able to communicate with other robots (e.g., using ultrasound) over distances of about 100 microns, and will consume in the range of 1 − 1000 picowatts. An example task for such robots operating in the blood- stream is to aggregate and form structures at locations with specific patterns of chemicals. Initially, as robots move pas- sively through the fluid, monitoring for the chemical pat- tern, they need to avoid disturbing the flow. Thus they will be at low density, i.e., with typical separation between neigh- boring robots many times larger than their size. On the other hand, to affect the environment, many robots will need to act together (e.g., to block flow in blood vessels feeding populations of cancer cells or to aid in repairing damaged tissues by forming suitable scaffolding). Thus the swarm must change to a higher density of robots, in spite of lim- ited communication ranges. In this denser configuration, communication among neighbors is easier, and simple local controls allow forming a variety of structures either static or dynamically responding to changing forces in the environ- ment, as proposed in the context of large self-reconfigurable robots [3, 24]. To quantify this example, a swarm could con- sist of around 1012 machines, vastly more than in swarms of larger devices. Even such a large number of machines would have a total mass of only about one gram, and a oc- cupy less than 0.1% of the typical blood volume of an adult, compared to the 20 − 40% occupied by cells. While fabricating such machines is beyond the ability of current technology, the rapid progress in engineering nano- scale devices should eventually enable their production. For example, ongoing development [12, 10, 18] of molecular- scale electronics, sensors and motors provides components for such robots, though these cannot yet be assembled into large numbers of complete systems. Programmable bacte- ria [25] give large numbers of functioning microscopic sys- tems, and separate DNA computers can respond to Boolean combinations of chemicals in their environment [2]. How- ever relying on biological organisms restricts the robots' material properties and, by using protein synthesis to per- form logic operations, limits the computational complexity and speed of control programs. Beyond the challenge of fabricating the robots is de- signing and analyzing controls suitable for their physical environments, tasks and capabilities, whose features differ considerably from those of larger robots. Fortunately, we can evaluate control methods prior to building the robots with theoretical studies [7, 9, 23] characterizing robot ca- pabilities and their task environments. Moreover, suitable control programs can compensate for some hardware lim- itations (e.g., limited available power or sensor accuracy). Thus studies of control approaches can identify useful tasks for robots with limited hardware capabilities, as may arise before the fabrication technology is fully mature. This paper extends the stochastic processes framework developed for modeling teams of larger robots and that has been applied successfully to a number of robotic applica- tions [17]. Our work complements other theoretical studies of microscopic robots [5, 23, 11] by providing a methodol- ogy for studying collective swarm behavior. It can also be applied to larger robots that implement chemotaxis as the basis for movement in an external field [6]. While compari- son with microscopic experiments must await the technical feasibility of fabricating microscopic robots, our mathemat- ical model can be used to evaluate various design trade-offs for the robot capabilities that can achieve the same swarm performance and can be a useful guide to eventual fabri- cation by allowing designers to focus on combinations of hardware capabilities easiest to fabricate. Below we present a general model of the dynamics of a swarm of microscopic robots that are interacting with an external field. In Section 3 we motivate the approach by describing a medically relevant scenario that considers a swarm of microscopic robots moving in a fluid to localize a chemical source. In Section 4 we solve a one-dimensional model and analyze different design choices. We conclude the paper with a discussion of the approach and results. 2. STOCHASTIC THEORY OF SPATIALLY-DEPENDENT PROCESSES Previously, we developed a framework based on stochas- tic Master Equation for mathematical analysis of homoge- neous robotic swarms [13, 16]. Specifically, consider an agent whose controller is an automaton consisting of L lo- cal states. We then assume the overall system is sufficiently well-described by an occupancy vector n = (n1, n2, ...nL), where nk is the fraction of agents in state k. That is, we need only consider the number of agents in each state rather than tracking their individual identities. In designing sys- tems where typical or average behavior is of primary inter- est, it is useful to characterize the system by a probability distribution P (n, t), which is the probability the system is in configuration n at time t, and evolves according to the Master Equation [14]. This distribution characterizes the behaviors of an ensemble or multiple independent instances of the swarm. When most such instances have nearly the same behavior,1 fluctuations among different instances can be neglected, and the average occupancies ¯nk provide a suf- ficient characterization of the system. The average fraction of agents in state k then evolves according to d¯nk dt = Xj wjk ¯nj − ¯nkXj wkj (1) 1Consider, for example, a swarm consisting of a large number of agents, each independently executing the same controller. Then, by the law of large numbers, behaviors of different instances of this swarm would be nearly identical. with wjk the transition rates between the states j and k. Note than in general wjk might depend on the fraction of agents in particular states, i.e., average occupancy vector ¯n. Eq. 1 governs the evolution of the collective behavior of the system. While this approach works well for many spatially uni- form systems [17], it is too coarse-grained for systems with a spatial correlation in agents' interactions. Thus, it is not sufficient to describe, for example, an ant-like swarm where agents interact through evolving chemical fields or micro- scopic robots monitoring chemicals released into a fluid. These situations require a generalization of the Master Equa- tion, in which each robot not only has a discrete controller state k but also a continuous coordinate x (i.e., its spatial location). As with the original formulation, we suppose the number of agents in each state is sufficient to determine the collective behavior of interest. Because x is a continuous variable, these counts become densities leading us to intro- duce ¯nk(x, t) as the average robot fraction density in state k at location x and time t. Thus a small volume ∆x around location x contains, on average, the fraction ¯nk(x, t)∆x of the robots in the system. Let us consider a system where agents interact with the environment through a certain external chemical field. Let us also assume that agents are able to interact through stig- mergy by releasing a special chemical into the environment that we call communicative signal. We denote ρ(x, t) and c(x, t) concentration of the chemical and communicative signal, respectively, at point x at time t. Then we can write down the generalized rate equation as follows: tion rates. Communication among nearby robots, e.g., with ultrasound, allows the robots to reduce noise in estimating chemical gradients and hence perform better than individ- ual robots or bacteria [1], but at a cost of additional power use for the communication. Robot motion, either moving passively with the fluid or using powered locomotion, e.g., to follow chemical concentration gradients, also contributes to the transitions. While Equation 2 is a general description of the overall system behavior, it is too complex in its present form to be useful. Fortunately, it can be simplified considerably into a more intuitive form by noting that in many physically real- istic situations agents' motion can be decoupled from state transitions, so that the transition rate can be represented as wjk = δjkWk(x, x′; ρ(x), ρ(x′), c(x), c(x′)) + δ(x − x′)wjk(ρ(x), c(x)) , (3) where δjk is Kroenecker's symbol2 and δ(x) is its continu- ous analogue δ -- function. In other words, during a transition between two discrete states we neglect the change in robot's position. In Eq. 3 Wk is an appropriately chosen kernel that describes agents' motion (as index k indicate, it can be dif- ferent for each state), while the second term describes tran- sition between discrete states. Equation 3 allows us to separate transition function into terms with purely spatial transitions and terms with purely state transitions. Indeed, using Eq. 3 we can decouple the agents' kinematics from the state transitions between dis- crete state and rewrite Eq. 2 as follows: ∂ ¯nk(x, t) ∂t = Z dx′ Xj − ¯nk(x, t)Z dx′ Xj wjk(x, x′; ρ, c)¯nj(x′, t) (2) wkj (x, x′; ρ, c) . ∂ ¯nk(x, t) ∂t wjk(ρ, c)¯nj (x, t) (4) = Lk ¯nk(x, t) + Xj − ¯nk(x, t)Xj wkj (ρ, c) Now the transition rates wjk depend not only the state in- dices j and k and occupation vector but also on the spatial coordinates and concentration of the chemical at the corre- sponding points. Note also that we have included the depen- dence of the transition rates on x and x′ explicitly to account for agents' kinematics even in the absence of chemical and communicative concentrations (e.g., to describe freely dif- fusing agent). The transition rates wjk(x, x′; ρ(x), c(x)) summarize the behaviors of the individual robots. For example, the robot's internal state could change when it detects a chem- ical concentration above a predetermined threshold. In ap- plications of microscopic robots, such detections will often involve a relatively small number of molecules (e.g., on the order of tens) so stochastic fluctuations in the number de- tected will be a significant source of sensor noise and can be included as a range of new states with nonzero transi- Here Lk is an operator (specified below) that describes the motion of agents in state k. The second and third terms in Eq. 4 describe agents state transitions. Note that now wjk(ρ, c) depends on spatial coordinates indirectly, through concentration ρ(x, t) and c(x, t). When the concentrations ρ and c are constants, Eq. 1 is recovered by integrating Eq. 4 over the spatial coordinates x, assuming that Lk preserves the number of agents in state k (e.g., no absorbing bound- aries) so that integral over the first term in Eq. 4 vanishes. To specify the operators Lk, we note that for the par- ticular environment we are interested in, (i.e., microscopic robots operating in a fluid) robots' motion can be described by a diffusion equation [14]. In this paper, we study chemo- tactic robots that respond to a chemical and signalling fields 2Kroenecker's symbol is defined as follows: δij = 1 if i = j and δij = 0, i 6= j. by propelling themselves in the direction of increasing con- centration. This capability is modeled after bacterial chemo- taxis which allows these single cell organisms to efficiently move towards food sources and away from noxious sources. Although in some cases the exact derivation from the mi- croscopic transition rates is feasible, if very involved (see, for example, [21, 8] for treatment of bacterial chemotaxis which can be treated as a biased random walk), chemotaxis in a chemical concentration field ρ(x, t) is usually intro- duced into the rate equations phenomenologically by pos- tulating a chemotactic velocity as VD = ηρ∇ρ(x, t), where ηρ is the so called chemotactic sensitivity (which may itself depend on ρ). One can then write for operators Lk Lk = Dk∇2 − v·∇−∇· [Vρ D(c,∇c)] (5) Here, Dk is the diffusion coefficient of agents in state k as- sumed to be a constant, v is the flow velocity, and Vρ D and D are the chemotaxis drift velocities of robots due to con- Vc centration gradients of the chemical and the communicative signal, respectively. D(ρ,∇ρ) + Vc To proceed further, we should also define how the chem- ical and concentration fields evolves in time. As an example relevant for microscopic robots, we consider the evolution of this fields in a moving fluid in which the robots operate. The evolutions of ρ(x, t) c(x, t) are governed by the diffu- sion equation: fusion coefficients. Another generalization would allow a variable number of agents in the system, in which case we would add a variable for the total number of agents in the system at time t to the variables introduced above describ- ing the fraction in various states. Equations 4 -- 7 together with appropriately chosen boun- dary conditions describe time evolution of the system. In the next section we use this formulation for a prototypical task: finding and localizing at the source of a chemical released into a flowing fluid. 3. TARGET LOCALIZATION WITH MICROSCOPIC ROBOTS Let us consider a D -- dimensional volume with multiple tar- gets that release certain chemical into the environment. The task of the microscopic swarm is to aggregate at these tar- gets in order to carry out some actions in the vicinity of the targets. This capability is fundamental to many medical applications envisioned for these microscopic robots. For example, the volume of fluid may be a blood vessel that has been damaged. Robots are required to aggregate at the in- jury site in order to assist in healing, forming clots, etc. We consider a simple robot controller that on a high level can be thought to consist of 3 discrete states described below: (6) State 1 (search): Do a biased random walk in the direction of the communicative signal concentration gradient. ∂ρ ∂t ∂c ∂t = Dρ∇2ρ − v · ∇ρ − γρρ + Qρ(x, t) = Dc∇2c − v · ∇c − γcc +Xk qk ¯nk(x, t) (7) In Eq. 6 the terms on the right describe, respectively, the diffusion of the chemical (with a diffusion constant Dρ), the advection of the chemical due to fluid motion with velocity v, the decay of the chemical at rate γρ, and its deposition by sources with intensity profile Qρ(x, t). Terms in Eq. 7 have similar meaning, except the deposition rates of sig- nalling chemical is proportional to the fraction of agents in state k, ¯nk(x, t) (note that, generally speaking, the coef- ficients qk themselves depend on the fraction of agents in state k). The parameters in this equation could, in general, depend on space and time, as well as the location of the robots (e.g., a sufficiently high concentration of the robots could significantly affect the fluid flow). For simplicity, we will treat them as constants. For microscopic robots, fluid motions will usually be at very low Reynolds number so the fluid flow will be laminar with the velocity v chang- ing smoothly with location. Viscous forces dominate the motions of such robots with requirements for locomotion mechanisms and power use quite different from experiences with larger robots [22]. Note that the system of Eqs. 4, 6 and 7 can be easily generalized to handle multiple chemicals with different dif- State 2 (communicate): Move towards the chemical source following the concentration gradient of the target chem- ical and release communicative signal to other robots. State 3 (disperse): Move away from the target in the direc- tion opposite to the target chemical's concentration gradient for some specified time τ. To fully specify a robot's behavior, we also have to de- scribe the transitions between these states. The robots start out in State 1, the searching for targets using random diffu- sive motion and following the gradient of the communica- tive signal. Once the concentration of the target chemical at a certain point in space is sufficiently high the robot at that point will switch to the State 2: it will start moving towards regions of high concentration (using biased diffu- sion or gradient following) while releasing a new chemical which acts as a communication signal to attract other robots. With some probability (that can be fixed, or dependent on the concentration of the robots at the source), robots in the State 2 will switch to State 3, where they will disperse from the source, moving in the direction opposite to the gradient. Finally, robots in the State 3 will switch to the searching state with probability 1/τ. The last behavior ensures that robots will not be stuck at local maxima of the chemical potential. Let denote by n1(x), n2(x), n3(x) the fraction of robots in each state at point x, with normalization condition Z dx(cid:0)n1(x) + n2(x) + n3(x)(cid:1) = 1. Let ρ(x) and c(x) be the concentrations of the chemical re- leased from the targets and the communicative signal re- leased by robots in State 2. We also denote by Vρ D and Vc D the robots' drift velocity in the concentration gradients of chemical (released by the targets) and communicative sig- nal (released by the robots), respectively. Then the set of equations describing the evolution of the system is as fol- lows: ∂n1 ∂t ∂n2 ∂t ∂n3 ∂t n3 τ = D1∇2n1 − v · ∇n1 − ∇ · [Vc − n1F (ρ) + = D2∇2n2 − v · ∇n2 − ∇ · [Vρ + n1F (ρ) − G(n2, ρ, c)n2 Dn1] Dn2] = D3∇2n3 − v · ∇n3 + ∇ · [Vρ + G(n2, ρ, c)n2 − n3 τ Dn3] (8) (9) (10) where F (ρ) is the concentration -- dependent transition rate from State 1 to State 2, G(n2; ρ; c) is the transition rate from State 2 to State 3, and 1/τ is the probability that a robot in State 3 will switch to State 1. Equations 8 -- 10 have a simple intuitive interpretation. The first two terms in Eq. 8 describe robots motion in State 1: diffusive searching and following communicative signal, if present. The third term describes the drift in the flow. The fourth term describes transitions to State 2 at the rate F (ρ), which depends on the concentration of the target field. The last term describes transition of robots from State 3 to State 1 after the robots have moved in the direction opposite to the concentration gradient for a period of time τ. G(n2, ρ, c) is the rate at which robots transition from State 2 to State 3, and it could in principle depend on the local concentrations of the gradients, as well as the number of agents present at the target site, for example, when presence of a certain min- imum number of robots is required for executing an action. We have to complement these three equations with two more to account for the evolution of chemicals ρ and c, that are obtained from Equations ??,?? and ?? as follows: ∂ρ ∂t ∂c ∂t = Dρ∇2ρ − v · ∇ρ + M Xi=1 Qiδ(x − xi) − γρρ (11) = Dc∇2c − v · ∇c + qcn2 − γcc (12) In Eq. 11 xi-s, i = 1, 2, ..M are the locations of the target sources, Qi is the intensity of source i, and γρ is the decay rate of the target chemical. Similarly, in Eq. 12 qc is the in- tensity of communication signal released by a robot in State 2, while γc is the decay rate of the signal. 4. RESULTS FOR A SIMPLIFIED 1D SCENARIO In this section we present results for a 1D geometry and a single target scenario. We consider the case when the liquid flow is very slow compared to other time scales so we can set v = 0. Also, since there is only one target, we neglect the third (dispersing) behavior so that two possible states are State 1 ("search") and State 2 ("communicate"). The target is located at x = 1 and serves as a point source for the chemical. We assume that the diffusion of the chemi- cal happens much faster compared to robots' diffusion, and it quickly reaches its steady state profile. Hence, the equa- tion for evolution of ρ(x, t) can be solved separately, with a solution ρ(x,∞) ≡ ρ(x) = Q0e−√γρ/Dρ(1−x), 0 ≤ x ≤ 1. (13) For the results presented here we used Q0 = 0.1, Dρ = 0.2 and γρ = 0.5. All robots start at State 1 and are initially localized at x = 0. We assume that a transition from State 1 to State 2 happens whenever a robot in State 1 detects the target's chemical above a certain threshold level ρ0, so that the tran- sition rate is F (ρ) = θ(ρ − ρ0), where θ(x) is the step function, θ(x) = 1 if x ≥ 0 and θ(x) = 0, x < 0. While in State 2, robots move in the chemical gradient with a con- stant drift velocity VD and release a communicative signal with intensity qc. To proceed further, we need to specify the dependence of the drift velocity in State 1 on the concentration of com- municative signal c. Again, we assume that once a robot detects communicative signal above certain threshold c0, it propels itself through the fluid in the direction of the gra- dient with a constant drift velocity VD. Then the dynamics of the system is described by the following system of equa- tions: ∂n1 ∂t ∂n2 ∂t ∂c ∂t = Dn = Dn = Dc ∂2n1 ∂x2 − VDθ(c − c0) ∂2n2 ∂x2 − VD ∂2c ∂x2 + qcn2 − γcc ∂n2 ∂x ∂n1 ∂x − F (ρ)n1 (14) (15) + F (ρ)n1 (16) To study the effect of different design parameters on ag- gregation behavior of the robots at the target, we solved the system Eq. 14 -- 16 numerically. We used the following pa- rameters (in dimensionless units): Dn = 0.01, Dc = 0.05, VD = 0.1, qc = 0.1, γc = 0.01. For the detection thresh- olds we used c0 = 0.001 and ρ0 = 0.01, the later assuring that that robots detect the chemical approximately midway in the interval [0, 1]. We used reflective boundary condi- tions for n1 and n2, ∂n1/∂x0,1 = ∂n2/∂x0,1 = 0, and absorbing boundary conditions for c, c(0) = c(1) = 0. In Fig. 1 we plot the spatia -- temporal evolution of robots' densities with and without communication. Clearly, the den- sity peak at x = 1 is stronger for the system with commu- nicative behavior. This suggests that communication indeed helps the robots to aggregate better. In addition, the ag- gregation process with communication happens faster than without communication. This is also shown in Fig. 2, where we plot the density of robots at x = 1 as a function of time for three different cases: free diffusion3 (VD = 0), gradient following without communication (VD 6= 0, qc = 0), and gradient following with communication (VD, qc 6= 0). As it can be seen from Fig. 2, the systems with gradient follow- ing and communicative behavior do demonstrate aggrega- tive behavior, and it is more pronounced for the system with communication. For instance, at time t = 10 the robot den- sity at x = 1 and with communication is more than 3 times higher than in the non -- communicating case. One of the design objectives is to have robots aggre- gate at the target fast enough, while at the same time not dissipating too much power due to the propelling. To ex- amine this tradeoff, let us consider the dependence of the aggregation time (defined as time needed for fraction n0 of robots to reach the vicinity of the target which we define as the interval [0.95, 1],) on the drift velocity VD. In Fig. 3 we plot aggregation time vs VD for three different values of n0. One observes that if increasing the drift velocity from VD = 0, the aggregation time decreases monotoni- cally, with a steeper decline for larger n0. However, it soon "saturates", so that increasing VD further has very small ef- fect on the aggregation time. This is because for large val- ues of VD/Dn, the aggregation time is mainly dominated by time required for robots to diffuse and detect chemical gradient, and increasing VD clearly does not have any effect on this time. Hence, depending on the desired number of robots in the vicinity of the target, as well as the required aggregation time, the best strategy for robots might be to have a moderate drift velocity. Note that this type of anal- ysis can be used to assess the energy -- efficiency of various behaviors since power required to propel a robot through a fluid with velocity VD scales with VD. . 3Note that the absence of aggregation for free diffusing robots is due to reflective boundary conditions at the source for n1 and n2. If one employs absorbing boundary conditions instead, robots will demonstrate aggrega- tive behavior even with free diffusion. n(x,t) 25 20 15 Time t 10 5 0.2 0 0 0.6 0.4 Distance x n(x,t) 1 0.8 (a) 12 10 8 6 4 2 0 30 12 8 4 0 30 20 10 Time t 0.2 0 0 0.6 0.4 Distance x 1 0.8 (b) Figure 1. Time evolution of robot densities without commu- nication (a) and with communication (b) 12 10 ) t , 1 = x ( n 8 6 4 2 0 0 free diffusion gradient following with communication 5 10 15 Time t 20 25 30 Figure 2. Time evolution of robot densities at x = 1 for three different strategies i e m T n o i t a g e r g g A 25 20 15 10 5 0 0 n =0.01 0 n =0.02 0 n =0.04 0 0.05 0.1 Drift Velocity V D 0.15 0.2 Figure 3. Aggregation time as a function of drift velocity, for three different values of n0. 5. DISCUSSION Microscopic robots face physical environments quite differ- ent from our experience with larger robots. In particularly, many interesting tasks for such robots will involve interac- tion with spatially varying fields, such as chemical concen- trations. In this paper, we showed how to incorporate such fields into a previously proposed approach relating individ- ual robot behaviors to that of the population as a whole. The analytic framework readily incorporates Brownian mo- tion and viscous fluid flow. The framework also applies to macroscopic robots programmed to emulate behavior of mi- croscopic organisms -- for example, chemotaxis [6]. As future work, it would be interesting to examine more realistic scenarios, involving three-dimensional fluid flow in vessels with quantitatively accurate physical parameters for the environment and robot sensors and actuators. We could also compare alternate approaches to various robot capabil- ities, e.g., acoustic vs. chemical communication. For in- stance, with more extensive use of communication, nearby robots could compare concentration measurements to bet- ter estimate concentration gradients, thereby introducing a spatial correlation in the state changes. Our approach ap- plies to these more complicated physical scenarios, but be- comes more computationally demanding to solve numeri- cally. Nevertheless, the computation cost involved to iden- tify useful design trade-offs through our approach will be less than that involved with detailed simulations (especially for tasks involving large populations of robots). Actual ex- periments with physical devices will be even more challeng- ing. Limitations of this approach are its underlying assump- tions, namely that to determine relevant collective swarm behaviors the occupancy numbers are a sufficient descrip- tion of the individual robots and fluctuations are small so the averages over many independent instances of the swarm are close to the actual observed behaviors in most of those instances. More broadly, this approach connects average, aggregate behavior with local robot controllers rather than providing specific details of individual robots. For applica- tions involving large populations of microscopic robots, the law of large numbers will ensure behaviors are usually close to average. 6. REFERENCES [1] J. P. Adler. Chemotaxis in bacteria. Science, 153:708 -- 716, 1966. [2] Yaakov Benenson, Binyamin Gil, Uri Ben-Dor, Rivka Adar, and Ehud Shapiro. An autonomous molecular computer for logical control of gene expression. Nature, 429:423 -- 429, 2004. [3] Hristo Bojinov, Arancha Casal, and Tad Hogg. Multiagent control of modular self-reconfigurable robots. Artificial In- telligence, 142:99 -- 120, 2002. Available as arxiv.org preprint cs.RO/0006030. [4] Eric Bonabeau, Marco Dorigo, and Guy Theraulaz. Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press, New York, 1999. [5] Adriano Cavalcanti and Tad Hogg. Simulating nanorobots in fluids with low Reynolds number. In Proc. of the 11th Foresight Conference on Molecular Nanotechnology, Octo- ber 2003. [6] Amit Dhariwal, Gaurav S. Sukhatme, and Aristides A. G. Re- quicha. Bacterium-inspired robots for environmental moni- toring. In Proceedings of the 2004 IEEE Intl. Conference on Robotics and Automation, New Orleans, LA. IEEE Press, April 2004. [7] K. Eric Drexler. Nanosystems: Molecular Machinery, Man- ufacturing, and Computation. John Wiley, NY, 1992. [8] Radek Erban and Hans G. Othmer. From individual to col- lective behavior in bacterial chemotaxis. SIAM J. Applied Math, 65(2):361 -- 391, 2004. [9] Robert A. Freitas Jr. Nanomedicine, volume 1. des Bioscience, Georgetown, TX, 1999. www.nanomedicine.com. Lan- Available at [10] J. Fritz et al. Translating biomolecular recognition into nanomechanics. Science, 288:316 -- 318, 2000. [11] V. Gazi and K. M. Passino. Stability analysis of social forag- ing swarms. IEEE Trans. on Systems, Man and Cybernetics, B34:539 -- 557, 2004. [12] Joe Howard. Molecular motors: Structural adaptations to cellular functions. Nature, 389:561 -- 567, 1997. [13] Bernardo A. Huberman and Tad Hogg. The behavior of com- putational ecologies. In B. A. Huberman, editor, The Ecology of Computation, pages 77 -- 115, Amsterdam, 1988. Elsevier (North-Holland). [14] N. G. Van Kampen. Stochastic Processes in Physics and Chemistry. Elsevier Science, Amsterdam, revised and en- larged edition, 1992. [15] Balazs L. Keszler, Istvan J. Majoros, and James R. Baker Jr. Molecular engineering in nanotechnology: Structure and composition of multifunctional devices for medical applica- tion. In Proc. of the Ninth Foresight Conference on Molecu- lar Nanotechnology, 2001. [16] Kristina Lerman and Aram Galstyan. Two paradigms for the design of artificial collectives. In Kagan Tumer and David Wolpert, editors, Collectives and Design of Complex Sys- tems, pages 231 -- 256. Springer Verlag, New York, 2004. [17] Kristina Lerman, Alcherio Martinoli, and Aram Galstyan. A review of probabilistic macroscopic models for swarm robotic systems. In Sahin E. and Spears W., editors, Swarm Robotics Workshop: State-of-the-art Survey, number 3342 in LNCS, pages 143 -- 152. Springer-Verlag, Berlin Heidelberg, 2005. [18] Carlo Montemagno and George Bachand. Constructing nanomechanical devices powered by biomolecular motors. Nanotechnology, 10:225 -- 231, 1999. [19] Kelly Morris. Macrodoctor, come meet the nanodoctors. The Lancet, 357:778, March 10 2001. [20] NIH. National roadmap: http://nihroadmap.nih.gov/nanomedicine/index.asp. Nanomedicine, Institutes 2003. of Available Health at [21] Hans G. Othmer and Thomas Hillen. The diffusion limit of transport equations ii: Chemotaxis equations. SIAM J. Ap- plied Math, 62(4):1222 -- 1250, 2002. [22] E. M. Purcell. Life at low Reynolds number. American Jour- nal of Physics, 45:3 -- 11, 1977. [23] Aristides A. G. Requicha. Nanorobots, NEMS and nanoassembly. Proceedings of the IEEE, 91:1922 -- 1933, 2003. [24] B. Salemi, W.-M. Shen, and P. Will. Hormone controlled metamorphic robots. In Proc. of the Intl. Conf. on Robotics and Automation (ICRA2001), 2001. [25] Ron Weiss and Thomas F. Knight, Jr. Engineered communi- cations for microbial robotics. In Proc. of Sixth Intl. Meeting on DNA Based Computers (DNA6), 2000.
1611.08364
1
1611
2016-11-25T07:03:21
Robust Sequential Path Planning Under Disturbances and Adversarial Intruder
[ "cs.MA" ]
Provably safe and scalable multi-vehicle path planning is an important and urgent problem due to the expected increase of automation in civilian airspace in the near future. Although this problem has been studied in the past, there has not been a method that guarantees both goal satisfaction and safety for vehicles with general nonlinear dynamics while taking into account disturbances and potential adversarial agents, to the best of our knowledge. Hamilton-Jacobi (HJ) reachability is the ideal tool for guaranteeing goal satisfaction and safety under such scenarios, and has been successfully applied to many small-scale problems. However, a direct application of HJ reachability in most cases becomes intractable when there are more than two vehicles due to the exponentially scaling computational complexity with respect to system dimension. In this paper, we take advantage of the guarantees HJ reachability provides, and eliminate the computation burden by assigning a strict priority ordering to the vehicles under consideration. Under this sequential path planning (SPP) scheme, vehicles reserve "space-time" portions in the airspace, and the space-time portions guarantee dynamic feasibility, collision avoidance, and optimality of the paths given the priority ordering. With a computation complexity that scales quadratically when accounting for both disturbances and an intruder, and linearly when accounting for only disturbances, SPP can tractably solve the multi-vehicle path planning problem for vehicles with general nonlinear dynamics in a practical setting. We demonstrate our theory in representative simulations.
cs.MA
cs
Robust Sequential Path Planning Under Disturbances and Adversarial Intruder Mo Chen, Somil Bansal, Jaime F. Fisac, Claire J. Tomlin 6 1 0 2 v o N 5 2 ] A M . s c [ 1 v 4 6 3 8 0 . 1 1 6 1 : v i X r a Abstract-Provably safe and scalable multi-vehicle path plan- ning is an important and urgent problem due to the expected increase of automation in civilian airspace in the near future. Although this problem has been studied in the past, there has not been a method that guarantees both goal satisfaction and safety for vehicles with general nonlinear dynamics while taking into account disturbances and potential adversarial agents, to the best of our knowledge. Hamilton-Jacobi (HJ) reachability is the ideal tool for guaranteeing goal satisfaction and safety under such scenarios, and has been successfully applied to many small-scale problems. However, a direct application of HJ reachability in most cases becomes intractable when there are more than two vehicles due to the exponentially scaling computational complexity with respect to system dimension. In this paper, we take advantage of the guarantees HJ reachability provides, and eliminate the computation burden by assigning a strict priority ordering to the vehicles under consideration. Under this sequential path planning (SPP) scheme, vehicles reserve "space-time" portions in the airspace, and the space-time portions guarantee dynamic feasibility, collision avoidance, and optimality of the paths given the priority ordering. With a computation complexity that scales quadratically when accounting for both disturbances and an intruder, and linearly when accounting for only disturbances, SPP can tractably solve the multi-vehicle path planning problem for vehicles with general nonlinear dynamics in a practical setting. We demonstrate our theory in representative simulations. I. INTRODUCTION Recently, there has been an immense surge of interest in the use of unmanned aerial systems (UASs) in urban environ- ments. UASs have great potential in civil applications such as package delivery, aerial surveillance, disaster response, among many others [1]–[5]. Unlike previous uses of UASs for military purposes, civil applications will involve unmanned aerial vehi- cles (UAVs) flying in urban environments, potentially in close proximity of humans, other UAVs, and other important assets. As a result, government agencies such as the Federal Aviation Administration (FAA) and National Aeronautics and Space Administration (NASA) of the United States are urgently trying to develop new scalable ways to organize an airspace in which potentially thousands of UAVs can fly simultaneously in the same region [6], [7]. One essential problem that needs to be addressed is the safe multi-vehicle path planning problem: how a group of vehicles in the same vicinity can reach their destinations while avoiding This work has been supported in part by NSF under CPS:ActionWebs (CNS-931843), by ONR under the HUNT (N0014-08-0696) and SMARTS (N00014-09-1-1051) MURIs and by grant N00014-12-1-0609, by AFOSR under the CHASE MURI (FA9550-10-1-0567). The research of M. Chen and J. F. Fisac have received funding from the "NSERC" program and "la Caixa" Foundation, respectively. All authors are with the Department of Electrical Engineering and Com- puter Sciences, University of California, Berkeley. {mochen72, somil, jfisac, tomlin}@eecs.berkeley.edu situations which are considered dangerous, such as collisions. In many previous studies that address this problem, specific control strategies for the vehicles are assumed, and approaches such as those involving induced velocity obstacles [8]–[11] and involving virtual potential fields to maintain collision [12], [13] have been used. Other analyses of multi-vehicle systems include methods for real-time trajectory generation [14], for path planning for vehicles with linear dynamics in the presence of obstacles with known motion [15], and for cooperative path planning via waypoints which do not account for vehicle dynamics [16]. Other related work include those which consider only the collision avoidance problem without path planning. These results include those that assume the system has a linear model [17]–[19], rely on a linearization of the system model [20], [21], assume a simple positional state space [22], and many others [23]–[25]. However, the capability to flexibly plan provably safe and dynamically feasible trajectories without making strong assumptions on the vehicles' dynamics and other vehicles' motion is essential for dense groups of UAVs to safely fly in each other's vicinity. In addition, in a practical setting, any path planning scheme that also addresses collision avoidance must guarantee both goal satisfaction and safety of UAVs de- spite disturbances such as weather effects and communication faults [7]. Furthermore, unexpected scenarios such as UAV malfunctions or even UAVs with malicious intent need to be accounted for. The problem of trajectory planning and collision avoidance under disturbances in safety-critical systems has been stud- ied using Hamilton-Jacobi (HJ) reachability analysis, which provides guarantees on goal satisfaction and safety of optimal system trajectories [26]–[31]. Reachability-based methods are particular suitable in the context of UAVs because of the hard guarantees that are provided. In reachability analysis, one computes the reachable set, defined as the set of states from which the system can be driven to a target set. Many numerical tools are available for computing various definitions of reachable sets [32]–[35], and reachability analysis has been successfully used in applications involving systems with no more than two vehicles, such as pairwise collision avoidance [27], automated in-flight refueling [36], and many others [37], [38]. One of the main challenges of managing the next generation of airspace is the density of vehicles that needs to be accom- modated [7]. Such a large-scale system has a high-dimensional joint state space, making a direct application of dynamic programming-based approaches such as reachability analysis intractable. In particular, reachable set computations involve solving a HJ partial differential equation (PDE) or variational inequality (VI) on a grid representing a discretization of the state space, causing computational complexity to scale exponentially with system dimension. A. Contributions and Outline In this paper, we propose the sequential path planning (SPP) method to tackle the multi-vehicle path planning problem. Our approach is similar to the approaches of [39], [40], but provides hard guarantees on both the goal satisfaction and safety of all vehicles even in the presence of disturbances and a single intruder vehicle that could potentially be adversarial. In addition, our method scales only linearly with the number of vehicles when there is no intruder, and quadratically with the number of vehicles when there is a single intruder. On a high level, the SPP method assigns a strict priority ordering to the vehicles under consideration. Higher-priority vehicles plan their paths without taking into account the lower-priority vehicles. Lower-priority vehicles treat higher-priority vehicles as moving obstacles. Under this assumption, time-varying for- mulations of reachability [29], [31] can be used to obtain the optimal and provably safe paths for each vehicle, starting from the highest-priority vehicle. Thus, the curse of dimensionality is overcome for the multi-vehicle path planning problem at the cost of a mild structural assumption. In a sense, the SPP method reserves a portion of "space- time" in the airspace for each vehicle. The reserved space-time portion is recorded so that lower-priority vehicles can take it into account. Besides planning around the reserved space-time portions of higher-priority vehicles, no other communication between the vehicles is needed at execution time, even when disturbances and an intruder are present. In the absence of disturbances and intruders, and assuming each vehicle has perfect information about other vehicles' positions, each vehicle may plan and commit to an exact trajectory, with the reserved space-time being the collision set around the trajectory at every point in time. This basic concept of SPP is formally presented in Section IV. When the vehicles are affected by disturbances, exact tra- jectories cannot be known a priori, and thus the basic SPP algorithm cannot be directly applied. Fortunately, reachability analysis allows us to determine, at no additional computation cost, all possible states of each vehicle over time under the worst-case disturbance, given a control strategy. In addition, we can also determine suitable portions of space-time for each vehicle depending on the available information about the control strategies of higher-priority vehicles. SPP under disturbances and three different assumptions on the informa- tion available about the control strategy of other vehicles is formally presented in Section V. In scenarios where there could potentially be single, pos- sibly adversarial intruder in the airspace, each vehicle needs extra space around other vehicles in order to be able to perform avoidance maneuvers. Assuming the intruder may be present for some maximum duration, we use use reachability analysis to determine precisely the amount of space-time needed for each vehicle to be able to avoid the intruder under the presence of disturbances, making our proposed method sufficiently robust to most practical scenarios. SPP in the presence of a single intruder is formally presented in Section VI. II. PROBLEM FORMULATION Consider N vehicles which participate in the SPP pro- cess and denote these vehicles as the SPP vehicles Qi, i = 1, . . . , N. We assume their dynamics are given by i xi = fi(xi, ui, di), t ≤ tSTA ui ∈ Ui, di ∈ Di, i = 1 . . . , N (1) where xi ∈ Rni represents the state of vehicle Qi, ui ∈ Ui the control of Qi, and di ∈ Di the disturbance experienced by Qi. For convenience, we partition the state xi into the position component pi ∈ Rnp and the non-position component hi ∈ Rni−np: xi = (pi, hi). We assume that the control functions ui(·), di(·) are drawn from the set of measurable functions1. For convenience, we will use the sets Ui, Di to respectively denote the set of functions from which the control and disturbance functions ui(·), di(·) are drawn. : Rni × Ui × Di → Rni is uniformly continuous, bounded, and Lipschitz continuous in xi for fixed ui and di. With this assumption, given ui(·) ∈ Ui, di(·) ∈ Di, there exists a unique trajectory solving (1) [41]. In addition, we assume that the disturbances di(·) are drawn the set of non-anticipative strategies [27] Γ, defined as follows: We further assume that the flow field fi Γ := {N : Ui → Di : ui(r) = ui(r) a. e. r ∈ [t, s] ⇒ N [ui](r) = N [ui](r) a. e. r ∈ [t, s]} (2) i i Each vehicle Qi has initial state x0 i , and aims to reach its target Li by some scheduled time of arrival tSTA . The target in general represents some set of desirable states, for example the destination of Qi. In some situations, we may find that it is infeasible for Qi to get to Li at or before tSTA . Whenever unsure, we may first determine the earliest feasible tSTA as described in Section VI. On its way to Li, Qi must avoid a set of static obstacles Ostatic could be a tall building, a region around an airport, or any set of states that are forbidden for each SPP vehicle. ⊂ Rni. The interpretation of Ostatic In addition to the static obstacles, each vehicle Qi must also avoid the danger zones with respect to every other vehicle Qj, j (cid:54)= i. The danger zones in general can represent any joint configurations between Qi and Qj that are considered to be unsafe. In this paper, we define the danger zone of Qi with respect to Qj to be i i i Zij = {(xi, xj) : (cid:107)pi − pj(cid:107)2 ≤ Rc} (3) whose interpretation is that Qi and Qj are considered to be in an unsafe configuration when they are within a distance of Rc of each other. For concreteness, we will call Zij the collision set, and if (xi, xj) ∈ Zij, then Qi and Qj are said to have collided. Given the set of SPP vehicles, their targets Li, the static obstacles Ostatic , and the vehicles' danger zones with respect 1A function f : X → Y between two measurable spaces (X, ΣX ) and (Y, ΣY ) is said to be measurable if the preimage of a measurable set in Y is a measurable set in X, that is: ∀V ∈ ΣY , f−1(V ) ∈ ΣX , with ΣX , ΣY σ-algebras on X,Y . i to each other Zij, we would like, for each vehicle Qi, to synthesize a controller which guarantees that Qi reaches its target Li at or before the scheduled time of arrival tSTA , while avoiding the static obstacles Ostatic as well as the danger zones with respect to all other vehicles Zij, j (cid:54)= i. In addition, we would like to obtain the latest departure time tLDT such that Qi can still arrive at Li on time. i i i In general, the above optimal path planning problem must be solved in the joint space of all N SPP vehicles. How- ever, due to the high joint dimensionality, a direct dynamic programming-based solution is intractable. Therefore, we pro- pose to assign a priority to each vehicle, and perform SPP given the assigned priorities. Without loss of generality, let Qj have a higher priority than Qi if j < i. Under the SPP scheme, higher-priority vehicles can ignore the presence of lower-priority vehicles, and perform path planning without taking into account the lower-priority vehicles' danger zones. A lower-priority vehicle Qi, on the other hand, must ensure that it does not enter the danger zones of the higher-priority vehicles Qj, j < i; each higher-priority vehicle Qj induces a set of time-varying obstacles Oj i (t), which represents the possible states of Qi such that a collision between Qi and Qj could occur. is able to plan a trajectory that takes it to Li while avoiding the static obstacles Ostatic and the danger zones of higher- priority vehicles Qj, j < i, then the set of SPP vehicles Qi, i = 1, . . . , N would all be able to reach their targets safely. With the SPP scheme, the additional structure provided by the vehicle priorities allows us to reduce the complexity of the joint path planning problem. As we will see, under the SPP scheme, path planning can be done sequentially in descending order of vehicle priority in the state space of only a single vehicle. Thus, SPP provides a solution whose complexity scales linearly with the number of vehicles in the presence of disturbances, as opposed to exponentially with a direct application of dynamic programming approaches. In the presence of a single intruder, the computation complexity scaling becomes quadratic. is straight-forward to see that if each vehicle Qi It i In the following sections, we will explore SPP under dif- ferent assumptions. We begin with the basic SPP algorithm in which disturbances are ignored and perfect information of vehicles' positions is assumed. This simplification allows us to clearly establish the basic SPP algorithm. Next, we show how the basic SPP approach can be made robust to disturbances as well as an imperfect knowledge of other vehicles' positions. Finally, we further robustify the SPP approach by considering how the set of SPP vehicles may respond to the presence of an intruder vehicle which may be adversarial. All of our methods use time-varying reachability analysis to provide goal satisfaction and safety guarantees. III. TIME-VARYING REACHABILITY BACKGROUND We will be using reachability analysis to compute either a backward reachable set (BRS) V, a forward reachable set (FRS) W, or a sequence of BRSs and FRSs, given some target set L, time-varying obstacle G(t), and the Hamiltonian function H which captures the system dynamics as well as the roles of the control and disturbance. The BRS V in a time interval [t, tf ] or FRS W in a time interval [t0, t] will be denoted by V(t, tf ) W(t0, t) (backward reachable set) (forward reachable set) (4) In the SPP scheme, a lower-priority vehicle must avoid a set of moving obstacles on its way to the target. Several formulations of reachability are able to perform optimal path planning with hard guarantees on safety and performance under disturbances in such a scenario [29], [31]. For our application in SPP, we utilize the time-varying formulation in [31], which accounts for the time-varying nature of systems without requiring augmentation of the state space with the time variable. In the formulation in [31], a BRS is computed by solving the following final value double-obstacle HJ VI: max min{DtV (t, x) + H(t, x,∇V (t, x)), l(x) − V (t, x)}, (cid:110) (cid:111) − g(t, x) − V (t, x) t ≤ tf V (tf , x) = max{l(x),−g(tf , x)} = 0, (5) In a similar fashion, the FRS is computed by solving the following initial value HJ PDE: DtW (t, x)+H(t, x,∇W (t, x)) = 0, t ≥ t0 W (t0, x) = max{l(x),−g(t0, x)} (6) In both (5) and (6), the function l(x) is the implicit surface function representing the target set L = {x : l(x) ≤ 0}. Similarly, the function g(t, x) is the implicit surface function representing the time-varying obstacles G(t) = {x : g(t, x) ≤ 0}. The BRS V(t, tf ) and FRS W(t0, t) are given by V(t, tf ) = {x : V (t, x) ≤ 0} W(t0, t) = {x : W (t, x) ≤ 0} (7) Some of the reachability computations will not involve an obstacle set G(t), in which case we can simply set g(t, x) ≡ ∞ which effectively means that the outside maximum is ignored in (5). Also, note that unlike in (5), there is no inner mini- mization in (6). As we will see later, we will be using the BRS to determine all states that can reach some target set within the time horizon [t, tf ], whereas we will be using the FRS to determine where a vehicle could be at some particular time t. In addition, (6) has no outer maximum, since the FRSs that we will compute will not involve any obstacles. The Hamiltonian, H(t, x,∇V (t, x)), depends on the system dynamics, and the role of control and disturbance. Whenever H does not depend explicit on t, we will drop the argument. In addition, the Hamiltonian is an optimization that produces the optimal control u∗(t, x) and optimal disturbance d∗(t, x), once V is determined. For BRSs, whenever the existence of a control ("∃u") or disturbance is sought, the optimization is a minimum over the set of controls or disturbance. Whenever a BRS characterizes the behavior of the system for all controls ("∀u") or disturbances, the optimization is a maximum. We will introduce precise definitions of reachable sets, expressions for the Hamiltonian, expressions for the optimal controls as needed for the many different reachability calculations we use. IV. SPP WITHOUT DISTURBANCES AND WITH PERFECT INFORMATION In this section, we introduce the basic SPP algorithm assuming that there is no disturbance affecting the vehicles, and that each vehicle knows the exact position of higher- priority vehicles. Although in practice, such assumptions do not hold, the basic SPP algorithm can still serve as a useful approximation in certain situations. In addition, the description of the basic SPP algorithm will introduce the notation needed for describing the subsequent, more realistic versions of SPP. We also show simulation results for the basic SPP algorithm. The majority of the content in this section is taken from [42]. A. Theory Recall that the SPP vehicles Qi, i = 1, . . . , N, are each assigned a strict priority, with Qj having a higher priority than Qi if j < i. In the absence of disturbances, we can write the dynamics of the SPP vehicles as i i xi = fi(xi, ui), t ≤ tSTA ui ∈ Ui, i = 1 . . . , N and the obstacles Oj (8) In SPP, each vehicle Qi plans the path to its target set Li while avoiding static obstacles Ostatic i (t) induced by higher-priority vehicles Qj, j < i. Path planning is done sequentially starting from the first vehicle and proceeding in descending priority, Q1, Q2, . . . , QN so that each of the path planning problems can be done in the state space of only one vehicle. During its path planning process, Qi ignores the presence of lower-priority vehicles Qk, k > i, and induces the obstacles Oi k(t) for Qk, k > i. From the perspective of Qi, each of the higher-priority vehicles Qj, j < i induces a time-varying obstacle denoted Oj i (t) that Qi needs to avoid2. Therefore, each vehicle Qi must plan its path to Li while avoiding the union of all the induced obstacles as well as the static obstacles. Let Gi(t) be the union of all the obstacles that Qi must avoid on its way to Li: paths before Qi does. Thus, in the absence of disturbances, pj(t) is a priori known, and therefore Oj i (t), j < i are known, deterministic moving obstacles, which means that Gi(t) is also known and deterministic. Therefore, the path planning problem for Qi can be solved by first computing the BRS Vbasic ), defined as follows: (t, tSTA i i Vbasic i (t, tSTA i ) ={y : ∃ui(·) ∈ Ui, xi(·) satisfies (8), ∀s ∈ [t, tSTA ∃s ∈ [t, tSTA i ], xi(s) /∈ Gi(s), ], xi(s) ∈ Li, xi(t) = y} i (11) The BRS V(t, tSTA L = Li, G(t) = Gi(t), and the Hamiltonian i ) can be obtained by solving (5) with Hbasic (12) The optimal control for reaching Li while avoiding Gi(t) is (xi, λ) = min ui∈Ui i λ · fi(xi, ui) then given by λ · fi(xi, ui) ubasic i i i i i (t, xi) = arg min ui∈Ui (13) from which the trajectory xi(·) can be computed by integrating the system dynamics, which in this case are given by (8). In addition, the latest departure time tLDT can be obtained from the BRS V(t, tSTA i ∈ V(t, tSTA )}. In summary, the basic SPP algorithm is given as follows: i = arg supt{x0 ) as tLDT the case i = 1, Gi(t) = Ostatic Algorithm 1: Basic SPP algorithm: Suppose we are given i , vehicle dynamics (8), target sets Li, and initial conditions x0 static obstacles Ostatic , i = 1 . . . , N. For each i in ascending order starting from i = 1 (which corresponds to descending order of priority), 1) determine the total obstacle set Gi(t), given in (9). In 2) compute the BRS Vbasic latest departure time tLDT Vbasic ∀t; i (t, tSTA ) defined in (11). The is then given by arg supt{x0 i ∈ 3) determine the trajectory xi(·) using vehicle dynamics (8), with the optimal control ubasic 4) given xi(·), compute the induced obstacles Oi each k > i. In the absence of disturbances, Oi given by (10). (·) given by (13); k(t) for k(t) is (t, tSTA )}; i i i i i i B. Numerical Simulations Gi(t) = Ostatic i Oj i (t) (9) We now illustrate the basic SPP algorithm using a four- vehicle example. In this example, we will use the following dynamics for each vehicle: ∪ i−1(cid:91) j=1 With full position information of higher priority vehicles, the obstacle induced for Qi by Qj is simply Oj i (t) = {xi : (cid:107)pi − pj(t)(cid:107)2 ≤ Rc} (10) Each higher priority vehicle Qj plans its path while ignoring Qi. Since path planning is done sequentially in descending or- der or priority, the vehicles Qj, j < i would have planned their 2Note that the index k in Oi and the index j in Oj k denotes vehicles with lower priority than Qi, i (t) denotes vehicles with higher priority than Qi. px,i = vi cos θi py,i = vi sin θi θi = ωi ωi ≤ ¯ω (14) where xi = (px,i, py,i, θi) is the state of vehicle Qi, pi = (px,i, py,i) is the position, θi is the heading, vi is the speed, and ωi is the turn rate. In this example, we assume that the vehicles have constant speed vi = 1 ∀i, and that the control of each vehicle Qi is given by ui = ωi with ωi ≤ ¯ω = 1 ∀i. We have chosen these dynamics for clarity of illustration; the SPP algorithm can handle more general systems of the form in which the vehicles have different control bounds and dynamics. For this example, the target sets Li of the vehicles are circles of radius r in the position space; each vehicle is trying to reach some desired set of positions. In terms of the state space xi, the target sets are defined as Li = {xi : (cid:107)pi − ci(cid:107)2 ≤ r} (15) where ci are centers of the target circles. For the simulation of the basic SPP algorithm, we used r = 0.1. The vehicles have target centers ci, initial conditions x0 i , and scheduled times of arrivals tSTA as follows: i 1 = (−0.5, 0, 0), 2 = (0.5, 0, π), 3 = (−0.6, 0.6, 7π/4) , 4 = (0.6, 0.6, 5π/4) , c1 = (0.7, 0.2), x0 c2 = (−0.7, 0.2), x0 c3 = (0.7,−0.7), x0 c4 = (−0.7,−0.7), x0 tSTA 1 = 0 tSTA 2 = 0.2 tSTA 3 = 0.4 tSTA 4 = 0.6 (16) The setup for this example is shown in Fig. 1, which also shows the static obstacles as the black rectangles around the center of the domain. i i i = −1.48, tLDT The joint state space of this four-vehicle system is twelve- dimensional (12D), making the joint path planning and colli- sion avoidance problem intractable for direct analysis using HJ reachability. Therefore, we apply the SPP algorithm described in Algorithm 1 and repeatedly solve the double-obstacle HJ VI in (5) to obtain the optimal control for each vehicle to reach its target while avoiding higher-priority vehicles. In addition, due to the flexibility of the HJ VI with respect to time-varying systems, the different scheduled times of arrival tSTA can be trivially incorporated. Fig. 2, 3, and 4 show the simulation results. Since the state space of each vehicle is 3D, each of the BRSs Vbasic (t, tSTA ) is also 3D. To visualize the results, we slice the BRSs at the initial heading angles θ0 i . Fig. 2 shows the 2D BRS slices for each vehicle at its latest departure times tLDT 2 = = −1.44 determined from our −0.94, tLDT method. The obstacles in the domain Ostatic and the obstacles induced by higher-priority vehicles Oj i (t) inhibit the evolution of the BRSs, carving out thin "channels" that separate the BRSs into different "islands". One can see how these "chan- nels" and "islands" form by examining the time evolution of the BRS, shown in Fig. 3 for vehicle Q3. Finally, Fig. 4 shows the resulting trajectories of the four vehicles. Most interestingly, the subplot labeled t = −0.55 shows all four vehicles in close proximity without collision: each vehicle is outside of the danger zone of all other vehicles (although the danger zones may overlap). This close proximity is an indication of the optimality of the basic SPP algorithm given the assigned priority ordering. Since no disturbances are present, getting as close to other vehicles' danger zones as possible without entering the danger zones intuitively results in short transit times. 1 = −1.12, tLDT 4 3 i Fig. 1: Initial configuration of the four-vehicle example. The actual arrival times of vehicles Qi, i = 1, 2, 3, 4 are 0, 0.19, 0.34, 0.31, respectively. It is interesting to note that for some vehicles, the actual arrival times are earlier than the scheduled times of arrivals tSTA . This is because in order i to arrive at the target by tSTA , these vehicles must depart early enough to avoid major delays resulting from the induced obstacles of other vehicles; these delays would have led to a late arrival if vehicle Qi departed after tLDT . i i V. SPP WITH DISTURBANCES AND INCOMPLETE INFORMATION Disturbances and incomplete information significantly com- plicate the SPP scheme. The main difference is that the vehicle dynamics satisfy (1) as opposed to (8). Committing to exact trajectories is therefore no longer possible, since the disturbance di(·) is a priori unknown. Thus, the induced obstacles Oj i (t) are no longer just the danger zones centered around positions. A. Theory We present three methods to address the above issues. The methods differ in terms of control policy information that is known to a lower-priority vehicle, and have their relative advantages and disadvantages depending on the situation. The three methods are as follows: • Centralized control: A specific control strategy is en- forced upon a vehicle; this can be achieved, for example, by some central agent such as an air traffic controller. • Least restrictive control: A vehicle is required to arrive at its target on time, but has no other restrictions on its control policy. When the control policy of a vehicle is unknown, but its timely arrive at its target can be as- sumed, the least restrictive control can be safely assumed by lower-priority vehicles. • Robust trajectory tracking: A vehicle declares a nom- inal trajectory which can be robustly tracked under dis- turbances. In general, the above methods can be used in combina- tion in a single path planning problem, with each vehicle independently having different control policies. Lower-priority Initial Setup-0.500.5-0.8-0.6-0.4-0.200.20.40.6ObstacleTarget 1Target 2Target 3Target 4Position/Heading 1Danger zone 1Position/Heading 2Danger zone 2Position/Heading 3Danger zone 3Position/Heading 4Danger zone 4 i Fig. 2: BRSs at t = tLDT for vehicles 1, 2, 3, 4, sliced at initial headings θ0 i . Black arrows indicate direction of obstacle motion. Due to the turn rate constraint, the presence of static obstacles Ostatic and time-varying obstacles induced by higher- priority vehicles Oj i (t) carve "channels" in the BRS, dividing it up into multiple "islands". i vehicles would then plan their paths while taking into account the control policy information known for each higher-priority vehicle. For clarity, we will present each method as if all vehicles are using the same method of path planning. In addition, for simplicity of explanation, we will assume that no static obstacles exist. In the situations where static obstacles do exist, the time-varying obstacles Gi(t) simply become the union of the induced obstacles Oj i (t) in (10) and the static obstacles. The material in this section is taken partially from [43]. 1) Centralized Control: The highest-priority vehicle Q1 first plans its path by computing the BRS (with i = 1) Vdstb ) ={y : ∃ui(·) ∈ Ui,∀di(·) ∈ Di, xi(·) satisfies (1), (t, tSTA i i ∀s ∈ [t, tSTA ∃s ∈ [t, tSTA i ], xi(s) /∈ Gi(s), xi(t) = y ], xi(s) ∈ Li} i (17) Since we have assumed no static obstacles exist, we have that for Q1,G1(s) = ∅ ∀s ≤ tSTA , and thus the above BRS is well-defined. This BRS can be computed by solving the HJ VI (5) with the following Hamiltonian: i Hdstb i (xi, λ) = min ui∈Ui max di∈Di λ · fi(xi, ui, di) (18) Fig. 3: Time evolution of the BRS for vehicle Q3, sliced at its initial heading θ0 4 . Black arrows indicate direction of obstacle motion. Top row: the BRS grows unobstructed by obstacles. Bottom row: the static obstacles Ostatic and the induced obstacles O1 3, carve out "channels" in the BRS. 3 = 7π 3,O2 i From the BRS, we can obtain the optimal control udstb i (t, xi) = arg min ui∈Ui max di∈Di λ · fi(xi, ui, di) (19) Here, as well as in the other two methods, the latest depar- ture time tLDT i is then given by arg supt x0 i ∈ Vdstb i (t, tSTA ). i If there is a central agent directly controlling each of the N vehicles, then the control law of each vehicle can be enforced. In this case, lower-priority vehicles can safely assume that higher-priority vehicles are applying the enforced control law. In particular, the optimal controller for getting to the target, udstb (t, xi), can be enforced. In this case, the dynamics of each i vehicle becomes xi = f cc di ∈ Di, i (t, xi, di) = fi(xi, udstb i i = 1, . . . , N, (t, xi), di) , tSTA ] t ∈ [tLDT i i (20) where ui no longer appears explicitly in the dynamics. From the perspective of a lower-priority vehicle Qi, a higher-priority vehicle Qj, j < i induces a time-varying obstacle that represents the positions that could possibly be within the collision radius Rc of Qj under the dynamics f cc j (t, xj, dj). Determining this obstacle involves computing Vehicle Q1, t=tLDT1=-1.12-1-0.500.51-1-0.500.51Vehicle Q2, t=tLDT2=-0.94-1-0.500.51-1-0.500.51Vehicle Q3, t=tLDT3=-1.48-1-0.500.51-1-0.500.51Vehicle Q4, t=tLDT4=-1.44-1-0.500.51-1-0.500.51ObstacleTargetsInitial pos. and headingReach-avoid setDanger zonest=0.40-1-0.500.51-1-0.500.51t=-0.27-1-0.500.51-1-0.500.51t=-0.88-1-0.500.51-1-0.500.51t=-1.48-1-0.500.51-1-0.500.51ObstacleTargetsInitial pos. and headingReach-avoid setDanger zones i Fig. 4: The planned trajectories of the four vehicles. Top left: only vehicles Q3 (green) and Q4 (purple) have started moving, showing tLDT is not common across the vehicles. Top right: all vehicles have come within very close proximity, but none is in the danger zone of another. Bottom left: vehicle Q1 (blue) arrives at L1 at t = 0. Bottom right: all vehicles have reached their destination, some ahead of tSTA . i an FRS of Qj starting from3 xj(tLDT Wcc , t) is defined as follows: j ) = x0 j. The FRS where the set Pj(t) is the set of states in the FRS Wcc , t) projected onto the states representing position pj, and disre- garding the non-position dimensions hj: j (tLDT j Pj(t) = {pj : ∃hj, (pj, hj) ∈ Bj(t)}, Bj(t) = Wcc j (tLDT , t). j (24) (25) Finally, taking the union of the induced obstacles Oj i (t) as in (9) gives us the time-varying obstacles Gi(t) needed to define and determine the BRS Vdstb ) in (17). Repeating this process, all vehicles will be able to plan paths that guarantee the vehicles' timely and safe arrival. The centralized control algorithm can be summarized as follows: (t, tSTA i i conditions x0 obstacles Ostatic i , i = 1 . . . , N, for each i, ∀t; the case i = 1, Gi(t) = Ostatic i (t, tSTA ) defined in (17). The i ∈ is then given by arg supt x0 Algorithm 2: Centralized control algorithm: Given initial i , vehicle dynamics (1), target set Li, and static 1) determine the total obstacle set Gi(t), given in (9). In 2) compute the BRS Vdstb latest departure time tLDT Vdstb Vdstb (t, tSTA the FRS Wcc k > i. In the centralized control method, Oi computed using (23) where Pi(t) is given by (24). 4) finally, compute the induced obstacles Oi ) given by (19). Given udstb i (tLDT (t, xi) corresponding to (t, xi), compute 3) compute the optimal control udstb k(t) for each k(t) is , t) in (21); (t, tSTA ); i i i i i i i i i i i i (t, tSTA 2) Least Restrictive Control : Here, we again begin with the highest-priority vehicle Q1 planning its path by computing the BRS Vdstb ) in (17). However, if there is no centralized controller to enforce the control policy for higher-priority vehicles, weaker assumptions must be made by the lower- priority vehicles to ensure collision avoidance. One reasonable assumption is that all higher-priority vehicles follow the least restrictive control that would take them to their targets. This control would be given by (t, xj) in (19)} if xj(t) ∈ ∂Vdstb j (t, tSTA j ), (26) Such a controller allows each higher-priority vehicle to use any controller it desires, except when it is on the boundary of the BRS, ∂Vdstb ), in which case the optimal control udstb (t, xj) given by (19) must be used to get to the target j safely and on time. This assumption is the weakest assumption that could be made by lower-priority vehicles given that the higher-priority vehicles will get to their targets on time. (t, tSTA j j Suppose a lower-priority vehicle Qi assumes that higher- priority vehicles Qj, j < i use the least restrictive con- trol strategy ulrc j (t, xj) in (26). From the perspective of the lower-priority vehicle Qi, a higher-priority vehicle Qj could be in any state that is reachable from Qj's initial state j and from which the target Lj can be reached. xj(tLDT Mathematically, this is defined by the intersection of an FRS Wlrc j (tLDT j and the ) defined in (17) from the target set Lj, BRS Vdstb , t) from the initial state xj(tLDT (t, tSTA ) = x0 ) = x0 j j j j j j j (tLDT Wcc j (tLDT j , t) ={y : ∃dj(·) ∈ Dj, xj(·) satisfies (20), xj(tLDT j ) = x0 j , xj(t) = y}. (21) j (t, xj) ∈ ulrc This FRS can be computed using (6) with the Hamiltonian (cid:40){udstb j Uj otherwise Hcc The FRS Wcc j (t, xj, λ) = max dj∈Dj λ · f cc j (t, xj, dj) (22) j j j (tLDT , t) represents the set of possible states at time t of a higher-priority vehicle Qj given all possible disturbances dj(·) and given that Qj uses the feedback con- troller udstb (t, xj). In order for a lower-priority vehicle Qi to guarantee that it does not go within a distance of Rc to Qj, Qi must stay a distance of at least Rc away from the FRS Wcc , t) for all possible values of the non-position states hj. This gives the obstacle induced by a higher-priority vehicle Qj for a lower-priority vehicle Qi as follows: j (tLDT j Oj i (t) = {xi : ∃y ∈ Pj(t),(cid:107)pi − y(cid:107)2 ≤ Rc} (23) 3In practice, we define the target set to be a small region around the vehicle's initial state for computational reasons. t=-1.15-0.500.5-0.500.5t=-0.55-0.500.5-0.500.5t=0-0.500.5-0.500.5t=0.34-0.500.5-0.500.5ObstacleTargetsPositions, HeadingsTrajectoriesDanger Zones j j (tLDT , t)∩Vdstb Wlrc ). In this situation, since Qj cannot be assumed to be using any particular feedback control, Wlrc , t) is defined as (t, tSTA j j j j (tLDT Wlrc j (tLDT j , t) ={y : ∃uj(·) ∈ Uj,∃dj(·) ∈ Dj, ) = x0 j , xj(·) satisfies (1), xj(tLDT xj(t) = y}. j (27) This FRS can be computed by solving (6) with the Hamil- tonian Hlrc j (xj, λ) = max uj∈Uj max dj∈Dj λ · fj(xj, uj, dj) (28) In turn, the obstacle induced by a higher-priority Qj for a lower-priority vehicle Qi is as follows: Oj i (t) = {xi : ∃y ∈ Pj(t),(cid:107)pi − y(cid:107)2 ≤ Rc}, where (29) Pj(t) = {pj : ∃hj, (pj, hj) ∈ Bj(t)}, Bj(t) = Wlrc (t, tSTA ). , t) ∩ Vdstb j (tLDT j j j (30) (31) The least restrictive control method can be summarized as follows: i initial conditions x0 static obstacles Ostatic , i = 1 . . . , N, for each i, ∀t; the case i = 1, Gi(t) = Ostatic i (t, tSTA ) defined in (17). The i ∈ is then given by arg supt x0 Algorithm 3: Least restrictive control algorithm: Given i , vehicle dynamics (1), target set Li, and 1) determine the total obstacle set Gi(t), given in (9). In 2) compute the BRS Vdstb latest departure time tLDT Vdstb (t, tSTA 3) compute the FRS Wlrc , t) and Vdstb ), compute the positions that the Qi could be in. The set of these positions is given by (30); k(t) for each k > i 4) compute the induced obstacles Oi i (t) in (27). Given Wlrc i (tLDT (t, tSTA ); i i i i i i i i using (29). Remark 1: The centralized control method described in the previous section can be thought of as the "most restrictive control" method, in which all vehicles must use the optimal controller at all times, while the least restrictive control method allows vehicles to use any suboptimal controller that allows them to arrive at the target on time. These two methods can be considered two extremes of a spectrum in which varying degrees of optimality is assumed for higher-priority vehicles. Vehicles can also choose a control strategy in the middle of the two extremes, and for example use a control within some range around the optimal control, or use the optimal control unless some condition is met. The induced obstacles and the BRS can then be similarly computed using the corresponding control strategy. 3) Robust Trajectory Tracking: Even though it is impossi- ble to commit to and track an exact trajectory in the presence of disturbances, it may still be possible to instead robustly track a feasible nominal trajectory with a bounded error at all times. If this can be done, then the tracking error bound can be used to determine the induced obstacles. Here, computation is done in two phases: the planning phase and the disturbance rejection phase. In the planning phase, we compute a nominal trajectory xr,j(·) that is feasible in the absence of disturbances. In the disturbance rejection phase, we compute a bound on the tracking error. It is important to note that the planning phase does not make full use of a vehicle's control authority, as some margin is needed to reject unexpected disturbances while tracking the nominal trajectory. Therefore, in this method, planning is done for a reduced control set U p ⊂ U. The resulting trajectory reference will not utilize the vehicle's full control capability; additional maneuverability is available at execution time to counteract external disturbances. In the disturbance rejection phase, we determine the error bound independently of the nominal trajectory. To compute this error bound, we find a robust controlled-invariant set in the joint state space of the vehicle and a tracking reference that may "maneuver" arbitrarily in the presence of an unknown bounded disturbance. Taking a worst-case approach, the track- ing reference can be viewed as a virtual evader vehicle that is optimally avoiding the actual vehicle to enlarge the tracking error. We therefore can model trajectory tracking as a pursuit- evasion game in which the actual vehicle is playing against the coordinated worst-case action of the virtual vehicle and the disturbance. Let xj and xr,j denote the states of the actual vehicle Qj and the virtual evader, respectively, and define the tracking error ej = xj − xr,j. When the error dynamics are independent of the absolute state as in (32) (and also (7) in [27]), we can obtain error dynamics of the form ej = fej (ej, uj, ur,j, dj), uj ∈ Uj, ur,j ∈ U p j , dj ∈ Dj, t ≤ 0 (32) To obtain bounds on the tracking error, we first conserva- tively estimate the error bound around any reference state xr,j, denoted Ej: Ej = {ej : (cid:107)pej(cid:107)2 ≤ REB}, (33) where pej denotes the position coordinates of ej and REB is a design parameter. We next solve a reachability problem with its complement E c j , the set of tracking errors violating the error bound, as the target in the space of the error dynamics. From E c j , we compute the following BRS: j (t, 0) ={y : ∀uj(·) ∈ Uj,∃ur,j(·) ∈ Up VEB ej(·) satisfies (32), ej(t) = y, ∃s ∈ [t, 0], ej(s) ∈ E c j}, j ,∃dj(·) ∈ Di, (34) where the Hamiltonian to compute the BRS is given by: λ · fej (ej, uj, ur,j, dj). HEB j (ej, λ) = max uj∈Uj (35) Letting t → −∞, we obtain the infinite-horizon control- invariant set Ωj := limt→−∞(cid:0)VEB j (t, 0)(cid:1)c. If Ωj is nonempty, then the tracking error ej at flight time is guaranteed to remain min j ,dj∈Dj ur∈U p 3) compute the BRS VEB 2) decide on a reduced control authority U p i for the plan- ning phase, and choose a parameter REB to conserva- tively bound the tracking error; i (t, 0) using (34) and make sure that Ωi (cid:54)= ∅. Given REB, the error bound on the tracking error is given by Ωi; 4) using Ωi, determine the augmented obstacle set Gi(t), given in (38); 5) compute the BRS Vrtt ) as described in (39) using the reduced target set Li, Gi(t) as obstacles, and the control authority U p is then given by arg supt x0 i . The latest departure time tLDT 6) compute the nominal trajectory xr,i(·) for Qi in the absence of disturbances, which can be obtained using the vehicle dynamics in (8) and the optimal control given in (41); computed using Ωi and xr,i(·) via (37). k(t) for each k > i can be 7) the induced obstacles Oi i ∈ Vrtt i (t, tSTA i (t, tSTA ); i i i B. Numerical Simulations We demonstrate our proposed methods for accounting for disturbances and incomplete information using a four-vehicle example. Each vehicle has the simple kinematics model in (14) but with disturbances added to the evolution of each state: px,i = vi cos θi + dx,i py,i = vi sin θi + dy,i θi = ωi + dθ,i, v ≤ vi ≤ ¯v,ωi ≤ ¯ω, (cid:107)(dx,i,dy,i)(cid:107)2 ≤ dr,dθ,i ≤ ¯dθ (42) where d = (dx,i, dy,i, dθ,i) represents Qi's disturbances in the three states. The control of Qi is ui = (vi, ωi), where vi is the speed of Qi and ωi is the turn rate; both controls have a lower and upper bound. For illustration purposes, we choose v = 0.5, ¯v = 1, ¯ω = 1; however, our method can easily handle the case in which these inputs differ across vehicles. The disturbance bounds are chosen as dr = 0.1, ¯dθ = 0.2, which correspond to a 10% uncertainty in the dynamics. within Ωj ⊆ Ej provided that the vehicle starts inside Ωj and subsequently applies the feedback control law κj(ej) = arg max uj∈Uj ur∈U p min j ,dj∈Dj λ · fej (ej, uj, ur,j, dj). (36) The induced obstacles by each higher-priority vehicle Qj can thus be obtained by: i (t) = {xi : ∃y ∈ Pj(t),(cid:107)pi − y(cid:107)2 ≤ Rc} Oj Pj(t) = {pj : ∃hj, (pj, hj) ∈ Bj(t)} Bj(t) = Ωj + xr,j(t), (37) where the "+" in (37) denotes the Minkowski sum4. Intu- itively, if Qj is tracking xr,j(t), then it will remain within the error bound Ωj around xr,j(t) ∀t. This is precisely the set Pj(t). The induced obstacles can then be obtained by augmenting a danger zone around this set. Finally, we can obtain the total obstacle set Gi(t) using (9). Since each vehicle Qj, j < i, can only be guaranteed to stay within Ωj, we must make sure during the path planning of Qi that at any given time, the error bounds of Qi and Qj, Ωi and Ωj, do not intersect. This can be done by augmenting the total obstacle set by Ωi: Gi(t) = Gi(t) + Ωi. (38) Finally, given Ωi, we can guarantee that Qi will reach its target Li if Ωi ⊆ Li; thus, in the path planning phase, we modify Li to be Li := {xi : Ωi + xi ⊆ Li}, and compute a BRS, with the control authority U p i , that contains the initial state of the vehicle. Mathematically, Vrtt i (t, tSTA i ) ={y : ∃ui(·) ∈ Up i , xi(·) satisfies (8), ], xi(s) /∈ Gi(t), ], xi(s) ∈ Li, xi(t) = y} ∀s ∈ [t, tSTA ∃s ∈ [t, tSTA i i (39) ) can be obtained by solving (5) using i (t, tSTA i The BRS Vrtt the Hamiltonian: Hrtt (40) The corresponding optimal control for reaching Li is given i (xi, λ) = min ui∈U p i λ · fi(xi, ui) by: λ · fi(xi, ui). i urtt i (t) = arg min ui∈U p (41) The nominal trajectory xr,i(·) can thus be obtained by using i (·) given by vehicle dynamics (8), with the optimal control urtt (41). From the resulting nominal trajectory xr,i(·), the overall control policy to reach Li can be obtained via (36). The robust trajectory tracking method can be summarized as follows: initial conditions x0 static obstacles Ostatic Algorithm 4: Robust trajectory tracking algorithm: Given i , vehicle dynamics (1), target sets Li, and 1) determine the total obstacle set Gi(t), given in (9). In , i = 1 . . . , N, for each i, i the case i = 1, Gi(t) = Ostatic ∀t; i 4The Minkowski sum of sets A and B is the set of all points that are the sum of any point in A and B. Fig. 5: Initial configuration of the four-vehicle example in the presence of disturbances. -0.500.5-0.500.5Initial SetupVehicle 1Vehicle 2Vehicle 3Vehicle 4 For this example, we have chosen scheduled times of arrival i = 0 ∀i for simplicity. Each vehicle aims to get to a target tSTA set of the form (15) with target radius r = 0.1. The vehicles' i are given by (16). target centers ci and initial conditions x0 These parameters are the same as the example in Section IV-B, except that the tSTA values are the same for all vehicles, and that there are no static obstacles. The problem setup for this example is shown in Fig. 5. i With the above parameters, we obtain tLDT , i = 1, 2, 3, 4. Note that even though tSTA is assumed to be same for all vehicles in this example for simplicity, our method can easily handle the case in which tSTA is different for each vehicle as we have already shown in Section IV-B. i i i For each proposed method of computing induced obstacles, we show the vehicles' entire trajectories (colored dotted lines), and overlay their positions (colored asterisks) and headings (arrows) at a point in time in which they are in a relatively dense configuration. In all cases, the vehicles are able to avoid each other's danger zones (colored dashed circles) while getting to their target sets in minimum time. In addition, we show the evolution of the BRS over time for Q3 (green boundaries) as well as the obstacles induced by the higher- priority vehicles (black boundaries). Fig. 7: Evolution of the BRS and the obstacles induced by Q1 and Q2 for Q3 in the centralized control method. Since vehicles apply the optimal control at all times, the obstacle sizes are only slightly bigger than those in Fig. 2 and 3. Fig. 7 shows the evolution of the BRS for Q3 (green boundary), as well as the obstacles (black boundary) induced by the higher-priority vehicles Q1 and Q2. The locations of the induced obstacles at different time points include the actual positions of Q1 and Q2 at those times, and the sizes of obstacles remain relatively small. The tLDT values for the four vehicles (in order) in this case are −1.35,−1.37,−1.94 and −2.04, relatively close for vehicles pairs (Q1, Q2) and (Q3, Q4), because the obstacles generated by higher-priority vehicles are small and hence do not affect the tLDT of lower- priority vehicles significantly. i i 2) Least Restrictive Control: Fig. 8 shows the simulated trajectories in the situation where each vehicle assumes that higher-priority vehicles use the least restrictive control to reach their targets, as described in V-A2. Fig. 9 shows the BRS and induced obstacles for Q3. Q1 (red) takes a relatively straight path to reach its target. From the perspective of all other vehicles, large obstacles are induced by Q1, since lower-priority vehicles make the weak assumption that higher-priority vehicles are using the least restrictive control. Because the obstacles induced by higher-priority vehicles are so large, it is faster for lower- priority vehicles to wait until higher-priority vehicles pass by than to move around the higher-priority vehicles. As a result, the vehicles never form a dense configuration, and their trajectories are all relatively straight, indicating that they end up taking a short path to the target after higher-priority vehicles pass by. This is also indicated by the early tLDT i Fig. 6: Simulated trajectories in the centralized control method. Since the higher priority vehicles induce relatively small obstacles in this case, vehicles do not deviate much from a straight line trajectory towards their respective targets, and arrive at a dense configuration similar to that in Fig. 4. i 1) Centralized Control: Fig. 6 shows the simulated trajec- tories in the situation where a centralized controller enforces each vehicle to use the optimal controller udstb (t, xi) according to (19), as described in Section V-A1. In this case, vehicles appear to deviate slightly from a straight line trajectory to- wards their respective targets, just enough to avoid higher- priority vehicles. The deviation is small since the centralized controller is quite restrictive, making the possible positions of higher-priority vehicles cover a small area. In the dense configuration at t = −1.0, the vehicles are close to each other but still outside each other's danger zones. -0.500.5-0.500.5t = -1.0TargetsPositions, HeadingsDanger ZonesTrajectories-0.500.5-0.500.5t = -0.34-0.500.5-0.500.5t = -1.04-0.500.5-0.500.5t = -1.24-0.500.5-0.500.5t = -1.94TargetsInitial pos. and headingReachable setObstacle Fig. 8: Simulated trajectories in the least restrictive control method. All vehicles start moving before Q1 starts, because the large obstacles make it optimal to wait until higher priority vehicles pass by, leading to earlier tLDT 's. i values for the four vehicles, −1.35,−1.97,−2.66 and −3.39, respectively. Compared to the centralized control method, tLDT 's are significantly earlier for all vehicles, except Q1, i the highest-priority vehicle, since it need not account for any moving obstacles. From Q3's (green) perspective, the large obstacles induced by Q1 and Q2 are shown in Fig. 9 as the black boundary. As the BRS (green boundary) evolves over time, its growth gets inhibited by the large obstacles for a long time, from t = −0.89 to t = −1.39. Eventually, the boundary of the BRS reaches the initial state of Q3 at t = tLDT 3 = −2.66. 3) Robust Trajectory Tracking: In the planning phase, we reduced the maximum turn rate of the vehicles from 1 to 0.6, and the speed range from [0.5, 1] to exactly 0.75 (constant speed). With these reduced control authorities, we determined from the disturbance rejection phase that a nominal trajectory from the planning phase can be robustly tracked within a distance of REB = 0.075. the tLDT In this case, Fig. 10 shows the vehicle trajectories in the situation where each vehicle robustly tracks a pre-specified trajectory and is guaranteed to stay inside a "bubble" around the trajectory. Fig. 11 shows the evolution of BRS and induced obstacles for vehicle Q3. The obstacles induced by other vehicles inhibit the evolution of the BRS, carving out thin channels, which can be seen at t = −2.59, that separate the BRS into different islands. values for the four vehicles are −1.61,−3.16,−3.57 and −2.47 respectively. In this method, vehicles use reduced control authority for path planning to- wards a reduced-size effective target set. As a result, higher- priority vehicles tend to have earlier tLDT 's compared to the other two methods, as evident from tLDT . Because of this "sacrifice" made by the higher-priority vehicles during the path planning phase, the tLDT's of lower-priority vehicles may be later compared to those in the other methods, as evident from tLDT will change for a vehicle compared to the other methods, as the conservative path planning leads to earlier tLDT 's for higher-priority vehicles . Overall, it is unclear how tLDT 4 i i 1 i i Fig. 9: Evolution of the BRS for Q3 in the least restrictive = −2.66, significantly control method. In this case, tLDT earlier than that in the centralized control method (−1.94), reflecting the impact of larger induced obstacles. 3 Fig. 10: Simulated trajectories for the robust trajectory tracking method. and later tLDT i 's for lower-priority vehicles. VI. SPP WITH AN INTRUDER In Section V, we made the basic SPP algorithm more robust by taking into account disturbances and considering situations in which vehicles may not have complete information about the control strategy of the other vehicles. However, if a vehicle not in the set of SPP vehicles enters the system, or even worse, if this vehicle is an adversarial intruder, the original plan can lead to vehicles entering into another vehicle's danger zone. -0.500.5-0.500.5t = -1.4TargetsPositions, HeadingsDanger ZonesTrajectories-0.500.5-0.500.5t = -0.39-0.500.5-0.500.5t = -0.89-0.500.5-0.500.5t = -1.39-0.500.5-0.500.5t = -2.66TargetsInitial pos. and headingReachable setObstacle-0.500.5-0.500.5t = -1.1TargetsPositions, HeadingsDanger ZonesTrajectories and that some fail-safe or enforcement mechanism exists to force the intruder out of the altitude level affecting the SPP vehicles. Note that we do not make any assumptions about t; however, we assume that once it appears, it stays for a maximum duration of tIAT. Assumption 2: The dynamics of the intruder are known and given by xI = fI (xI , uI , dI ). Assumption 2 is required for HJ reachability analysis. In situations where the dynamics of the intruder are not known exactly, a conservative model of the intruder may be used instead. Based on the above assumptions, we aim to design a control policy that ensures for each SPP vehicle separation with the intruder and with other SPP vehicles, and successful transit to the destination. However, depending on the initial state of the intruder, its control policy, and the disturbances in the dynamics of a vehicle and the intruder, a vehicle may arrive at different states after avoiding the intruder. Therefore, a control policy that ensures a successful transit to the destination needs to account for all such possible states, which is a path planning problem with multiple (infinite, to be precise) initial states and a single destination, and is hard to solve in general. Thus, we divide the intruder avoidance problem into two sub-problems. (i) We first design a control policy that ensures a successful transit to the destination if no intruder appears or successful avoidance of the intruder if it does appear. (ii) After the intruder is removed from the system at ¯t, we solve a new SPP problem (that is, we "re-plan") for vehicles which needed to avoid the intruder. In this case, the affected vehicles will re-plan as lowest-priority vehicles starting from the initial they happen to arrive at after avoiding the intruder. Suppose some vehicle Qi starts avoiding the intruder QI at some time t = t, and stops avoiding at t = ¯t. When t < t, Qi must plan its path taking into account the possibility that it may need to avoid an intruder QI. Since Qi may spend a duration of up to tIAT performing avoidance, its induced obstacles Oi k(t), k > i need to be computed in a way that reflects this possibility. The induced obstacles computation is discussed in Section VI-A1. We must also ensure that while avoiding the intruder, Qi does not collide with the total obstacle set Gi(t). This requires computing the augmented total obstacle Gi(t); the computation of Gi(t) and the controller that guarantees the avoidance of the augmented obstacles are discussed in Section VI-A2. In Section VI-A3, we describe how Qi can guarantee collision avoidance with the intruder. A pairwise collision avoidance problem such as this has been solved in isolation in [27]. Finally, when t > ¯t, Qi has already successfully avoided the intruder, but depending on the state it happens to arrive at after avoiding the intruder, it may need to re-plan its trajectory to reach the target safely. The re-planning process is discussed in Section VI-A4. 1) Induced Obstacle Computation: The goal of this section is to compute, for each lower-priority vehicle Qi, the time- varying obstacles induced by each higher-priority vehicle Qj, j < i, denoted by Oj i (t). As before, the total obstacle set Gi(t) can then be obtained using (9). To compute the obstacle Fig. 11: Evolution of the BRS for Q3 in the robust trajectory tracking method. As the BRS grows in time, the induced obstacles carve out a channel. Note that a smaller target set is used to compute the BRS to ensure that the vehicle reaches the target set by t = 0 for any allowed tracking error. If vehicles do not plan with an additional safety margin that takes a potential intruder into account, a vehicle trying to avoid the intruder may effectively become an intruder itself, leading to a domino effect. In this section, we propose a method to allow vehicles to avoid an intruder while maintaining the SPP structure. A. Theory In general, the effect of an intruder on the vehicles in structured flight can be entirely unpredictable, since the in- truder in principle could be adversarial in nature, and the number of intruders could be arbitrary. Therefore, for our analysis to produce reasonable results, two assumptions about the intruders must be made. Assumption 1: At most one intruder (denoted as QI) affects the SPP vehicles at any given time. The intruder is removed from the system after affecting the SPP vehicles after a duration of tIAT. The removal of the intruder can be done, for example, by forcing it out of the altitude range of the SPP vehicles. Let the time at which intruder appears in the system be t and the time at which it disappears be ¯t. Assumption 1 implies that ¯t ≤ t + tIAT. Thus, any vehicle Qi would need to avoid the intruder QI for a maximum duration of tIAT. This assumption can be valid in situations where intruders are rare, -0.500.5-0.500.5t = -0.50-0.500.5-0.500.5t = -2.09-0.500.5-0.500.5t = -2.59-0.500.5-0.500.5t = -3.57TargetsInitial pos. and headingReachable setObstacle that Qi needs to avoid at time t, it is sufficient to consider the scenarios where t ∈ [t− tIAT, t]. This is because if t < t− tIAT, then the SPP vehicles would already be in the re-planning phase at time t and hence cannot be in conflict. Depending on the information known to a lower-priority vehicle Qi about Qj's control strategy, we can use one of the three methods described in Section V to compute the "base" obstacles Bj(t); these are the obstacles that would have been induced by Qj in the absence of an intruder. The base obstacles are respectively given by (25), (31) and (37) for the centralized control, least restrictive control and robust trajectory tracking methods. The induced obstacles, Oj i (t), are then given by the states that Qj can reach while avoiding the intruder, starting from some state in Bj(t), t ∈ [t − tIAT, t]. These states can be obtained by computing an FRS from the base obstacles. WO j (t − τ, t) ={y : ∃uj(·) ∈ Uj,∃dj(·) ∈ Dj, xj(·) satisfies (1), xj(t − τ ) ∈ Bj(t − τ ), xj(t) = y}. (43) WO j (t − τ, t) represents the set of all possible states that Qj can reach after a duration of τ starting from inside Bj(t− τ ). This FRS can be obtained by solving the HJ VI in (6) with the following Hamiltonian: HO j (xj, λ) = max uj∈Uj (44) Since τ ∈ [0, tIAT], the induced obstacles can be obtained as: λ · fj(xj, uj, dj). max dj∈Dj Pj(t) = {pj : ∃hj, (pj, hj) ∈ (cid:91) Oj i (t) = {xi : ∃y ∈ Pj(t),(cid:107)pi − y(cid:107)2 ≤ Rc} WO j (t − τ, t)} (45) τ∈[0,tIAT] Note that by the definition of base obstacles, Bj(t + τ2) ⊆ WBO j (t + τ1, t + τ2) ∀t, τ2 > τ1, where WBO j (t + τ1, t + τ2) denotes the FRS of Bj(t + τ1) computed for a duration of τ2 − τ1. Therefore, we have that WO j (t − tIAT, tIAT) ∀τ ∈ [0, tIAT]. Thus, Pj(t) in (45) can be equiva- lently written as j (t − τ, t) ⊆ WO Pj(t) = {pj : ∃hj, (pj, hj) ∈ WO j (t − tIAT, t)}. (46) 2) Augmented Obstacle Computation: We next need to en- sure that Qi doesn't collide with the obstacles Gi(·) computed in Section VI-A1 even when it is avoiding the intruder. In particular, we can compute a region around the obstacles Gi(·) such that for all disturbances, Qi can avoid colliding with obstacles for tIAT seconds regardless of its avoidance control, if Qi starts outside this region. Augmenting Gi(·) with this region gives us the augmented obstacles, Gi(·), that can then be used during the path planning of Qi to ensure collision avoidance with Gi(·). Suppose that the intruder appears in the system at some time time t = t − tIAT + τ, τ ∈ [0, tIAT]. In this case, we need to ensure that Qi does not collide with the obstacle Gi(t + τ ) at time t+τ, regardless of its control ui(s) and disturbance di(s) for the time interval s ∈ [t, t + τ ]. It is, therefore, sufficient to avoid the τ-horizon BRS of Gi(t + τ ) at time t. This argument applies for all τ ∈ [0, tIAT]. Mathematically, (cid:91) τ∈[0,tIAT] Gi(t) = VG i (t, t + τ ) (47) where VG backwards for τ seconds. Formally, i (t, t + τ ) represents BRS of Gi(t + τ ) computed i (t, t + τ ) ={y : ∃ui(·) ∈ Ui,∃di(·) ∈ Di, VG xi(·) satisfies (1), xi(t) = y, ∃s ∈ [t, t + τ ], xi(s) ∈ Gi(s)}. The Hamiltonian HG i to compute VG i (·) is given by: HG i (xi, λ) = min ui∈Ui min di∈Di λ · fi(xi, ui, di) (48) (49) Remark 2: Note that if we use the robust trajectory tracking method to compute the base obstacles, we would need to augment the obstacles in (47) by the error bound of Qi, Ωi, as discussed in section V-A3. Finally, we compute a BRS VAO ) for path planning that contains the initial state of Qi while avoiding these augmented obstacles: VAO (t, tSTA (t, tSTA ) ={y : ∃ui(·) ∈ Ui,∀di(·) ∈ Di, xi(·) satisfies (1),∀s ∈ [t, tSTA ∃s ∈ [t, tSTA ], xi(s) ∈ Li, xi(t) = y}. ], xi(s) /∈ Gi(s), i i i i i i The Hamiltonian HAO i (50) to compute BRS in (50) is given by: λ · fi(xi, ui, di) HAO i i max di∈Di (xi, λ) = min ui∈Ui Note that VAO (51) (·) ensures goal satisfaction for Qi in the absence of intruder. The goal satisfaction controller is given by: λ · fi(xi, ui, di) uAO i (t, xi) = arg min ui∈Ui max di∈Di Moreover, if Qi starts within VAO , it is guaranteed to avoid collision for a duration of tIAT, starting at any t < tSTA , irrespective of the control and disturbance applied during this time period. (52) i i 3) Optimal Avoidance Controller: First, we define relative dynamics of the intruder QI with state xI with respect to Qi with state xi. xI,i = xI − xi xI,i = fr(xI,i, ui, uI , di, dI ) (53) Given the relative dynamics, we compute the set of states from which the joint states of QI and Qi can enter danger zone ZiI despite the best efforts of Qi to avoid QI. This set of states is given by the BRS VCA(t, tIAT), t ∈ [0, tIAT]: VCA i (t, tIAT) ={y : ∀ui(·) ∈ Ui,∃uI (·) ∈ UI ,∃di(·) ∈ Di, ∃dI (·) ∈ DI , xI,i(·) satisfies (53), ∃s ∈ [t, tIAT], xI,i(s) ∈ LCA , xI,i(t) = y}, i (54) i = {xI,i : (cid:107)pI,i(cid:107)2 ≤ Rc}, and the Hamiltonian for where LCA computing this BRS is given by (cid:16) HCA i (xI,i, λ) = max ui∈Ui min uI∈UI ,di∈Di,dI∈DI (cid:17) λ · fr(xI,i, ui, uI , di, dI ) Once the value function V CA (t, xI,i) corresponding to the (t, tIAT) is computed, the optimal avoidance control i i can be obtained as: BRS VCA uCA i uCA i (t, xi, xI ) = arg max ui∈Ui (cid:16) (cid:17) i min uI∈UI ,di∈Di,dI∈DI λ · fr(xI,i, ui, uI , di, dI ) (55) Under normal circumstances when the intruder QI is far away, we have V CA (0, xI,i) > 0; as QI gets closer to Qi, (0, xI,i) decreases. If Qi applies the control uCA V CA i when i V CA (0, xI,i) = 0, then collision avoidance between Qi and i QI is guaranteed for a duration of tIAT under the worst-case intruder control strategy. In addition, obstacle augmentation (47) ensures that Qi does not collide with Gi(·) during the avoidance maneuver. The overall control policy for avoiding the intruder and collision with other vehicles is thus given by: (cid:26) uAO uA i (t) = i (t, xi) uCA i (t, xi, xI ) t ≤ t t ≤ t ≤ ¯t 4) Replanning after intruder avoidance: After the intruder disappears, goal satisfaction controllers which ensure that the vehicles reach their destinations can be obtained by solving an SPP problem as described in Section V, where the starting states of the vehicles are now given by the states they end up in, denoted x0 j, after avoiding the intruder. Let the optimal control policy corresponding to this goal satisfaction controller be denoted uL i (t, xi). The overall control policy that ensures intruder avoidance, collision avoidance with other vehicles, and successful transition to the destination is given by: (cid:26) uA u∗ i (t) = i (t, xi) uL i (t, xi) t ≤ ¯t t > ¯t Note that in order to re-plan using a SPP method, we need for all vehicles. This can be done to determine feasible tSTA by computing an FRS: i WRP i (¯t, t) ={y ∈ Rni : ∃ui(·) ∈ Ui,∀di(·) ∈ Di, xi(·) satisfies (1), xi(¯t) = x0 i , xi(t) = y,∀s ∈ [¯t, t], xi(s) /∈ GRP i represents the state of Qi at t = ¯t; GRP i (s)}, i (·) takes into where x0 account the fact that Qi needs to avoid higher-priority vehicles Qj, j < i and is defined in an way analogous to (9). (56) The FRS in (56) can be obtained by solving where W RP, gRP, lRP represent the FRS, obstacles during re- planning, and the initial state of Qi, respectively. The new tSTA of Qj is now given by the earliest time at which WRP j (¯t, t) j (¯t, t)∩Lj (cid:54)= intersects the target set Lj, tSTA ∅}. Intuitively, this means that there exists a control policy which will steer the vehicle to its destination by that time, despite the worst case disturbance it might experience. := arg inf t{WRP j Remark 3: Note that we only need to re-plan the trajectories of the vehicles that are affected by the intruder. In particular, if V CA(0, xI,i(t)) > 0 during the entire duration t ∈ [t, ¯t] for a vehicle, to apply any avoidance control, and hence re-planning would not be required for this vehicle. then the vehicle would need not Remark 4: In general, an intruder can be present in the system for much longer than tIAT, as long as it is not affecting the SPP vehicles. t thus really corresponds to the time an intruder starts affecting a SPP vehicle. Remark 5: Note that even though we have presented the analysis for one intruder, the proposed method can handle multiple intruders as long as only one intruder is present at any given time. We conclude this section with the overall SPP algorithm that takes into account an intruder that may appear for a duration of tIAT: , i = 1 . . . , N, for each i, Algorithm 5: Intruder Avoidance algorithm (offline plan- ning): Given initial conditions x0 i , vehicle dynamics (1), intruder dynamics in Assumption 2, target sets Li, and static obstacles Ostatic 1) determine the total obstacle set Gi(t), given in (9). In 2) compute the augmented obstacle set Gi(t) given by (47), 3) given Gi(t), compute the BRS VAO the case i = 1, Gi(t) = Ostatic where VG i (0, τ ) is given by (48); ) defined in (t, tSTA ∀t; i i i i (50); by computing VCA 4) the optimal control to avoid the intruder can be obtained 5) the induced obstacles Oi (t, tIAT) in (54) and using (55); k(t) for each k > i can be i computed using (45). Intruder Avoidance algorithm (online re-planning): For each vehicle i which performed avoidance in response to the intruder, 1) compute WRP 2) given tSTA i (¯t, t) using (56). The new tSTA for Qi is i , vehicle dynamics (1), target set Li, and , i = 1 . . . , N, use any of the three given by arg inf t{WRP static obstacles Ostatic SPP methods discussed in Section V for re-planning. j (¯t, t) ∩ Lj (cid:54)= ∅}; , x0 i i i B. Numerical Simulations (cid:110) (cid:111) max DtW RP(t, xi) + HRP i (t, xi,∇W RP(t, xi)), − gRP(t, xi) − W RP(t, xi) = 0 W RP(t, xi) = max{lRP(xi),−gRP(t, xi)} λ · fi(xi, ui, di) HRP i (xi, λ) = max ui∈Ui min di∈Di To illustrate that our SPP method is robust with respect to disturbances as well as a single intruder that is present for a duration of tIAT, we use a five-vehicle example in which one of the five vehicles is an intruder. We assume that each vehicle has the dynamics given in (42). For this example, we chose the parameters v = 0.1, ¯v = 1, ¯ω = 1, and disturbance bounds dr = 0.1, ¯dθ = 0.2, which correspond to a 10% uncertainty in the dynamics. (57) The vehicles' initial states, scheduled times of arrival, and target sets are the same as those described in Section V-B, except that in this example, we have increased the target radius to r = 0.15. For illustrate purposes, we have chosen to use the robust trajectory tracking method described in Section V-A3 for the base obstacles' computation, and hence each vehicle tracks a nominal trajectory. Fig. 12 shows the simulation at t = ¯t = −2.39, which corresponds to the time at which the intruder "disappears" from the domain. This time is chosen to maximally highlight the impact of the intruder. Here, the intruder is shown in black, and the SPP vehicles are shown in the other different colors. By the time t = −2.39, vehicle Q2 (red) and vehicle Q3 (green) have been avoiding the intruder for some time. This is evident from the amount of deviation between the actual positions of vehicles Q2 and Q3 (denoted by *) and their nominal positions (denoted by o) specified by the nominal trajectories they originally planned to track; these vehicles have abandoned nominal trajectory tracking in order to ensure safety with respect to the intruder. In contrast, Q4 (magenta), which has not needed to avoid the intruder, is tracking its nominal trajectory very closely (but not exactly, due to the presence of disturbances). The SPP vehicles are rather far apart because a large margin is needed to ensure that they maintain separation even when multiple vehicles need to avoid the intruder. In this example in particular, the lowest-priority vehicle Q4 needed to depart very early compared to Q2 and Q3 so that if an intruder were to arrive, Q4 does not impede the ability of the other vehicles to perform avoidance. The early departure of Q4 can be inferred from the fact that at t = −2.39, it is already nearly at its target. For the same reason, the highest-priority vehicle Q1 has not departed from its initial state yet, and thus is not shown at t = −2.39. Q2 and Q3 needed to depart very early compared to Q1 to ensure sufficient margin for avoidance maneuvers. Fig. 13 shows the nominal (black) and actual trajectories (red and green respectively) of vehicles Q2 (top subplot) and Q3 (bottom subplot). Specifically, the x and y positions over time are shown, and the black dotted vertical lines indicate the time interval in which the intruder is present. From Fig. 13, one can clearly see that before the intruder was present, both vehicles are able to track their nominal trajectories closely. When the intruder appears, the vehicles deviate from their nominal trajectories significantly. After the intruder disappears, both vehicles re-plan new trajectories, and at a later time, the resulting actual trajectories eventually arrive at the same location as the nominal trajectories. VII. CONCLUSIONS AND FUTURE WORK Guaranteed-safe multi-vehicle path planning is a challeng- ing problem, and previous analyses often either require strong assumptions on the motion of the vehicles or result in a large degree of conservatism. Optimal control and differential game techniques such as Hamilton-Jacobi (HJ) reachability are ideally suited for guaranteeing goal satisfaction and safety under disturbances, but become intractable for even a small number of vehicles. Fig. 12: The positions of the SPP vehicles and the intruder at t = −2.39, the end of the intruder's appearance. The red and green vehicles Q2, Q3 have not been tracking their nominal trajectories for a while, and have been avoiding the intruder instead. Thus, their positions are far away from their nominal trajectories, indicated by the small colored circles. Q4 has not needed to avoid the intruder, and tracks its nominal trajectory closely. The nominal trajectory of Q4 allows it to stay far enough away from other vehicles so that all vehicles can remain safe in the presence of the intruder. Fig. 13: The difference between the initially planned nominal trajectories and the actual trajectories for vehicles Q2 (top subplot) and Q3 (bottom subplot), which needed to perform avoidance with respect to the intruder during the time interval marked by the vertical black dotted lines. Before the intruder's presence, both vehicles track their nominal trajectories closely; however, both vehicles later deviate significantly from their nominal trajectories in order to avoid the intruder. After the intruder is gone, both vehicles replan their trajectories and arrive at their targets at a later time. Our robust sequential path planning (SPP) method assigns a strict priority ordering to vehicles to offer a tractable and practical approach to the multi-vehicle path planning problem. Under the proposed method, a portion of "space- time" is reserved for vehicles in the airspace in descending priority order to allow for dense vehicle configurations. Unlike previous priority-based methods, our approach accounts for disturbances and an adversarial intruder. SPP reduces the scaling of HJ reachability's computational complexity from exponential to linear with respect to the number of vehicles, while maintaining hard guarantees on goal satisfaction and safety under disturbances. In the presence of a single intruder vehicle, SPP still guarantees goal satisfaction and safety with -1-0.500.51-0.8-0.6-0.4-0.200.20.4t = -2.39TargetVehicle 2Vehicle 3Vehicle 4IntruderDanger zoneTrajectoryNominal Position-2.8-2.6-2.4-2.2-2-1.8-1.6-1.4-1.2-1-101Q2 PositionNominal x traj.Nominal y traj.Actual x traj.Actual y traj.Intruder time-3-2.5-2-1.5-1-0.5Time-101Q3 PositionNominal x traj.Nominal y traj.Actual x traj.Actual y traj.Intruder time a quadratically scaling computational complexity. In the future, we plan to investigate ways of guaranteeing a maximum number of vehicles that need to re-plan, combine reachability analysis with other path planning methods to improve computation speed, and to better understand the scenarios under which the SPP scheme is the most useful by running large-scale simulations. REFERENCES [1] B. P. Tice, "Unmanned Aerial Vehicles – The Force Multiplier of the 1990s," Airpower Journal, 1991. [2] W. DeBusk, "Unmanned Aerial Vehicle Systems for Disaster Relief: Tornado Alley," in AIAA Infotech@Aerospace 2010. American Institute of Aeronautics and Astronautics, Apr. 2010, pp. 2010–3506. [3] Amazon.com, Inc., "Amazon Prime Air," 2016. [Online]. Available: http://www.amazon.com/b?node=8037720011 [4] AUVSI News, "UAS Aid in South Carolina Tornado Investigation," 2016. [Online]. Available: http://www.auvsi.org/blogs/auvsi-news/2016/ 01/29/tornado [5] BBC Technology, "Google plans drone delivery service for 2017," 2016. [Online]. Available: http://www.bbc.com/news/technology-34704868 [6] Joint Planning and Development Office, "Unmanned Aircraft Systems (UAS) Comprehensive Plan," Federal Aviation Administration, Tech. Rep., 2014. [7] T. Prevot, J. Rios, P. Kopardekar, J. E. Robinson III, M. Johnson, and J. Jung, "UAS Traffic Management (UTM) Concept of Operations to Safely Enable Low Altitude Flight Operations," in 16th AIAA Aviation Technology, Integration, and Operations Conference. American Insti- tute of Aeronautics and Astronautics, Jun. 2016, pp. 1–16. [8] P. Fiorini and Z. Shiller, "Motion Planning in Dynamic Environments Using Velocity Obstacles," The International Journal of Robotics Re- search, vol. 17, no. 7, pp. 760–772, Jul. 1998. [9] G. Chasparis and J. Shamma, "Linear-programming-based multi-vehicle path planning with adversaries," in American Control Conference, Jun. 2005, pp. 1072–1077. [10] J. van den Berg, Ming Lin, and D. Manocha, "Reciprocal Velocity Ob- stacles for real-time multi-agent navigation," in International Conference on Robotics and Automation, May 2008, pp. 1928–1935. [11] A. Wu and J. P. How, "Guaranteed infinite horizon avoidance of unpredictable, dynamically constrained obstacles," Autonomous Robots, vol. 32, no. 3, pp. 227–242, Apr. 2012. [12] R. Olfati-Saber and R. M. Murray, "DISTRIBUTED COOPERA- TIVE CONTROL OF MULTIPLE VEHICLE FORMATIONS USING STRUCTURAL POTENTIAL FUNCTIONS," IFAC Proceedings Vol- umes, vol. 35, no. 1, pp. 495–500, 2002. [13] Y. L. Chuang, Y. R. Huang, M. R. D'Orsogna, and A. L. Bertozzi, "Multi-vehicle flocking: Scalability of cooperative control algorithms using pairwise potentials," in International Conference on Robotics and Automation, Apr. 2007, pp. 2292–2299. [14] Feng-Li Lian and R. Murray, "Real-time trajectory generation for the cooperative path planning of multi-vehicle systems," in Conference on Decision and Control, vol. 4, Dec. 2002, pp. 3766–3769. [15] A. Ahmadzadeh, N. Motee, A. Jadbabaie, and G. Pappas, "Multi-vehicle path planning in dynamically changing environments," in International Conference on Robotics and Automation, May 2009, pp. 2449–2454. [16] J. Bellingham, M. Tillerson, M. Alighanbari, and J. How, "Cooperative path planning for multiple UAVs in dynamic and uncertain environ- ments," in Conference on Decision and Control, vol. 3, Dec. 2002, pp. 2816–2822. [17] R. Beard and T. McLain, "Multiple UAV cooperative search under collision avoidance and limited range communication constraints," in Conference on Decision and Control, vol. 1, 2003, pp. 25–30. [18] T. Schouwenaars and E. Feron, "Decentralized Cooperative Trajectory Planning of Multiple Aircraft with Hard Safety Guarantees," in Guid- ance, Navigation, and Control Conference and Exhibit, Aug. 2004, pp. 2004–5141. [19] D. M. Stipanovic, P. F. Hokayem, M. W. Spong, and D. D. Siljak, "Cooperative Avoidance Control for Multiagent Systems," Journal of Dynamic Systems, Measurement, and Control, vol. 129, no. 5, p. 699, 2007. [20] M. Massink and N. De Francesco, "Modelling free flight with collision avoidance," in International Conference on Engineering of Complex Computer Systems, 2001, pp. 270–279. [21] M. Althoff and J. M. Dolan, "Set-based computation of vehicle behaviors for the online verification of autonomous vehicles," in International Conference on Intelligent Transportation Systems, Oct. 2011, pp. 1162– 1167. [22] Y. Lin and S. Saripalli, "Collision avoidance for UAVs using reachable sets," in International Conference on Unmanned Aircraft Systems, Jun. 2015, pp. 226–235. [23] E. Lalish, K. A. Morgansen, and T. Tsukamaki, "Decentralized reactive collision avoidance for multiple unicycle-type vehicles," in American Control Conference, Jun. 2008, pp. 5055–5061. [24] G. M. Hoffmann and C. J. Tomlin, "Decentralized cooperative collision avoidance for acceleration constrained vehicles," in Conference on Decision and Control, 2008, pp. 4357–4363. [25] M. Chen, C.-Y. Shih, and C. J. Tomlin, "Multi-Vehicle Collision Avoidance via Hamilton-Jacobi Reachability and Mixed Integer Pro- gramming," in Conference on Decision and Control (to appear), 2016. [26] E. N. Barron, "Differential games with maximum cost," Nonlinear Analysis, vol. 14, no. 11, pp. 971–989, Jun. 1990. [27] I. Mitchell, A. Bayen, and C. Tomlin, "A time-dependent Hamilton- Jacobi formulation of reachable sets for continuous dynamic games," Transactions on Automatic Control, vol. 50, no. 7, pp. 947–957, Jul. 2005. [28] O. Bokanowski, N. Forcadel, and H. Zidani, "Reachability and Minimal Times for State Constrained Nonlinear Problems without Any Controlla- bility Assumption," Journal on Control and Optimization, vol. 48, no. 7, pp. 4292–4316, Jan. 2010. [29] O. Bokanowski and H. Zidani, "MINIMAL TIME PROBLEMS WITH MOVING TARGETS AND OBSTACLES," IFAC Proceedings Volumes, vol. 44, no. 1, pp. 2589–2593, Jan. 2011. [30] K. Margellos and J. Lygeros, "HamiltonJacobi Formulation for ReachAvoid Differential Games," Transactions on Automatic Control, vol. 56, no. 8, pp. 1849–1861, Aug. 2011. [31] J. F. Fisac, M. , C. J. Tomlin, and S. S. Sastry, "Reach-avoid problems with time-varying dynamics, targets and constraints," in International Conference on Hybrid Systems Computation and Control, 2015, pp. 11– 20. [32] J. A. Sethian, "A fast marching level set method for monotonically advancing fronts." National Academy of Sciences, vol. 93, no. 4, pp. 1591–1595, Feb. 1996. [33] S. Osher and R. Fedkiw, Level Set Methods and Dynamic Implicit Surfaces. Springer-Verlag, 2006. [34] I. M. Mitchell, "Application of Level Set Methods to Control and Reach- ability Problems in Continuous and Hybrid Systems," Ph.D. dissertation, Stanford University, 2002. [35] "A toolbox of level set methods," Tech. Rep., 2007. [36] J. Ding, J. Sprinkle, S. S. Sastry, and C. J. Tomlin, "Reachability calculations for automated aerial refueling," in Conference on Decision and Control, 2008, pp. 3706–3712. [37] H. Huang, J. Ding, W. Zhang, and C. J. Tomlin, "A differential game approach to planning in adversarial scenarios: A case study on capture- the-flag," in International Conference on Robotics and Automation, 2011, pp. 1451–1456. [38] A. M. Bayen, I. M. Mitchell, M. K. Osihi, and C. J. Tomlin, "Aircraft Autolander Safety Analysis Through Optimal Control-Based Reach Set Computation," Journal of Guidance, Control, and Dynamics, vol. 30, no. 1, pp. 68–77, Jan. 2007. [39] M. Erdmann and T. Lozano-P´erez, "On multiple moving objects," Algorithmica, vol. 2, no. 1-4, pp. 477–521, Nov. 1987. [40] J. van den Berg and M. Overmars, "Prioritized motion planning for multiple robots," in IEEE/RSJ International Conference on Intelligent Robots and Systems, 2005, pp. 430–435. [41] N. L. Earl A. Coddington, Theory of ordinary differential equations. R.E. Krieger, 1955. [42] M. Chen, J. F. Fisac, S. Sastry, and C. J. Tomlin, "Safe sequential path planning of multi-vehicle systems via double-obstacle Hamilton- Jacobi-Isaacs variational inequality," in European Control Conference, Jul. 2015, pp. 3304–3309. [43] S. Bansal, M. Chen, J. F. Fisac, and C. J. Tomlin, "Safe Sequential Path Planning of Multi-Vehicle Systems Under Presence of Disturbances and Imperfect Information," in American Control Conference (Submitted), 2017.
cs/0403012
1
0403
2004-03-10T03:49:25
Distributed Control by Lagrangian Steepest Descent
[ "cs.MA", "cs.GT", "nlin.AO" ]
Often adaptive, distributed control can be viewed as an iterated game between independent players. The coupling between the players' mixed strategies, arising as the system evolves from one instant to the next, is determined by the system designer. Information theory tells us that the most likely joint strategy of the players, given a value of the expectation of the overall control objective function, is the minimizer of a Lagrangian function of the joint strategy. So the goal of the system designer is to speed evolution of the joint strategy to that Lagrangian minimizing point, lower the expectated value of the control objective function, and repeat. Here we elaborate the theory of algorithms that do this using local descent procedures, and that thereby achieve efficient, adaptive, distributed control.
cs.MA
cs
Distributed Control by Lagrangian Steepest Descent David H. Wolpert1, Stefan Bieniawski2, and Esfandiar Bandari2 1NASA Ames Research Center, Moffett Field, CA, 94035, and 2253 Durand, Dept. of Aeronautics Stanford, CA 94305, [email protected] {[email protected],[email protected]} Often adaptive, distributed control can be viewed as an iterated game between independent players. The coupling between the players' mixed strategies, arising as the system evolves from one instant to the next, is determined by the system designer. Information theory tells us that the most likely joint strategy of the players, given a value of the expectation of the overall control objective function, is the minimizer of a Lagrangian function of the joint strategy. So the goal of the system designer is to speed evolution of the joint strategy to that Lagrangian minimizing point, lower the expectated value of the control objective function, and repeat. Here we elaborate the theory of algorithms that do this using local descent procedures, and that thereby achieve efficient, adaptive, distributed control. PACS numbers: I. INTRODUCTION This paper considers the problem of adaptive dis- tributed control [1, 2, 3]. Typically in such problems, at each time t each control agent i sets its state xt i inde- pendently of the other agents, by sampling an associated distribution, qt i). Rather than directly via statisti- cal dependencies of the agents' states at the same time t, the coupling between the agents arises indirectly, through the stochastic joint evolution of their distributions {qt i } across time. i (xt More formally, let time be discrete, where at the be- ginning of each t every agent sets its state ("makes its move"), and then the rest of the system responds. Indi- cate the state of the entire system at time t as zt. (zt includes xt, as well as all stochastic elements not being di- rectly controlled.) So the joint distribution of the moves of the agents at any moment t is given by the product dis- i), and the state of the entire i (xt system, given joint move xt, is governed by P (zt xt). tribution qt(xt) = Qi qt Now in general the observations by agent i of aspects of the system's state at times previous to t will determine qt i . So qt i is statistically dependent on the previous states of the entire system, z{t′<t}. In other words, the agents can be viewed as players in a repeated game with Nature, each playing mixed strategies {qt i } at moment t [4, 5, 6, 7, 8]. Their interdependence arises through information sets and the like, in the usual way. From this perspective what the designer of a dis- tributed control system can specify is the stochastic laws governing the updating of the joint strategy. In other words, the designer wishes to impose a stochas- tic dynamics on a Multi-Agent System (MAS) that op- timizes an overall objective function of the state of the system in which the MAS is embedded, F (z).[32] For- mally, this means inducing a joint strategy q(x) with a good associated value of Eq(F ) = R dxq(x)E(F x) ≡ R dxq(x)G(x).[33] Once such a q is found, one can sample it to get a final x, and be assured that, on average, the associated F value is low. G is called the world utility. In this paper we elaborate a set of algorithms that iteratively update qt in such a manner. The algo- rithms presented here are based on using steepest descent techniques to minimize a G-parameterized Lagrangian, LG(q).[34] Because the descent is over Euclidean vectors q, these algorithms can be applied whether the xi are cat- egorical, continuous, time-extended, or a mixture of the three. So in particular, they provide a principled way to do "gradient descent over categorical variables". In the next section we first derive the Lagrangian LG(q) and discuss some of its properties. In the following section we show how to apply gradi- ent descent (and its embellishments) to optimization of the Lagrangian. If we view the agents as engaged in a team game, all having the same utility G, then this gra- dient descent is a distributed scheme for each agent to update its strategy, in a way that will steer the game to a bounded rational equilibrium [9, 14]. In this section we also consider second order methods. In contrast to gradient descent, in general any single ap- plication of Newton's method to update a product dis- tribution q will result in a new distribution p(q) that is not a product distribution. So we must instead solve for the product distribution q′(p) having minimal Kullback- Leibler distance to p. In this section we derive the rule for iterative updating of our distribution so as to move q in the direction of q′(p(q)). In practice any local descent scheme often requires Monte Carlo sampling to estimate terms in the gradient. To minimize the expected quadratic error of the estima- tion, typically the game is changed from being a team game. In other words, in general changing the agent's utilities gi to not all equal G will result in lower bias plus variance of the estimation of the gradient, and therefore will speed evolution to a good joint strategy. These and other techniques for shrinking bias plus variance are dis- cussed in [10, 11]. We end this section by mentioning some other tech- niques for improving the Monte Carlo sampling. These include data-aging, and techniques for managing the de- scent when it gets close to a border of the (simplex of) allowed q, Q. Most of these techniques introduced can be used even with schemes for minimizing LG(q) other than gradient descent. In the final section we introduce some alternatives to LG(q), designed to help speed convergence to a q with low E(G). Miscellaneous proofs can be found in the ap- pendix. The general mathematical framework for casting con- trol and optimization problems in terms of minimizing Lagangians of probability distributions is known as the theory of probability Lagangians. The precise version where the probability distributions are product distri- butions is known as "Product Distribution" (PD) the- ory. [11]. It has many deep connections to other fields, including bounded rational game theory and statistical physics [14]. As such it serves as a mathematical bridge connecting these disciplines. Some initial experimental results concerning the use of PD theory for distributed optimization and distributed control can be found in [15, 16, 17, 18, 19, 20]. See [10, 13, 21] for other uses and extensions of PD theory. II. PRODUCT DISTRIBUTION LAGRANGIANS A. The maxent Lagrangian Say the designer stipulates a particular desired value of E(G), γ. For simplicity, consider the case where the designer has no other knowledge concerning the system besides γ and the fact that the joint strategy is a product distribution. Then information theory tells us that the a priori most likely q consistent with that information is the one that maximizes entropy subject to that informa- tion [22, 23, 24].[35] In other words, of all distributions that agree with the designer's information, that distribu- tion is the "easiest" one to induce by random search. Given this, one can view the job of the designer of a distributed control system as an iterative equilibration process. In the first stage of each iteration the designer works to speed evolution of the joint strategy to the q with maximal entropy subject to a particular value of γ. Once we have found such a solution we can replace the constraint - replace the target value of E(G) - with a more difficult one, and then repeat the process, with another evolution of q [11]. Define the maxent Lagrangian by L(q) ≡ β(Eq(G) − γ) − S = β(Z dxq(x)G(x) − γ) − S(q), (1) S(q) is the Shannon entropy of where µ(x) , and for −R dxq(x)ln q(x) q, simplicity we here take the prior µ to be uniform.[36]. Writing it out, for a given γ, the associated most likely joint strategy is given by the q that minimizes L(q) over all those (q, β) such that 2 the Lagrange parameter β is at a critical point of L, i.e., such that ∂L ∂β = 0. Solving, we find that the qi are related to each other via a set of coupled Boltzmann equations (one for each agent i), qβ i (xi) ∝ e −βE q β (i) (Gxi) (2) where the overall proportionality constant for each i is set by normalization, the subscript qβ (i) on the expecta- tion value indicates that it is evaluated according to the distribution Qj6=i qj, and β is set to enforce the condition Eqβ (G) = γ. Following Nash, we can use Brouwer's fixed point theorem to establish that for any fixed β, there must exist at least one solution to this set of simultane- ous equations. If we evaluate E(G) at the solution qβ, we find that it is a declining function of β. So in following the iterative procedure of equilibrating and then lowering γ we we will raise β. Accordingly, we can avoid the steps of testing whether each successive constraint E(G) = γ is met, and simply monotonically increase β instead. This allows us to avoid ever explicitly specifying the values of γ. Simulated annealing is an example of doing this, where rather than work directly with q, one works with random samples of it formed via the Metropolis random walk algorithm [25, 26, 27, 28]. There is no a priori reason to use such an inefficient means of manipulating q however. Here we will work with q directly instead. This will result in an algorithm that is not simply "probabilistic" in the sense that the updating of its variables is stochastic (as in simulated annealing). Rather the very entity being updated is a probability distribution. B. Shape of the maxent Lagrangian Consider L as a function of q, with β and γ both treated as fixed parameters. (So in particular, Eq(g) need not equal γ.) First, say that q(i) is also held fixed, with only qi allowed to vary. This makes E(g) linear in qi. In addition, entropy is a concave function, and the unit simplex is a convex region. Accordingly, the Lagrangian of Eq. 1 has a unique local minimum over qi. So there is no issue of choosing among multiple minima when all of q(i) is fixed. Nor is there any problem of "getting trapped in a local minimum" in a computational search for that minimum. Indeed, in this situation we can just jump directly to that global optimum, via Eq. 2. Now introduce the shorthand for any function U (x), [U ]i,p(xi) ≡ Z dx(i)U (xi, x(i))p(x(i) xi). So [G]i,q(i) (xi) is agent i's "effective" cost function, ([G]i,q(i) ). This is Eq(i) (G xi). Consider the value Eqβ the value of E(G) at i's bounded rational equilibrium for the fixed q(i), i.e., it is the value at the minimum over qi of i L. View that value as a function of β. One can show that this is a decreasing function. In fact, its derivative just equals the negative of the variance of [G]i,q(i) (xi) evalu- ated under distribution qβ i (xi) (see appendix). Combin- ing this with the fact that E(G) is bounded below (for bounded G), establishes that the variance must go to zero for large enough β. So as β grows, qβ i (xi) → 0 for all xi that don't minimize Eq(i) (G xi). In other words, in that limit, qi becomes Nash-optimal. Next consider varying over all q ∈ Q, the space of all product distributions q. This is a convex space; if p ∈ Q and p′ ∈ Q, then so is any distribution on the line connecting p and p′. However over this space, the E(G) term in L is multilinear. So L is not a simple convex function of q. So we do not have guarantees of a single local minimum. The following lemma extends the technique of La- grange parameters to off-equilibrium points: Lemma 1: Consider the set of all vectors leading from x′ ∈ Rn that are, to first order, consistent with a set of constraints over Rn, {fi(x) = 0}. Of those vectors, the one giving the steepest ascent of a function V (x) is ~u = ∇V + Pi λi∇fi, up to an overall proportionality constant, where the λi enforce the first order consistency conditions, ~u · ∇fi = 0 ∀i. Now examine the derivatives of S(q) with respect to all components of q, i.e., the q-gradient of the entropy. At the border of Q, at least one of the ln(qi) terms in those derivatives will be negative infinite. Combined with Lemma 1, this can be used to establish that at the edge of Q, the steepest descent direction of any player's La- grangian points into the interior of Q (assuming finite β and {G}). (This is reflected in the equilibrium solutions Eq. 2.) Accordingly, whereas Nash equilibria can be on the edge of Q (e.g., for a pure strategy Nash equilibrium), in bounded rational games any equilibrium must lie in the interior of Q. In other words, any equilibrium (i.e., any local minimum) of a bounded rational game has non-zero probability for all joint moves. So just as when only vary- ing a single qi, we never have to consider extremal mixed strategies in searching for equilibria over all Q. We can use local descent schemes instead [15, 19, 29]. Lemma 1 can also be used to construct G with more than one solution to Eq. 2. One can also show that for every player i and any point q interior to Q, there are di- rections in Q along which i's Lagrangian is locally convex. Accordingly, no player's Lagrangian has a local maximum interior to Q. So if there are multiple local minima of i's Lagrangian, they are separated by saddle points across ridges. In addition, the uniform q is a solution to the set of coupled equations Eq. 2, but typically is not a local minimum, and therefore must be a saddle point. Say that we were not restricting ourselves to prod- uct distributions. So the Lagrangian becomes L(p) = β(Ep(G) − γ) − S(p), where p can now be any distribu- tion over x. There is only one local minimum over p of 3 this Lagrangian, the canonical ensemble: pβ(x) ∝ e−βG(x) In general pβ is not a product distribution. However we can ask what product distribution is closest to it. Now in general, the proper way to approximate a tar- get distribution p with a distribution from a subset C of the set of all distributions is to first specify a misfit measure saying how well each member of C approximates p, and then solve for the member with the smallest mis- fit. This is just as true when C is the set of all product distributions as when it is any other set. How best to measure distances between probability dis- tributions is a topic of ongoing controversy and research [30]. The most common way to do so is with the infi- nite limit log likelihood of data being generated by one distribution but misattributed to have come from the other. This is know as the Kullback-Leibler distance [22, 23, 31]: KL(p1 p2) ≡ S(p1 p2) − S(p1) (3) where S(p1 p2) ≡ −R dx p1(x)ln[ p2(x) µ(x) ] is known as the cross entropy from p1 to p2 (and as usual we im- plicitly choose uniform µ). The KL distance is always non-negative, and equals zero iff its two arguments are identical. As shorthand, define the "pq distance" as KL(p q), and the "qp distance" as KL(q p), where p is our tar- get distribution and q is a product distribution. Then it is straightforward to show that the qp distance from q to target distribution pβ is just the maxent Lagrangian L(q), up to irrelevant overall constants. In other words, the q minimizing the maxent Lagrangian is q with the minimal qp distance to the associated canonical ensem- ble. However the qp distance is the (infinite limit of the negative log of) the likelihood that distribution p would attribute to data generated by distribution q. It can be argued that a better measure of how well q approximates p would be based on the likelihood that q attributes to data generated by p. This is the pq distance; it gives a different Lagrangian from that of Eq. 1. Evaluating, up to an overall additive constant (of the canonical distribution's entropy), the pq distance is KL(p q) = −Xi Z dx p(x)ln[qi(xi)]. This is equivalent to a game where each coordinate i has the "Lagrangian" L∗ i (q) ≡ −Z dxi pi(xi)ln[qi(i)], (4) where pi(xi) is the marginal distributionR dx(i)p(x). The minimizer of this is just qi = pi ∀i, i.e., each qi is set to the associated marginal distribution of p. In the interests of space, the rest of this paper we restrict attention to the pq KL distance and associated maxent Lagrangian. III. DESCENT OF THE MAXENT LAGRANGIAN A. Gradient descent Consider the situation where each xi can take on a finite number of possible values, ξi. Say we are iter- atively evolving q to minimize L for some fixed β, and are currently at some point q ∈ Q. Using Lemma 1, we can evaluate the direction from q within Q that, to first order, will result in the largest drop in the value of L(q): ∂L(q) ∂qi(xi = j) = ui(j) −Xx′ i ui(x′ i)/ξi, (5) where ui(j) ≡ βE(G xi = j) + ln[qi(j)]. (Intuitively, i)/ξi is to keep the distribution in the set of all possible probability distribu- tions over x, P.) the reason for subtracting Px′ ui(x′ i Eq. 5 specifies the change that each agent should make to its distribution to have them jointly implement a step in steepest descent of the maxent Lagrangian. These up- dates are completely distributed, in the sense that each agent's update at time t is independent of any other agents' update at that time. Typically at any t each agent i knows qi(t) exactly, and therefore knows ln[qi(j)]. However often it will not know G and/or the q(i). In such cases it will not be able to evaluate the E(G xi = j) terms in Eq. 5 in closed form. One way to circumvent this problem is to have those expectation values be simultaneously estimated by all agents by repeated Monte Carlo sampling of q to pro- duce a set of (x, G(x)) pairs. Those pairs can then be used by each agent i to estimate the values E(G xi = j), and therefore how it should update its distribution. In the simplest version of such an update to q only occurs once every L time-steps. In this scheme only the samples (x, G(x)) formed within a block of L successive time-steps are used at the end of that block by the agents to update their distributions (according to Eq. 5). B. Higher order descent schemes In general, second order descent (e.g., Newton's method) of the maxent Lagrangian is non-trivial, due to coupling that arises between the agents and the re- quirement for associated matrix inversion. However re- call that one way to motivate the entropic product dis- tribution Lagrangian L(q) starts by saying that what we really want is the fully coupled canonical ensemble dis- tribution, pβ(x) ∝ exp(−βG(x)). L(q) then measures qp KL-distance to that desired distribution. From this perspective, any given iteration of second order descent of the maxent Lagrangian runs downhill on a quadratic approximation to a distribution, a distribution that is it- self a product distribution approximation to the ultimate distribution we want to minimize. 4 This suggests the alternative of making the approxi- mations in the opposite order. In this approach we first make a quadratic approximation (over the space of all p, not just all q) to the maxent Lagrangian, L(p). Via Newton's method this specifies a p∗ that minimizes that quadratic approximation. We can then find the product distribution that is nearest (in pq KL distance) to p∗. This scheme is called Nearest Newton descent. The gradient and Hessian of L(p) are given by ∂L ∂p(x) ∂2L ∂p(x)∂p(x′) p=p0 = βG(x) + 1 + ln(p0(x)) p=p0 = δx,x′ p0(x) where p0 is the current point. This Hessian is positive- definite (given that the current p is a member of P). By simple Lagrange parameters, the general solution is either on the border of P, or if in the interior is given by p∗(x) = −p0(x) (cid:2)βG(x) + ln(p(x)) + λ(cid:3) where λ is set by normalization. Solving, either p∗ is on the edge of the simplex, or p∗(x) p0(x) = 1 − S(p0) − ln(p0(x)) − β[G(x) − E(G)]. Note that the right-hand side is exactly the direction you should go using (simplex-constrained) gradient de- scent of L(p). So the direction to p∗ from p0 is given by the Hadamard product of p0 and the direction given by gradient descent. Now we can approximate p∗ with the product distri- bution having the minimal KL distance to it. In partic- ular, consider using pq KL distance rather than qp KL distance. Recall that for this kind of KL distance, the op- timal product distribution approximation to a joint dis- tribution is given by the product of the marginals of that joint distribution (see the discussion just below Eq. 4). Say that p0 is in the form of a product distribution, q0, i.e., that we are starting from a product distribution. Then calculating the marginals of the associated p∗ to get q∗ is trivial: q∗ i (j) q0 i (j) = 1 − S(q0 i ) − ln(q0 i (j)) − β[E(G xi = j) − E(G)] (6) Note that since the original quadratic approximation was over the full joint space, this formula automatically takes into account inter-agent couplings. In practice of course, it may make sense not to jump all the way from q0 to q∗, but only part-way there, to be conservative. (In fact, if q∗ isn't in the interior of the simplex, such partial jumping is necessary.) One potential guide to how far to i . Unlike the KL distances to the full joint Boltzmann distribution, we can readily calculate this KL distance. jump is the pq KL distance from p∗ to Qi q∗ The conditional expectations in Nearest Newton are the same as those in gradient descent. Accordingly, they too can be estimated via Monte Carlo sampling, if need be. It's also worth noting that Eq. 6 has the same form as one would get by evaluating the Hessian of the maxent Lagrangian, so long as one ignored inter-agent aspects of that Hessian. C. Practical issues In practice, the block-wise Monte Carlo sampling to estimate descent directions described above can be pro- hibitively slow. The estimates typically have high vari- ance, and therefore require large block size L to get a good descent direction. One set of ways to address this is to replace the team game with a non-team game, i.e., for each agent i have it estimate quantities E(gi xi = j) rather than E(G xi = j), where each private util- ity gi is chosen to have much lower variance than G [10, 11, 15].[37] Another useful technique is to allow samples from pre- ceding blocks to be re-used. One does this by first "ag- ing" that data to reflect the fact that it was formed under a different q(i) . For example, one can replace the empir- ical average for the most recent block k, Gi,j (k) ≡ PkL+L t=kL G(xt)δxt i,j PkL+L t=kL δxt i,j with a weighted average over the expected G's of all pre- ceding blocks, Pm Gi,j(m)e−κ(k−m) Pm e−κ(k−m) for some appropriate aging constant κ.[38] Typically such ageing allows L to be vastly reduced, and therefore the overall minimization of L to be greatly sped up. For such small L though, it may be that the most recent block has no samples of some move xi = j. This would mean that Gi,j(k) is undefined. One crude way to avoid such problems is to simply force a set of samples of each such move if they don't occur of their own accord, being careful to have the x(i) formed by sampling q(i) when forming those forced samples. Other useful techniques allow one to properly decrease the step size as one nears the border of Q. 5 IV. OTHER LAGRANGIANS FOR FINDING MINIMA OF G There are many alternative Lagrangians to the ones described above. The section focuses on such alterna- tive Lagrangians for the purpose of finding argminxG(x). Two classes of such Lagrangians are investigated: vari- ants of the Maxent Lagrangians, and variants of the two types of KL-distance Lagrangians. A. Maxent Lagrangians Say that after finding the q that minimizes the La- grangian, we IID sample that q, K times. We then take the sample that has the smallest G value as our guess for the x that minimizes G(x). For this to give a low x we don't need the mean of the distribution q(G) to be low - what we need is that the bottom tail of that distribu- tion is low. This suggests that in the E(G) term of the Maxent Lagrangian we replace q(x) → q(x) Θ[κ −R dx′ q(x′)Θ[G(x) − G(x′)]] κ where Θ is the Heaviside theta function. This new mul- tiplier of G is still a probability distribution over x. It equals 0 if G(x) is in the worst 1 − κ percentile (accord- ing to distribution q) of G values, and κ−1 otherwise. So under this replacement the E(G) term in the Lagrangian equals the average of G restricted to that lower κ'th per- centile. For κ = K −1, our new Lagrangian forces atten- tion in setting q on that outlier likely to come out of the K-fold sampling of q(G). One can use gradient descent and Monte Carlo sam- pling to minimize this Lagrangian, in the usual way. Note that the Monte Carlo process includes sampling the prob- ability distribution Θ[κ−R dx′ q(x′)Θ[G(x)−G(x′)]] as well as the qi. This means that only those points in the best κ'th percentile are kept, and used for all Monte Carlo estimates. This may cause greater noise in the Monte Carlo sampling than would be the case for κ = 1. κ As an example, say that for agent i, all of its moves have the same value of E(G xi), and similarly for agent j, and say that G is optimal if agents i and j both make move 0. Then if we modify the updating so that agent i only considers the best values that arose when it made move 0, and similarly for agent j, then both will be steered to prefer to make move 0 to their alternatives. This will cause them to coordinate their moves in an op- timal manner. A similar modification is to replace G with f (G) in the maxent Lagrangian, for some concave nowhere- decreasing function f (.). Intuitively, this will have the effect of coordinating the updates of the separate qi at the end of the block, in a way to help lower G. It does this by distorting G to accentuate those x's with good values. The price paid for this is that there will be more variance in the values of f (G) returned by the Monte Carlo sampling than those of G, in general. Note that if q is a local minimum of the Lagrangian for G, in general it will not be a local minimum for the Lagrangian of f (G) (the gradient will no longer be zero under that replacement, in general). So we can replace G with f (G) when we get stuck in a local minimum, and then return to G once q gets away from that local minimum. In this way we can break out of local minima, without facing the penalty of extra variance. Of course, none of these advantages in replacing G with f (G) hold for algorithms that directly search for an x giving a good G(x) value; x is a local minimum of G(x) ⇔ x is a local minimum of f (G(x)). An even simpler modification to the E(G) term than those considered above is to replace G(x) with Θ[G(x) − K]. Under this replacement the E(G) term becomes the probability that G(x) > K. So minimizing it will push q to x with lower G values. For this modified Lagrangian, the gradient descent update steps adds the following to each qi(xi): 6 low G, if β is large enough. This is why one way to min- imize G is to iteratively find a q that approximates the Boltzmann distribution, for higher and higher β. However there are other target distributions that are peaked about minimizers of G. In particular, given any distribution p′, the distribution θp(x) ≡ p(x)Θ[K − G(x)] R dx′ p(x′)Θ[K − G(x′)] is guaranteed to be more peaked about such minimizers than is p. So our minimization can be done by iterating the process of finding the q that best approximates θp and then setting p = q. This is analogous to the minimization algorithm considered in previous sections, which iterates the process of finding the q that best approximates the Boltzmann distribution and then increases β. For the choice of pq-KL distance as the approximation error, the q that best approximates θp is just the product of the marginal distributions of θp. So at the end of each iteration, we replace qi(xi) ← R dx′ (i)(x′ (i)q′ (i))Θ[K − G(xi, x′ R dx′ q′(x′)Θ[K − G(x′)] (i))] α(cid:2)βq(G < K xi) + ln(qi(xi)) βq(G < K x′ − Px′ i i) + ln(qi(x′ 1 i)) (cid:3). = = Px′ i q′(G < K xi) q′(G < K) q′(xi G < K) q′(xi) In gradient descent of the Maxent Lagrangian we must Monte Carlo estimate the expected value of a real number (G). In contrast, in gradient descent of this modified Lagrangian we Monte Carlo estimate the expected value of a single bit: whether G exceeds K. Accordingly, the noise in the Monte Carlo estimation for this modified Lagrangian is usually far smaller. In all these variants it may make sense to replace the Heaviside function with a logistic function or an exponen- tial. In addition, in all of them the annealing schedule for K can be set by periodically searching for the K that is (estimated to be) optimal, just as one searches for op- timal coordinate systems [11, 14]. Alternatively, a simple heuristic is to have K at the end of each block be set so that some pre-fixed percentage of the sampled points in the block go into our calculation of how to update q. Yet another possibility is to replace E(G) with the i.e., with the K such that κ'th percentile G value, R dx′ q(x′)Θ(G(x′) − K) = κ. (To evaluate the partial derivative of that k with respect a particular qi(xi) one must use implicit differentiation.) B. KL-based Lagrangians Both the qp-KL Lagrangian and pq-KL Lagrangians discussed above had the target distribution be a Boltz- mann distribution over G. For high enough β, such a distribution is peaked near argminxG(x). So sampling an accurate approximation to it should give an x with where q′ is the product distribution being replaced. The denominator term in this expression is known exactly to agent i, and the numerator can be Monte-Carlo estimated by that agent using only observed G values. So like gra- dient descent on the Maxent Lagrangian, this update rule is well-suited to a distributed implementation. Note that if we replace the Heaviside function in this algorithm with an exponential with exponent β, the up- date rule becomes qi(xi) ← E(e−βG xi) E(e−βG) . where both expectations are evaluated under q′, the dis- tribution that generated the Monte Carlo samples. It's interesting to compare this update rule with the parallel Brouwer update rule for the team game [11, 12, 19], to which it is very similar.[39] This update is guaranteed to optimize the associated Lagrangian, unlike the Brouwer update. On the other hand, since it is based on the pq- KL Lagrangian, as mentioned above there is no formal guarantee that this alternative to Brouwer updating will decrease E(G). This update rule is also very similar to the adaptive importance sampling of the original pq-KL approach dis- cussed in [11]. The difference is that in adaptive im- portance sampling the e−βG(x) terms get replaced by e−βG(x)/q′(x). Finally, consider using qp-KL distance to approximate q′(x) eβ(K−G(x)) R dx′ q′(x′)eβ(K−G(x′ )) rather than pq-KL distance. In the Lagrangian for that distance the q′ terms only con- tribute an overall additive constant. Aside from that con- stant, this qp-KL Lagrangian is identical to the Maxent Lagrangian. V. CONCLUSION Many problems in adaptive, distributed control can be cast as an iterated game. The coupling between the mixed strategies of the players arises as the system evolves from one instant to the next. This is what the system designer determines. Information theory tells us that the most likely joint strategy of the players, given a value of the expectation of the overall control objec- tive function, is the minimizer of a particular Lagrangian function of the joint strategy. So the goal of the sys- tem designer is to speed evolution of the joint strategy to that Lagrangian minimizing point, lower the expec- tated value of the control objective function, and repeat. Here we elaborate the theory of algorithms that do this using local descent procedures, and that thereby achieve efficient, adaptive, distributed control. VI. APPENDIX This appendix provides proofs absent from the main text. A. Derivation of Lemma 1 Proof: Consider the set of ~u such that the directional derivatives D~ufi evaluated at x′ all equal 0. These are the directions consistent with our constraints to first or- der. We need to find the one of those ~u such that D~uV evaluated at x′ is maximal. To simplify the analysis we introduce the constraint that ~u = 1. This means that the directional derivative D~uV for any function V is just ~u · ∇V . We then use La- grange parameters to solve our problem. Our constraints j = 1 and D~ufi(x′) = ~u · ∇fi(x′) = 0 ∀i. on ~u are Pj u2 Our objective function is D~uV (x′) = ~u · ∇V (x′). B. Proof of claims following Lemma 1 7 For generality, we provide the proofs in the general scenario where the private utilities gi may differ from one another. See the discussion in Section III C. i) Define fi(q) ≡ R dxiqi(xi), i.e., fi is the constraint forcing qi to be normalized. Now for any q that equals zero for some joint move there must be an i and an x′ i such that qi(x′ i) = 0. Plugging into Lemma 1, we can evaluate the component of the direction of steepest descent along the direction of player i's probability of making move x′ i: ∂L ∂qi(xi) + λ ∂fi ∂qi(xi) = βE(gi xi) + ln(qi(xi)) i [βE(gi x′′ R dx′′ −R dx′′ i ) + ln(qi(x′′ i 1 i ))] x′′ i ) + ln(qi(x′′ i such that qi(x′′ Since there must some x′′ i ) 6= 0, ∃xi such that βE(gi i )) is finite. Therefore our component is negative infinite. So L can be reduced by increasing qi(x′ i). Accordingly, no q having zero prob- ability for some joint move x can be a minimum of i's Lagrangian. ii) To construct a bounded rational game with multiple equilibria, note that at any (necessarily interior) local minimum q, for each i, Differentiating the Lagrangian gives 2λ0ui +Xi λi∇f = ∇V ∀i. with solution ui = ∇V −Pi λi∇f 2λ0 . λ0 enforces our constraint on ~u. Since we are only in- terested in specifying ~u up to a proportionality constant, we can set 2λ0 = 1. Redefining the Lagrange parameters by multiplying them by −1 then gives the result claimed. QED. βE(gi xi) + ln(qi(xi)) = βZ dx(i)gi(xi, x(i))Yj6=i qj(xj ) + ln(qi(xi)) must be independent of xi, by Lemma 1. So say there is a component-by-component bijection T (x) ≡ (T1(x1), T2(x2), . . .) that leaves all the {gj} unchanged, i.e., such that gj(x) = gj(T (x)) ∀x, j [40]. Define q′ by q′(x) = q(T (x)) ∀x. Then for any two values x1 i and x2 i , βEq′ (gi x1 i ) + ln(q′ i(x1 − βEq′ (gi x2 i )) i ) + ln(q′ i(x2 i )) = βZ dx(i)gi(x1 i , x(i))Yj6=i qj(T (xj)) + ln(qi(T (x1 i ))) − βZ dx(i)gi(x2 i , x(i))Yj6=i = βZ dx(i)gi(x1 i , T −1(x(i)))Yj6=i qj(T (xj))) + ln(qi(T (x2 i ))) qj(xj ) + ln(qi(T (x1 i ))) − βZ dx(i)gi(x2 i , T −1(x(i)))Yj6=i qj(xj)) + ln(qi(T (x2 i ))) 8 iii) To establish that at any q there is always a direction along which any player's Lagrangian is locally convex, fix all but two of the {qi}, q0 and q1, and fix both q0 and q1 for all but two of their respective possible values, which we can write as q0(0), q0(1), q1(0), and q1(1), respectively. So we can parameterize the set of q we're considering by two real numbers, x ≡ q0(0) and y ≡ q1(0). The 2 × 2 Hessian of L as a function of x and y is (cid:18) 1 x + 1 α a−x α b−y (cid:19) 1 y + 1 where a ≡ 1 − q0(0) − q0(1) and b ≡ 1 − q1(0) − q1(1), and x + 1 α is a function of gi and Qj6=0,1 qj. Defining s ≡ 1 b−y , the eigenvalues of that Hessian are and t ≡ 1 y + 1 a−x = βZ dx(i)gi(T (x1 i ), x(i)))Yj6=i qj(xj ) + ln(qi(T (x1 i ))) − βZ dx(i)gi(T (x2 i ), x(i)))Yj6=i qj(xj )) + ln(qi(T (x2 i ))) βEq(gi T (x1 = i )) + ln(qi(T (x1 i ))) − βEq(gi T (x2 i )) + ln(qi(T (x2 i ))) where the invariance of gi was used in the penultimate step. Since q is a local minimum though, this last differ- ence must equal 0. Therefore q′ is also a local minimum. Now choose the game so that ∀i, xi, T (xi) 6= xi. (Our congestion game example has this property.) Then the only way the transformation q → q(T ) can avoiding producing a new product distribution is if qi(xi) = qi(x′ i, i.e., q is uniform. Say the Hessians of the players' Lagrangians are not all positive definite at the uniform q. (For example have our congestion game be biased away from uniform multiplicities.) Then that q is not a local minimum of the Lagrangians. Therefore at a local minimum, q 6= q(T ). Accordingly, q and q(T ) are two distinct equilibria. i) ∀i, xi, x′ [1] D. Laughlin, M. Morari, and R. Braatz, "Robust perfor- mance of cross-directional control systems for web pro- cesses," Automatica, vol. 29, pp. 1394–1410, 1993. [2] J. Wolfe, D. Chichka, and J. Speyer, "Decentralized con- trollers for unmanned aerial vehicle formation flight," American Institute of Aeronautics and Astronautics, vol. 96, p. 3933, 1996. [3] M. Mesbai and F. Hadaegh, "Graphs, matrix inequalities, and switching for the formation flying control of multi- ple spacecraft," in Proceedings of the American Control Conference, San Diego, CA, 1999, pp. 4148–4152. [4] D. Fudenberg and J. Tirole, Game Theory. Cambridge, MA: MIT Press, 1991. [5] T. Basar and G. Olsder, Dynamic Noncooperative Game s + t ±p4α2 + (s − t)2 2 . The eigenvalue for the positive root is necessarily posi- tive. Therefore along the corresponding eigenvector, L is convex at q. QED. iv) There are several ways to show that the value of ([gi]i,q(i) ) must shrink as β grows. Here we do so by Eqβ evaluating the associated derivative with respect to β. i Define N (U ) ≡ R dy e−U(y), the normalization con- stant for the distribution proportional to e−U(y). View the xi-indexed vector qβ i as a function of β, gi and q(i). So we can somewhat inelegantly write E(gi) = Eqβ (gi). Then one can expand i (β,gi,q(i)),q(i) ∂E(gi) ∂β ∂2ln(N (β[gi]i,q(i) )) = − ∂β2 = −Var([gi]i,q(i) ) where the variance is over possible xi, sampled according to qβ i (xi). QED. Theory. Philadelphia, PA: Siam, 1999, second Edition. [6] M. Osborne and A. Rubenstein, A Course in Game The- ory. Cambridge, MA: MIT Press, 1994. [7] R. Aumann and S. Hart, Handbook of Game Theory with Economic Applications. North-Holland Press, 1992. [8] D. Fudenberg and D. K. Levine, The Theory of Learning in Games. Cambridge, MA: MIT Press, 1998. [9] D. H. Wolpert, "Bounded rationality game theory and information theory," 2004, submitted. [10] --, "Product distribution theory and collective intel- ligence," in Proceedings of WEHIA04, A. N. et al, Ed. Springer Verlag, 2004. a ensemble," [11] --, canonical 2003, "Factoring cond-mat/0307630. [12] S. Bieniawski and D. H. Wolpert, "Using product distri- butions for distributed optimization," in Proceedings of ICCS 04, 2004. [13] D. H. Wolpert and C. F. Lee, "Adaptive metropolis hast- ings sampling using product distributions," 2004, sub- mitted to ICCS04. [14] D. H. Wolpert, "Information theory - the bridge con- necting bounded rational game theory and statisti- cal physics," in Complex Engineering Systems, A. M. D. Braha and Y. Bar-Yam, Eds., 2004. [15] W. Macready, S. Bieniawski, and D. Wolpert, "Adaptive multi-agent systems for constrained optimization," 2004. [16] N. Antoine, S. Bieniawski, I. Kroo, and D. H. Wolpert, "Fleet assignment using collective intelligence," in Pro- ceedings of 42nd Aerospace Sciences Meeting, 2004, aIAA-2004-0622. [17] C. F. Lee and D. H. Wolpert, "Product distribution the- ory for control of multi-agent systems," 2004, submitted to AAMAS 04. [18] S. Airiau and D. H. Wolpert, "Product distribution the- ory and semi-coordinate transformations," 2004, submit- ted to AAMAS 04. [19] S. Bieniawski and D. H. Wolpert, "Adaptive, distributed control of constrained multi-agent systems," 2004, sub- mitted to AAMAS 04. [20] S. Bieniawski, D. H. Wolpert, and I. Kroo, "Discrete, continuous, and constrained optimization using collec- tives," in Proceedings of 10th AIAA/ISSMO Multidisci- plinary Analysis and Optimization Conference, Albany, New York, 2004, in press. [21] D. H. Wolpert, "Adaptive distributed control: beyond single-instant categorical variables," in Proceedings of MSRAS04, A. S. et al, Ed. Springer Verlag, 2004. [22] T. Cover and J. Thomas, Elements of Information The- ory. New York: Wiley-Interscience, 1991. [23] D. Mackay, Information theory, inference, and learning algorithms. Cambridge University Press, 2003. [24] E. T. Jaynes and G. L. Bretthorst, Probability Theory : The Logic of Science. Cambridge University Press, 2003. [25] S. Kirkpatrick, C. D. J. Gelatt, and M. P. Vecchi, "Opti- mization by simulated annealing," Science, vol. 220, pp. 671–680, May 1983. [26] R. Diekmann, R. Luling, and J. Simon, "Problem inde- pendent distributed simulated annealing and its applica- tions," in Applied Simulated Annealing. Springer, 1993, pp. 17–44. [27] O. Catoni, "Solving scheduling problems by simulated annealing," SIAM Journal on Control and Optimization, vol. 36, no. 5, pp. 1539–1575, 1998. [28] R. V. V. Vidal, Ed., Applied Simulated Annealing (Lec- ture Notes in Economics and Mathematical Systems). Springer, 1993. 9 [29] D. H. Wolpert and S. Bieniawski, "Theory of distributed control using product distributions," in Proceedings of CDC04, 2004. [30] D. H. Wolpert and W. Macready, "Metrics for sets of more than two points," in Proceedings of the Interna- tional Conference on Complex Systems, 2004, 2004, in press. [31] R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Clas- sification (2nd ed.). Wiley and Sons, 2000. [32] Here we follow the convention that lower F is better. In addition, for simplicity we only consider objectives that depend on the state of the system at a single instant; it is straightforward to relax this restriction. [33] For simplicity, here we indicate integrals of any sort, in- cluding point sums for countable x, with the R symbol. [34] See [9, 10, 11, 12] for non-local techniques for finding qt, techniques that are related to ficticious play, and see [13] for techniques that exploit the Metropolis-Hastings algorithm. Other non-local techniques are related to im- portance sampling of integrals, and are briefly mentioned in [14]. [35] In light of how limited the information is here, the algo- rithms presented below are best-suited to "off the shelf" uses; incorporating more prior knowledge allows the al- gorithms to be tailored more tightly to a particular ap- plication. [36] Throughout this paper the terms in any Lagrangian that restrict distributions to the unit simplices are implicit. The other constraint needed for a Euclidean vector to be a valid probability distribution is that none of its com- ponents are negative. This will not need to be explicitly enforced in the Lagrangian here. [37] Formally, this means that each agent i has a separate Lagrangian, formed from Eq. 1 by substituting gi for G. The associaed joint solution q is then given by substitut- ing the appropriate gi for G in each instance of the cou- pled equations Eq. 2 (one instance for each i). See [14] for the relation of this to bounded rational game theory. [38] Not all preceding Gi,j (m) need to be stored to imple- ment this; exponential ageing can be done online using 3 variables per (i, j) pair. [39] That update is a variant of ficticious play, in which we simultaneously replace each qi(xi) with its ideal value if q(i) were to be held fixed, given by Eq. 2. [40] As an example, consider a congestion team game. In such a game all players have the same set of possible moves, and the shared utility G is a function only of the k- indexed bit string {N (x, k)}, where N (x, k) = 1 iff there is a move that is shared by exactly k of the players when the joint move is x. In this case T just permutes the set of possible moves in the same way for all players.
1901.02885
1
1901
2019-01-09T13:18:54
Swarm coordination of mini-UAVs for target search using imperfect sensors
[ "cs.MA" ]
Unmanned Aerial Vehicles (UAVs) have a great potential to support search tasks in unstructured environments. Small, lightweight, low speed and agile UAVs, such as multi-rotors platforms can incorporate many kinds of sensors that are suitable for detecting object of interests in cluttered outdoor areas. However, due to their limited endurance, moderate computing power, and imperfect sensing, mini-UAVs should be into groups using swarm coordination algorithms to perform tasks in a scalable, reliable and robust manner. In this paper a biologically-inspired mechanisms is adopted to coordinate drones performing target search with imperfect sensors. In essence, coordination can be achieved by combining stigmergic and flocking behaviors. Stigmergy occurs when a drone releases digital pheromone upon sensing of a potential target. Such pheromones can be aggregated and diffused between flocking drones, creating a spatiotemporal attractive potential field. Flocking occurs, as an emergent effect of alignment, separation and cohesion, where drones self organise with similar heading and dynamic arrangement as a group. The emergent coordination of drones relies on the alignment of stigmergy and flocking strategies. This paper reports on the design of the novel swarming algorithm, reviewing different strategies and measuring their performance on a number of synthetic and real-world scenarios.
cs.MA
cs
Draft version. Cite this work as: A.L. Alfeo, M.G.C.A. Cimino, N. De Francesco, A. Lazzeri, M. Lega, G. Vaglini, "Swarm coordination of mini-UAVs for target search using imperfect sensors", Intelligent Decision Technologies, IOS Press, Vol. 12, Issue 2, Pages 149-162, 2018 The final publication is available at IOS Press through http://dx.doi.org/10.3233/IDT-170317 Swarm coordination of mini-UAVs for target search using imperfect sensors Antonio L. Alfeo1, Mario G. C. A. Cimino1,*, Nicoletta De Francesco1, Alessandro Lazzeri1, Massimiliano Lega2, Gigliola Vaglini1 1 Department of Information Engineering, University of Pisa, Largo L. Lazzarino 1, 56127 Pisa, Italy 2 Department of Engineering, University of Naples "Parthenope", 80143 Naples, Italy [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] * Corresponding author: Mario G. C. A. Cimino, [email protected] Tel: +39 050 2217 455; Fax: +39 050 2217 600. Abstract Unmanned Aerial Vehicles (UAVs) have a great potential to support search tasks in unstructured environments. Small, lightweight, low speed and agile UAVs, such as multirotors platforms can incorporate many kinds of sensors that are suitable for detecting object of interests in cluttered outdoor areas. However, due to their limited endurance, moderate computing power, and imperfect sensing, mini-UAVs should be into groups using swarm coordination algorithms to perform tasks in a scalable, reliable and robust manner. In this paper a biologically-inspired mechanisms is adopted to coordinate drones performing target search with imperfect sensors. In essence, coordination can be achieved by combining stigmergic and flocking behaviors. Stigmergy occurs when a drone releases digital pheromone upon sensing of a potential target. Such pheromones can be aggregated and diffused between flocking drones, creating a spatiotemporal attractive potential field. Flocking occurs, as an emergent effect of alignment, separation and cohesion, where drones self organise with similar heading and dynamic arrangement as a group. The emergent coordination of drones relies on the alignment of stigmergy and flocking strategies. This 2 paper reports on the design of the novel swarming algorithm, reviewing different strategies and measuring their performance on a number of synthetic and real-world scenarios. Keywords Swarm intelligence, mini-UAV, Stigmergy, Flocking, Target search 1 Introduction and Problem Statement In recent years, several research groups are working on new procedures and technologies to operate and monitor complex scenarios. Two specific areas include search and rescue and environmental monitoring. Both these topics require solutions to critical issues related to the mission requirements and the mission profile. The choice of a specific aerial platform for the monitoring of complex scenarios should be made by examining particular correspondence to the needs of the mission at the same time, and the multiplying effect of what is measurable by sensors positioned on the ground as fixed configuration. Advanced aerial platforms such as Unmanned Aerial Vehicles (UAVs), often called drones, are today the most frequent response to the needs of different missions. In particular, the specific category of mini- are generall have recently received a strong technological acceleration thanks to recent advances in miniaturization of battery, of communication, processing and sensing technology [1]. The remote/proximal sensing data obtained using mini-UAVs were validated in several environmental monitoring missions with complex scenarios as reported in previous research; these include: fusion of optical data with synthetic aperture radar data to detect environmental hazards [2,3], use of thermal imagery to monitor landfills [4], surface waters contamination [5] and to detect illegal dumping [6,7] and to identify other illegal activities [8]. In addition, remote sensing data can be strategically combined with other data layers in geographic information systems to monitor the vulnerability of cultural sites [9] and anticipate environmental violations [10,11]. 3 The use of a range of aerial platforms and advanced sensors to detect the illegal activities was validated in several real missions in Italy [12,13]. These are the first known use of these methods in both the fields of environmental research and law enforcement/environmental forensics. They also represent an example of collaboration between law enforcement and university teams on developing enhanced environmental protection methods. In the operational surveillance for successful identification and prosecution of environmental pollution culprits it is required an integrated system based on data from several sources. The surveillance service must also include geospatially tagged forensic data analysis (information arising from navigation/positional systems). The detection, identification and localisation of a target are key elements in all the above operations. Groups of mini-UAVs equipped with self-localisation and sensing capabilities offer new opportunities; indeed, groups of mini-UAVs can explore cluttered outdoor environments, where access to conventional platforms is inefficient, limited, impossible, or dangerous. In brief, the main motivations for adopting the UAV technology in the survey process are the following: reduction of risk of human falling, reduction of safety costs for plant stoppage, improved data density and quality due to a better proximity, accessibility to locations where people or vehicles have no access, faster and cheaper data acquisition due to the involvement of less workforce and equipment. The coordinated swarming drones could be also considered as single array of sensors configured to the measure of a host of environmental parameters. In search and rescue tasks, for example, a more effective appr to identify key locations as quick as possible. This exclusion process enables organisers to rescan the key locations that provided some circumstantial evidence. In this context, the quality of the sensing has also a direct impact on the overall mission performance [14]. 4 Therefore, an important aspect of the swarm coordination is the possibility to require a sufficient number of redundant samples of the target to reliably classify it A cooperative approach that exploits drones sensing, minimizes the error in target recognition [15]. In contrast, to use a unique drone implies costly structure and design, as well as vulnerability. Hence, a number of considerations support the use of coordinated swarming drones. An important requirement of the coordination strategy is to avoid centralized control approaches, leading to exponential increases in communication bandwidth and software complexity [16]. Swarm intelligence methodologies can be investigated to solve problems cooperatively while maintaining scalability. The main inspiration for swarming drones comes from the observation of social animals, such as insects, winged animals, and fish, that exhibit a collective intelligence which appears to achieve complex goal through simple rules and local interactions [17]. The main benefits of a swarm drones includes: robustness (for the ability to cope with the loss of individuals); scalability (due to the ability to perform well with different group size); and flexibility (thanks to the capability to manage a broad spectrum of different environments and tasks). To this aim, each individual of the swarm: acts with a certain level of autonomy; performs only local sensing and communication; operates without centralized control or global knowledge, and cooperates to achieve a global task [17]. In this paper, different coordination strategies are reviewed and tested empirically with both synthetic and real-world scenarios, with obstacles having irregular complex shapes. For this purpose, it is adopted a multi-agent simulation platform with the possibility of importing environments with obstacles and targets sampled from real landscapes. The paper is structured as follows. In Section 2 early requirements and coordination strategies are reported. Section 3 briefly characterizes the related work. In Section 4, the 5 analysis and the integration of the emergent schemes is covered. Section 5 reports on the design of the algorithm. Experimental studies are detailed in Section 6. Section 7 draws conclusions and future work. 2 Early requirements and coordination strategies From a structural standpoint, it is assumed that each mini-UAV is provided with the following capabilities: wireless communication capability for sending and receiving information from the ground station; self-location capability based on Global Position System (GPS) and inertial technology, returning the coordinates of its current location; one or more target sensing technology, capable of acquire data in the area over which it flies; processor with limited computing capability; obstacle avoidance capability, that is, locally managed detection and steering to avoid flying towards surrounding barriers and drones. Moreover, it is assumed that a certain level of uncertainty comes from noisy of faulty sensor measurements. Marker-based stigmergy is a fundamental swarm coordination mechanism, based on the release of information in the environment in the form of pheromones [18,19]. The pheromone is a volatile substance diffused locally and staying temporarily for other individuals that can properly react and modify their behavior [20]. Simulated (that is, digital) pheromones can be used to coordinate groups of drones for various tasks. In a distributed environment, a pheromone map of the search space can be maintained and made [21]. When the sensing system of a drone determines a potential target, it tries to trigger the cooperation of its swarm to achieve reliable sensing and target detection. Reliable sensing. Sensors on mini-UAV can generate faulty measurements for a number of reasons, such as power loss, software failure, small bias, miscalibration, slow-drifting, loss of accuracy, temporary freezing, to name a few [22]. In the literature, some 6 approaches to fault recognition assume the fault types can be described by a static parameterized model. If parameterized models for the fault types are available, a fault recognition algorithm can be applied. However, without health monitoring a static fault model is often not known [22]. In practice, there is likely to be some deviation between what the actual faults look like and what their models predict. This residual may be irrelevant for a single sensor system. However, in a conventional distributed approach even small residuals can have a significant impact on the overall effectiveness, due to the high number of occurrences potentially involved. In contrast, swarm systems could exhibit much higher levels of robustness, in the sense of tolerance to individual (or few) residual(s), than in conventional distributed systems. Nevertheless, a simplistic modelling approach may make incorrect assumptions, because the question of how many agents are needed to guarantee a required emergent behavior in a particular swarm and for a particular behavior is not straightforward [23]. This potential tolerance cannot be natively assumed without special analysis, design, and test, since swarm systems can exhibit a number of unexpected behaviors. Therefore, the proposed coordination algorithm needs to incorporate some mechanism able to exploits the inherent collective influence between measures, in order to verify its effectiveness under assumption of uncertainty in individual sensing. To this aim, this study tries to achieve a control on the number of redundant measures of the targets that are sufficient to ensure a sufficient level of reliability. Target detection. For a distributed target, the detection process is the identification of any parts of it, with sufficient detail to permit the intended action. For example: to detect a landmine means to find the location of it to avoid being maimed or killed. To detect radioactive substance means to trace perimeters were radioactivity levels are considered dangerous. To detect gas leak means to identify the area were natural gas seeping from 7 the ground implies fire and explosion hazards, and so on. The search problem is formulated by discretizing the environment into a set of cells. Each target is stationary and usually covers many cells. The objective is to determine in which cells the targets lie. Due to the distribution, the task requires that drones are dynamically arranged so as to be efficiently engaged when some member detects a part of the possible target. For this purpose, the drone releases a particular amount of pheromone on the cell of the sensed possible target, whose diffusion acts as an attractive potential on neighboring drones. To be attracted by pheromone trails, the available drones should be spatially organized into flocks. Flocking is a strategy to allow the self-organization of drones into a number of flocks. Flocking behavior is an emergent effect of individual rules based on alignment, separation and cohesion [24]. With alignment rules the drones tends to move in the same direction that nearby drones. With separation rules, the drone keeps a minimum distance able to provide the drone with flexibility when moving in the swarm, and for a better exploration. Finally, with cohesion rules the drone tends to move towards the swarm. As a result of flocking, each member of a flock has approximately the same heading of the other members, and attempts to remain in range with them. For this purpose, the structural dimensions of the pheromone should take into account the average size of a swarm (or vice versa). Otherwise, a highly diffused or poorly evaporated pheromone could attract disproportionate resources on a single target, thus interfering with the progressive development of the emergent behavior. In contrast, a poorly diffused or highly evaporated pheromone could not be sensed at all. As an effect of pheromone attraction, other drones can confirm the possible target through repeated sensing, and can surround the detected location in order to map the whole distribution. Thus a considerable amount of pheromone is aggregated for each possible target. Once a predefined number of drones confirmed the sensing of the possible target, it 8 is definitively considered to be a true target and then its sensing cannot activate additional pheromone. Since pheromone evaporates over time, after a certain time the pheromone intensity cannot be reinforced in a fully explored region, and in practice disappears. In the presented approach, stigmergy and flocking are two emergent behavioral patterns which should work in conjunction with other basic behavioral patterns of the drone, such as obstacle and boundary avoidance. The process of designing a combination strategy is bottom-up and consists in finding the right setting at the micro-level (agent-level) in order to obtain a coherent emergent behavior at macro-level (swarm-level) [25]. 3 Related Work The goal of this section is to briefly characterize the main approaches and results in the literature on stigmergic mechanisms coordinating swarms of small robots to perform target search or similar tasks. The published works in the field can be distinguished into three categories: using a physical substance as a pheromone, which is necessarily transmitted in an indirect way between robots, by means of the physical environment; using a digital pheromone, transmitted via direct communication between robots; using a digital pheromone, transmitted via an indirect communication between robots. The latter is the category of our approach. Kuyucu et al. in [26] use a swarm of robots releasing physical substance as a repulsive pheromone, for environment exploration. In particular, robots act combining three basic behaviors, with decreasing priority: wall avoiding, pheromone coordination, and random walk. Actually there are various approaches in the literature using physical pheromones, because they do not require a computational structure. Although real pheromones are not usable with aerial vehicle, they can be simulated. Thus, this type of research can be interesting to model new types of digital stigmergy. An example of stigmergic coordination between drones using direct communication is 9 presented by Dasgupta [27], where he focuses on automatic target recognition. Potential target are marked by drones, which also communicate the gossiped pheromone to nearby drones, with probability inversely proportional to the distance from the source. The proposed stigmergic schema employs also repulsive pheromone, as a negative feedback, when a predefined number of drones identify the same target. A disadvantage of such scheme is that the bandwidth required goes into an exponential explosion as the population grows. To avoid redundancy in target evaluation each UAV has to maintain in memory the state of each potential and confirmed target. In this way, the direct communication in the swarm should be strongly limited [28]. A swarm coordination schema with indirect coordination is proposed by Sauter et al. [18]. Here the coordination of a swarm of vehicles is based on digital pheromones maintained in an artificial space called pheromone map and composed by an arbitrary graph of place agents, that is, intermediate control nodes. There are two classes of agents which deposit, withdraw, and read pheromones, that is, walkers and avatars. A walker agent aims to make movements and action decisions, whereas avatars collect location information to make estimates when sensor information is not available. The schema has been applied to a range of scenarios, among which target acquisition. An important problem of this approach is that the exploration depends on the initial position of the swarm. This model does not consider complex targets but only simple targets without structure. To handle the unreliability in sensing, a certain number of drones must be attracted on a potential target. To achieve this goal a spatial organization of the available drones is required in order to sense the pheromone deposit released during a survey leaded by a peer of the same group. This result can be achieved keeping flocking formation. Flocking behavior is exhibited during the group flight. It is an emergent effect caused by the observance of three rules: preserving heading alignment with flock-mates, while 10 maintaining separation with respect to the nearest one and cohesion with the entire group, as described by Reynolds [24]. This flocking behavior formalization have been extensively used in swarming robots and drones coordination. Bouraqadi et al. [29] accomplish an unknown environment survey via a group of robots which has to stay close enough to maintaining the ability to communicate with each other. This objective is reached using Reynolds rules to organize the robots distribution and movements. Hauert et al. [30] apply flocking rules for the management of a drones swarm in order to keep an ad-hoc network during their flight and to coordinate their task. However, this application is based on the assumption of well-known search field, and then it is not applicable to unstructured environments, which is one of our requirements. 4 Behavioral specification of the proposed approach This section aims to characterize the emergent behavior of the coordination algorithm, via the integration of a variety of mechanisms. This purpose is achieved using the Tropos agent-oriented methodology [31]. Tropos is based on the notion of agent, which in this context is a drone, with related notions such as goals and plans. It allows a clear modeling of the operating environment and of the interactions that should occur between drones. Figure 1a shows a legend of the main concepts: actor, goal, plan, resource, capability, and social dependency between actors for goal achievement. Actors may be further specialized based on roles (circle with a bottom line) or agents (circle with upper line). A software agent represents a physical instance (human, hardware or software) of an actor that performs the assigned activities. A role represents a speci c function that, in different circumstances, may be played by the agents. Edges Edges between nodes form dependencies of the form: actor goal/task/resource actor . In additional to hard goals, soft goals are also used when having no clear-cut definition and/or criteria as to whether they are satisfied, for example for modeling goal/plan qualities and non-functional 11 requirements [32]. A detailed account of modeling activities can be found in [31]. Figure 1c represents a top view of the proposed algorithm. More specifically, on the bottom, a Physical Environment is a resource modeling the search field, which contains all the physical elements interacting with drones, whereas a Virtual Environment is a resource managing virtual pheromones and the targets (cells discovered or not). In the middle, Drone is the main actor, supporting the primary goal look for target, collectively attained by two levels of organization: the flock, that is, the organism consisting in locally coordinated drones, and the swarm, that is, the organism consisting in globally coordinated flocks. Conversely, a drone depends on the swarm for saving fly time, since the coordinated search is purposely organized to reduce the overall time. This purpose is based on the resource accomplishment time, managed via update plans of the virtual environment (on the bottom right of the figure): count target found and time unit. Other update plans of the virtual environment are diffuse and evaporate pheromones. The basic needs of a drone consist in the sensing procedures, carried out via both the physical and virtual environments, whereas the basic soft goals of a drone consist of: to cover the search space, collective flight, to point towards targets, and to follow obstacle-free paths. Such soft goals are attained via related roles (in ascending order of priority): obstacle avoider, tracker, flockmate, and explorer [33]. Above all, Fig. 1d shows how a drone reacts to local conditions. Each role is further detailed in Fig. 1b. Fig. 1e represents the obstacle avoider role, with the first priority level. At the second priority level, Fig. 1f represents the tracker role. Fig. 1b shows the third priority level, flockmate. Finally, Fig. 1g represents the minimum priority level, explorer. The above specification is a mixed actor-dependency model in which explained. As a result, the drone task and goals and its precedencies between roles have been detailed. The next Section focuses on the system design, to show how to implement and integrate the main functional and architectural components. 12 (a) (b) (c) (d) (f) Fig. 1. Behavioral representation of the proposed approach (e) (g) 5 Architectural and functional Design of the main subsystems This section is devoted to the modeling of environment and drones. 13 4.1 The design of the environment: pheromones and error dynamics It is assumed that the environment is constrained to a specific area. Without loss of generality, the area is discretized through a grid consisting of C2 cells, each identified by a pair (x,y) of coordinates, with x,y [ C]. The actual size of the area and the number of discretized squares depend on the specific application domain. Figure 2 shows a basic scenario of the pheromone dynamics, focused to the most significant stages of diffusion and evaporation. The levels of pheromone intensity are represented by different grey gradations: the darker the gradation is, the higher the intensity. (a) t = 1 (b) t = 2 (e) t = 20 (c) t = 3 (d) t = 5 (f) t = 25 Fig. 2. Basic scenario of pheromone dynamics: (a) releasing; (b) mainly diffusing; (c-d) diffusing and evaporating; (e-f) mainly evaporating. More specifically, in Fig. 2: (a) a single pheromone intensity I is released; (b) at the first steps, the pheromone is mainly diffusing (moving) to the nearby cells, with a constant diffusion rate [0,1] , StigDiffusion; (c-d) the pheromone is diffusing and evaporating; by evaporating, the pheromone decreases its intensity over time; it is ruled by the constant rate [0,1], StigEvaporation; (e-f) the pheromone is mainly evaporating. More formally, the pheromone intensity p released at the instant t on the cell (x,y) is then characterized by the following dynamics: 14 p x y , ( ) t (1 ) p x y , ( t 1) p x y , ( t 1, ) t d , x y ( t 1, ) t (1) where (1- ) px,y(t-1) represents the amount remaining after diffusion to nearby cells, px,y(t- 1,t) the additional deposits made within the interval (t-1,t], and dx,y(t-1,t) the input pheromone diffused from all the nearby cells. The latter can be formally calculated as: d , x y ( t 1, ) t 1 1 8 i j 1 1 ( , ) (0,0) i j p x i y j , ( t 1) (2) since each of the 8 neighbor cells propagates the portion of its pheromone to the cell (x,y) at each update cycle. The total amount in (1) is also multiplied by (StigEvaporation) to take the evaporation into account. The Environment supports also the management of the target detection with imperfect sensors. It is assumed that each target sensing can provide both false positive and false negative. However, this occurs, with a certain error probability of , only while checking the target cell or the cells adjacent to the target, as represented in Fig. 3. Fig. 3. Imperfect sensor model In essence, it is introduced the notion of degradation of the sensing quality as a function of the proximity to the target: as the proximity increases, the sensing may generate an altered measure resulting in a wrong detection. This assumption implies that the discontinuities represented in Fig.1 should be small with respect to the source signal. 4.2 The design of the drone behavior 15 The drone behavior is structured into a prioritized logic, where each priority level implements one basic behavior, or role. At each update cycle, or tick, the role assumed by the drone is a consequence of the environmental sensing. In descending order or priority, the roles are: obstacle avoider, tracker, flockmate and explorer. Figure 4 shows an overall representation of the drone behavior, using a UML (Unified Modeling Language) activity diagram. Here, every tick period, represented by the hourglass icon on bottom left, the environment updates his status, whereas the drone performs in parallel: the target detection, in which case it releases pheromone controlled by StigDiffusion and StigEvaporationRate parameters; the obstacle avoider. If a close object is detected, within the ObstacleVision radius, the drone points toward a free direction, when available, and moves forward. Otherwise, if there are no close objects detected, the drones play the tracker role: it tries to sense pheromone within the Olfaction radius and, if detected, points toward the pheromone peak. Alternatively, if pheromone is not detected, the drone plays the flockmate role: it tries to detect surrounding drones within the FlockVision radius, in order to point toward the flock. Finally, if there are no surrounding drones, as an explorer it performs a random turn within the WiggleVar angle, and then moves forward. Figure 5 represents a detailed modeling of the main procedures and roles played by a drone. Figure 5a models the basic drone behavior consisting in releasing attractive pheromone with StigIntensity intensity, upon target detection and moving forward according to a given velocity set to DroneVel. In Fig. 5b, Fig. 5c, and Fig. 5d the obstacle avoider, the tracker and the flockmate roles are modelled, respectively. Figure 6 shows the main procedures of behavior, the drone takes into account only drones within a FlockVision. Figure 6a represents the separation behavior: drones close to others have to separate for better [24]. In the flocking 16 exploration; thus, if a drone senses another drone closer than the MinimumSeparation, it turns by an angle MaxSeparateTurn. Figure 6b shows the alignment behavior: the drone calculates the average direction of the drones in the flock vision and turns by an angle MaxAlignTurn to conform its direction to the flock direction. Figure 6c illustrates the cohesion behavior: the drone calculates the barycenter of the drones in the Flock vision and turns by an angle MaxCohereTurn towards the barycenter. Fig. 4. Overall modeling of the drone behavior modularized in roles. 17 (a) Drone behavior (b) Obstacle avoider (c) Tracker (d) Flockmate Fig. 5. Detailed modeling of the main roles played by a drone (a) Separation (b) Alignment (f) Cohesion Fig. 6. Illustration of the procedures of the flocking behavior 6 Experimental studies 18 The proposed model has been implemented on NetLogo1, a leading simulation platform for swarm intelligence. The output of the system is the total time needed to find the 95% of targets. According to Fig. 4, the model requires 12 parameters, to be tuned via three-phases: early analysis, under the assumption of reliable sensing (that is, sensing error probability and sensing redundancy set to 0.1 and 1, respectively); parameter sensitivity analysis on representative scenarios, by evaluating the uncertainty in the output for each parameter; finally, accurate setting on each of the most sensitive parameters, via a bisection method to find the value minimizing the output. main structural and behavioral parameters of the model, with their range and their value set. Table 1 Structural and behavioral parameters. Name DroneVel WiggleVar ObstacleVision FlockVision MinimumSeparation MaxSeparateTurn MaxAlignTurn MaxCohereTurn Olfaction StigIntensity StigDiffusion StigEvaporation SensingError Redundancy Description (unit measure) Drone horizontal speed (m/s) Drone max rand- Drone object sensing distance (m) Flock visibility radius (m) Flock mobility distance (m) Fl Pheromone sensing distance (m) Pheromone release intensity Pheromone diffusion rate (%) Pheromone evaporation rate (%) Sensing error probability (%) Sensing Redundancy Range Set v. (0,15) 1 (0,180) 150 (0, 5) 2 [0, 50] 7 [0,5] 3 (0,180) 30 (0,180) 20 (0,180) 5 1 ) (0, 40K (0, ) [0,1] 0.85 [0,1] 0.05 (0, 100) [0.1,1] (0, {1,3,5} ) The algorithm has been tested on four different scenarios, such as Field, Dumps, Urban and Mines. The Field scenario is made by 5 groups of targets scattered over the area, with about 10 targets per group. There are no obstacles. Figure 7 shows a snapshot with the 19 spatial arrangement of flocks of different forms and sizes, together with four stigmergic formations on corresponding groups of targets. Here, it can be observed that stigmergic formations attracted flocks of drones. Fig. 7. A snapshot of the Field scenario with flocks and stigmergic formations An initial configuration of the Field scenario is shown in Fig. 8a. Here, 80 total drones (represented by triangular forms) are arranged into four dense flocks, placed at the antipodes of the area, whereas the targets are represented by clusters of black dots. The second scenario, called Dumps (Fig. 8b) represents a synthetic reconstruction of woodland with three abusive garbage aggregations, modelled by three groups of targets. Here, 30 targets and 100 trees are represented by gray and black dots, respectively. 80 total drones, arranged into 4 flocks, are initially placed at the antipodes of the area. The third scenario, 20 that is, Urban (Fig. 8c) is characterized by two cluster of 110 total targets placed on two sides of corresponding buildings. Overall, 7 total buildings are located. 40 drones, arranged into four flocks, are placed at the antipodes of the area, with no trees at all. Finally, the Urban Mines (Fig. 8d) scenario is derived from real-world examples of areas near Sarajevo, in Bosnia-Herzegovina, with landmine objects, selected from publicly available maps2. Recently, some authors actually proposed the use of mini-UAVfor detecting landmines [34]. Drones have been initially placed on the boundaries of the area. With respect to the map of the first three scenarios, whose area is 200 square meters, in the last scenario the area is 400 square meters. To carry out the experiments under the requirement of imperfect sensor model, a sensing error probability in the interval [0.1, 1] percent with uniform distribution has been added. Then, the system output has been evaluated by requiring a prefixed number of repeated measures of the targets in the termination criterion, that is, sensing redundancy values 3 and 5. To assess the effectiveness of the proposed approach, the performance of the model has been evaluated on three approaches: tigmergic Stigmergic and Flocking aproach 10 trials have been carried out. It has been determined that the resulting performance indicator samples are well- modeled by a normal distribution, using a graphical normality test. Hence, the 95% confidence intervals have been calculated. Table 2 summarizes, for each scenario, the that the use of stigmergy speeds up the target search process in any scenario. Moreover, results become even better in combination with flocking. It can be remarked that all scenarios have been processed by using a general purpose parameterization determined a 21 with reliable sensor model. Indeed, a parameterization ad initialization adapted to types of scenario might produce better results. Table 2. Characteristics and numerical results (mean confidence interval) of each scenario. Field Dumps Urban Urban Mines # targets # clusters # trees # buildings # drones 50 5 0 0 80 ) y c n a d n u d e r ( R (1) S (1) S+F (1) R (3) S (3) S+F (3) R (5) S (5) S+F (5) m h t i r o g l A 2,604 1,383 1,078 4,161 1,758 1,484 6,173 2,109 1,591 248 126 106 269 151 147 361 246 136 30 3 100 0 80 2,252 1,297 1,009 3,993 1,513 1,289 6,163 2,208 1,823 212 102 141 266 116 135 399 208 233 110 2 0 7 40 2,340 1,748 1,259 3,688 2,089 1,861 4,647 2,488 2,102 40 40 54 28 25 651 229 560 188 487 102 944 286 707 197 594 166 271 1,167 770 280 151 726 55 49 29 55 84 34 51 93 32 (a) (b) 22 (c) (d) Fig. 8. Models of three synthetic and one real-world scenarios: (a) Field; (b) Dumps; (c) Urban; (d) Urban Mines. To better highlight the scalability of our approach against redundancy, Fig. 9a-d shows the completion time for redundancy 1, 3 and 5, for each scenario. Here, it is apparent that Stigmergy introduces a significant improvement of trend over Random Fly, both alone and combined with flocking behavior. (a) (b) (d) 23 (c) Fig. 9. Completion time against redundancy, for each scenario and with different approaches: Random Fly (dotted line), Stigmergy (dashed), and Stigmergy + Flocking (solid). 7 Conclusions and Future Work In this paper, it is presented a novel swarm approach for coordinating mini-UAVs to perform target search with imperfect sensors. The approach uses a stigmergic behavior, consisting in the release of information in the environment in the form of attractive digital pheromones, in areas where potential targets are sensed. Moreover, the approach employs flocking behavior, resulting in a flexible arrangement of drones according to the stigmergic potential field. The paper illustrates the approach from the behavioral and architectural point of views, and then discusses the experimental studies. Results on synthetic and real- world scenarios prove the benefits of both stigmergy and flocking, in terms of tolerance to errors and scalability for increasing redundancy requirements. The overall mechanism can be better enabled if structural parameters are correctly tuned for the given scenario. Determining such correct parameters is not a simple task since different areas have different features. Thus, an appropriate tuning to adapt parameters to the specific search area is desirable to make the search more effective. For this purpose, to use a parameter optimization strategy is considered a key investigation activity for future work. Acknowledgements This work was carried out in the framework of the SCIADRO project, cofunded by the Tuscany Region (Italy) under the Regional Implementation Programme for Underutilized Areas Fund (PAR FAS 2007-2013) and the Research Facilitation Fund (FAR) of the Ministry of Education, University and Research (MIUR) References 24 1. K. Whitehead, C. H. Hugenholtz, S. Myshak, O. Brown, A. LeClair, A. Tamminga, T. E. Barchyn, B. Moorman, B. Eaton, Remote sensing of the environment with small unmanned aircraft systems (UASs), part 2: scientific and commercial applications, Journal of Unmanned Vehicle Systems, 02 (2014), 86-102. 2. A. Errico, C. V. Angelino, L. Cicala, G. Persechino, C. Ferrara, M. Lega, A. Vallario, C. Parente, G. Masi, R. Gaetano, G. Scarpa, D. Amitrano, G. Ruello, L. Verdoliva, G. Poggi, Detection of environmental hazards through the feature-based fusion of optical and SAR data: a case study in southern Italy, International Journal of Remote Sensing, 36 (2015), 3345-3367. 3. A. Errico, C. V. Angelino, L. Cicala, D. P. Podobinski, G. Persechino, C. Ferrara, M. Lega, A. Vallario, C. Parente, G. Masi, R. Gaetano, G. Scarpa, D. Amitrano, G. Ruello, L. Verdoliva, G. Poggi, SAR/multispectral image fusion for the detection of environmental hazards with a GIS, Proceedings of SPIE - The International Society for Optical Engineering, 9245 (2014), doi: 10.1117/12.2066476. 4. M. Lega, R. M. A. Napoli, A new approach to solid waste landfills aerial monitoring, WIT Transactions on Ecology and the Environment, 109 (2008), 193-199. 5. M. Lega, R. M. A. Napoli, Aerial infrared thermography in the surface waters contamination monitoring, Desalination and Water Treatment, 23 (2010), 141-151. 6. G. Persechino, P. Schiano, M. Lega, R. M. A. Napoli, C. Ferrara, J. Kosmatka, Aerospace-based support systems and interoperability: The solution to fight illegal dumping, WIT Transactions on Ecology and the Environment, 140 (2010), 203-214. 25 7. G. Persechino, M. Lega, G. Romano, F. Gargiulo, L. Cicala, IDES project: An advanced tool to investigate illegal dumping, WIT Transactions on Ecology and the Environment, 173 (2013), 603-614. 8. M. Lega, C. Ferrara, G. Persechino, P. Bishop, Remote sensing in environmental police investigations: Aerial platforms and an innovative application of thermography to detect several illegal activities, Environmental Monitoring and Assessment, 186 (2014), 8291-8301. 9. M. Lega, L. D'Antonio, R. M. A. Napoli, Cultural Heritage and Waste Heritage: Advanced techniques to preserve cultural heritage, exploring just in time the ruins produced by disasters and natural calamities, WIT Transactions on Ecology and the Environment, 140 (2010), 123-134. 10. M. Lega, G. Persechino, GIS and infrared aerial view: Advanced tools for the early detection of environmental violations, WIT Transactions on Ecology and the Environment, 180 (2014), 225-235. 11. F. Gargiulo, G. Persechino, M. Lega, A. Errico, IDES project: A new effective tool for safety and security in the environment, Lecture Notes in Computer Science (LNCS), 8286 (2013), 201-208. 12. M. Lega, D. Ceglie, G. Persechino, C. Ferrara, R. M. A. Napoli, Illegal dumping investigation: A new challenge for forensic environmental engineering, WIT Transactions on Ecology and the Environment, 163 (2012), 3-11. 13. M. Lega, J. Kosmatka, C. Ferrara, F. Russo, R. M. A. Napoli, G. Persechino, Using Advanced Aerial Platforms and Infrared Thermography to Track Environmental Contamination, Environmental Forensics, 13 (2012), 332-338. 26 14. L. F. Bertuccelli, J. P. How, Robust UAV search for environments with imprecise probability maps, Proceedings of the 44th IEEE Conference on Decision and Control, (2005), 5680-5685. 15. B. Bethke, M. Valenti, J. How, Cooperative vision based estimation and tracking using multiple UAVs, In Advances in Cooperative Control and Optimization, Springer, Berlin Heidelberg, (2007), 179-189. 16. R. McCune, R. Purta, M. Dobski, A. Jaworski, G. Madey, Y. Wei, A. Madey and M.B. Blake, Investigations of DDDAS for command and control of uav swarms with agent- based modeling, Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World, (2013), 1467-1478. 17. M. Brambilla, E. Ferrante, M. Birattari, M. Dorigo, Swarm robotics: a review from the swarm engineering perspective, Swarm Intelligence, 7 (2013), 1-41. 18. J. A. Sauter, R. Matthews, H. Van Dyke Parunak, S. A. Brueckner, Performance of digital pheromones for swarming vehicle control, Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, (2005), 903-910. 19. M.G.C.A. Cimino, A. Lazzeri, G. Vaglini, Combining stigmergic and flocking behaviors to coordinate swarms of drones performing target search, Proceedings of the Sixth International Conference on Information, Intelligence, Systems and Applications (2015), 1-6. 20. H. Van Dyke Parunak, M. Purcell, R. O'Connell, Digital pheromones for autonomous coordination of swarming UAV's, Proceedings of the 1st Technical Conference and Workshop on Unmanned Aerospace Vehicles, (2002), 48105-1579. 21. G. Ermacora, A. Toma, B. Bona, M. Chiaberge, M. Silvagni, A cloud robotics architecture for an emergency management and monitoring service in a smart city 27 environment, Proceedings of the International Conference of Intelligent Robots and Systems, (2013). 22. S. Reece, S. Roberts, C. Claxton, D. S. Nicholson, Multi-sensor fault recovery in the presence of known and unknown fault types, Proceedings of the 12th International Conference on Information Fusion, (2009). 23. A. F. T. Winfield, C. J. Harper and J. Nembrini, Towards the Application of Swarm Intelligence in Safety Critical Systems, Proceedings of the International Conference on System Safety, (2006), 89-95. 24. C. W. Reynolds, Flocks, herds and schools: A distributed behavioral model, Proceedings of the ACM Siggraph Conference on Computer Graphics, (1987), 25-34 . 25. C. Bernon, M. P. Gleizes, G. Picard, Enhancing self-organising emergent systems design with simulation, Engineering Societies in the Agents World VII, Springer Berlin Heidelberg, (2007), 284-299. 26. T. Kuyucu, I. Tanev, K. Shimohara, Superadditive effect of multi-robot coordination in the exploration of unknown environments via stigmergy, Neurocomputing, 148 (2015), 83-90. 27. P. Dasgupta, A multiagent swarming system for distributed automatic target recognition using unmanned aerial vehicles, IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, 38 (2008) 549-563. 28. Y. Tan, Z. Zhong-Yang, Research advance in swarm robotics, Defence Technology 9 (2013), 18-39. 29. N. Bouraqadi, A. Doniec, E. M. de Douai. Flocking-based multi-robot exploration. Proceedings of National conference on control architectures of robots, (2009). 30. S. Hauert, S. Leven, M. Varga, F. Ruini, A. Cangelosi, J.-C. Zufferey, D. Floreano, Reynolds flocking in reality with fixed-wing robots: communication range vs. 28 maximum turning rate, Proceedings of the International Conference on Intelligent Robots and Systems, (2011). 31. P. Bresciani, A. Perini, P. Giorgini, F. Giunchiglia, J. Mylopoulos, Tropos: An agent- oriented software development methodology, Autonomous Agents and Multi-Agent Systems, 8 (2004) , 203 236. 32. F. Pagliarecci, L. Penserini, L. Spalazzi, From a Goal-Oriented methodology to a BDI agent language: the case of Tropos and Alan, Proceedings of Workshop on Agents, Web Services and Ontologies Merging, (2007). 33. P. Giorgini, J. Mylopoulos, A. Perini, A. Susi, The Tropos Metamodel and its Use, Informatica, 29 (2005), 401.408. 34. J. Rodriguez, C. Castiblanco, I. Mondragon, J. Colorado, Low-cost quadrotor applied for visual detection of landmine-like objects, Proceedings of the International Conference on Unmanned Aircraft Systems, (2014).
1310.3781
2
1310
2019-07-15T22:16:25
An Agent-based Model of the Cognitive Mechanisms Underlying the Origins of Creative Cultural Evolution
[ "cs.MA", "cs.AI" ]
Human culture is uniquely cumulative and open-ended. Using a computational model of cultural evolution in which neural network based agents evolve ideas for actions through invention and imitation, we tested the hypothesis that this is due to the capacity for recursive recall. We compared runs in which agents were limited to single-step actions to runs in which they used recursive recall to chain simple actions into complex ones. Chaining resulted in higher cultural diversity, open-ended generation of novelty, and no ceiling on the mean fitness of actions. Both chaining and no-chaining runs exhibited convergence on optimal actions, but without chaining this set was static while with chaining it was ever-changing. Chaining increased the ability to capitalize on the capacity for learning. These findings show that the recursive recall hypothesis provides a computationally plausible explanation of why humans alone have evolved the cultural means to transform this planet.
cs.MA
cs
Gabora, L., & Saberi, M. (2011). An agent-based model of the cognitive mechanisms underlying the origins of creative cultural evolution. In A. Goel, F. Harrell, B. Magerko, & J. Prophet (Eds.), Proceedings of the 8th ACM Conference on Cognition & Creativity (pp. 299-306). New York: Association for Computing Machinery (ACM). An Agent-based Model of the Cognitive Mechanisms Underlying the Origins of Creative Cultural Evolution Liane Gabora Department of Psychology University of British Columbia Okanagan campus, 3333 University Way Kelowna BC, V1V 1V7, CANADA 250-807-9849 [email protected] Maryam Saberi School of Interactive Art and Technology Simon Fraser University Surrey BC, V3T 0A3, CANADA 778-868-5159 [email protected] ABSTRACT Human culture is uniquely cumulative and open-ended. Using a computational model of cultural evolution in which neural network based agents evolve ideas for actions through invention and imitation, we tested the hypothesis that this is due to the capacity for recursive recall. We compared runs in which agents were limited to single-step actions to runs in which they used recursive recall to chain simple actions into complex ones. Chaining resulted in higher cultural diversity, open-ended generation of novelty, and no ceiling on the mean fitness of actions. Both chaining and no-chaining runs exhibited convergence on optimal actions, but without chaining this set was static while with chaining it was ever-changing. Chaining increased the ability to capitalize on the capacity for learning. These findings show that the recursive recall hypothesis provides a computationally plausible explanation of why humans alone have evolved the cultural means to transform this planet. General Terms Algorithms, Experimentation, Theory, Verification ACM Classification Keywords Primary Classification: J.4 SOCIAL AND BEHAVIORAL SCIENCES: Subjects: Psychology and Sociology; Additional Classification: J.5 ARTS AND HUMANITIES I.2 ARTIFICIAL INTELLIGENCE I.2.6 Learning; I.2.11 Distributed Artificial Intelligence Author Keywords EVOC; Homo erectus; action; agent-based model; creativity; cultural diversity; cultural evolution; gesture; innovation; invention; mimetic; origin of culture; recursive recall, self-triggered recall and rehearsal loop INTRODUCTION How did humans come to be so creative? No other species has transformed this planet to anything near the degree that our species has. We now have the technology at our disposal to design computer models that enable us to investigate how our remarkable creativity came about. Humans are not only creative; we put our own spin on the inventions of others, such that new inventions build cumulatively on previous ones. This cumulative cultural change is referred to as the ratchet effect (Tomasello, Kruger, & Ratner, 1993), and it has been suggested that it is uniquely human (Donald, 1998). This paper uses an agent-based simulation to address the question of what enabled humans to be creative enough that cumulative, open-ended cultural evolution could take hold and flourish. Our approach is motivated by the view that there is a distinct difference between (1) culture as a system involving transmission of chance innovations, which is observed in several species, and (2) culture as a process involving the accumulation and differentiation of strategic innovations, which is unique to our species. Only (2) constitutes a genuine evolutionary process, for to achieve descent with adaptive modification it is necessary that change be cumulative. A POSSIBLE MECHANISM FOR THE ORIGIN OF CULTURAL EVOLUTION The minds of our earliest ancestors, Homo habilis, have been referred to as episodic because there is no evidence that their experience deviated from the present moment of concrete sensory perceptions (Donald, 1991). They were able to encode perceptions of events in memory, and recall them in the presence of a reminder or cue, but had little voluntary access to memories without environmental cues. They were therefore unable to voluntarily shape, modify, or practice skills and actions, and unable to invent or refine complex gestures or means of communicating. Homo erectus lived between approximately 1.8 and 0.3 million years ago. The size of the Homo erectus brain was approximately 1,000 cc, about 25% larger than that of Homo habilis, at least twice as large as the brains of living great apes, and 75% the cranial capacity of modern humans 1 of that indications exhibited many (Aiello, 1996; Ruff et al., 1997). This period is widely referred to as the beginnings of cumulative culture. Homo erectus enhanced intelligence, creativity, and ability to adapt to their environment, including sophisticated, task-specific stone handaxes, complex stable seasonal home bases, and long- distance hunting strategies involving large game, and migration out of Africa. This period marks the onset of the archaeological record and it is thought to be the beginnings of human culture. It is widely believed that this cultural transition reflects an underlying transition in cognitive or social abilities. Some have suggested that they owe their achievements to onset of theory of mind (Mithen, 1998) or the capacity to imitate (Dugatkin, 2001). However, there is evidence that other species possess theory of mind and the capacity to imitate (Heyes, 1998), yet do not compare to modern humans in intelligence and cultural complexity. Evolutionary psychologists have suggested the intelligence and cultural complexity of the Homo line can be attributed to the onset of massive modularity (Buss, 1999, 2004; Barkow, Cosmides, &Tooby, 1992). However, although the mind exhibits an intermediate degree of functional and anatomical modularity, neuroscience has not revealed vast numbers of hardwired, encapsulated, task- specific modules; indeed, the brain has been shown to be more highly subject to environmental influence than was previously believed (Buller, 2005; Byrne, 2000; Wexler, 2006). Donald (1991) proposed that with the enlarged cranial capacity of Homo erectus, the human mind underwent the first of three transitions by which it -- along with the cultural matrix in which it is embedded -- evolved from the ancestral, pre-human is characterized by a shift from an episodic to a mimetic mode of cognitive functioning, made possible by onset of the capacity for voluntary retrieval of stored memories, independent of environmental cues. Donald refers to this as a self-triggered recall and rehearsal loop. Self-triggered recall enabled information to be processed recursively, and reprocessed with to different contexts or perspectives. Self-triggered recall allowed our ancestor to access memories voluntarily and thereby act out1 events that occurred in the past or that might occur in the future. Thus not only could the mimetic mind temporarily escape the here and now, but by miming or gesture, it could communicate similar escapes in other minds. The capacity to mime thus ushered forth what is referred to as a mimetic form of cognition and brought about a transition to the mimetic stage of human culture. The self-triggered recall and rehearsal loop also enabled our ancestors to engage in a stream of thought. One thought or idea evokes another, revised version of it, which evokes yet another, and so forth condition. This transition respect 1 The term mimetic is derived from "mime," which means "to act out." recursively. In this way, attention is directed away from the external world toward one's internal model of it. Finally, self-triggered recall allowed for voluntary rehearsal and refinement of actions, enabling systematic evaluation and improvement of skills and motor acts. The recursive recall hypothesis is difficult to test directly, for if correct it would leave no detectable trace. It is, however, possible to computationally model how the onset of the capacity for recursive recall would affect the effectiveness, diversity, and open-endedness of ideas generated in an artificial society. THE MODEL We tested Donald's hypothesis using an agent-based computational model of culture referred to as 'EVOlution of Culture', abbreviated EVOC (Gabora, 2008b, 2008c; Gabora & Leijnen, 2009; Leijnen & Gabora, 2009). EVOC has been used to address such questions as (1) how does the presence of leaders or barriers to the diffusion of ideas affect cultural evolution dynamics, (2) what is the effect of the ratio of creators to imitators in a society, and (3) what is the impact of locally clustering the creators. It is an elaboration of Meme and Variations, or MAV (Gabora, 1994, 1995), the earliest computer program to model culture as an evolutionary process in its own right (as opposed to modeling the interplay of cultural and biological evolution).The approach was inspired by Holland's (1975) genetic algorithm, or GA. The GA is a search technique that finds solutions to complex problems by generating a 'population' of candidate solutions through processes akin to mutation and recombination, selecting the best, and repeating until a satisfactory solution is found. The goal here was to distil the underlying logic of not biological evolution but cultural evolution, i.e. the process by which ideas adapt and build on one another in the minds of interacting individuals. In cultural evolution, the generation of novelty takes place through invention instead of through mutation and recombination as in biological evolution, and the differential replication of novelty takes place through imitation, instead of through reproduction with inheritance as in biological evolution (Gabora, 1996). EVOC (as did MAV) uses neural network based agents that could (1) invent new ideas by modifying previously learned ones, (2) evaluate ideas, (3) implement ideas as actions, and (4) imitate ideas implemented by neighbors. Agents do not evolve in a biological sense -- they neither die nor have offspring -- but do in a cultural sense, by generating and sharing ideas for actions. EVOC (like MAV) successfully models how 'descent with modification' occurs in a cultural context. The approach can thus be contrasted with computer models of how learning affects biological evolution (Best, 1999, 2006; Higgs, 2000; Hinton & Nowlan, 1987; Hutchins & Hazelhurst, 1991). EVOC consists of an artificial society of neural network based agents in a two-dimensional grid-cell world. It is written in Joone, an object oriented programming environment, using an open source neural network library individual 2 written in Java. We now summarize the key components of the agents and the world they inhabit. THE AGENTS Agents consist of (1) a neural network, which encodes ideas for actions and detects trends in what constitutes a fit action, and (2) a body, which implements actions. The core of an agent is an auto associative neural network, as shown in Figure 1. The network learns ideas for actions. An idea is a pattern consisting of six elements that dictate the placement of the six body parts. Learning and training of the neural network is as per Gabora (1995). Figure 1. The core of an agent is an autoassociative neural network composed of six input nodes and six corresponding output nodes that represent concepts of body parts (LEFT ARM, RIGHT ARM, LEFT LEG, RIGHT LEG, HEAD, and HIPS), and seven hidden nodes that represent more abstract concepts (LEFT, RIGHT, ARM, LEG, SYMMETRY, MOVEMENT and OPPOSITE). Input nodes and output nodes are connected to hidden nodes of which they are instances (e.g. RIGHT ARM is connected to RIGHT.) Activation of any input node activates the MOVEMENT hidden node. Same-direction activation of symmetrical input nodes (e.g. positive activation -- which represents upward motion -- of both arms) activates the SYMMETRY node. Sequential opposite movement of an ARM activates the OPPOSITE node. This hidden node was newly added to this version of the program to implement the chaining of actions to form multi-step actions. The hidden nodes are used to bias invention using learned trends about what constitutes a fit action. In EVOC, the neural network can also be turned off to compare results with a data structure that cannot detect trends, and thus invents ideas merely at random. If the fitness of an action is evaluated to be higher than that of any action learned thus far, it is copied from the input/output nodes of the neural network that represent concepts of body parts to a six digit array that contains representations of actual body parts, referred to as the body. Since it is useful to know how many agents are doing essentially the same thing, when node activations are translated into limb movement they are threshold such that there are only three possibilities for each limb: stationary, up, or down. Six limbs with three possible positions each gives a total of 729 possible actions. Only the action that is currently implemented by an agent's body can be observed and imitated by other agents. THE ARTIFICIAL WORLD MAV allowed only worlds that were square and toroidal, or 'wrap-around' (such that agents at the left border that attempt to move further left appear on the right border). In EVOC the world can assume any shape, and be as sparsely or densely populated as required, with agents placed in any configuration. EVOC also allows for the creation of complete or semi-permeable permanent or eroding borders that decrease the probability of imitation along a frontier (although this was not used in the experiments reported here). INCORPORATION OF COGNITIVEPHENOMENA The neural network can be turned off to compare neural network results with those obtained using a database that cannot learn trends, and thus invents ideas at random. The following cultural evolution parameters can also be turned off or on (in some cases to varying degrees). Imitation Fit actions diffuse through the society when agents copy neighbors' actions. During imitation, the input is the action implemented by a neighbor. The process of finding a neighbor to imitate works through a form of lazy (non- greedy) search. An imitating agent randomly scans its neighbors, and adopts the first action that is fitter than the action it is currently implementing. If it does not find a neighbor that is executing a fitter action than its own current action, it continues to execute the current action. Invention Agents generate new actions by modifying their initial action or an action that has been invented previously or acquired through imitation. During invention, the pattern of activation on the output nodes is fed back to the input nodes, and invention is biased according to the activations of the SYMMETRY, MOVEMENT, and OPPOSITE hidden nodes. (Were this not the case there would be no benefit to using a neural network.) The extent to which the generation of novelty is biased by past experience is referred to as the learning rate. To invent a new idea, for each node of the idea currently represented on the input layer of the neural network, the agent makes a probabilistic decision as to whether the position of that body part will change, and if it does, the direction of change is stochastically biased according to the learning rate. If the new the currently implemented idea, the agent learns and implements the action specified by that idea. (See Gabora, 1995 for further details.) idea has a higher fitness than 3 Learning Invention makes use of the ability to detect, learn, and respond adaptively to trends. Since a new action (or, in invention, a new idea for an action) is not learned unless it is fitter than the currently implemented action, new actions provide valuable information about what constitutes an effective idea. Thus knowledge acquired through the evaluation of previous actions is translated into educated guesses about what constitutes a successful action, and this is accomplished by updating the learning rate. There are two learnable trends. The first concerns the overall level of activity involved in successful actions. Learning this trend can bias the generation of new ideas in favor of either more movement or less. Each body part starts out at a stationary rest position, and with an equal probability of changing to movement in one direction or the other. If the fitter action codes for more movement, increase the probability of movement of each body part. Do the opposite if the fitter action codes for less movement. If movement is generally beneficial, increase the probability that new actions involve movement of more body parts. This trend is based on the assumption that movement in general (regardless of which particular body part is moving) can be beneficial or detrimental. This seems like a useful generalization since movement of any body part uses energy and increases the likelihood of being detected. It is implemented as follows: am1 = movement node activation for current action am2 = movement node activation for new action p(im)I = probability of increased movement at body part i p(dm)I = probability of decreased movement at body part i IF (am2>am1) THEN p(im)I = MAX(1.0, p(im)I + 0.1) ELSE IF (am2<am1) THEN p(im)I = MIN(0.0, p(im)I - 0.1) p(dm)I = 1 - p(im)i The second learnable trend is: if successful actions tend to be symmetrical (e.g. left arm moves to the right and right arm moves to the left), the probability increases that new actions are symmetrical. (See Gabora 1995 for details.) This generalization is biologically sensible, since many useful actions (e.g. walking) entail movement of limbs in opposite directions, while others (e.g. pushing) entail movement of limbs in the same direction. However, the reason for implementing a preference for symmetrical limb coordination is not to produce a biologically realistic model of motor control but to provide a systematic rationale for associating different actions with a graded distribution of fitness values. The preference for symmetrical limb coordination is implemented in a manner analogous to that of the first rule. Of particular relevance to the current investigation, if multi-step actions involving one limb moving sequentially one direction and then the other are beneficial, the probability of inventing such actions increases. In summary, each action is associated with a measure of its effectiveness, and generalizations about what seems to work and what does not are translated into guidelines for what action to take. Evaluation Before committing to implementing an idea as an action, agents can assess how successful the action would be if it were implemented. They evaluate the effectiveness of their actions according to how well they satisfy needs using a pre-defined equation that rewards actions that make use of trends detected by the SYMMETRY, MOVEMENT, and OPPOSITE hidden nodes. A successful action is one in which all body parts except the head are moving, and limb movement is asymmetrical. (Thus if the left arm is moving up, the right arm is moving down, and vice versa.) For the experiments reported here with chaining turned off, where total body movement, m, is calculated by adding the number of active body parts, and mh is head movement, the fitness, Fnc, is calculated as follows: sa = 1 if arms are moving symmetrically; 0 otherwise sl = 1 if legs are moving symmetrically; 0 otherwise mh = 1 if head is stationary; 0 otherwise Fnc = m+ 1.5(sa+ sl) + 2(1 -- mh) This gives a fitness function with a maximum value of ten, because while movement of the head contributes positively to the first term (which represents overall movement) it contributes negatively to the third term (which represents head stability). This corresponds to a relatively realistic action with respect to the need to attract the attention of, and maintain eye contact with others including a potential mate. Since there are two optimal movements for the hips, one optimal movement for the head (or in this case, a lack of movement), two optimal arm combinations, and two optimal leg combinations, there are eight different optimal actions. In previous versions of the program that did not allow for chained actions, once an agent converged on one of the eight optimal actions (out of the possible 729 actions), it implemented that action for the rest of the run. Therefore, once all agents had found one or another of the optimal actions, the mean fitness of actions across the society plateaus, and the set of implemented actions became fixed. Chaining Chaining, which is new to this version of the program, gives agents the opportunity to execute multi-step actions. For the experiments reported here with chaining turned on, if in the first step of an action an agent was moving at least one of its arms, it executes a second step, which again involves up to six body parts. If, in the first step, the agent moved one arm in one direction, and in the second step it 4 moved the same arm in the opposite direction, it has the opportunity to execute a three-step action. And so on. The agent is allowed to execute an arbitrarily long action so long as it continues to move the same arm in the opposite direction to the direction it moved previously. Once it does not do so, the chained action comes to an end. The longer it moves, the higher the fitness of this multi-step chained action. Where n is the number of chained actions, the fitness, Fc, is calculated as follows: implemented Fc = Fnc+ (n -- 1) The fitness function with chaining provides a simple means of simulating the capacity for recursive recall. We omit a detailed explanation of EVOC options that were not used in the experiments reported here, such as broadcasting, which allows the action of a leader to be visible to not just immediate neighbors, but all agents, thereby simulating the effects of media (Gabora, 2008a,b; Leijnen & Gabora, 2010). A TYPICAL RUN Each iteration, every agent has the opportunity to (1) acquire an idea for a new action, either by imitation, copying a neighbor, or by invention, creating one anew, (2) update the knowledge-based operators, and (3) implement a new action. To invent a new idea, for each node of the idea currently represented on the input/output layer of the neural network, the agent makes a probabilistic decision as to whether change will take place, and if it does, the direction of change is stochastically biased by the knowledge-based operators. If the new idea has a higher fitness than the currently learns and implements the action specified by that idea. To acquire an idea through imitation, an agent randomly chooses one of its neighbors, and evaluates the fitness of the action the neighbor is implementing. If its own action is fitter than that of the neighbor, it chooses another neighbor, until it has either observed all of its immediate neighbors, or found one with a fitter action. If no fitter action is found, the agent does nothing. Otherwise, the neighbor's action is copied to the input layer, learned, and implemented. Fitness of actions starts out low because initially all agents are immobile. Soon some agent invents an action that has a higher fitness than doing nothing, and this action gets imitated, so fitness increases. Fitness increases further as other ideas get invented, assessed, implemented as actions, and spread through imitation. The diversity of actions initially increases due to the proliferation of new ideas, and then decreases as agents hone in on the fittest actions. THE GRAPHIC USER INTERFACE The graphic user interface (GUI) makes use of the open source charting project, JFreeChart, enabling variables to be user defined at run time, and results to become visible as the program runs. The topmost output panel, shown in Figure 2, is provided to give the reader a sense of how the program works. idea, the agent EXPERIMENTS In previous versions of EVOC, that did not allow chaining, there were only a fixed number of possible actions, and once all agents converged on optimal actions, cultural change ground to a halt. We hypothesized that if agents were able to chain actions together to form arbitrarily long actions, fitness would not stop increasing, and the agents would not converge on the same fixed set of actions. For these experiments the artificial world was a toroidal lattice with 100 nodes, each occupied by a single, stationary agent. We used a von Neumann neighborhood structure, (agents only interacted with their four adjacent neighbors). All graphs plot averages of ten runs, with an invention to imitation ratio of 1:1, and a rate of conceptual change of 1/6. this means approximately one body part movement per step of an action). All agents were stationary at the start of a run. there are six body parts (Since Figure 2. Output panel of GUI. At the upper left one specifies the Invention to Imitation Ratio. This is the probability that a given agent, on a given iteration, invents a new idea for an action, versus the probability that it imitates a neighbor's action. Below it is Rate of Conceptual Change, where one specifies the degree to which a newly invented idea differs from the one it was based on. Below that is Number of Agents, which allows the user to specify the size of the artificial society. Below that is where one specifies Number of Iterations, i.e. the duration of a run. Agents can be accessed individually by clicking the appropriate cell in the grid on the upper right. This enables one to see such details as the action currently implemented by that agent, or the fitness of that action. The graphs at the bottom plot the mean idea fitness and diversity of ideas. Tabs shown at the top give access to other output panels. Effect of Chaining on Fitness of Actions Figure 3 shows the results of comparing how the capacity to recursively chain actions together affects the mean fitness of actions across the artificial society over the duration of a run. 5 Figure 3. Mean fitness of actions in the artificial society with chaining versus without chaining. The capacity to chain together simple actions to form more complex ones increases the mean fitness of actions across the artificial society. This is most evident in the later phase of a run. Without chaining, agents converge on optimal actions, and the mean fitness of action reaches a plateau. With chaining, however, there is no ceiling on the mean fitness of actions. By the 100th iteration it reached almost 15, indicating a high incidence of chaining. Effect of Chaining on Diversity of Actions Figure 3 shows the results of comparing how the capacity to recursively chain actions together affects the mean fitness of actions across the artificial society over the duration of a run. Figure 4. Mean number of different actions in the artificial society with chaining (continuous line) versus without chaining (dashed line). Chaining also increases the diversity of actions. This is most evident in the early phase of a run before agents begin to converge on optimal actions, though it remains the case throughout the duration of a run. Interestingly, although in both cases there is convergence on optimal actions, without chained actions, this is a static set (thus mean fitness plateaus) whereas with chained actions the set of optimal actions is always changing, as increasingly fit actions are found (thus mean fitness keeps increasing). The Effect of Chaining on Learning Recall that agents have the capacity to learn trends from past experiences (using the knowledge-based operators), and thereby bias the generation of novelty in directions that have a greater than chance probability of being fruitful. Results obtained previously with this kind of computer model of cultural evolution showed that learning increases the mean fitness of actions throughout the duration of a run (Gabora, provides more opportunities to capitalize on the capacity to learn, we hypothesized that chaining would accentuate the impact of learning on the mean fitness of actions across the artificial society. Figure 5 compares the effect of chaining with knowledge-based operators turned on (agents are able to learn) versus when they are turned off (agents are unable to learn). chaining 1995). Since Figure 5. Mean fitness of actions in the artificial society with both chained actions and learning (top), with just chained actions (second from the top) with just learning (second from the bottom), and with neither chained actions nor learning (bottom). This hypothesis was confirmed. Since waving an arm back and forth increased activation of the OPPOSITE hidden node, agents learned to generate increasingly longer moves throughout the duration of a run. When agents are given the capacity to chain together simple actions to form more complex ones, the increase in mean fitness of actions throughout the duration of a run is more pronounced, indicating that the society as a whole benefits much more from learning. Discussion Many species possess what could be called culture, but human culture is unique in that ideas build on each other cumulatively; indeed culture is widely thought to be an evolutionary process (e.g. Bentley, Ormerod, & Batty, 2011; Cavalli-Sforza & Feldman, 1981; Gabora, 1996, 2008; Hartley, 2009;Mesoudi, Whiten & Laland, 2004, 2006; Whiten, Hinde, Laland, & Stringer, 2011). Using an agent based computer model of cultural evolution, we obtained support for the hypothesis that the onset of cumulative, open-ended cultural evolution can be attributed to the evolution of a self-triggered recall and rehearsal loop, enabling the recursive chaining of thoughts and actions. 6 the open-endedness of Our results suggest that it is the capacity for recursive recall that makes possible some computational models of language evolution (e.g. Kirby, 2001). Note that in the chaining versus no chaining conditions the size of the neural network is the same, but how it is used differs. This suggests that it was not larger brain size per se that initiated the onset of cumulative culture, but that larger brain size enabled episodes to be encoded in more detail, allowing more routes for reminding and recall, thereby facilitating the ability to recursively re- describe information stored in memory (Karmiloff-Smith, 1992), thereby tailor it to the situation at hand. By demonstrating that onset of the capacity for recursive recall constitutes a viable explanation for how cultural change became cumulative and open-ended, we believe that this research is a pivotal step forward in the development of a scientific theory of cultural evolution. Nevertheless, the model is simplified, and caution must be taken applying such results to the real world. The agents can be said to have the goal of optimizing the fitness of their actions, but they do not have values, norms, or social bonds remotely like ours. The goal behind a computational model such as EVOC, however, is to extract the skeleton of a process as complex as cultural evolution and investigate questions that are difficult to investigate by other means. To our knowledge, this is the only experimental test of, and tentative support for, the hypothesis that the capacity for self-triggered recall of thoughts and recursive execution of actions played a key role in ratcheting the kind of cumulative, open-ended novelty and cultural complexity that surrounds us. Despite that evolved cultural complexity essentially defines our humanness, we know of no other computational modeling support for this or any other competing hypothesis concerning how the transition from episodic to mimetic cognition came about. Future work will focus on simulating more complex forms of recursive recall that would require a larger neural network, and corroborating findings obtained with the model with archaeological and anthropological evidence. Another direction of future research involves using EVOC to investigate competing hypotheses concerning what cognitive mechanism could have given rise to the explosive cultural transition in the Middle-Upper Paleolithic (Klein, 1999; Leaky, 1984). ACKNOWLEDGMENTS We would like to acknowledge grants to the first author from the Social Sciences and Humanities Research Council of Canada and the Concerted Research Program of the Fund for Scientific Research, Belgium. REFERENCES 1. Aiello, L. C. Hominine pre-adaptations for language and cognition. In P. Mellars & K. Gibson (Eds.), Modeling the early human mind, Cambridge, UK: McDonald Institute Monographs (1996), 89 -- 99. 2. Barkow, J. H., Cosmides, L., & Tooby, J., Eds. The Adapted Mind: Evolutionary Psychology and the Generation of Culture. New York: Oxford University Press, 1992. 3. Bentley, R. A., Ormerod, P., & Batty, M. Evolving social influence in large populations. Behavioral Ecology and Sociobiology, 65 (2011), 537 -- 546. 4. Best, M. How culture can guide evolution: An inquiry into gene/meme enhancement and opposition. Adaptive Behavior, 7, 3 (1999), 289 -- 293. 5. Best, M. Adaptive value within natural language discourse. Interaction Studies, 7, 1(2006), 1-15. 6. Buller, D. J. Adapting minds. Cambridge, MA: MIT Press, 2005. 7. Buss, D. M. Evolutionary Psychology: The New Science of the Mind. Boston, MA: Pearson, 1999/2004. 8. Byrne, R. W., & Russon, A. E. Learning by imitation: A hierarchical approach. Behavioral and Brain Sciences, 21(1998), 667 -- 721. 9. Cavalli-Sforza, L. L., & Feldman, M. W. Cultural transmission and evolution: A quantitative approach. Princeton: Princeton University Press, 1981. 10. Cloak, F. T. Jr. Is a cultural ethology possible? Human Ecology, 3(1975), 161-182. 11. Donald, M. Hominid enculturation and cognitive evolution. In C. Renfrew & C. Scarre (Eds.), Cognition and Material Culture: The Archaeology of Symbolic Storage. McDonald Institute Monographs (1998), 7 -- 17. 12. Donald, M. Origins of the Modern Mind: Three Stages in the Evolution of Culture and Cognition. Cambridge, MA: Harvard University Press, 1991. 13. Dugatkin, L. A. Imitation Factor: Imitation in Animals and the Origin of Human Culture. New York: Free Press, 2001. 14. Gabora, L. A computer model of the evolution of culture. In R. Brooks & P. Maes (Eds.) Proceedings of the 4th International Conference on Artificial Life, July 4-6,Boston, MA, 1994. 15. Gabora, L. Meme and Variations: A computer model of cultural evolution. In L. Nadel & D. Stein (Eds.) 1993 Lectures in Complex Systems. Reading, MA: Addison- Wesley (1995), 471−486. 16. Gabora, L. A day in the life of a meme. Philosophica, 57, (1996), 901-938. 17. Gabora, L. EVOC: A computer model of cultural evolution. In V. Sloutsky, B. Love & K. McRae (Eds.), Proceedings of the 30th Annual Meeting of the Cognitive Science Society, Sheridan Publishing (2008a), 1466-1471. 18. Gabora, L. Modeling cultural dynamics. In Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI) Fall Symposium 1: Adaptive Agents in a Cultural Context, Menlo Park, CA: AAAI Press (2008b), 18-25. 7 19. Gabora, L., Leijnen, S., & von Ghyczy, T. The relationship between creativity, imitation, and cultural diversity. International Journal of Software and Informatics, (in press). 20. Hartley, J. From cultural studies to cultural science. Cult. Science, 2 (2009), 1-16. 21. Higgs, P. G. The mimetic transition: a simulation study of the evolution of learning by imitation. Proceedings of the Royal Society B: Biological Sciences, 267, 1450(2000), 1355 -- 1361. 22. Heyes, C. M. Theory of mind in nonhuman primates. Behavioral and Brain Sciences, 211(1998), 104 -- 134. 23. Hinton, G. E. & Nowlan, S. J. How learning can guide evolution. Complex Systems, 1(1987), 495 -- 502. 24. Holland, J. K. Adaptation in Natural and Artificial Systems. Ann Arbor, MI: University of Michigan Press, 1975. 25. Hutchins, E. & Hazelhurst, B. Learning in the cultural process. In Langton, C., Taylor, J., Farmer, D., &Rasmussen, S. (Eds.) Artificial Life II. Redwood City, CA: Addison-Wesley, 1991. 26. Kirby, S. Spontaneous evolution of linguistic Structure -- An iterated learning model of the emergence of regularity and irregularity. IEEE Transactions on Evolutionary Computation, 5, 2(2001), 102-110. 27. Leijnen, S., & Gabora, L. How creative should creators be to optimize the evolution of ideas? A computational model. Electronic Proceedings in Theoretical Computer Science, 9(2009), 108-119. 28. Mesoudi, A., Whiten, A., & Laland, K. Toward a unified science of cultural evolution. Evolution 58, 1(2004), 1-11. 29. Mesoudi, A., Whiten, A., & Laland, K. Toward a unified science of cultural evolution. Behavioral and Brain Sciences, 29(2006), 329-383. 30. Mithen, S. (Ed.). Creativity in Human Evolution and Prehistory. London, UK: Routledge, 1998. 31. Ruff, C., Trinkaus, E., & Holliday, T. Body mass and encephalization in Pleistocene Homo. Nature, 387 (1997), 173 -- 176. 32. Tomasello, M., Kruger, A. C., & Ratner, H. H. Cultural learning. Behavioral and Brain Sciences, 16(1993), 495 -- 552. 33. Wexler, B. Brain and Culture: Neurobiology, Ideology and Social Change. New York: Bradford Books, 2006. 34. Whiten, A., Hinde, R. A., Laland, K. N., Stringer, C. B. Culture evolves. Philosophical Transactions of the Royal Society B, 366(2011), 938 -- 948. 8
1905.09795
1
1905
2019-05-23T17:38:20
Nature-Inspired Computational Model of Population Desegregation under Group Leaders Influence
[ "cs.MA", "cs.SI" ]
This paper presents an agent-based model of population desegregation and provides a thorough analysis of the social behavior leading to it, namely, the contact hypothesis. Based on the parameters of frequency and intensity of influence of group leaders on the population, the proposed model is constituted by two layers: 1) a physical layer of the population that is influenced by and 2) a virtual layer of group leaders. The model of negotiation and survival of group leaders are governed by the nature-inspired evolutionary process of queen ants, also known as Foundress Dilemma. The motivation of using a virtual grouping concept (instead of taking a subset of population as the group leaders) is to stay focused on finding the conditions leading individuals in a society tolerating a significantly diversified (desegregated) neighborhood, rather than, indulging into complex details, which would be more relevant to studies targeting the evolution of societal group and leaders. A geographic information system-driven simulation is performed, which reveals that: 1) desegregation is directly proportional to the frequency of group leaders' contact with the population and 2) mostly, it remains ineffective with an increase in the intensity of group leaders' contact with the population. The mechanism of group selection (the conflict resolution model resolving the Foundress Dilemma) reveals an exciting result concerning negative influence of cooperative group leaders. Most of the time, desegregation decreases with increase in cooperative leaders (the leaders enforcing desegregation) when compared with fierce leaders (the leaders enforcing segregation).
cs.MA
cs
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 1 Nature-Inspired Computational Model of Population Desegregation under Group Leaders Influence Kashif Zia, Dinesh Kumar Saini, Arshad Muhammad, and Alois Ferscha Member, IEEE 9 1 0 2 y a M 3 2 ] A M . s c [ 1 v 5 9 7 9 0 . 5 0 9 1 : v i X r a Abstract -- This paper presents an agent-based model of popula- tion desegregation and provides a thorough analysis of the social behavior leading to it, namely the contact hypothesis. Based on the parameters of frequency and intensity of influence of group leaders on the population, the proposed model is constituted by two layers: (i) a physical layer of the population that is influenced by (ii) a virtual layer of group leaders. The model of negotiation and survival of group leaders is governed by the nature-inspired evolutionary process of queen ants, also known as Foundress Dilemma. The motivation of using a virtual grouping concept (instead of taking a subset of population as the group leaders) is to stay focused on finding the conditions leading individuals in a society tolerating a significantly diversified (desegregated) neighborhood, rather than, indulging into complex details, which would be more relevant to studies targeting the evolution of societal group and leaders. A GIS-driven simulation is performed, which reveals that (i) desegregation is directly proportional to the frequency of group leaders' contact with the population, and (ii) mostly, it remains ineffective with an increase in the intensity of group leaders' contact with the population. The mechanism of group selection (the conflict resolution model resolving the Foundress Dilemma) reveals an exciting result concerning negative influence of cooperative group leaders. Most of the time, desegregation decreases with increase in cooperative leaders (the leaders enforcing desegregation) when compared with fierce leaders (the leaders enforcing segregation). Index Terms -- Population Segregation, Desegregation, Agent- based Model, Foundress Dilemma, Group Selection. I. INTRODUCTION According to Oxford dictionary, segregation is defined as "the action or state of setting someone or something apart from others". Historically, segregation is connected with the dynam- ics of biological, and more specifically human population. For a human population, segregation is a progressive outcome of population demography as a result of discriminatory settlement behavior of the individuals [1]. The discrimination is based on some bias, such as sex, race or color that influences people decision of where to live. It has been observed that such individualistic decisions have shaped the demographics of cities, sometimes resulting in exceptionally segregated settlements [2]. Settlements having extreme segregation are sometimes not desirable. For example, the countries that have experienced racial abuse and ethnic wars desire desegregation (anti-segregation) in its population [3]. Brewer [4] defined desegregation as: "extended contact between previously iso- lated social groups that are brought on either by acute or K. Zia is with the Faculty of Computing and Information Technology, Sohar University, Oman e-mail: [email protected]. D.K. Saini, and A. Muhammad are with the Faculty of Computing and Information Technology, Sohar University, Oman. Alois Ferscha is with the Institute of Pervasive Computing, Johannes Kepler University, Linz, Austria. Manuscript received April 19, 2005; revised August 26, 2015. gradual processes of change". However, this change cannot be brought about through legislation and laws [5]. It is established from the experience that such a change is inseparable without people themselves realize change [6] [7]. Human societies evolve with time may be due to the intention of people to mix-up and desegregate. Standard processes of evolution are randomness, agency, organization, and contingency [8]. Agent- based Modeling (ABM) provides an ideal platform to model and configure these processes [9], thus acting as an enabler not only to observe the evolutionary process itself but also, find answers of the interesting "what-if" questions. A model, whether agent-based or not is always based on a foundation. For social phenomena, such as segregation (desegregation), this can be based on a theory or empirical evidence. Since empirical evidence of individualistic behavior in the population is difficult to get and synthesize towards a population-level dynamics, the theory-driven foundations are often more appropriate. However, theories are intrinsically contradictory. Computer simulation provides means to evaluate the contradictory theories relating to the same phenomena and specify conditions in which one theory is applicable, while others are not. The rapidly growing field of Computational Social Science (CSS) [10] [11] is about understanding a society using the computer simulation. More recent tools, such as Cellular Au- tomata (CA) (from physics and mathematics), and Distributed Artificial Intelligence and agent technology (from computer science) have influenced this growth positively [12]. Due to its nature, the social simulation should be a theory-driven system with a focus on the explanation of the phenomena of interest (rather than the desire for specific outcomes) [13]. The novelty of social simulation is based on the observation that an over- whelmingly complex behavior emerges from relatively simple local activities [14]. ABM is a popular modeling technique used by CSS researchers due to its ability to reproduce the societal effects purely based on interactions at the local level [15]. CSS has a long history and a strong underpinning on the social theories. Schelling's seminal computational model of the population segregation [1] has been a reference point for diverse re- search streams [16], such as, population dynamics and land use [17] -- [21], social interaction dynamics [22], social and psychological behavior studies [23] [24], and business and market analysis [16]. Shelling's model suggests that even if the majority of people are not biased and tolerate a neighborhood (locality), which is not exactly of their liking, segregation is still a possibility on a global scale. More specifically, Schelling's model is successful in demonstrating that a predominantly tolerant population may also generate a JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 2 segregated settlement, thus, validating that what emerges at a global level may not be a true representation of the local parts. The strength of otherwise a basic neighborhood-based model was vested in agents' strict localized decisions producing an unexpected outcome at the population level. Schelling's model, therefore, was one of the first experimental evidence for the emergence of totally unpredictable global behavior, which was contradictory to the local rules producing it. Due to this reason, Schelling's model is often used to demonstrate the strengths of an agent-based modeling paradigm; a modeling technique specifically developed to analyze these situations. To model a socially-inspired model of desegregation, it is important to understand the human behavior and the social processes involved. Norman S. Miller and Marilynn B. Brewer defined a relevant hypothesis, that is the contact hypothesis as: "the idea that prejudice and hostility between members of segregated groups can be reduced by promoting the fre- quency and intensity of intergroup contact" [25]. However, there are other theories, which entirely contradict this theory. For example, it is also claimed in [26] that "contact tends to reproduce, rather than challenge, the inequitable racial structure." With the help of the model presented in this paper, the conditions in which the contact hypothesis is applicable are evidenced. Consequently, the conditions in which the contact hypothesis is not applicable are also evidenced, thus, favoring the contradictory hypothesis [26]. However, the modality/medium of intergroup contact is hard to resolve. There are numerous factors that can be considered, such as, group boundaries, the scope of influence, relative activism within a group, and the cognitive traits that would be responsible for bringing the change. This could lead to a complex mechanism of defining and evaluating the outcome of intergroup contact. However, in fact, the outcome of intergroup contact influences an individual in a population towards two possible states of minds; appreciation for the societal good (cooperation) or not (defection); provides the much-needed ground for simplification. Therefore, for the purpose of the model presented in this paper, the responsibility of intergroup contact is taken away from the real population and assigned to the artificial society of leaders. It is motivated by the argument that contact itself (without any external anti-segregation im- pact) is not enough to change the racial structure as suggested in [26]. This means that leaders' influence the population to segregate or desegregate based on their type. In this way, the notions of intensity and frequency of intergroup contact are equally replicated as intensity and frequency of leaders' influence on the population. Hence, the proposed model is based on two layers: a physical layer of real population of agents, which is influ- enced by a virtual layer of group leaders. The periodicity and intensity of the influence exerted by group leaders onto the real population transform it into a settlement, which is segregated or otherwise. Since the real population only decides to segregate or not to segregate, a simple model motivated by Schelling's computational model of segregation is sufficient [1]. If under this model, an agent does not make a move, even though a majority of its neighbors are not of its kind, it practically acts in favor of desegregation. The model of virtual layer's influence is then the model of interest and termed as the model of leaders influence. The model of leaders influence on the agents is partially based on the contact hypothesis [25]. How much these leaders influence the behavior of agents depends on the attributes related to the leaders, such as (i) capabilities, (ii) relationship, (iii) environment, and (iv) strategies of conflict-resolution (group dynamics). The capabilities are defined by frequency and intensity of interaction [25] of the leaders with the agents. The relationship between leaders and agents is realized by the presence and proximity constraints, which are in turn depen- dent on the density of leaders population (an agent must have one or more leaders in its proximity to get itself influenced). It is notable that the relationship constraints of the environment restrain the capabilities of the leaders. For this paper, the environment is spatial in nature. A CA based environment is used to define the interlayer relationship thus mechanizing the capabilities of interaction between leaders and agents. For other types of environments, this relationship would have been different. For example, if leaders are operating through social networks or mass media, their interaction mode and influence would have been connectivity and availability rather than proximity and presence. Lastly, the strategies of grouping and conflict resolution between the leaders are also modeled. A nature-inspired model of grouping, survival, and influence is used. Nature- inspired models provide basic mechanisms of inter-organism interaction leading to mutual survival, role assignment and cooperative problem-solving. For the model proposed in this paper, it makes modeling of leaders straight-forward in terms of: (i) interaction pattern and influence, (ii) relationship and dependability, and (iii) strategies of conflict-resolution. The process of negotiation and survival of the leaders is governed by the nature-inspired evolutionary model of queen ants be- havior termed as Foundress Dilemma. To the best of our knowledge, the model of such complexity and coverage is not reported previously. The rest of the paper is organized as follows. In section II, a review of related work is given. Section III presents an overview of the models. In section IV, a detailed description of agent-based models is given. Section V explains the simulation experiments and the analysis of the simulation results, followed by conclusions of the paper in section VI. II. RELATED WORK Nature-inspired computing is a computing paradigm in- spired by self-organizational behavior in naturally-appearing complex systems [28]. Originating from the contemporary ant colony [29], and particle swarm [30] optimization algorithms, more unusual behaviors have been studied more recently [31]. These include firefly [32], bat [33], and cuckoo search [34] algorithms. Nigel Gilbert and Klaus G. Troitzsch in their book proposed various social science computational models and simulation methods, which are helpful to understand the society [15]. Axelrod is one of the pioneers, who used an evolutionary approach to describe societal norms focusing on the stability and emergence [35]. A more general discussion on evolution- ary algorithms to understand the social processes as a whole JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 3 Fig. 1. A schematic representation of integrated model. The process of segregation works under the combined effect of the neighborhood of an agent and the influence exerted by the leaders. Formation of nests of leaders is governed by a model motivated from Foundress dilemma [27]. Each generation of leaders is placed on the map independent of previous placements (this guarantees influence distribution all across the agent population). The frequency of leaders' influence relates to how often they reproduce to produce new generations, whereas, the intensity of leaders' influence relates to how fierce they are (e.g. leader in Nest 2 is more fierce than other leaders, indicated by increased size). is given by Chattoe-Brown, et al. [36]. Similarly, Kenneth A. De Jong presented various dimensions of evolutionary computation in his book, which helps to understand the nature- and bio-inspired models of population behavior [37]. Cioffi, De Jong and Bassett in their paper described biologically- inspired approaches to understand complex social systems [38]. Their work is seminal, because it presents a combined approach of evolutionary approaches used with the agent- based modeling. An overview of altruism, cooperation, mutualism, strong reciprocity, and group selection in the social settings is pro- vided by West, et al. [39]. A framework for achieving group level goals with the formation of agents' coalitions is presented by Axtell [40]. Modeling and simulation work on segregation is widely available [41] -- [43]. Romans Pancs, and Nicolaas J Vriend [44] have adapted Schelling's segregation model to have a strict preference in favor of integration (desegregation). They found that even in such case, the best response dynamics leads to the segregation at a global level. Similar results are also presented by Junfu Zhang [45]. These are interesting results highlighting that population on its own cannot settle for desegregation; it requires external factors. Mostly, work on the population desegregation is primarily of empirical nature. For example, Smets, et al. [46] demon- strated the difficulty in quantifying the population behavior in varying degree of possible contacts. Sahasranaman studied evolutionary dynamics of neighborhood economic status in the cities, which also have a great impact on the desegregation of people in big cities [8]. Hatna, Erez and Besnion studied the Schelling model of ethnic residential dynamics, and their findings suggest an integrated-segregated dichotomy of the patterns in population behavior. Miles Hewstone and Alberto Voci [47] have studied the effectiveness of intergroup contact in reducing prejudice in a society. Contrarily, Jeffrey S Denis [26] concluded that "contact tends to reproduce, rather than challenge, the inequitable racial structure". It is contrary to the expected outcome (desegregation), when applying the contact theory [25]. Nevertheless, this is again an empirical study without involving any computational model. In this paper, the external driving factor for desegregation is an overlay virtual population representing the influence factors from the leaders. The grouping dynamics of these leaders is mediated by nature-inspired ant queen behavior [27]. Queen ants perform nests management following evolutionary mech- anism of group selection, which is essential for the survival of the entire population. Hence, using such mechanism to analyze population dynamics (including segregation / desegregation) is natural. Despite its relevance, to the best of our knowledge, no such work exists in the literature. This work is an effort to address this gap. III. MODEL OVERVIEW The model of population segregation is simple, motivated by Shelling's original publication [1]. Agents representing human population are of two ethnic types; expat and native. An agent has a desire to segregate if the majority of the agents in its neighborhood are not of its type. This contemporary model of segregation is extended to include the influence of leaders in the decision-making of the agents. Hence, an agent would only be happy, if it is happy with its surrounding as well as its compatibility with the type of influence exerted by the leaders in its surrounding. The model of leaders influence is motivated from [27] and assumes the presence of cognitive leaders (leaders influencing the opinion of the real population JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 4 it to segregate or otherwise). These leaders are virtual because they are not part of the real population. The leaders' behavior is motivated by ant queens' behavior reported in [27], briefly described in the following. Ants live in colonies. When young queens reach the age of reproduction, they leave their nest, and try to build their own nest; is a very challenging task for a queen. In many species of the ants, the queens are predominately fierce. They fight with other queens and independently build their colony. However, in some species of the ants, the queens, also of being fierce, are also cooperative and may live in a nest together. In this situation, one of them becomes a leader of the group and performs the duty of reproduction; while others sacrifice their natural instinct of reproduction in favor of the leader queen. In fact, it increases their chances of survival collectively, while adhering to the evolutionary phenomena of group selection. While involved in the process of group selection, the choice to fight or cooperate is defined as Foundress Dilemma [27]. Motivated from above, there are two types of leaders in the proposed model. Cooperative leaders are those, who promote a sense of cooperation (possibly leading to desegregation). Fierce leaders are those who promote a sense of non-cooperation (possibly leading to segregation). The Fierce leaders always fight with the cooperative leaders. The fierce leaders may fight with each other if one or both of them are fierce beyond a threshold. The model of leaders influence is comprised of five sequen- tial steps; named as reproduction, clustering, fighting, group competition, and influencing (the details are given in section IV). The agent-based model combines the grouping behavior, the dynamics of interaction of the group leaders and the real population, and neighborhood based segregation mechanism; with an underpinning on the environmental constraints. A schematic representation of the overall model is given in Fig. 1. As the population under the influence of a nest (or a leader) is mere of physical nature (agents in influence range of a leader), the outcome (the desegregation index) is entirely depended on the presence, evolution, frequency, and intensity of the influence. This helps to understand the conditions lead- ing to the population desegregation in terms of (i) spread of (de)segregation effort (relative number of cooperative vs. fierce leaders), (ii) evolving leaders' populations and distribution, (iii) intensity of (de)segregation effort (level of fierceness of fierce leaders), and (iv) the frequency of (de)segregation effort (speed of reproduction in the evolutionary process). IV. AGENT-BASED MODEL The agent-based model proposed in this paper models grouping dynamics, and interaction of the group leaders and the real population with an underpinning on the environmental constraints. Under these settings, the capabilities of group leaders (in terms of frequency and intensity of interaction) towards the agent's decision to stay or leave a place are evaluated. A. Simulation Space Both, the model of segregation and the model of leaders influence are simulated on the real map. The GIS maps of Fig. 2. Setting up a population of 5000 agents on the map of Sohar city. Agents in blue are expats and agents in red are natives. Two regions, one colored in red and the other colored in blue show the population of these regions segregated enough (segregation is more than segregation threshold of 40%) in favor of natives and expats, respectively. the city are converted into a CA-based structure. Each cell in the CA World belongs to a region/locality of the city. Each region of the city has a population, which is assigned an initial value equal to a fraction of (dependent on the area of the region) total agent population. Each member of this population represents a household and exists as an agent occupying a cell in the corresponding region. The type of each generated agent is set to either "expat" or "native", randomly. A region's regionType can also be one of "expat" or "native", if region's agent population is segregated enough (defined by prescribed segregation threshold), otherwise it would be "neutral". A setup representing these parameters is shown in Fig. 2. B. Model of Segregation An agent has a desire to segregate if the majority of agents in its neighborhood are not of its type. The definition of majority is based on the parameter PDTU (abbreviation for percentage difference to be unhappy). If an agent has the ratio of agents in its neighborhood not of its own type greater than PDTU, it becomes "unhappy" and try to move somewhere else. Otherwise, it is "happy" and remains where it is. An unhappy agent will move to a region whose regionType is equal to its own type or "neutral". Fig. 3 shows population after segregation model is applied with the parameters: agent population = 5000, segregation threshold = 60%, and PDTU = 40%. It is worth noting that the extension of segregation model so that it also incorporates the leaders' influence is given later in the sub-section "integrated model". JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 5 in isolation; there would be no clustering. Clusters act as nests, ready for consolidation and inducing influence on agent population. A scenario describing clustering is exhibited in Fig. 4. Individual Fight In a nest, the fight between the leaders to claim the nest would initiate after reproduction and clustering. A fierce leader would initiate a fight if prob init fight is greater than a random floating point number. For example, if the value of prob init fight is 0.5, there is an equal probability of fierce leader to initiate a fight or otherwise. If the fierce leader is set to initiate a fight, it will fight if there are more leaders in its nest. If the randomly chosen leader by the initiator is of type fierce as well, the probability for both of them winning the fight is equal. The leader losing the fight will die. If a fierce leader is imposing a fight on the cooperative leader, the probability of fierce leader dying is 60%, whereas, the probability of cooperative leader dying is 40%. All leaders in a nest perform the mechanism stated above until all other leaders have expired their turn or the leaders remaining are only cooperative, or there is no other leader (all died as a result of the fight). Group Competition The fights in the nests would follow group competition. If two nests are close enough (identified by radius competition), the survival function surv function from Bartz and Hoelldobler [48] would determine survival chances of the nest, which corresponds to the number of leaders living together in a nest. As a result of this competition, one of the nests (having chances of survival less than the other) would be destroyed along with the leaders in it. The cell representing a nest would first be assigned a value for the survival function surv function, calculated as [48]: surv function = −2.88+4.28×nest pop−0.377×nest pop2 (1) where nest pop is the number of leaders living together in a nest. Out of two competing nest, a nest having greater value of surv function would survive. Influence The last step how a nest of leaders would influence the population of agents. All the nests would generate an infec- tious pheromone in an infection range around them, which is the product of nest pop and radius competition. The infection type is one of the randomly chosen leaders in the nest. A cell under this influence range would update its infected with value with the type of influence that this nest has: "cooperation", "non-cooperation", or "null" (if not in infection range of any of the nest). D. Integrated Model Altogether, the conditions describing the state of an agent (being "happy" or "unhappy") in the context of segregation, not only depend on the population type in the neighborhood, Fig. 3. Population segregation after equilibrium is achieved at iteration 25. Some regions have attained segregation threshold (region as a whole having regionType "expat" [in blue] or "native" [in red]) while many regions are still below segregation threshold (with Type "neutral"). Even regions of regionType "neutral" achieve local segregation. C. Model of leaders Influence A small fraction of cooperative leaders are initially dispersed randomly across the map. Remaining are fierce leaders. These leaders are continuously created, and destroyed in each generation, hence evolving with time. Consequently, the model of segregation gets augmented to incorporate the influence induced by this model. The model of leaders influence operates in five sequential steps, described in the following. Reproduce At the start of each five-step execution cycle, all the co- operative, and fierce leaders reproduce themselves depending on the previous generation. The population of leaders in each generation is same, but the relation between the cooperative and fierce leaders may change due to mutation. A minimal mutation index equal to 0.01 would guarantee a change in the population distribution of leaders during evolution. Cluster After reproduction, the leaders if close enough (identified by cluster radius) would cluster, i.e. moving right adjacent (overlapped) to each other irrespective of their type. Hence, several nests would be formed, where each nest may contain more than one leaders of different types. During clustering, all leaders would choose a single cell in a specified range to cluster. Each leader on its turn chooses a cell in cluster radius, which has the maximum number of leaders placed on it and moves into that cell. If there are more than one options available, the leader can choose a cell randomly. If there is no such cell, the leader is placed JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 6 Fig. 4. Clustering of leaders. (a) A section of map with leaders (ant shape agents) placed randomly. (b) leaders cluster together creating nest (three of them are visible). (c) A closer view of one of the nest (the one on the right in (b)), with one cooperative and one fierce leader clustered. but also, the aura of influence induced into the cellular space around it. The index of interest, the Desegregation Index is calculated as follows. Each agent in the population calculates its own individual index of desegregation (IID), which is the ratio of the number of individuals NOT of its type, and the total number of neighbors in its neighborhood (8 adjacent cells of Moore's neighborhood [49]). For example, if an individual is of type "expat" and if 3 out of 5 of its neighbors are also expats, the value of IID would be equal to 0.4 (40% desegregation). Alternatively, if 2 out of 5 of its neighbors are also expats, the value of IID would be equal to 0.6 (60% desegregation). Such an agent will be happy in the second case given that PDTU is 50%. IID is combined with nest influence to evaluate the state of happiness of an agent X. That is: X = "happy(cid:48)(cid:48) "unhappy(cid:48)(cid:48) if cond1 is true if cond2 is true (2) (cid:40) where cond1 is true when IID >= PDTU AND infected with c = "cooperation" OR "null". This states the combined condition in which X's IID is high enough to suppress unhappiness and also, the nest influence supports desegregation ("cooperation") or there is no influence ("null" for no influencing nest in the surrounding); cond2 is true otherwise. V. SIMULATION AND RESULT ANALYSIS For simulation, Netlogo [50], a CA-based agent-based mod- eling tool is used. The simulation is executed for a real city (Sohar, Oman) using its GIS map. Several important cases across multiple settings of simulation parameters are analyzed. Parameters used in the simulation are as follows: • NOL: number of leaders constituting the virtual layer. The values are 25 and 50. • FC: fraction of leaders of type cooperative in the entire population of leaders (NOL). The values are 0.1, 0.2, and 0.5. • IR: leaders' influence rate, which represents how fre- quently leaders are influencing the population concerning TABLE I DESEGREGATION INDEX IR 5 25 50 FC 0.1 0.2 0.5 0.1 0.2 0.5 0.1 0.2 0.5 PIF=0.1 0.1287 0.1316 0.1172 0.0441 0.0441 0.0385 0.0432 0.0405 0.0402 NOL=25 PIF=0.2 0.1240 0.1199 0.1129 0.0458 0.0409 0.0385 0.0451 0.0353 0.0366 PIF=0.5 0.1156 0.1061 0.1008 0.0424 0.0369 0.0318 0.0394 0.0390 0.0349 PIF=0.1 0.1917 0.1908 0.1679 0.0631 0.0678 0.0531 0.0633 0.0636 0.0509 NOL=50 PIF=0.2 0.1701 0.1726 0.1595 0.0669 0.0569 0.0521 0.0521 0.0550 0.0509 PIF=0.5 0.1594 0.1611 0.1172 0.0536 0.0453 0.0469 0.0469 0.0532 0.0472 NOL = Number of Leaders PIF = Probability of Initiating Fight IR = Leader Influence Rate FC = Fraction of Cooperation in the population. TABLE II HAPPINESS INDEX IR 5 25 50 FC 0.1 0.2 0.5 0.1 0.2 0.5 0.1 0.2 0.5 PIF=0.1 0.6663 0.6936 0.6936 0.8925 0.8916 0.9063 0.8937 0.9017 0.9026 NOL=25 PIF=0.2 0.6774 0.6882 0.7065 0.8887 0.9003 0.9063 0.8891 0.9148 0.9112 PIF=0.5 0.7018 0.7245 0.7363 0.8958 0.9110 0.9216 0.9021 0.9058 0.9153 PIF=0.1 0.5006 0.5033 0.5638 0.8512 0.8423 0.8768 0.8520 0.8519 0.8823 NOL=50 PIF=0.2 0.5585 0.5553 0.5879 0.8414 0.8683 0.8808 0.8808 0.8698 0.8820 PIF=0.5 0.5869 0.5841 0.6901 0.8747 0.8956 0.8921 0.8921 0.8742 0.8894 NOL = Number of Leaders PIF = Probability of Initiating Fight IR = Leader Influence Rate FC = Fraction of Cooperation in the population. simulation time lag. Values are every 5th, 25th and 50th iteration. • PIF: probability of initiating the fight by a fierce leader, representing the intensity of influence of group leaders. Values are 10%, 20%, and 50%. The other parameters related to the model of influence are constants: • pmutation: mutation probability of each generation (set to 1%). • cluster-radius: radius of the cluster (set to 10 cells). JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 7 Fig. 5. Average Desegregation Index of Simulation runs corresponding to TABLE I. NOL = Number of Leaders, PIF = Probability of Initiating Fight, IR = Leader Influence Rate, FC = Fraction of Cooperation in the population. Fig. 6. Average Happiness Index of Simulation runs corresponding to TABLE II. NOL = Number of Leaders, PIF = Probability of Initiating Fight, IR = Leader Influence Rate, FC = Fraction of Cooperation in the population. • radius-competition: the radius of the group competition (set to 50 cells). The constant parameters related to the model of segregation (desegregation) are: • population size: set to 5000 agents. • segregation threshold: set to 40%. • PDTU: difference in population types in the neighbor- hood of an agent (the -ve percentage that makes it unhappy). set to 40%. It is worth noting that scenarios representing different values for constants of ranges, population, and thresholds would entirely change the simulation results. Therefore, these values are kept constant, and only those, which give a consistent meaning to phenomena of interest are varied. Table I and Table II outline the simulation results. To calculate the global Desegregation Index, IID of all the agents is accumulated and divided by the total number of agents. Similarly, Happiness Index, which is inversely proportional to IID, is an accumulated global value of agent happiness as formulated in the equation 2. Consequently, with an increase in the desegregation index, the population as a whole is expected to be less happy. This is exemplified by the value of the index in case of the model of segregation applied alone. Without vir- tual leaders, and their influence, the index is equal to 0.0152. In fact, this represents that the population is segregated, and index of desegregation is 0.0152. It understandably makes overall population very happy with an index equal to 0.9568. Analyzing Table I, and the corresponding graphs in Fig. 5, it is evident that with an increase in the number of leaders, the Desegregation Index increases, the population gets desegregated. It is seen that with more frequency of influence dissemination, the population gets desegregated as well. Overall, with an increase in the intensity of the in- fluence, the value of desegregation decreases. It is because the fierce leaders kill cooperative leaders, thus decreasing the corresponding influence on the population. The maximum that is, JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 8 Fig. 7. Comparison of desegregation index against simulation iterations between FC = 0.1 and FC = 0.5. Specific case of NOL = 50, IR = 5 and PIF = 0.1. [NOL = Number of Leaders, PIF = Probability of Initiating Fight, IR = Leader Influence Rate, FC = Fraction of Cooperation in the population] Fig. 8. Effect of Leaders' influence on the population represented by simulation screenshot at iteration 30 (left) and 31 (right) in case NOL = 50, IR = 5, PIF = 0.1, FC = 0.1. [NOL = Number of Leaders, PIF = Probability of Initiating Fight, IR = Leader Influence Rate, FC = Fraction of Cooperation in the population] desegregation is achieved when the intensity of the influence as well as the fraction of cooperative leaders are minimal. Happiness Index corresponds to Desegregation Index, and all values are consistent as shown in Table II, and corresponding graphs in Fig. 6. The maximum desegregation equal to 0.1917 is achieved when N OL = 50, IR = 5, P IF = 0.1, and F C = 0.1. However, there is a difference of almost 15%, when F C = 0.1 with F C = 0.5 is compared. A closer look at this trend exhibited in the graph in Fig. 7. The graph shows a regular pattern. Overall, the level of desegregation is highest when a new phase of influence dissemination is started (after each five simulation iterations, in this case, i.e. IR = 5), and decreases continuously afterwards unless it reaches a new peak at the wake of a new influence dissemination phase. In each such phase, the index is higher when FC is less, which means more desegregation. It means that more cooperative leaders act negatively for the desegregation. It is an interesting result, which is justified using simulation screenshots given in Fig. 8 and Fig. 9. Fig. 8 (left) shows the arrangement of the agents at iteration 30, one iteration before the leaders assert their influence. It is JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 9 Fig. 9. Effect of Leaders' influence on the population represented by simulation screenshot at iteration 30 (left) and 31 (right) in case NOL = 50, IR = 5, PIF = 0.1, FC = 0.5. [NOL = Number of Leaders, PIF = Probability of Initiating Fight, IR = Leader Influence Rate, FC = Fraction of Cooperation in the population] Fig. 10. Comparison of desegregation index (left) and happiness index (right) between IR = 5 and IR = 25 in case NOL = 50, FC = 0.1, PIF = 0.5. [NOL = Number of Leaders, PIF = Probability of Initiating Fight, IR = Leader Influence Rate, FC = Fraction of Cooperation in the population] Fig. 11. Simulation screenshot at iteration 25, just before invocation of periodic influence cycle for IR = 5 (left) and IR = 25 (right) representing the importance of more periodic group influence for population desegregation, in case NOL = 50, PIF = 0.1, and FC = 0.1. [NOL = Number of Leaders, PIF = Probability of Initiating Fight, IR = Leader Influence Rate, FC = Fraction of Cooperation in the population] JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 10 evident that there are few cooperative leaders. Consequently, the population is quite segregated (except for some isolated islands where cooperative leaders can assert their influence). At iteration 31 (right), the population gets quite desegregated due to the refreshed influence of the leaders. However, it does not happen at the fringes of the city due to the absence of cooperative leaders. These screenshots represent situations when F C = 0.1. A similar analysis is done when F C = 0.5 as shown in Fig. 9. There is not much difference in arrangement of the agents at iteration 40 (left), one iteration before the leaders assert their influence. However, at iteration 41, the reach of leaders at the fringes of the city (due to more number) is evident.Hence, this strange outcome relates to demographic features of the population, not the comparative number of leaders, and their influence. Another interesting result is about comparing the desegre- gation and happiness in case of varying influence periodicity. In the constant conditions of N OL = 50, P IF = 0.5, F C = 0.1, more periodic influence dissemination keeps the deseg- regation at a higher level. It is shown in the graph in Fig. 10 (left). At the initial stages of the simulation, both for IR = 5 and IR = 25, the Desegregation Index is similar (around 0.3), which drops for subsequent iterations following the similar trend. However, when the first period of refreshing of the influence happens (at iteration 5) for IR = 5, the Desegregation Index elevates from around 0.15, while for IR = 25, the index keeps dropping. In the subsequent periods, each separated by five timestamps, the Desegregation Index keeps fluctuating between a maximum of around 0.26 and a minimum of around 0.1. In case of IR = 25, the Deseg- regation Index almost drops to 0.1 and then gets a boost at iteration 26 when the first period of refreshing of the influence happens for IR = 25. After refresh, the peak value does not surpass 0.2. However, the real issue is the length of time for which the value of index remains between 0.1 and 0.0, which is almost 80% of the time. Opposite of Desegregation Index is the pattern of Happiness Index shown in the graph in Fig. 10 (right). The above pattern is evident from the simulation screenshots given in Fig. 11, evidencing the importance of increased periodicity of influence for the population desegregation. Overall, the simulation results reveal the following out- comes: • With the increase in the frequency of contact of the leaders with the population, desegregation increases. • With the increase in the intensity of contact of the leaders with the population, desegregation decreases. • Desegregation is only possible if the population gets in contact with the leaders. In the next section, a discussion on these outcomes is presented. VI. DISCUSSION AND CONCLUSION Contradictory views regarding the effect of contact on desegregation are available. On one extreme, the contact hy- pothesis [25] states that: "the idea that prejudice and hostility between members of segregated groups can be reduced by promoting the frequency and intensity of intergroup contact". Whereas, one the other extreme, it is stated that [26] "contact tends to reproduce, rather than challenge, the inequitable racial structure". However, both hypotheses do not take into account the contradictions and sustainability of influencing groups. Since, segregation is a result of internal bias of individuals, so must be the counter of it, i.e. desegregation. Social bias is not purely an internal factor. It consolidates with the passage of time, gained with experience and social influence. Hence, the aversion of bias induced by some imposing group should not be examined as a deterministic uni-dimensional factor acting against segregation. In this paper, a model based on group selection [27] is customized to integrate it with the model of group influence on the population. The model resolves the Foundress Dilemma for each generation of spatial group leaders and provides an evolutionary mechanism that may transform the virtual population of influence. The real population, in addition of having internal bias, gets influenced by an external non- deterministic bias, generated by virtual group leaders. The emerging nature of group influence integrated with population decision (to desegregate or not to) produces more knowledgeable outcomes, validating some aspects of the the- ories and hypothesis outlined above, while rejecting others. It can be argued that contact itself (without any external anti- segregation impact) is not enough to change racial structure (as suggested in [26]). However, nobody would have any such expectation, as this is against pure human nature. With external influence, the change in racial structure is possible, thus, providing a justification of keeping real population and leaders as two separate groups (layers). A part of contact hypothesis is validated, i.e. with the increase in the frequency of contact of leaders with the population, desegregation increases. However, with a strong assumption that the virtual population is analogous to the real population (predominately favoring segregation), the second part of the hypothesis is not validated. In fact, it was observed that with the increase in the intensity of contact of leaders with the population, desegregation decreases. More intense the viewpoint of virtual leaders (influence leaders) is, more intense would be its impact, practically, favoring segregation instead of desegregation. The simulation results reveal that it is also not true that decrease in the intensity of contact always increase the deseg- regation. A decrease in the intensity of contact combined with decrease in the number of cooperative leaders favoring deseg- regation results in best case with maximum desegregation. Future Work: Although the simulation results are validated against two contradictory theories of contact, validating them on real city population will be an interesting dimension to consider for the future work. REFERENCES [1] T. C. Schelling, "Dynamic models of segregation," Journal of mathe- matical sociology, vol. 1, no. 2, pp. 143 -- 186, 1971. [2] M. J. White, "Segregation and diversity measures in population distri- bution," Population index, pp. 198 -- 221, 1986. [3] O. D. L. Gona, Dawn of Desegregation: JA De Laine and Briggs V. Elliott. Univ of South Carolina Press, 2012. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 11 [4] M. B. Brewer, "The social psychology of desegregation: An introduc- tion," Groups in Contact: The Psychology of Desegregation, p. 1, 2013. [5] A. J. Christopher, "The slow pace of desegregation in south african cities, 1996-2001," Urban studies, vol. 42, no. 12, pp. 2305 -- 2320, 2005. [6] S. Oldfield, "Urban networks, community organising and race: an analy- sis of racial integration in a desegregated south african neighbourhood," Geoforum, vol. 35, no. 2, pp. 189 -- 201, 2004. [7] G. Liu and W. L. Taylor, "School choice to achieve desegregation," Fordham L. Rev., vol. 74, p. 791, 2005. [8] S. F. I. R. T. C. C. Evolution, Website, 2017. [Online]. Available: https: //www.santafe.edu/research/themes/computational-cultural-evolution [9] M. W. Macy and R. Willer, "From factors to factors: computational sociology and agent-based modeling," Annual review of sociology, vol. 28, no. 1, pp. 143 -- 166, 2002. [10] G. N. Gilbert, Computational social science. Sage, 2010, vol. 21. [11] H. Wallach, "Computational social science," Computational Social Sci- ence, p. 307, 2016. [12] R. Conte, N. Gilbert, G. Bonelli, C. Cioffi-Revilla, G. Deffuant, J. Kertesz, V. Loreto, S. Moat, J.-P. Nadal, A. Sanchez et al., "Manifesto of computational social science," European Physical Journal-Special Topics, vol. 214, pp. p -- 325, 2012. [13] C. Cioffi-Revilla, "Computation and social science," in Introduction to computational social science. Springer, 2017, pp. 35 -- 102. [14] H. A. Simon, The sciences of the artificial. MIT press, 1996. [15] N. Gilbert and K. Troitzsch, Simulation for the social scientist. McGraw-Hill Education (UK), 2005. [16] D. Easley and J. Kleinberg, Networks, crowds, and markets: Reasoning about a highly connected world. Cambridge University Press, 2010. [17] J. Hwang and R. J. Sampson, "Divergent pathways of gentrification racial inequality and the social order of renewal in chicago neighbor- hoods," American Sociological Review, vol. 79, no. 4, pp. 726 -- 751, 2014. [18] P. Bayer, R. McMillan, A. Murphy, and C. Timmins, "A dynamic model of demand for houses and neighborhoods," Econometrica, vol. 84, no. 3, pp. 893 -- 942, 2016. [19] D. C. Parker, S. M. Manson, M. A. Janssen, M. J. Hoffmann, and P. Deadman, "Multi-agent systems for the simulation of land-use and land-cover change: a review," Annals of the association of American Geographers, vol. 93, no. 2, pp. 314 -- 337, 2003. [20] D. S. Massey and N. A. Denton, American apartheid: Segregation and the making of the underclass. Harvard University Press, 1993. [21] J. V. Henderson, Economic theory and the cities. Academic Press, 2014. [22] C. Castellano, S. Fortunato, and V. Loreto, "Statistical physics of social dynamics," Reviews of modern physics, vol. 81, no. 2, p. 591, 2009. [23] G. A. Akerlof, "A theory of social custom, of which unemployment may be one consequence," The quarterly journal of economics, vol. 94, no. 4, pp. 749 -- 775, 1980. [24] J. Crane, "The epidemic theory of ghettos and neighborhood effects on dropping out and teenage childbearing," American journal of Sociology, vol. 96, no. 5, pp. 1226 -- 1259, 1991. [25] N. S. Miller and M. B. Brewer, Groups in contact: The psychology of desegregation. Academic Press, 2013. [26] J. S. Denis, "Contact theory in a small-town settler-colonial context: The reproduction of laissez-faire racism in indigenous-white canadian relations," American Sociological Review, vol. 80, no. 1, pp. 218 -- 242, 2015. [27] Z. Shaffer, T. Sasaki, B. Haney, M. Janssen, S. C. Pratt, and J. H. Fewell, "The foundresss dilemma: group selection for cooperation among queens of the harvester ant, pogonomyrmex californicus," Scientific Reports, vol. 6, 2016. [28] J. Liu and K. C. Tsui, "Toward nature-inspired computing," Communi- cations of the ACM, vol. 49, no. 10, pp. 59 -- 64, 2006. [29] M. Dorigo, "Optimization, learning and natural algorithms," Ph. D. Thesis, Politecnico di Milano, Italy, 1992. [30] J. Kennedy, "Particle swarm optimization," in Encyclopedia of machine learning. Springer, 2011, pp. 760 -- 766. [31] I. Fister Jr, X.-S. Yang, I. Fister, J. Brest, and D. Fister, "A brief review of nature-inspired algorithms for optimization," arXiv preprint arXiv:1307.4186, 2013. [32] X.-S. Yang, Nature-inspired metaheuristic algorithms. Luniver press, 2010. [33] -- -- , "A new metaheuristic bat-inspired algorithm," in Nature inspired cooperative strategies for optimization (NICSO 2010). Springer, 2010, pp. 65 -- 74. [34] X.-S. Yang and S. Deb, "Cuckoo search via l´evy flights," in Nature & Biologically Inspired Computing, 2009. NaBIC 2009. World Congress on. IEEE, 2009, pp. 210 -- 214. [35] R. Axelrod, "An evolutionary approach to norms," American political science review, vol. 80, no. 4, pp. 1095 -- 1111, 1986. [36] E. Chattoe-Brown et al., "Just how (un) realistic are evolutionary algorithms as representations of social processes?" Journal of Artificial Societies and Social Simulation, vol. 1, no. 3, 1998. [37] K. D. Jong, "Evolutionary computation," Wiley Interdisciplinary Re- views: Computational Statistics, vol. 1, no. 1, pp. 52 -- 56, 2009. [38] C. Cioffi-Revilla, K. De Jong, and J. K. Bassett, "Evolutionary compu- tation and agent-based modeling: biologically-inspired approaches for understanding complex social systems," Computational and Mathemat- ical Organization Theory, vol. 18, no. 3, pp. 356 -- 373, 2012. [39] S. A. West, A. S. Griffin, and A. Gardner, "Social semantics: altruism, cooperation, mutualism, strong reciprocity and group selection," Journal of evolutionary biology, vol. 20, no. 2, pp. 415 -- 432, 2007. [40] R. L. Axtell, "Non-cooperative dynamics of multi-agent teams," in Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3. ACM, 2002, pp. 1082 -- 1089. [41] W. A. Clark, "Residential preferences and neighborhood racial segrega- tion: A test of the schelling segregation model," Demography, vol. 28, no. 1, pp. 1 -- 19, 1991. [42] S. Grauwin, F. Goffette-Nagot, and P. Jensen, "Dynamic models of residential segregation: An analytical solution," Journal of Public Eco- nomics, vol. 96, no. 1, pp. 124 -- 141, 2012. [43] V. Cortez, P. Medina, E. Goles, R. Zarama, S. Rica et al., "Attractors, statistics and fluctuations of the dynamics of the schellings model for social segregation," Eur. Phys. J. B, vol. 88, p. 25, 2015. [44] R. Pancs and N. J. Vriend, "Schelling's spatial proximity model of segregation revisited," Journal of Public Economics, vol. 91, no. 1, pp. 1 -- 24, 2007. [45] J. Zhang, "Tipping and residential segregation: a unified schelling model," Journal of Regional Science, vol. 51, no. 1, pp. 167 -- 193, 2011. [46] P. Smets, N. Kreuk et al., "Together or separate in the neighbourhood? contacts between natives and turks in amsterdam," The Open Urban Studies Journal, vol. 1, pp. 35 -- 47, 2008. [47] M. Hewstone and A. Voci, "Diversity and integration: The role of inter- group contact in process of prejudice reduction and conflict resolution," Psicologia sociale, vol. 4, no. 1, pp. 9 -- 28, 2009. [48] S. H. Bartz and B. Holldobler, "Colony founding in myrmecocys- tus mimicus wheeler (hymenoptera: Formicidae) and the evolution of foundress associations," Behavioral ecology and sociobiology, vol. 10, no. 2, pp. 137 -- 147, 1982. [49] T. Kretz and M. Schreckenberg, "Moore and more and symmetry," in Springer, 2007, pp. 297 -- Pedestrian and evacuation dynamics 2005. 308. [50] S. Tisue and U. Wilensky, "Netlogo: A simple environment for modeling complexity," in International conference on complex systems, vol. 21. Boston, MA, 2004, pp. 16 -- 21. PLACE PHOTO HERE Kashif Zia Kashif Zia is currently working as Assistant Professor at Sohar University, Oman. He obtained his PhD from the Institute for Pervasive Computing, Johannes Kelper University in Linz, Austria. Zias research interests revolve around socio- technical systems and computational social science with particular focus on crowds dynamics and smart cities. His PhD work was related to large- scale agent-based modeling and analysis of socio- technical systems utilizing parallel and distributed simulation. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2017 12 PLACE PHOTO HERE PLACE PHOTO HERE Dinesh Kumar Saini Dr. Dinesh Kumar Saini re- ceived a PhD degree in 2005. Dr. Saini hold the rank of an Associate Professor at Sohar University, Oman and an Adjunct Associate and Research Fel- low with the University of Queensland, Brisbane Australia. Research interest in Software Engineering, Cyber Defense and Mathematical Modeling, Content Management Systems, and Computational Social Science. Arshad Muhammad Arshad Muhammad received a PhD degree in 2010 Computer Science from Liv- erpool John Moores University, UK. From 2010 till 2013, worked as Assistant Professor with City Uni- versity, Pakistan. In 2013, he joined Sohar Univer- sity, Oman as Assistant Professor. He has more than 8 years of experience in research and academics. His areas of expertise are Peer-to-Peer networks, Networked Appliances, Agent-based modeling & simulation, IoT, and Service-Oriented Architectures. PLACE PHOTO HERE Alois Ferscha Alois Ferscha received a Mag. degree in 1984, and a PhD in business informatics in 1990, both from the University of Vienna, Austria. From 1986 through 2000 he was with the Department of Applied Computer Science at the University of Vienna at the levels of Assistant and Associate Professor. In 2000 he joined the University of Linz as full Professor where he is now head of the depart- ment for Pervasive Computing and the speaker of the JKU Pervasive Computing Initiative. Currently he is focused on pervasive and ubiquitous com- puting, networked embedded systems, embedded software systems, wireless communication, multiuser cooperation, distributed interaction and distributed interactive simulation.
1808.01169
1
1808
2018-08-03T12:03:12
Cities of the Future: Employing Wireless Sensor Networks for Efficient Decision Making in Complex Environments
[ "cs.MA", "cs.NI" ]
Decision making in large scale urban environments is critical for many applications involving continuous distribution of resources and utilization of infrastructure, such as ambient lighting control and traffic management. Traditional decision making methods involve extensive human participation, are expensive, and inefficient and unreliable for hard-to-predict situations. Modern technology, including ubiquitous data collection though sensors, automated analysis and prognosis, and online optimization, offers new capabilities for developing flexible, autonomous, scalable, efficient, and predictable control methods. This paper presents a new decision making concept in which a hierarchy of semantically more abstract models are utilized to perform online scalable and predictable control. The lower semantic levels perform localized decisions based on sampled data from the environment, while the higher semantic levels provide more global, time invariant results based on aggregated data from the lower levels. There is a continuous feedback between the levels of the semantic hierarchy, in which the upper levels set performance guaranteeing constraints for the lower levels, while the lower levels indicate whether these constraints are feasible or not. Even though the semantic hierarchy is not tied to a particular set of description models, the paper illustrates a hierarchy used for traffic management applications and composed of Finite State Machines, Conditional Task Graphs, Markov Decision Processes, and functional graphs. The paper also summarizes some of the main research problems that must be addressed as part of the proposed concept
cs.MA
cs
University at Stony Brook CEAS Technical Report Nr 831 Cities of the Future: Employing Wireless Sensor Networks for Efficient Decision Making in Complex Environments Alex Doboli, Daniel Curiac†, Dan Pescaru‡, Simona Doboli*, Wendy Tang, Costantin Volosencu†, Michael Gilberti, Ovidiu Banias†, Codruta Istin‡ Department of Electrical and Computer Engineering State University of New York at Stony Brook, Stony Brook, NY 11794-2350 † Department of Automatics and Technical Informatics "Politehnica" University Timisoara, Timisoara, Romania ‡ Department of Computer Science "Politehnica" University Timisoara, Timisoara, Romania *Department of Computer Science Hofstra University, Hempstead, NY 11549 April 1 2008 Cities of the Future: Employing Wireless Sensor Networks for Efficient Decision Making in Complex Environments Alex Doboli, Daniel Curiac†, Dan Pescaru‡, Simona Doboli*, Wendy Tang, Costantin Volosencu†, Michael Gilberti, Ovidiu Banias†, Codruta Istin‡ Department of Electrical and Computer Engineering State University of New York at Stony Brook, Stony Brook, NY 11794-2350 Email: [email protected] † Department of Automatics and Technical Informatics "Politehnica" University Timisoara, Timisoara, Romania ‡ Department of Computer Science "Politehnica" University Timisoara, Timisoara, Romania *Department of Computer Science Hofstra University, Hempstead, NY 11549 Abstract Decision making in large scale urban environments is critical for many applications involving continuous distribution of resources and utilization of infrastructure, such as ambient lighting control and traffic management. Traditional decision making methods involve extensive human participation, are expensive, and inefficient and unreliable for hard-to-predict situations. Modern technology, including ubiquitous data collection though sensors, automated analysis and prognosis, and online optimization, offers new capabilities for developing flexible, autonomous, scalable, efficient, and predictable control methods. This paper presents a new decision making concept in which a hierarchy of semantically more abstract models are utilized to perform online scalable and predictable control. The lower semantic levels perform localized decisions based on sampled data from the environment, while the higher semantic levels provide more global, time invariant results based on aggregated data from the lower levels. There is a continuous feedback between the levels of the semantic hierarchy, in which the upper levels set performance guaranteeing constraints for the lower levels, while the lower levels indicate whether these constraints are feasible or not. Even though the semantic hierarchy is not tied to a particular set of description models, the paper illustrates a hierarchy used for traffic management applications and composed of Finite State Machines, Conditional Task Graphs, Markov Decision Processes, and functional graphs. The paper also summarizes some of the main research problems that must be addressed as part of the proposed concept. 1. Introduction From a functional point of view, cities are complex systems in which resources and infrastructure are continuously distributed to activities of the local economy and inhabitants [CACCIT, NAE, Dineen (2000), Dion and Yagar (1996), Fehin (2004), Felici et al (2006), Greene (2007), Hull et al (2006), Korkmaz et al (2004), Licalzi and O'Connell (2005), Murty et al (2007)]. The distributed resources are electricity, water, heating gas, parking space, etc., but also commodities like dining services, lodging, hospitals, entertainment facilities, and so on. The city infrastructure includes roads, sewage, water pipes, power grid, etc., in general, any means that enables the continuous transferring of resources to satisfy emerging needs. In this context, a city must have sufficient decision making capabilities for efficiently and continuously allocating resources through the infrastructure to satisfy demands. Efficiency is defined with respect to many metrics like monetary cost, quality of services, response time, safety, overhead (related losses), etc. The quality of decision making represents a trade-off between the effectiveness and comprehensiveness of the decisions, and the related costs. Global decisions can be more efficient as they involve detailed analysis of large amounts of data. However, they are time and money-wise the most expensive as they require lengthy procedures executed by large personnel. In contrast, local decisions are much cheaper but they rely on small amounts of data, and use much simpler decision making procedures. In traditional urban set-ups, decision making remains arguably a lower efficiency process, which rarely relies on state-of-the-art technology for rapidly identifying the best options for a given situation. It has been recently suggested that modern technology, including ubiquitous data collection through sensors, automated analysis and prognosis, and online optimization can offer intriguing new capabilities for effective decision making in large urban environments while keeping the related costs low [Campbell et al (2006), Chakrabarty et al (2003), De et al (2005), Dubois et al (2003), Eisenman et al (2007), Greene (2007), Hull et al (2006), Lee et al (2006), Jain et al (2004), LeBrun et al (2005), Lee et al (2006), Murty et al (2007), Yoneki (2005)]. Popular applications like, large scale lighting control and traffic management, suggest that the main characteristics of decision making procedures include (i) flexibility, (ii) autonomy, (iii) scalability, (iv) efficiency, and (v) predictability. (i) Flexibility is the capability of a deployed system to address situations that are not predicted or addressed off-line. This is important due to the large variety of situation that occur in real-life. (ii) Autonomy refers to the capacity of a system to operate with minimum human intervention. This is critical as the cost of servicing decision making systems by humans might prohibit their deployment in large cities. Moreover, having humans tightly "embedded" in the decision making loop also increases the response time and can reduce the reliability due to inevitable human errors. (iii) Scalability characterizes the effectiveness of decision making methods with increasing amounts of demands, resources, and infrastructure. This is crucial for urban set-ups, which involve huge numbers of correlated activities, demands, resources, and infrastructure. (iv) For on-line and autonomous decision making systems, efficiency represents the quality of the decisions automatically selected during operation (online) as compared to the quality of offline decisions based on the entire state information being available. High efficiency is vital in real-life applications. (v) Predictability is the ability of devising automated procedures that estimate accurately and in real-time the quality of decision making alternatives. Predictability is a key enabling component for any decision making algorithm. In addition to the five criteria, another requirement refers to the capability of making decisions that comprehensively tackle different applications that are correlated or might become correlated in certain conditions. For example, it is likely that the illumination intensity control along roads must be correlated to the traffic level on the illuminated roads. Hence, the control procedures for street lighting control have to interact with the decision making procedures for traffic management, such as traffic signal control. This interdependency can be analyzed off-line and incorporated into the system before operation provided that there is a common model and specification formalism for the two separate decision making applications. A more complex situation occurs if correlations dynamically emerge only in certain conditions, which are hard to predict a-priori. Then, the decision making system ought to recognize any newly created dependencies, and provide in real-time a strategy for their common resolution. Traditional decision making systems incorporate mostly only static procedures, and thus are likely to fail in unpredicted situations. For example, the control of the heating gas pipes is often uncorrelated to the traffic flow. However, if gas leakages occur then the lighting intensity should be diminished to reduce the risk of explosions, which further requires the adjustment of the traffic signals, so that the traffic flow through that zone decreases. The identification of all correlations that can occur, while conceptually possible, is in practice infeasible due to the many situations and conditions that are possible in large cities. Moreover, it unnecessarily complicates the control procedures considering that many of the possible situations might actually not occur in practice. A number of recent research projects have focused on the topic of using state-of-the-art computing and communication technology, including wireless sensor networks, for various applications in large urban environments. The tackled applications include public transportation [Yoneki (2005)], traffic monitoring [Hull et al (2006), Lee et al (2006)], traffic light control [Cunningham et al], social networking and VoIP [Murty et al (2007)], data gathering [Campbell et al (2006)], communication [Kansal et al (2004)], just to mention a few. The present research focuses on efficient and comprehensive data acquisition, wireless routing protocols, programming paradigms, embedded hardware, and security. An intriguing opportunity is to device mechanisms that allow integrating and co-optimizing the correlated applications rather than the more traditional method of tackling them independently. This not only expands the optimization space, but also increases the reliability of decision making in new situations. Moreover, it is important to have a decision making approach that is simultaneously flexible, autonomous, scalable, efficient, and predictable. This is challenging as the performance of flexible and autonomous systems is hard to predict in the general case. Moreover, large systems are difficult to optimize through on-line decision making procedures. This paper proposes a new decision making paradigm for optimizing the continuous, real-time allocation of resources to satisfy demands in large urban environments. While the proposed paradigm is general, the paper refers to street lighting and traffic control as two illustrating case studies. The paradigm is structured as a semantic hierarchy in which different decision making models and strategies coexist and interact to produce flexible, autonomous, scalable, efficient, and predictable decisions. The hierarchal structure is scalable as only a reasonably large number of modules collaborate at each semantic level for reaching global decisions. Flexibility and autonomy is achieved by having reactive models at the bottom of the decision making hierarchy. Hence, unexpected sequences of events can be accommodated during operation. Efficiency and predictability results from having the reactive behavior constrained by the upper semantic levels, which use more deterministic models, such as data flow graphs, and Markov Decision Processes [Feinberg (1994), Feinberg (2002)]. The upper levels compute the limits within which the lower, reactive decision making modules must operate, so that the overall goals and constraints of the application are not violated. The lower semantic levels are in constant interaction with the environment and acquire data about real situations. This data is aggregated and propagated to the upper semantic levels, where it is employed for global decision making. Thus, the paradigm incorporates feedback mechanisms between the semantic levels, so that the upper levels constrain the lower levels while the latter provide feedback on the effectiveness of the constraints. Finally, the paper also introduces the defining elements of a specification formalism for integrating different but related applications. Various kinds of interactions between decision modules, such as collaboration, competition, guidance, and enabling interactions, are defined based on the goals, capabilities, inputs, and outputs of each module. This represents a uniform description style for different applications. While the proposed decision making paradigm is applicable to other theoretical formalisms too, this paper refers to a semantic hierarchy based on Finite State Machines (FSMs), Conditional Task Graphs (CTGs), Continuous Time Markov Decision Processes (CTMDPs), and Functional Graphs (FGs). The hierarchy is exemplified for coordinated traffic signal control, a main application in modern cities [Gartner (1983), Gartner et al (1992), Wahle and Schreckenberg (2001)]. It implements quantitative decision making in which decisions at successively higher semantic levels are used to cover increasingly broader geographical areas: (i) FSMs implement reactive control guided by signals coming from traffic sensors and cameras as well as neighboring FSMs, (ii) CTGs schedule the related activities over time for different traffic conditions, thus conduct optimization of signal sequences, (iii) CTMDP use macroscopic descriptions of the system to conduct scenarios-specific optimizations (hence, time is abstracted away from decision making), and (iv) FGs regulate the global allocation of resources and infrastructure to demands, hence taking out the impact of scenarios. The generality of the paradigm is motivated by summarizing a qualitative decision making process, in which the semantic hierarchy uses FSMs, fuzzy logic, and expert systems for decision making. The paper has the following structure. Section 2 introduces two applications (city lighting control and traffic management) to illustrate the importance of infrastructure management in cities. Section 3 defines the main characteristics of decision making in large urban environments, and Section 4 presents the proposed decision making approach. Section 5 introduces the specification model for integrated decision making, and Section 6 enumerates some of the main research issues related to the proposed concept. Finally, conclusions are offered. 2. Applications A myriad of applications can use the more efficient decision making capabilities that are enabled through ubiquitous data collection, automated prognosis, and intelligent advising. Applications differ depending on the geographical localization of decision making, and the kind of human interaction involved in the process. The first criterion defines not only the "globality" of the resulting decisions, but also it quantizes the hardness of the process, as selecting optimal decisions for smaller, geographically localized areas is arguably simpler than that for large, distributed areas. The second criterion centers on the human perspective to distinguish situations where humans are only passive participants to the process, and situations where humans participate to the decision making loop. In the first case, decision making actually results in an actuation activity, which produces a change in the way resources and infrastructure is used. In the latter case, the activity results in additional knowledge, which humans might use for taking more educated decisions. Two applications are discussed next: ambient lighting control and traffic management. A. Ambient lighting control Figure 1: Ambient lighting control system Ambient lighting control applications must automatically adjust the lighting intensity in public spaces so that optimal illumination is offered while minimizing the energy consumption and maximizing reliable operation. These systems must operate with no or little human intervention. They automatically turn on, off, and adjust the illumination intensity in public areas, streets, buildings, parks, and so on. The illumination intensity can be adjusted depending on the time of the day (e.g., dawn, dusk, etc.), weather conditions (sunny, cloudy, full moon), presence of obstacles, number of pedestrians, the nature of the activities carried on (e.g., walking, bicycle riding, etc.), and more. Other capabilities could be related to minimizing energy costs and improving safety, such as by switching to different energy providers during power outages, or selecting the providers that offer the cheapest energy. Similar applications include automated monitoring of the air quality and measuring the noise levels [Santini and Vitaletti (2007)]. Such applications not only reduce living cost and save energy, but also offer better quality-of-life in a city. The next paragraphs offer more insight into an ambient lighting control system (ALCS) that attempts to offer optimal illumination for a given energy budget. Figure 1 presents the ALCS structure. Optimal illumination is defined as a certain illumination intensity at the street level. Each lamp post is equipped with local sensors (e.g., luxmeters, motion detectors, orientation sensors, distance sensors, and other traffic related sensors), and a local controller to decide the illumination intensity. All local controllers of the lamp posts in a small zone (e.g., a street) are connected into a network to coordinate their decisions. Moreover, zones are linked together through wireless connections, and Lighting Coordination Unit (LCU) coordinates the different zones, if more global decisions ought to be made, such as to illuminate during events, holidays, etc. Moreover, if the energy cost budget is fixed, LCU divides the budget to the related sub-areas, so that the overall consumption stays within the budget. Sub-areas can renegotiate their assigned budget. LCUs also collect data for reports and statistics, and identify behavior patterns for different situations. To provide scalability and flexibility, ALCS implements a two-level control hierarchy, as in Figure 1: • Local controller: The controller decides the illumination intensity of a lamp depending on the conditions sensed through the sensors, and the interactions with the controllers of the neighboring lamp posts. For example, if one of the lamps ceases to operate, the illumination intensity of its neighbors is increased, so that they can cover the entire area. Similarly, lamps might be turned off to save energy, if the illumination level exceeds the needed values. Decision making implements a multi-mode control with specific control laws operating for each of the functioning modes. In a simpler case, decision making represents a reactive behavior in which the exceeding of pre-set threshold values (e.g., a neighboring lamp going off) results in switching to a new state in the decision making controller. For each of the states, the inputs from the sensors are used to control a simple "bang-bang" control algorithm, in which the lighting intensity increases if the sensed value is less than the optimal value, and decreases otherwise. Other control algorithms like PID control are also attractive. A complementary approach to local control implementation is using a fuzzy logic [Driankov et al (1996), Farinwata et al (2000), Passino and Yurkowich (1998)]. The fuzzy logic controller assesses qualitatively the inputs coming from sensors and neighboring controllers, and then selects the actuation outputs using the inputs in a set of predefined rules (which define the fuzzy logic controller). For example, if all inputs are large then a specific response is produced. Similar reactions correspond to all inputs being small, and so on for all qualitative combinations of input values. This approach can handle well the imprecision of the sensors outputs, as well as cases when the lighting intensity must be adjusted for hard-to-predict values, like the traffic volume. • Lighting Coordination Unit (LCU): The upper-level controller takes more long term decisions that relate to broader areas. The traditional approach implements a centralized controller for LCU. The decision making algorithm uses all requests from the zones to compute the energy resources allocated to each zone using optimization methods, like Linear Programming or heuristic techniques [Reeves et al (1993)]. While well understood, centralized control does not scale well for large systems as a large overhead is involved. Instead, decentralized control involves only a small number of neighboring zones, which decide resource allocation based on greedy minimization (maximization) of priorities [Sinopoli et al (2003)]. LCU also maintains connection with all related decision making systems within the city limit (like traffic management, disaster management, etc.), to responds efficiently to unscheduled events, e.g., traffic jams, high levels of environmental pollution, power breakdowns, and so on. More details on connecting the different decision making systems are given in Section 5. B. Traffic management Improving the efficiency of traffic is another important application of intelligent decision making in urban environments [Cunningham et al, Yoneki (2005), CALCCIT]. Poor traffic management results in long term waiting times, increased gas consumption, and pollution. Efficiency parameters might include the number of vehicles serviced in a given time interval, the time required to cover a certain trajectory, the pollution and noise levels due to traffic, the maximum number of vehicles that can be serviced without vehicle queuing as well as parameters that define special situations such as offering the shortest travel time to police cars, ambulances, fire-trucks, etc. Tasks related to traffic management include finding the optimal route for vehicles, identifying and warning about traffic "hot spots", re-routing in case of accidents and other unforeseen obstacles, redirecting traffic to avoid high pollution levels in a zone, and more. Decision making for traffic management must optimize the related goals (e.g., efficient traffic, reduced gas consumption, minimal noise levels, etc.) through either centralized or localized strategies [Cunningham et al]. Centralized algorithms express global goals and evaluate decision on a central processing unit, which also collects the data sampled by the individual sensing units. Centralized control, the traditional approach, offers good results for predictable traffic flows, however, its main limitations include low scalability and poor reliability. Localized algorithms rely on a small number of neighboring units for taking decisions, which only affect a small area. In addition, they include a mechanism for percolating the local interactions to the global area, so that large scale decision making is also possible. This approach is potentially more flexible in handling less predictable traffic situations, scalable, and reliable, nevertheless, its main challenge is the difficulty to correctly estimate global characteristics about functioning and performance. Similar to the previous example, the decision making approach proposed for traffic management is hierarchical, in which the lower control levels are localized methods and the upper levels are more global. The local controllers handle the street-level traffic in contrast to the global-level procedures, which identify strategies at the area level to guarantee the goals and performance constraints of the application. Compared to street lighting control, the decision making hierarchy is in this case higher as traffic management involves a wider geographical scale and operates in more diverse situations. Figure 2: Traffic management decison making system (Acknowledgement: The two sub-figures representing traffic situations are due to http://www.permisulauto.ro) Figure 2 depicts a three-level hierarchical system, even though more decision making levels can be added: • Intersection Traffic Unit (ITU): ITU is the controller of the traffic light that supervises each street intersection. ITU receives inputs from sensors, such as inductive loops embedded in the pavement, video cameras, etc., on the traffic intensity in each direction, the length of the vehicle queues, the time taken for a vehicle to move through the intersection, and more [Cunningham et al]. The ITU behavior can be extended with actions for preferred "vehicles", like bicycles or pedestrians, which ought to have higher priority to pass through the intersection. ITU might also include a "default" behavior which is executed whenever the controller fails to converge on a predictable operation. • Zone Traffic Coordination Unit (ZTCU): ZTCU coordinates the operation of ITUs in neighboring intersections to optimize the traffic through each of them by coordinating the decisions of the individual ITUs, redirecting the traffic flow, etc. ZTCU receives data from the participating ITUs, such as traffic characteristics, vehicle queues, moving obstacles, and so on. It might also receive inputs from the upper most Traffic Coordination Unit (see next item) about the targeted traffic efficiency goal, like avoiding long queues and minimizing the delay of vehicles. ZTCU computes optimal strategies for different traffic situations (patterns) in the intersections. • Traffic coordination unit (TCU): TCU operates at the global level by setting the parameters of the ZTCUs. Deterministic policies are used for decision making at this level. TCU also adapts the traffic flow to incorporate out-of-the-order, global situations, such as during the passing of a rapid intervention unit or fire truck that must traverse quickly through a large area. Sections 3 and 4 give more details on the methods proposed for each decision making level. 3. Proposed Decision Making Concept Decision making in complex urban environments must offer the following main capabilities: • Flexibility: During operation, the system must be flexible enough to accommodate new situations, objectives, and requirements, which are hard to predict off-line [Saleh et al (2002)]. • Scalability: Scalability is the property of the control algorithms to perform well for increasing numbers of service requests, resources, and infrastructure. There are many reports that indicate that decentralized methods, which use only information localized in time and space, handle better complex systems than centralized methods [Sinopoli et al (2003)]. • Autonomy: Decision making should minimize human intervention. This is important not only for the scalability requirement of decision making but also because of the higher costs and lesser, if human intervention is involved. • Efficiency: To be viable in real-life, decision making must be effective with respect to metrics, like short service time, high service quality, low costs, good reliability and safety, maximum number of satisfied services, and many more. Moreover, for flexible and autonomous decision making, efficiency also captures that quality of adapted, online decision making as compared to offline decision methods in situations when all state information being available. • Predictable: For autonomous and efficient operation, the characteristics of decision making ought to be predictable. For example, the resulting service time and costs of local decision making strategies should be predictable at a global level and over time. Also, control techniques should not lead to deadlock, thus the set goals should be reachable by the local strategy. Requirement 1 Feasible Design Space Current Operation Point Requirement 2 P1,U P1,L P2,L P2,U Figure 3: Definition of flexibility The five properties can be measured using the following metrics inspired by the similar metrics used in manufacturing engineering and parallel systems: • Flexibility: In [Kazmer et al (2003)], flexibility (in engineering design) is defined as the ratio of the feasible design space over the range of the specification. A similar definition can be used for decision making in urban environments. Figure 3 illustrates the definition for two performance requirements. The figure assumes that a specification range [Pi,L, Pi,U] is defined for the requirements P1 and P2. Moreover, some of the requirement values cannot be realized in practice, thus, a space of feasible design points is defined around the current functioning point. A larger feasible design space determines a higher flexibility of the system. The definition can be easily extended for more requirements. Scalability: According to [Jogalekar and Woodside (2000)], the scalability of a distributed systems with respect to attribute P reflects the amount of extra resources that ought to be spent for improving P's value from P1 to P2. If we denote Cost1 the resource cost for achieving performance P1, and Cost2 the resource cost for having performance P2, then scalability is the following ratio: • Scalabilit ( P,Py 2 1 ) = P 1 P 2 ⋅ Cost 2 Cost ⋅ 1 • Autonomy: Autonomy depends on the amount and quality of human input required to assure a system's correct functioning under a broad range of changing requirements, which act over a specified geographical area and over an interval of time. The following formula presents a qualitative expression of autonomy: Autonomy = T f ∫ T i ∫ V f V i ∫ PL PU ( Human effort ) dPerforman ce dArea dTime where performance P changes from PU to PL, the geographical area border is defined by Vi and Vf, and the time interval between moments is Ti and Tf. • Efficiency: Flexibility and autonomy are obtained at the expense of extra resources and infrastructure being spent in contrast to the optimal, offline solution. For example, in dusk conditions, an adaptive lighting system might be less efficient than a system specifically designed for such conditions. Nevertheless, it is not feasible to have a dedicated optimal design for each of the conditions that might appear in real-life. For performance P and range [PL,PH], efficiency is the average overhead spent by the adaptive system to achieve each of the performance values in the range: Efficiency ( P,P HL ) = PH ∫ PL ( P addaptive − P sin gle − value ) dP P H − P L • Predictability: Developing flexible and autonomous decision making strategies depends on having techniques that can estimate correctly the feasibility and quality of alternative decisions. Thus, the error between the estimated and the real values must stay within a tolerable limit. Figure 4: (a) The wide-scale decision making model and (b) the local control approach The proposed decision making model attempts to address the five main capabilities enumerated before. Figure 4 illustrates the concept. The approach realizes control through localized data acquisition and collaboration between the interrelated sub-systems. This is critical for having a scalable decision process. Depending on the goals, systems organize themselves into clusters. Each cluster might decide to elect virtual leaders used in collaborating with other clusters. Figure 4(a) shows decision making for three successively larger geographical parts: three local zones (shown in solid line), two larger areas (in dashed lines) and one broad region (in dotted line). Clusters correspond to increasingly higher semantic abstraction levels, each level using different formal representation models. For example, the lowest levels operate in terms of events and basic signals/data and the actions corresponding to them. This is typical to reactive behavior. The intermediate control levels reason in terms of optimizing the execution of multiple tasks over time but without analyzing the physical events and data. Finally, the upper levels consider global and qualitative decision making which are optimal across long period of times (hence, the temporal issues are eliminated from the model). Hence, the control algorithms for clusters covering broad regions remains scalable due to the more abstract information being used during analysis and decision making. Figure 4(b) illustrates the hierarchy of semantic abstraction levels. Each local decision making module has a layered structure to offer a gentle transition from reactive behavior to fully predictable functioning. • The physical layer is mostly concerned with the acquisition of physical signals (such as voltages coming from sensors) and the conversion of these signals into data and events. The physical layer utilizes reconfigurable hardware (e.g., reconfigurable analog and digital circuits) to optimize the efficiency of data acquisition and conversion. For example, faster hardware circuits are used if the speed requirements of data acquisition increase due to faster processes that have to be tracked, or more precise signals processing circuits are needed if the accuracy needs to be increased. • The events/data preparation layer aggregates data and classifies events. Multiple sensors might sense the same data or fragments of the same data. The redundant data can be used to improve the precision of sensing by eliminating noise. Also, comprehensive knowledge is assembled together from the data pieces sampled by each sensor. Event classification is important in situations where different event types are handled by different processing algorithms, like specific responses to different vehicle types (e.g., trucks, bicycles, passenger cars, etc.). • The reactive layer produces responses to the input data and events. • The planning layer controls the execution of tasks, so that the set goals are maximized and also the using of the infrastructure and resources is optimized. The planning layer guarantees that the constraints set for the system operation are met, including the deadlines and energy budgets of the individual tasks. Therefore, the behavior and performance of the planning layer must be fully predictable in contrast to the reactive layer, which is flexible but hard to estimate. • The strategic adaptation layer identifies repeatable patterns which can be used to optimize the functioning of the system with respect to goals, resources, and infrastructure. The identified patterns include sequences of input data, correlations between input data, correlations of events, optimal control sequences for certain conditions, and so on. including real-time constraints, bandwidth Section 4 offers more insight into the decision making components. 4. Efficient Decision Making Efficient and robust behavior in hard-to-predict environments does not only imply that the autonomous system can react to unexpected events and conditions but also is capable to meet all performance requirements, limitations, energy constraints, speed requirements, precision needs, safety, and so on. As we explained in the introductory sections, this is a hard problem, and there are no predictable control algorithms for integrated mixed-domain reactive behavior. We propose a predictable yet flexible decision making concept based on (i) a semantic modeling hierarchy to represent the performance needs and capabilities of a decision strategy at different levels of abstraction, and (ii) a joint top-down and bottom-up constraint transformation mechanism along the semantic hierarchy for guiding the dynamic reconfiguration process and signaling when a set of requirements is insatisfiable for the current set of resources. If the application requirements cannot be met then the autonomous decision making system can decide to shift some of the load to other systems (if they are available), or to trade-off the response quality, such as the response time and accuracy. Tackling the load shift problem without using a centralized control algorithm (which would pose serious scalability limitations) is beyond the scope of this work, but we plan to consider modern techniques for decentralized and local control when researching integrated dynamic reconfiguration, such as the algorithms in [Reynolds (1987), Brogan (1997), Ulam (2007), Brock (1999), Pereira (2003), Hsieh (2007), Sigurd (2006)]. The main features of the two components of the proposed predictive control mechanism are as follows: • Semantic modeling hierarchy: The semantic hierarchy is an abstraction model, which offers a smooth transition from the fully reactive behavior at the node level and the deterministic operation at the application level. The hierarchy includes several abstraction levels, so that each higher level is less flexible in tackling unknown conditions but is more predictable performance-wise. Figure 5 shows a semantic hierarchy with five layers, in which the two bottom layers represent reactive behavior, and the top-most layer offers a performance predictive description of the system as a task graph with data dependencies. • Top-down and bottom-up constraint transformation: A set of top-down and bottom-up constraints enforce the consistency between consecutive layers. The top-down constraints are defined by an upper level for the level immediately below, so that the behavior at the lower level remains within the "bounds" of the behavior at the upper level. The bottom-up constraints are defined from a lower level to the next upper level, and express the amount of performance "violation" (performance needs) that must be considered when re-computing the resource management and control algorithm at the next upper level. The adjustment (propagation) of top-down and bottom- up constraints is performed continuously at runtime. Hierarchical control of robots, a similar though less complex problem, is proposed in recent work. For example, a two level control hierarchy is proposed in [Pereira (2003)], where the lower level is a finite state machine guided by events and the upper level is a decentralized control method between an autonomous mobile system and its immediate neighbors. Local control is based on the potential field method. Similar approaches are discussed in [Ulam (2007), Ulam (2007b), Hsieh (2007)]. The proposed concept differs in several main issues from this work. First, the semantic modeling hierarchy includes more levels, including layers which use stochastic models, conditional task graphs, and task graphs with data dependencies. Second, the proposed hierarchy also aims at expressing end-to-end dynamic reconfiguration of the design and not only reactive functionality, like in the existing approaches. Hence, the proposed models will tackle a wider set of performance requirements, in contrast to existing approaches which mostly consider only convergence to the application goal and sporadically also timing constraints. Third, the predictive mechanism is based on a runtime propagation of top-down and bottom-up constraints and the re-computing of the corresponding control decisions. There is no such adaptation mechanism in the other methods. Existing techniques perform only an off-line static performance analysis, mostly related to the convergence and stability of the used control methods. The two components are discussed in the following two subsections. Function graph level: Probability State 2 Performance constraints Function 1 Probability Performance Probability Function 2 Function 3 Performance Performance Probability Function 4 Performance Markov Process level: p 12 p 21 State1 p 14 p 41 State 4 p 34 p 43 p 23 p 32 State3 Performance violations Performance violations COND Performance constraints Performance violations Performance constraints Conditional task graph level: Task1 Event 1 Event 3 Task 2 Task 3 Event 2 Task 2 Task 3 Reactive behavior level: Event 1 Task1 Event 3 PC Task 3 Task 2 Event 2 Runtime adaptation & reconfiguration Adaptive implementation level: SFG 1 Performance violations PC 1 1C C2 C3 SFG 3 SFG 2 4C && PC 2 Figure 5: Semantic modeling hierarchy for large-scale decision making 4.1 Modeling Hierarchy for Predictive Operation Figure 5 illustrates the suggested semantic modeling hierarchy for predictive decision making. The two bottom levels describe the reactive operation of the decision making system, and the three upper levels provide a smooth transition towards predictable control. The top most level defines the functionality as a task graph with a predictable and evaluatable performance. The five model layers are as follows: • Adaptive implementation level: This layer expresses the behavior of the dynamically modifiable system configuration. This layer defines the reactive adaptation of the implementation to dynamic conditions. Each node is a signal flow graph (SFG) defining a reconfigurable design (analog, hardware, and software). The transitions between SFGs are controlled by external events and other conditions set during operation. This level corresponds to the physical and events/data preparation layer in Figure 4(b). • Reactive behavior level: This layer defines the reactive functionality of a system as FSMs. Each node is a functional task (e.g., trajectory computing, data communication, sensing, etc.). State transitions are controlled by events that are set during operation. Each task is represented as an SFG graph at the adaptive implementation level. • Conditional task graph level: Conditional Task Graphs (CTGs) define various execution traces for the FSM at the reactive behavior level. A certain path of a CTG is executed depending on the runtime values of the conditions (events) labeling the graph arcs. The graph nodes are either individual tasks in the lower level FSM, or FSM portions, which are "lumped" together as a single node to reduce the size of the CTG. The conditions describing different paths are either single events in the FSM, or logic expressions based on the events. • Markov Process level: For each task (function), its execution traces (which is a complete path through the CTG) define a Markov Decision Process. This is suggested by experimental observation that the similar behavior of many computing systems can be approximated as a Markovian Process [Benini (2000), Qiu (2001), Kallakuri and Doboli (2007)]. Each trace is a state. Transition rates between states represent the probability of executing that trace in the CTG. • Function graph level: The application is described at the top-most level as a function graph in which a node is a specific function (task), and arcs define the order of performing the tasks. Nodes are unconnected, if no specific order is required. The performance of each task (e.g., its execution time) is described as a distribution that corresponds to the underlying Markov Decision Process. Please note that the system behavior is predictable at this level because the model can be deterministically evaluated. Area 1 ZTCU ITU TCU Area 2 (ATCU) (a) TCU ATCU ATCU ZTCU ZTCU ITU ITU ITU ITU ITU ITU (b) Figure 6: (a) Simple case study and (b) hierarchical decision making structure The hierarchical decision making in Figure 5 operates as follows. The two bottom most levels employ event driven decision making mechanisms, such as Finite State Machines. The reactive behavior level description switches from one task to another depending on the occurrence of events. For example, the system switches from Task1 to Task2, if Event1 occurs during operation. Each controlled unit executes its own controller. The adaptive implementation level refers to the capability of adapting online the implementation of a certain task, such as switching from a reconfigurable implementation to another under conditions Ci, which relate to implementation parameters, like the available energy, memory, communication bandwidth, etc. of a device. Several individual controllers might decide to collaborate by building collectively a shared description at the conditional task graph (CTG) level. The description defines how the individual controllers use jointly any shared resources to achieve common objectives, such as the access over time (schedule) of vehicles accessing intersections. The CTG description includes decisions specific to different conditions, such as various traffic loads. Please note that CTG decision making is at the level of small local areas rather than individual controllers. Next, the CTG descriptions of the correlated areas are used to build description covering broader areas, such as those at the Markov Decision Process level. Finally, the last level is at the function graph level, and is based on information collected from Markov Process level descriptions for several interrelated areas. This step distributes the overall goals into goals for the individual sub-systems using information from the Markov Decision Process level. The remaining part of the subsection presents the top-down bottom-up constraint transformation for predictive operation. The five consecutive layers in Figure 5 are related with each other through top-down and bottom-up constraints. The top-down constraints reflect the performance requirements that are imposed by the application, and which must be satisfied during operation. The bottom-up constraints (called performance violations in the figure) capture the amount of change in the control algorithms, if the current reactive implementation (at the bottom two levels) cannot operate in unpredictable conditions while the application requirements are satisfied. We will exemplify the concept of top-down and bottom-up constraints by looking at the bottom two levels in Figure 5. Depending on the performance requirements expressed at the reactive behavior level (e.g., the time constraint for task execution, precision, etc.), the control algorithm switches among the SFGs of the adaptive implementation level. If the constraint is not met then the control algorithm switches to the SFG for a more efficient implementation, and vice versa, if the required performance is exceeded. Similar control strategies have been recently proposed in [Lu (2001), Zhang (2002)a], but the methods are for software only and cannot handle mixed-domain constraints. If a performance constraint is violated then the control algorithm might decide to transition immediately to a safe implementation (as shown by the dashed line arc labeled as PC1 in the figure). For example, if the system is running out of time then it might decide to immediately switch to the most efficient state without going through any intermediate states. Similarly, the lower level will provide bottom-up feedback to adjust the transitions of the FSM at the reactive behavior level, in case the imposed performance constraints are violated. Such a "short cut" transition is indicated by the dashed line arc labeled as PC in the figure. Short cut transitions are also introduced by the performance constraints originated from the conditional task graph level. At the conditional task graph level, new nodes and edges are inserted into the graph for providing a predictive behavior. In the figure, the nodes are shaded and arcs are shown with dashed line. If performance constraints are not met then the resource management module might decide to perform a shaded node instead of the node corresponding to the functionality. The missed functionality might be allocated to another node, if there is a node available, or might be entirely skipped, if it does not violate the application requirements. The remaining of the section illustrates two possible instances of the proposed semantic decision making hierarchy: (A) traffic management based on FSM -- Conditional Task Graphs -- Markov Processes -- Function Graph hierarchy, and (B) light control using Fuzzy Logic -- Knowledge Based Rules. While the first hierarchy relies more on quantitative decisions, the second semantic hierarchy is more geared towards knowledge based (qualitative) decisions. 4.2 Traffic Management using FSM-CTGs-Markov Descision Processes-Function Graphs hierarchy Figure 6 shows the simple traffic management case study that has been explored and the corresponding semantic hierarchy. Figure 6(a) presents a street network, in which arcs indicate the flow of traffic. The goal of decision making is to maximize the traffic flow that passes in a given time T through the area. Traffic lights (shown as black bubbles) are positioned at each intersection, and each is controlled by its local ITU (Intersection Traffic Unit, see Section 2). Neighboring ITUs form a ZTCU (Zone Traffic Coordination Unit, see Section 2) that coordinates their operation. Moreover, ZTCUs of an area are interconnected and coordinated by an ATCU (Area Traffic Control Unit). Finally, ATCU are supervised by TCU (Traffic Coordination Unit). Figure 6(b) illustrates the resulting semantic hierarchy. ITUs, ZTCUs, and ATCUs can be statically defined, or can emerge dynamically during operation based on the actual traffic patterns and the best way of coordinating the traffic lights. We have assumed static definitions in this case study. Figure 7 illustrates the two lower levels of the semantic hierarchy: the FSM level and the Conditional Task Graph (CTG) level. The figure also shows the interaction between the two levels. • Each of the ITUs in the figure implements a FSM with three states (red, yellow, and green). Assuming cyclic traffic signals, arcs indicate state transitions which are taken after the FSM spends ∆Ti,j time units in the current state (the time is called split time). The time intervals are specific to each ITU and each transition, and are fixed by the ZTCU for optimizing the traffic flow. The schedule of the traffic signal repeats over a period T (called cycle time). Neighboring ITUs communicate with each other to decide the delay between the monitored intersections (the delay is called offset). • The ZTCU behavior is expressed as a Conditional Task Graph (CTG), which indicates the activities performed by two cars arriving at ITU1 and ITU2 in the figure. Activities include passing through the intersection, moving to the next intersection, and so on. Each of the activities is characterized by an execution time Tex k, which is estimated based on the data collected locally from the sensors at the traffic lights. ZTCUs set the cycle and split times of each intersection, and also find the initial delay values. Execution times differ for different traffic scenarios, e.g., light traffic (indicated as branch L) and heavy traffic (shown as branch T). The semantics of the application states that one and only one of the branches Li and Hi is executed for a traversal of the graph. This semantics defines a conditional (multimode) behavior. ∆ T i,j ZTCU T 0 ITU 1 ITU 2 ITU 3 ITU 1 Red ∆ T ∆ T 2,1 1,1 ∆ T 3,1 Yellow Green ∆ T 4,1 ITU 2 Red ∆ T 1,2 2,2 ∆ T ∆ T 3,2 Yellow ITU 3 Red ∆ T ∆ T 2,3 1,3 ∆ T 3,3 Yellow Green ∆ T 4,2 Green ∆ T 4,3 ex i T T 1 T 7 L T 2 T 3 H T 4 T 5 L T 8 T 9 H T 10 T 11 T 6 T 12 T 13 L T 14 T 15 H T 16 T 17 T18 T 0 T 1 ex T 1 H T 3 ex T 3 H L ex 2T' 2T' ex 4 T T 4 ex T' 4 T' 4 L T 2 ex T2 T10 ∆T i,j T 6 ex T 6 H L Out 9 T 5 ex T 5 H L ex 7 T T 7 ex T' 7 T' 7 ex 8 T T 8 ex T' 8 T' 8 In 3 ITU 1 ex 6 T In 6 ITU 2 ex 3 T In 1 ex 1 T ex 2 ex 4 T T ex 5 T ex 7 T ex 8 T ex 9 T T 9 ex 9 T Figure 7: FSM -- Conditional Task Graph hierarchy Figure 7(b) presents the concrete CTG for a zone with two consecutive intersections controlled by the traffic signals ITU1 and ITU2. The graph presents the activities occurring during one cycle of the entire area, even though the cycle might include several cycles of the individual traffic signals. The process is repetitive after each area cycle. In this example, we assumed single-lane roads, which means that two cars coming through the intersections ITU1 or ITU2 cannot move simultaneously. Hence, certain road sections (shown as dark areas in the figure) act as shared resources for two or more cars, while other roads are dedicated resources. The model defines tasks T1 and T2 as being the travel of a vehicle entering the area from the left, tasks T3 and T4 as representing the moving of a vehicle coming from the top-left road, tasks T6 and T7 represent a car moving from top right, and so on. The resulting CTG is illustrated in the figure. Each task has two attributes: Ni is the number of vehicles that traverses the section during one cycle, and ex is the time required for the vehicles to pass through the section. Obviously, the two attributes are Ti related to each other. In the graph, the tasks sharing the same resources (the road sections are depicted in dark) are marked with dashed and dotted lines, respectively. In addition, the dummy task ∆∆∆∆T12 represents the offset time between the two traffic signals. The ZTCU for the area computes online the optimal scheduling of the tasks Ti while tackling requirements such as, (i) to maximize the total number of vehicles passing though the zone, (ii) to minimize the time taken to cars to move through the zone, (iii) to minimize the fuel consumption in a certain area, (iv) to minimize the amount of polluting gases that are generated, and so on. To avoid continuous recomputing of schedules and to improve the flexibility of the approach, the ZTCU scheduler calculates traffic signal schedules for different traffic conditions, which determine the "behavior" (and thus the mathematical models) for the task attributes, such as parameters Ni and Ti Please note that each computed schedule corresponds to traffic conditions described by conditional behavior and the qualitative parameters Li and Hi in the figure. For example, if the traffic load is low on the segment 1 then the branch labeled as L is taken after the task T1 is completed, hence task T2 is performed. If the traffic load is high then the branch labeled as H is selected, and the task T2' is pursued. Tasks T2 and T2' can never be performed simultaneously as they correspond to mutually excluding ex. conditions (e.g., the traffic intensity cannot simultaneously be low and high). This generates eight different situations for the case study in Figure 7(b), and eight different optimal scheduling situations for the zone, such as the schedule S(L,L,L) with the total time Ttot (L,L,L) for the situation in which the traffic density is light through all three intersections. The actual conditions, which are labeled as L and H, can be different for different traffic lights, and can involve more than two situations. The concrete task scheduling for CTGs can be computed with algorithms similar to the one in [Eles et al (2000)]. Figure 8(a) illustrates the interaction between the local ITUs at each traffic signal and the CTG scheduling at the ZTCU for the interacting ITUs. The scheduling table computed online by the ZTCU is shown in the figure. The table includes the scheduling solutions for different scenarios that might arise in traffic. Please note that the actual semantics of the conditions Li and Hi (e.g., what traffic conditions actually define ex. More them) are refined during execution depending on the variation of the parameters Ni and Ti conditions allow more precise tuning of the schedules, however, the computational complexity of calculating the optimized schedules is also higher [Eles et al (2000)]. The table presents the schedules for two situations: one in which traffic is light along all directions, and the second in which the traffic along direction two is more intense while the others remain low. The traffic schedules are computed so that the total number of cars passing through the zone is maximized while the timing along different directions is kept within fixed deadlines (e.g., to avoid large delays along certain directions due to enabling heavy traffic along other directions). The boxes in gray indicate some of the idle times along a direction. ITU 1: ZTCU: Scenario 2 L 1 L 2 L 3 L 4 . . . L 1 H 2 L 3 L 4 . . . Scenario 1 After ∆ T x Yellow Scenario 1 Red Green After ∆ T y Scenario 2 6T 8T 9T''' T 1 2T 5T' 7T' 9T' 3T T 4 5T'' 7T'' 9T'' Time 6T 8T 9T''' 3T T 4 5T'' 7T'' 9T'' T 1 2T 5T' 7T' 9T' p (x,y,z)−>(u,v,w) ZTCU ATCU Conditional Task Graph level S (L,L,L) T(L,L,L) ... S (H,H,H) T(H,H,H) p (L,L,L)−>(L,L,H) TCU S (L,L,L) S (L,L,H) p (L,L,H)−>(L,L,L) ... Traverse Area 1 T area1 S (L,H,L) S (L,H,H) Traverse Area 2 T area2 T area i Figure 8: FSM - Conditional Task Graph -- Markov Process -- Functional Graph hierarchy The information in the CTG scheduling table is mapped down onto the FSMs of each individual traffic signal. For example, for Scenario 1 (in which traffic is low along all directions), the time required for performing task T3 plus the following idle time generate the timing constraint ∆∆∆∆Tx, which states that after that amount of time the FSM must be in state Green, thus allowing traffic to progress along direction two. Similarly, for Scenario 2, the time for task T1 plus the following idle time define the constraint ∆∆∆∆Ty, which states that the traffic signal ought to be in state Red after ∆∆∆∆Ty, which allows traffic to progress along direction one. As long as each traffic signal meets its local timing constraints (∆∆∆∆Tx and ∆∆∆∆Ty), the behavior at the ZTCU level still meets the traffic schedules specified in the ZTCU table. Please note that the local FSMs can switch more often, such as if no vehicle is traveling in one direction and a single car is approaching from another direction, but for "pools" of vehicles the signaling must follow the timing constraints of the ZTCU table. Figure 8(b) presents the upper levels of the hierarchy, including the Markov Process (ATCU) and the Functional Graph (TCU) levels, and their connection to the lower Conditional Graph level (ZTCU). For an estimated number of vehicles that pass through the area, the ZTCU has the optimal activity schedules for each estimated traffic scenarios. If the timing delay Tarea_i of a ZTCU schedule exceeds the necessary timing constraint set for the area traversal, then the traffic light controllers are adjusted so that the new traffic scenarios has a schedule that meets the constraint. Another action set by the ATCU is to distribute the traffic flow among the two areas so that the set timing constraints are met and the total number of cars passing through the area is maximized. This decision making is achieved by setting up a Markov process for the area in which the states correspond to the traffic scenarios of the ZTCU (eight scenarios in our case study). The transition rates between the states are the probabilities p(x,y,z)->(u,v,w) of shifting from one scenario to another. ATCU maintains a macro-level perspective of the traffic flow in which the moving of vehicles appears like a continuum flow without losses (the number of vehicles that enters a zone is equal to the number of vehicles that exists). For the example in Figure 7, In1+In3+In6=Out9 (indexes reflect the corresponding street segment). The following paragraphs introduce briefly the concept of Continuous-Time Markov Decision Processes, and explain how this formalism is used to model the higher levels of the ATCU decision making. A Continuous-Time Markov Decision Process (CTMDP) is defined as the following sixth-tuple: }r,k,q),(A,A,I{ Where I is a finite state space, A is a finite set of actions, A() is the function indicating the actions associated to any state in I, k is the number of criteria, rk(i,a) is the reward rate for criterion k, and q(i,j,a) is the transition rate from state i to state j, if action a is conducted. For ATCU decision making, the different traffic scenarios define the states of a CTMDP, such one state corresponds to low traffic conditions through each intersection of the zone. Hence, one state corresponds to one column in the CTG scheduling table. If the CTMDP corresponds to multiple scheduling tables then each column generates a different state in the table. The action set A represents the alternative routes that are available for moving inside a zone. The action set correlates to the available traffic scenarios and also the traffic ex and Ni. Rewards rk are the number of cars passing through a certain zone in a time equal parameters Ti to the time modeled through the scheduling table of the CTG. Thus, parameter k is one in this case. Decision making is expressed as the following optimization problem: a,ix)a,i(r Maximize ∑∑ ⋅ Such that ∑ x)a,i(q a,j ∑∑ ∑∑ x a,i 0 − ∑∑ = 1 x a,i ≥ x)a,i(r k a,i ⋅ x)a,j,i(q ⋅ = 0 a,i ≥ c k Qualitative Decision Making using Fuzzy Logic. An alternative to the previous approach can be based on hierarchical qualitative decision making, such as fuzzy logic and expert systems. Fuzzy logic computes the control outputs using a set of predefined rules that operate on a qualitative assessment of the inputs. The qualitative assessment (through membership functions) is critical as it decides the meaning of the inputs for the controller. Obviously, in a dynamic system, the meaning might change over time to reflect the insight gained during operation. Hence, the decision making process can be organized as a two level strategy, in which the upper level component uses learned patterns and dependencies to set the characteristics for decision making of the lower level, fuzzy logic controller. Figure 10 shows the block diagram of the two-level hierarchical control system. The fuzzy logic controller ZLCU receives aggregated information from (i) the illumination sensors, aggregated by block AG-il (e.g., the intensity of the ambient light i), and (ii) the traffic sensors, aggregated by block AG-t (e.g., the traffic "density" d). ZLCU computes the command variable u (e.g., for the actuators of the ambient illumination system). The fuzzy controller is supervised by the upper level control system LCU that sets parameter a, which is used by the fuzzy logic controller to qualitatively assess the two inputs. Figure 10: (a) Hierarchical qualitative control scheme and (b) fuzzy logic controller Figure 10(b) presents the block diagram of the fuzzy logic controller ZLCU. The received inputs are fuzzified in the input interface block Fuz. Then, an inference based on the max-mi method is done on the fuzzyfied inputs using rule BR. The output information is defuzzified with the centroid method to produce the output u. The fuzzy variables ai, ad and au can take three qualitative values: small (S), medium (M), and big (B). The parameters of these membership functions on the universes of discourse are indexed with the indexes m for the medium value, M for the maximum, value and Ml for the limited maximum value. These parameters are modified by the high level component LCU. Samples of membership functions are given in Figure 11(a). LCU transmits the following set of values to ZLCU: a =      a im a a dm um a iM a a dM uM a iMl a a dMl uMl      (1) A simple rule base BR of the fuzzy controller is presented in Table 1. Table 1: Simple rule base u i B M S S S S M d M S M B B S M B Figure 4 presents the surface of the fuzzy controller u = f ,( di ) for a particular value set of the parameters (0.5; 1; 1.2) on the universe of discourse [0; 1.2] for all three fuzzy variables. Changes in the membership function parameters and the rule base will change the above surface. Figure 11: (a) Membership functions and (b) surface of the fuzzy controller 5. Specification for Integrated Decision Making The paradigm discussed in Section 4 ought to support interdependent applications of different types, as the global optimization goal might not involve a certain application. For example, increasing the traffic flow during night time is linked to the illumination control as optimal illumination might allow higher vehicle speeds while still maintaining safety. This requires that the decision making (DM) modules across the entire semantic hierarchy utilize a uniform specification model, which is independent of the application type and the control strategy utilized by each individual DM module. The specification model must also allow easy decision making across the DM modules for different applications. The specification model proposed for decision making in large scale urban environments is based on a goal-oriented description paradigm, in which each DM module has well-defined goals. The goals are set by the application, such as providing the required illumination intensity, or maximizing the traffic flow through a region. In addition, each DM module has limited set of capabilities, such as the maximum illumination it can provide, the highest traffic flow on a route, communication distance and bandwidth, local energy resources, and so on. Module inputs are either connected to the sensors or connections from DM modules positioned on the same or higher semantic levels. DM outputs are either actuation and control signals or connections to modules on the same or lower semantic levels. Each module conducts internally a decision making process using models similar to those detailed in Section 4, however these models are not accessible outside a DM module. Figure 12 illustrates the goal-based specification concept. Area Zone Integration Region DM Goals: Capabilities: Inputs: Outputs: Internal DM: Region Area DM Goals: Capabilities: Inputs: Outputs: Internal DM: Local DM Goals: Capabilities: Inputs: Outputs: Internal DM: Local DM Goals: Capabilities: Inputs: Outputs: Internal DM: Local DM Goals: Capabilities: Inputs: Outputs: Internal DM: Region DM Goals: Capabilities: Inputs: Outputs: Internal DM: Area DM Goals: Capabilities: Inputs: Outputs: Internal DM: Figure 12: Uniform specification approach for integrated decision making Different kinds of interactions can be set up between the participating DM modules: • Collaborative interactions: Collaborative interactions are set up between DM modules on the same semantic level and which have non-conflicting (non-competing) goals, such as the individual traffic light controllers which must all offer optimal lighting intensity of an area. The DM modules interact with each other through inputs and outputs, e.g., one DM module produces outputs that serve as inputs to another module. The goals and capabilities of DM modules are not affected by these kinds of interactions. • Competing interactions: Such interactions are set up between DM modules from the same semantic level but with competing goals, like maximizing the illumination of a certain zone but also minimizing the energy consumption of the zone (the latter can be set by the power grid application). Similarly to collaborative interactions, DM modules interact through their inputs and outputs but cannot change their goals or capabilities components. • Guiding interactions: Guided interactions are between DM modules at consecutively higher levels in the semantic hierarchy. The modules at the upper levels generate outputs that are used to set the goals of the modules on the lower levels. This way the first modules are steering the goals and hence the behavior of the latter modules. For example, the DM modules at the area level set constraints, which then become part of the goals section of the related traffic signal controllers. • Enabling interactions: Enabling interactions are information transfers from the lower semantic levels to the upper levels. A lower DM module transmits information about its capabilities to an upper DM module, so that the second uses this knowledge during a decision making process that might affect the goals set for the lower module through guided interactions. Enabling interactions is the information link through which the upper decision making modules acquire knowledge about the actions that are ongoing in the real world. These concepts are illustrated in Figure 13 which shows the interactions and integration of the decision making mechanisms for different infrastructure management subsystems in a city, such as street lighting control, traffic control, pollution monitoring, and disaster management. 6. Future Research Directions Several main research problems emerge related to the proposed decision making approach for large scale urban environments. The identified problems can be grouped into three categories, and are described next. The starting point in addressing the problems represents the developing of more orthogonal applications, like heat, water, gas, and power distribution, fast response in emergency situations, energy harvesting on large areas, environmental monitoring (including noise levels and pollution), social networking, and many more. Developing a suitable testbed for simulating these applications is also very important. A. Exploring the formal model: semantic hierarchy and specification. An important goal is to study the full potential for decision making of the proposed approach based on semantic hierarchy. The paper details a hierarchy based on Finite State machines, Conditional task Graphs, Markov Decision Processes, and Functional Graphs, but other quantitative or qualitative models can be incorporated into the hierarchy too. Some of the formalisms that we plan to research include Petri Nets, Signal Flow Graphs, Timed Automata, Hybrid Automata, Flow based models, linear and nonlinear programming, and likely other too. Also, it is important to understand the interactions between the mathematical formalisms, including techniques for propagating constraints top-down from the more abstract to the more precise levels, and also bottom-up for specifying feasibility constraints at the higher levels. Moreover, it is important to understand how the propagated constraints relate to the mathematical formalisms used in the hierarchy, as the same constraints might be utilized for different specification formalisms. The scalability of the hierarchical model for different formalisms must be characterized too. Finally, the current formalism targets only static sensing nodes but it is important to extend it for mobile nodes too. Figure 13: Integrated decision making in a city Another important issue relates to lay out the mathematical foundation of collaborative interactions between decision making systems. This is important for understanding what other collaboration types are possible, if entities interact though goals, capabilities, inputs, and outputs. Moreover, the specific manifestation of collaborative interactions for different semantic models needs to be addressed too. B. Online decision making algorithms. A set of specific online decision making algorithms ought to be developed for the semantic hierarchy model. This includes algorithms for forming clusters based on application goals, electing virtual leaders for each cluster, and instantiating the virtual hierarchy at the level of each embedded sensing node. This activity also implies identifying the best collaboration model among related decision modules, including finding the correlations that emerge dynamically during operation. Also, the implications of the semantic and goal based operation mode on the underlying wireless and wired communication protocols and routing algorithms needs to be explored too. Other important research problems refer to the actual optimization algorithms that are used for online optimization of the goals expressed in different semantic models. This includes online algorithms for resource allocation and scheduling of data flow graphs and Conditional Task Graphs, and solving equations expressed as Markov Decision Processes or flow models. Moreover, fast algorithms are needed for integrating data from the low levels into constraints for the upper semantic levels, and also for propagating top-down constraints form the upper levels to the constituent decision making entities. These algorithms ought to tackle a variety of trade-offs, like cost, speed, reliability, energy consumption, etc. Also, the importance of these constraints might also change dynamically during execution, and thus decision making should be capable to respond quickly to changes. A possibility involves developing algorithms that can adapt to new requirements by incrementally changing the current solution. Considering that the adapted solutions are not optimal, it is important to understand and estimate the performance loss of an incrementally adapted solution as compared to the optimized solution. C. Performance prediction for reliable operation. A challenging objective is to provide the means for accurately estimating in real-time the performance of alternative decisions for new situations. This problem is essential for devising any efficient and reliable control algorithm. For an alternative, estimations should describe performance attributes, like quality (e.g., illumination intensity for lighting control), response time, precision, energy consumption, cost, etc. The predicted performance should include both continuous valued/time and discrete valued/time performance. Attributes like energy consumption, illumination intensity, response time, and travel time are examples of continuous valued-continuous time performance. Examples of discrete-valued attributes are the number of cars passing through a zone, the bit precision of a decision, etc. Performance estimation should rely at a minimum on simulation, instead macromodeling techniques ought to be developed based on linear and nonlinear interpolation, piecewise linear modeling, neural networks, wavelet functions, and so on. Also, it is important to detect and extract online any new patterns and correlations that emerge during operation, and use this information to further optimize the response of the decision making systems. 7. Current Information Systems for Large Urban Environments A number of recent research projects focus on developing wireless sensor networks for applications in urban environments. The monitoring of the noise level in a city and building the related noise maps is presented in [Santini (2007)]. The TIME (Transport Information Monitoring Environment) project [Yoneli (2005)] targets the improving of the traffic efficiency in Cambridge UK by monitoring and processing information collected in real-time about traffic. The U-City approach [Licalzi (2005)] attempts to connect the information systems in residential, governmental, commercial, and healthcare areas. The CarTel project [Hul (2006)] focuses on distributed mobile sensor networks for monitoring traffic. The approach is based on opportunistic data muling through mobile sensors, and offers delay-tolerant pipes and delay-tolerant stack for data transport. The concept of adaptive traffic-light control through Collaborative Reinforcement Learning is introduced in [(Cunningham)]. Several other approaches are detailed next. The CitySense concept [Murty (2007)] is wireless sensor network based infrastructure for developing application for large urban environments. Possible applications for CitySense include serving web pages, VoIP, social networking, and monitoring the networks deployed in a city. CitySense assumes static deployment of powerful computing platforms equipped with radios using the 802.11 wireless protocol to transmit over a mesh network. Hence, each node has the capabilities to perform locally complex computations and to communicate over multiple channels at high data rates. CitySense also relies on moving vehicles to provide connectivity to the areas which are hard to communicate with through radios. It uses predictions about the trajectory of the vehicle to prepare in advance the data to be communicated to the vehicle. Also this information is used to decide the aggregation points of the collected information. The MobEyes system [Lee (2006)] has been developed for monitoring and data acquisition in urban environments. The system uses moving vehicles such as cars to transport necessary information to/from areas in which wireless communication cannot be offered. The communicated information represents a summary of the entire information harvested by the nodes during operation. The single-hop communication protocol (called MDHP) transmits the missing data summaries to a vehicle that enters the communication range of the sensor. The summaries are stored locally by the sensor or collected from its neighbors. Moving police agents collect the important summaries. The protocol is scalable, and requires acceptable large latency overhead but cannot tackle real-time constraints. The MetroSense approach [Campbell (2006)] also tackles the problem of data gathering in urban settings, and exploits mobile vehicles for improving the covered area. This is very important for keeping the cost of the network down and also to offer connectivity if of remote zones. The authors propose an opportunistic delegation model in which tasks are temporarily re-assigned to available nodes. Similar to MobEyes, vehicles are used to carry information to remote areas. The authors propose four protocols for moving data through vehicles: lazy uploading, lazy tasking, direction-based muling, and adaptive multihop. In lazy uploading, a point-to-point connection is used to transmit data to the vehicle as long as it stays in the zone covered by the radio. The next available vehicle continues the data transfer. A similar strategy is used in lazy tasking to assign tasks (through reprogramming) to new processing devices. Direction-based muling uses predictions on vehicle moving to transfer data to the vehicles that are more likely to move towards the target of the data communication. In adaptive multihop, the characteristics of the communication, such as the task boundary, change dynamically depending on static threshold values, like the load threshold. The concept is exemplified in [Eisenman (2007)] for the practical case of data collection by a network of bicycles to improve the quality of bicycle riding. [Kansal (2004)] propose a networking infrastructure which uses autonomous mobile wireless routers for improving the energy consumption, accuracy, data rate of communication over large areas. The infrastructure also gives connectivity to remote areas. The method computes and adjusts the trajectories for the mobile routers depending on the nature of their dynamics, e.g., random, predictable, and controlled movement. A set of adaptive control procedures are suggested to adjust the speed of the mobile routers depending on the speed and latency of data collection, and the connectivity of the network. In deciding the dynamics, the procedures exploit the correlations between the sensing speed, communication distance, data rate and energy consumption. 8. Conclusions Cities are complex systems in which resources and infrastructure are continuously allocated to economy and inhabitants. A city must have sufficient decision making systems for continuously dispatching resources like water, electricity, heat, traffic, etc. in flexible, autonomous, scalable, efficient, and predictable fashion. This task is challenging as the quality of decision making is a trade-off between effectiveness, comprehensiveness, and related costs. Global decisions can be more efficient, however, they are time consuming and financially expensive. In contrast, local decisions are cheap but offer mostly local decisions. In addition, the integrated nature of modern applications requires control strategies that can comprehensively tackle correlated applications or which might become correlated in certain conditions. Intriguing new control solutions can be devised based on modern technology involving ubiquitous data collection through sensors, automated analysis and prognosis, and online optimization. This enables global decision making over large areas while keeping the costs low. Also, new mechanisms can be devised to integrate and co-optimize the correlated applications. This expands the optimization space, and increases the reliability of decision making in new situations. This paper proposes a new decision making paradigm for optimizing the continuous, real-time allocation of resources to satisfy demands in large cities. The paper refers to street lighting and traffic control as case studies to illustrate the paradigm. The proposed concept is structured as a semantic hierarchy in which different decision making models and strategies coexist and interact to produce flexible, autonomous, scalable, efficient, and predictable decisions. For scalability, only a reasonably large number of modules collaborate with each other to reach global decisions. Flexibility and autonomy results by using reactive models for the bottom decision making levels. Efficiency and predictability is due to the reactive behavior being constrained by the upper semantic levels, which use more deterministic models. The upper levels compute the limits within which reactive decision making must operate, so that the overall goals and constraints are not violated. The data sampled from the environment is aggregated and propagated to the upper semantic levels, where it is used for global decision making. Finally, the paper discusses the defining elements of the specification formalism for integrating different but related applications. Interactions between decision modules, such as collaboration, competition, guidance, and enabling interactions, are defined based on the goals, capabilities, inputs, and outputs of each module. While the proposed decision making paradigm is applicable to other theoretical formalisms too, this paper refers to a semantic hierarchy based on Finite State Machines (FSMs), Conditional Task Graphs (CTGs), Continuous Time Markov Decision Processes (CTMDPs), and Functional Graphs (FGs). The hierarchy is exemplified for coordinated traffic signal control, a main application in modern cities. Decisions at successively higher semantic levels are used to cover increasingly broader geographical areas: FSMs implement reactive control guided by signals coming from sensors as well as neighboring FSMs, CTGs schedule the related activities over time for different traffic conditions, CTMDP use macroscopic descriptions of the system to conduct scenarios-specific optimizations, and FGs regulate the global allocation of resources and infrastructure to global demands. Three main research problems emerge related to the proposed decision making approach. First, it is important to study semantic hierarchies based also on other formalisms like Petri Nets, Signal Flow Graphs, Timed Automata, Hybrid Automata, Flow based models, linear and nonlinear programming, and so on. Moreover, it is needed to devise the theoretical foundations for propagating constraints top-down from the more abstract to the more precise levels, and also bottom-up for specifying feasibility constraints at the higher levels. Second, efficient online decision making algorithms ought to be developed for the semantic hierarchy model, e.g., algorithms for forming goal oriented clusters, electing virtual leaders, and mapping the virtual hierarchy onto each embedded node. Also, new algorithms need to be designed for resource allocation and scheduling at different levels of the model hierarchy while tackling trade-offs, like cost, speed, reliability, energy consumption, etc. As the importance of these constraints might change during execution, the algorithms should incrementally change the current solution to adapt it to the new requirements. Third, procedures for accurate, real-time performance estimation ought to be devised. The tackled performance should include both continuous valued/time and discrete valued/time performance. Moreover, performance estimation should rely mostly on macromodeling, so that it can be performed in real-time. Other tasks relate to detecting and extracting online any emerging patterns and correlations, and using this information to further optimize decision making. References [Albus (2000)] J. Albus, "Features of Intelligence Required by Unmanned Ground Vehicles", NIST Workshop on Performance Metrics for Intelligent Systems, 2000. [Balarin et al (1997)] F. Balarin, L. Lavagno, P. Murthy, A. Sangiovanni-Vincentelli, "Scheduling for Embedded Real-Time Systems", IEEE Design & Test of Computers, Jan-March 1998, pp. 71-82. [Benett et al (1997)] F. Benett, D. Clarke, J. B. Evans, A. Hopper, A. Jones, D. Leask, "PicoNet: Embedded Mobile Networking", IEEE Personal Communication Magazine, 4(5): 8-15, Oct. 1997. [Bonnet et al (2000)] P. Bonnet, J. Gehrke, P. Seshadri, "Querying the Physical World", IEEE Personal Communications, Vol. 7, October 2000, pp. 10-15. [Borgatti et al (2003)] M. Borgatti, F. Lertora, B. Foret, L. Cali, "A Reconfigurable System Featuring Dynamically Extensible Embedded Microprocessor, FPGA, and Customizable I/O", IEEE Journal of Solid- State Circuits, Vol. 38, No. 3, pp. 521-529, March 2003. [Brooks et al (2003)] R. Brooks, P. Ramanathan, A. Sayeed, "Distributed Target Classification and Tracking in Sensor Networks", Proceedings of IEEE, Vol. 91, No. 8, pp. 1163-1171, August 2003. [Buck et al (1994)] J. Buck, S. Ha, E. Lee, D. Messerschmitt, "Ptolemy: A Framework for Simulation and Prototyping Heterogeneous Systems", International Journal of Computer Simulation, 4: 155-182, April 1994. [Byers and Nasser (2000)] J. Byers, G. Nasser, "Utility-Based Decision-Making in Wireless Sensor Networks", First Annual Workshop on Mobile and Ad Hoc Networking and Computing, MobiHoc 2000, 2000, pp. 143-144. in available a Next-Generation Urban Traffic Control Environment", [Campbell et al (2006)] A. Campbell, S. Eisenman, N. Lane, E. Miluzzo, R. Peterson, "People-Centric Urban Sensing", Proc. of 2nd Annual International Workshop on Wireless Internet, 2006. [Chakrabarty et al (2003)] A. Chakrabarty, A. Sabharwal, B. Aazhang, "Using Predictable Observer Mobility for Power Efficient Design of a Sensor Network", Proc. of Second International Workshop on Information processing in Sensor Networks, 2003. [Chong and Kumar (2003)] C.-Y. Chong, S. P. Kumar, "Sensor Networks: Evolution, Opportunities, and Challenges", Proceedings of the IEEE, Vol. 91, No. 8, pp. 1247-1256, August 2003. [Cohen et al (2004)] I. Cohen, M. Goldszmidt, T. Kelly, J. Symons, J. Chase, "Correlating instrumentation to system states: A building block for automated diagnosis and control", Proc. 6th Symposium on Operating Systems Design and Implementation, 2004. [Cunningham et al] R. Cunningham, J. Dowling, A. Harrington, V. Reynolds, R. Meier, V. Cahill, "Self- Optimization at http://www.ercim.org/publication/Ercim_News/enw64/cunningham.html. [De et al (2005)] P. De, A. Raniwala, S. Sharma, T. Chiueh, "MiNT: A Miniaturized Network Testbed for Mobile Wireless Research", Proc. of IEEE Infocom, 2005. [De et al (2006)] P. De, R. Krishnan, A. Raniwala, K. Tatavarthi, N. Syed, J. Modi, T. Chiueh, "MiNT-m: An Autonomous Mobile Wireless Experimentation Platform", Proceedings of Mobisys, 2006. [Dineen (2000)] M. Dineen, "Real-Time Display of Dublin Traffic Information on the Web", MS Thesis, University of Dublin, 2000. [Dion and Yagar (1996)] F. Dion, S. Yagar, "Real-Time Control of Signalized Networks -- Different Approaches for Different Needs", Eight International Conference on Road Traffic Monitoring and Control, IEE, pp. 56-60, 1996. [Driankov et al (1996)] D. Driankov, H. Hellendorn, M. Reinfrank, L. Ljung, R. Palm, B. Graham, A. Ollero, "An Introduction to Fuzzy Control", Springer, 1996. [Dubois et al (2003)] H. Dubois-Ferriere, M. Grossglauser, M. Vetterli, "Age Matters: Efficient Route Discovery in Mobile Ad Hoc Networks using Encounter Ages", Proc. of MobiHoc, 2003. [Eisenman et al (2007)] S. Eisenman, N. Lane, E. Miluzzo, R. Peterson, G. Ahn, A. Campbell, "The BikeNet Mobile Sensing System for Cyclist Experience Mapping", Proc. of Sensys 2007, 2007. [Eles et al (2000)] P. Eles, A. Doboli, P. Pop, Z. Peng, "Scheduling with Bus Access Optimization for Distributed Embedded Systems", IEEE Transaction on VLSI, Vol. 8, No. 5, pp. 472-491, October 2000. [Estrin et al (1999)] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next Century Challenges: Scalable Coordination in Sensor Networks", Proc. Int. Conf. Mobile Computing and Networking (MOBICOM), 1999, pp. 263-270. [Farinwata et al (2000)] S. Farinwata, D. Filev, R. Langari, "Fuzzy Control: Synthesis and Analysis", Wiley, 2000. [Fehin (2004)] K. Fehin, "Adaptive Traffic Signals. Are we missing the boat?", ITE District 6 2004 Annual Meeting, available online at http://www.dksassociates.com/paper_signals.asp. [Feinberg (1994)] E. Feinberg, "Constrained Semi-Markov Decision Processes with Average Rewards", ZOR- Mathematical Methods of Operational Research, Vol.39, pp. 257-288,1994. [Feinberg (2002)] E. Feinberg, "Optimal Control of Average Reward Constrained Continuous Time Finite Markov Decision Processes", Proc. of IEEE Conference on Decision and Control, pp. 3805-3810, 2002. [Felici et al (2006)] G. Felici, G. Rinaldi, A. Sforza, K. Truemper, "Intelligent Traffic Control: A Logic Programming Approach and a Real Application", Transportation Research Part C: Emerging Technologies, Volume 14, Issue 3, June 2006, Pages 175-189. [Gajski et al (1994)] D. Gajski, F. Vahid, S. Narayan, J. Gong, "Specification and Design of Embedded Systems", Prentice Hall, 1994. [Gartner (1983)] N. Gartner, "A Demand Responsive Strategy for Traffic Signal Control", Transportation Research Record, No. 906, 1983. [Gartner et al (1992)] N. Gartner, C. Messer, A. Rathi, "Traffic Flow Theory: A State of the Art Report -- Revised Monograph on Traffic Flow Theory", U.S. Department of Transportation, Transportation Research Board, Washington D.C, 1992. [Girault et al (1999)] A. Girault, B. Lee, E. Lee, "Hierarchical Finite State Machines with Multiple Concurrency Models", IEEE Transactions on CAD of Integrated Circuits and Systems, Vol. 18, No. 6, pp. 742-760, June 1999. [Greene (2007)] K. Greene, "A Wireless Sensor City", Technology Review Published by MIT, April 13 2007. [Guibas (2002)] L. Guibas, "Sensing, Tracking and Reasoning with Relations", IEEE Signal Processing Magazine, March 2002, pp. 73-85. [Helbing et al (2007)] D. Helbing, S. Lammer, J.-P. Lebacque, "Self-Organized Control of Irregular or Perturbed Network Traffic", Optimal Control and Dynamic Games, Vol. 7, pp. 239-274, Springer, 2007. [Hull et al (2006)] B. Hull, V. Bychkovsky, K. Chen, M. Goraczko, A. Miu, E. Shih, Y. Zhang, H. Balakrishnan, S. Madden, "CarTel: A Distributed Mobile Sensor Computing System", Proc. of ACM SenSys, 2006. [Imielinski and Goel (2000)] T. Imielinski, S. Goel, "DataSpace - Querying and Monitoring Deeply Networked Collections in Physical Spaces", IEEE Personal Communications Magazine, August 2000, pp. 44-51. [Ismail et al (1995)] T.-B. Ismail et al, "Synthesis Steps and Design Models for Codesign", Computer Magazine, February 1995. [Jones et al (2001)] C. Jones, K. Sivalingam, P. Agrawal, J. Chgen, "A Survey of Energy Efficient Network Protocols for Wireless Networks'', Wireless Networks, Vol. 7, 2001, pp. 343-358. [Jain et al (2004)] S. Jain, R. Shah, W. Brunette, G. Boriello, S. Roy, "Exploiting Mobility for Energy Efficient Data Collection in Sensor Networks", Proc. of IEEE Workshop on Modeling and Optimization in Moble Ad Hoc and Wireless Networks, 2004. [Jogalekar and Woodside (2000)] P. Jogalekar and M. Woodside, "Evaluating the Scalability of Distributed Systems", IEEE Transactions on Parallel and Distributed Systems, Vol. 11, No. 6, pp. 589-603, June 2000. [Kazmer et al (2003)] D. Kazmer, D. Hatch, L. Zhu, C. Roser, D. Kapoor, "Definition and Application of a Process Flexibility Index", Journal of Manufacturing Science and Engineering, Vol. 125, pp. 164-173, February 2003. [Licalzi and O'Connell (2005)] P. Licalzi O'Connell, "Korea's High-Tech Utopia, Where Everything Is Observed", The New York Times, October 5 2005. [Kallakuri and Doboli (2007)] S. Kallakuri, A. Doboli, "Customization of Arbitration Policies and Buffer Space Distribution using Continuous Time Markov Decision Processes", IEEE Transactions on VLSI Systems, 2007. [Kansal et al (2004)] A. Kansal, A. Somasundara, S. Jea, M. Srivastava, D. Estrin, "Intelligent Fluid Infrastructure for Embedded Networks", Proc. of MobiSys'04, 2004. [Klemmer et al (2002)] S. Klemmer, S. Waterson, K. Whitehouse, "Towards a Location-Based Context- Aware Sensor Infrastructure", IEEE Signal Processing Magazine, March 2002. [Korkmaz et al (2004)] G. Korkmaz, E. Ekici, F. Ozguner, U. Ozguner, "Urban Multihop Broadcast Protocols for Inter-Vehicle Communication Systems", Proc. of VANET'04, 2004. [Kostrzewski et al (2001)] A. Kostrzewski, S. Ro, T. Jannson, "Visual Sensor Network Based on Video Streaming and IP-Transparency", Proc. of SPIE, Vol. 4396, 2001, pp. 74-8 [LeBrun et al (2005)] J. LeBrun, C.-N. Chuah, D. Ghosal, M. Zhang, "Knowledge-based Opportunistic Forwarding in Vehicular Wireless Ad Hoc Networks", Proc. of IEEE VTC, 2005. [Lee and Sangiovanni-Vincentelli (1998)] E. Lee, A. Sangiovanni-Vincentelli, "A Framework for Comparing Models of Computation", IEEE Transactions on CAD of Integrated Circuits and Systems, Vol. 17, No. 12, pp. 1217-1229. December 1998. [Lee et al (2006)] U. Lee, E. Magistretti, B. Zhou, M. Gerla, P. Bellavista, A. Corradi, "MobEyes: Smart Mobs for Urban Monitoring with Vehicular Sensor Networks", IEEE Wireless Communications, Vol. 13, No. 5, October 2006, pp. 52-57. [Liao et al (1997)] S. Liao, S. Tijang, R. Gupta, "An Efficient Implementation of Reactivity for Modeling Hardware in the Scenic Design Environment", Proc. of Design Automation Conference, 1997. [Meystel (2000)] A. Meystel, "Measuring Performance of Systems with Autonomy: metrics for Intelligence of Constructed Systems", NIST Workshop on Performance Metrics for Intelligent Systems, 2000. [Murty et al (2007)] R. Murty, A. Gosain, M. Tierney, A. Brody, A. Fahad, J. Bers, M. Welsh, "CitySense: A Vision for an Urban-Scale Wireless Networking Testbed", Harvard Technical Report TR-13-07, 2007. [Ng et al (2005)] C. Ng, P. Buanadonna, B. Chun, A. Snoeren, A. Vahdat, "Addressing Strategic Behavior in a Deployed Microeconomic Resource Allocator", Proc. of SIGCOMM'05, 2005. [Passino and Yurkovich (1998)] K. Passino, S. Yurkovich, "Fuzzy Control", Addison Wesley Longman, 1998. [Porche (1996)] I. Porche, "A Decentralized Scheme for Real-Time Optimization of Traffic Signals", Proc. of IEEE International Conference on Control Applications, pp. 582-589, 1996. [Pottie and Kaiser (2000)] G. J. Pottie, W. J. Kaiser, "Wireless Integrated Network Sensors", Communications of the ACM, Vol. 43, No. 5, 2000, pp. 51-58. [Qiu et al (2001)] Q. Qiu, Q. Wu, M. Pedram, "Stochastic Modeling of a Power Managed System Construction and Optimization", IEEE Transactions on CADICS, Vol. 20, No. 9, pp. 120-121, 2001. [Raychaudhuri et al (2005)] D. Raychaudhuri, I. Seskar, M. Ott, S. Ganu, K. Ramachandran, H. Kremo, R. Siracusa, H. Liu, M. Singh, "Overview of the ORBIT Radio Grid Testbed for Evaluation of Next- Generation Wireless Network Protocols", Proc. of WCNC'05, 2005. [Reeves et al (1993)] C. Reeves et al, "Modern Heuristic Techniques for Combinatorial Problems", J. Wiley, 1993. [Richter et al (2006)] S. Richter, D. Aberdeen, J. Yu, "Natural Actor-Critic for Road Traffic Optimisation", Proc. of NIPS, 2006. [Saleh et al (2002)] Saleh et al, "Space System Flexibility Provided by on-Orbit Sensing: Part II", Journal of Spacecraft and Rockets, Vol. 39, No. 4, pp. 561-570, July -- August 2002. [Santini and Vitaletti (2007)] S. Santini, A. Vitaletti, "Wireless Sensor Networks for Environmental Noise Monitoring", GI/ITG Workshop Wireless Sensor Networks, Aachen, 2007. [Shah et al (2003)] R. Shah, S. Roy, S. Jain, W. Brunette, "DataMULEs: Modeling a Three Tiered Architecture for Sparse Sensor Networks", Proc. of First International Workshop on Sensor Network Protocols and Applications, 2003. [Shen et al (2001)] C.-C. Shen, C. Srisathapornphat, C. Jaikaeo, "Sensor Information Networking Architecture and Applications", IEEE Personal Communications, August 2001, pp. 52-59. [Sinopoli et al (2003)] B. Sinopoli, C. Sharp, L. Schenato, S. Schaffert, S. Sastry, "Distributed Control Applications Within Sensor Networks", Proceedings of IEEE, Vol. 91, No. 8, pp. 1235-1246, August 2003. [Small and Haas (2003)] T. Small, Z. Haas, "The Shared Wireless Infostation Model: a New and Ad hoc Networkign Paradigm", Proceeding of ACM Mobihoc'03, 2003. [Tomlinson and Bull] A. Tomlinson and L. Bull, "Towards Distributed Adaptive Control for Road Traffic Junction Signals Using Learning Classifier Systems", available at citeseer.ist.psu.edu/601649.html. [Wahle and Schreckenberg (2001)] J. Wahle, M. Schreckenberg, "A Multi-Agent System for On-line Simulations based on Real World Data", Proc. of Hawaii International Conference on System Science, 2001. [Wang et al (2001)] I.-J. Wang, S. Jones, "The Scalability of a Class of Wireless Sensor Networks", Modeling and Design of Wireless Networks, E. Chong, editor, Proceedings of SPIE, Vol. 4531, 2001, pp. 103-113. [Warneke et al (2001)] B. Warneke, B. Liebowitz, K. Pister, "Smart Dust: Communicating with a Cubic Millimeter Computer", IEEE Computer, 2001, pp. 2-9. [Weiser (2002)] M. Weiser, "The Computer for the 21st Century", IEEE Pervasive Computing, Vol. 1, No. 1, pp. 15-25, January-March 2002. [Welsh and Bers] M. Welsh, J. Bers, "CitySense. An Open, City-Wide Wireless Sensor Network", presentation. [Weng and Doboli (2004)] Y. Weng, A. Doboli, "Smart Sensor Architecture Customized for Image Processing Applications", Proc. of 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004. [Werner et al (2005)] G. Werner-Allen, P. Swieskowski, M. Welsh, "MoteLab: A Wireless Sensor Network Testbed", Proc. of International Symposium on Information Processing in Sensor Networks, 2005, pp.483-488. [Wildstrom et al (2005)] J. Wildstrom, P. Stone, E. Witchel, R. Mooney, M. Dahlin, "Towards Self- Configuring Hardware for Distributed Computer Systems", Proc. of International Conference on Autonomic Computing, 2005, pp. 241-249. [Wiering (2000)] M. Wiering, "Multi-Agent Reinforcement Learning for Traffic Light Control", Proceedings of ICML, 2000. [Wiering et al (2004)] M. Wiering, J. van Veenen, J. Vreeken, A. Koopman, "Intelligent Traffic Light Control", Technical report UU-CS-2004-029, Institute of Information and Computing Sciences, Utrecht University, 2004. [William (1999)] B. William, "Modeling and Forecasting Vehicular Traffic Flow as a Seasonal Stochastic Time Series Process", Doctoral Dissertation, University of Virginia, Charlottesville, 1999. [Wolshon and Taylor (1999)] B. Wolson, W. Taylor, "Analysis of Intersection Delay under Real-Time Adaptive Signal Control", Transportation Research part C, Pergamon, pp. 53-72, 1999. [Yoneki (2005)] E. Yoneki, "Evolution of Ubiquitous Computing with Sensor Networks in Urban Environments", Proc. of UbiComp'05, 2005. [Zhao et al (2002)] F. Zhao, J. Shin, J. Reich, "Information-Driven Dynamic Sensor Collaboration for Tracking Application", IEEE Signal Processing Magazine, March 2002. [Zhao and Guibas (2004)] F. Zhao, L. Guibas, "Wireless Sensor Networks", Morgan Kaufmann, 2004. [CALCCIT] /Traffic_Surveillance/road-based/in-road/loop_summary.html. [NAE] Restore and improve urban infrastructure, http://www.engineeringchallenges.org /cms/8996/9136.aspx http://www.calccit.org/itsdecision/serv_and_tech
1903.02868
1
1903
2019-03-07T12:23:15
Convergence of Multi-Agent Learning with a Finite Step Size in General-Sum Games
[ "cs.MA", "cs.LG" ]
Learning in a multi-agent system is challenging because agents are simultaneously learning and the environment is not stationary, undermining convergence guarantees. To address this challenge, this paper presents a new gradient-based learning algorithm, called Gradient Ascent with Shrinking Policy Prediction (GA-SPP), which augments the basic gradient ascent approach with the concept of shrinking policy prediction. The key idea behind this algorithm is that an agent adjusts its strategy in response to the forecasted strategy of the other agent, instead of its current one. GA-SPP is shown formally to have Nash convergence in larger settings than existing gradient-based multi-agent learning methods. Furthermore, unlike existing gradient-based methods, GA-SPP's theoretical guarantees do not assume the learning rate to be infinitesimal.
cs.MA
cs
Convergence of Multi-Agent Learning with a Finite Step Size in General-Sum Games Xinliang Song Tsinghua University Beijing, China [email protected] Tonghan Wang Tsinghua University Beijing, China [email protected] Chongjie Zhang Tsinghua University Beijing, China [email protected] 9 1 0 2 r a M 7 ] A M . s c [ 1 v 8 6 8 2 0 . 3 0 9 1 : v i X r a ABSTRACT Learning in a multi-agent system is challenging because agents are simultaneously learning and the environment is not stationary, undermining convergence guarantees. To address this challenge, this paper presents a new gradient-based learning algorithm, called Gradient Ascent with Shrinking Policy Prediction (GA-SPP), which augments the basic gradient ascent approach with the concept of shrinking policy prediction. The key idea behind this algorithm is that an agent adjusts its strategy in response to the forecasted strat- egy of the other agent, instead of its current one. GA-SPP is shown formally to have Nash convergence in larger settings than existing gradient-based multi-agent learning methods. Furthermore, unlike existing gradient-based methods, GA-SPP's theoretical guarantees do not assume the learning rate to be infinitesimal. KEYWORDS Multi-Agent Learning; Nash Equilibrium; Convergence; Finite Step Size ACM Reference Format: Xinliang Song, Tonghan Wang, and Chongjie Zhang. 2019. Convergence of Multi-Agent Learning with a Finite Step Size in General-Sum Games. In Proc. of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), Montreal, Canada, May 13 -- 17, 2019, IFAAMAS, 9 pages. 1 INTRODUCTION Multi-agent learning (MAL) is concerned with a set of agents that learn to maximize their expected rewards. There are a number of important applications that involve MAL, including competitive settings such as self-play in AlphaZero [23] and generative ad- versarial networks in deep learning [15, 20], cooperative settings such as when learning to communicate [13, 25] and multiplayer game [14], or some mix of the two [17, 26]. Although promising em- pirical results, establishing a theoretical guarantee of convergence for MAL, especially for gradient-based methods, is fundamentally challenging because of its non-stationary environment. Recent multi-agent learning (MAL) algorithms [7, 9 -- 11, 19, 22] with satisfactory empirical results are proposed, but most of them do not provide theoretical analyses of convergence. There are only a few worksthat provide theoretical results before them. Singh et al. [24] first consider the theoretical convergence of gradient-based methods in MAL. After that, several variants [1, 4, 5, 24, 27] are proposed and they provide theoretical convergence in general-sum Proc. of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), N. Agmon, M. E. Taylor, E. Elkind, M. Veloso (eds.), May 13 -- 17, 2019, Montreal, Canada. © 2019 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved. games, but theoretical guarantees are restricted in 2-agent, 2-action games and they assume that the learning rate is infinitesimal, which is not practical. Some other online learning algorithms [8, 12, 16] have also been proposed with theoretical guarantees, but just for specific settings, such as congestion games and potential games. In this paper, we propose a new multi-agent learning algorithm that augments a basic gradient ascent algorithm with shrinking policy prediction, called Gradient Ascent with Shrinking Policy Prediction (GA-SPP). The key idea behind this algorithm is that an agent adjusts its strategy in response to the forecasted strategy of the other agent, instead of its current one. This paper makes three major novelties. First, to our best knowledge, GA-SPP is the first gradient-ascent MAL algorithm with a finite learning rate that provides convergence guarantee in general-sum games. Second, GA- SPP provides convergence guarantee in larger games than existing gradient-ascent MAL algorithms, which include m × n positive semi-definite games, a class of 2 × n general-sum games, and 2 × 2 general-sum games. Finally, GA-SPP guarantees to converge to a Nash Equilibrium when converging in any m×n general-sum game. Although GA-SPP shares some similar ideas about using policy prediction with IGA-PP [27] and the extra-gradient method [2], it has several major differences from them. For example, apart from using a finite step size, another significant difference between GA- SPP and IGA-PP is that forecasted strategies of the opponent are projected to the valid probability space. This improvement enables GA-SPP's Nash convergence when converging, which does not hold for IGA-PP. In contrast to the extra-gradient approach, GA- SPP uses shrinking prediction lengths which can be different from the policy update rate. This improvement makes GA-SPP not only more flexible in practice but also stronger in terms of theoretical guarantees. Like IGA-PP, we assume that agents know the other agent's strategy and its current strategy gradient, but we do not require the learning rate to be infinitesimal. Even though GA-SPP needs some restricted assumptions, it pushes forward the state of the art of MAL with theoretical analysis. We expect that our work can shed a light for theoretical understanding of dynamics and complexity of MAL problems and like IGA-PP and WoLF-IGA [6], can encourage broadly applicable multi-agent reinforcement learning algorithms. Our proposed learning algorithm also provides a different approach for computing Nash Equilibiria of subsets of larger games, other than well-established offline algorithms [18, 21], whose computa- tion complexity increases sharply with the number of actions. Notation We use following notations in this paper: ∆ denotes the valid strategy space (i.e., a simplex). Π∆: ℜn → ∆ denotes the convex projection to the valid space, Π∆[x] = arдminz ∈∆∥x − z∥. P∆(x, v) denotes the projection of a vector v on x ∈ ∆, P∆(x, v) = lim η→0 Π∆[x + ηv] − x η . (cid:19) (cid:18) v1 v2 (v1; v2) denotes , where v1, v2 are column vectors. 2 GRADIENT ASCENT We begin with a brief overview of normal-form games and then review the basic gradient ascent algorithm. 2.1 Normal-Form Games A 2-agent, m × n -action, general-sum normal-form game is defined by a pair of matrices  r11 ... rm1 R =  ... ... ... r1n ... rmn  c11 ... cm1  ... ... ... c1n ... cmn and C = specifying the payoffs for the row agent and the column agent, respectively. The agents simultaneously select an action from their available set, and the joint action of the agents determines their payoffs according to their payoff matrices. If the row agent selects action a ∈ {1, ..., m} and the column agent selects action b ∈ {1, ..., n}, respectively, then the row agent receives a payoff rab and the column agent receives a payoff cab. The agents can choose actions stochastically based on some prob- ability distribution over their available actions. This distribution is said to be a mixed strategy. Let αi ∈ [0, 1] denote the probability of choosing the i-th action by the row agent and βj ∈ [0, 1] denote the probability of choosing the j-th action by the column agent, where βj ≤ 1. We use ∆1 to denote a m-1 dimensional simplex and ∆2 to denote a n-1 dimensional simplex. This (m − 1) × (n − 1) representation is equivalent to the m × n representation, and, following the previous work on gradient-based methods, we choose the former one. Let i ∈ {1, ..., m − 1}, j ∈ {1, ..., n − 1},m−1 αi ≤ 1,n−1 1 1 α = [α1 ... αm−1]T β = [β1 ... βn−1]T , , em−1 = [1 ... 1]T en−1 = [1 ... 1]T , , where the dimension of em−1 is m − 1, the dimension of en−1 is n − 1. Then α ∈ ∆1, β ∈ ∆2. With a joint strategy (α , β), the row agent's and column agent's expected payoffs are R(β; 1 − e C(β; 1 − e Vr(α , β) = (α; 1 − e Vc(α , β) = (α; 1 − e m−1α)T T m−1α)T T n−1β), T n−1β). T (1) A joint strategy (α∗, β∗) is called a Nash equilibrium if for any mixed strategy α of the row agent, Vr(α∗, β∗) ≥ Vr(α , β∗), and for any mixed strategy β of the column agent, Vc(α∗, β∗) ≥ Vc(α∗, β). It is well-known that every game has at least one Nash equilibrium. 2.2 Learning using Gradient Ascent in Iterated Games In an iterated normal-form game, agents repeatedly play the same game. Each agent seeks to maximize its expected payoff in response to the strategy of the other agent. Using the basic gradient ascent algorithm, a agent can increase its expected payoff by updating its strategy with a step size along the gradient of the current strategy. The gradient is computed as the partial derivative of the agent's expected payoff with respect to its strategy: ∂α Vr(α , β) = ∂βVc(α , β) = where Im−1 is (m-1)-order identity matrix and In−1 is (n-1)-order identity matrix. If (αk , βk) are the strategies on the k-th iteration and both = (Im−1 em−1)R(β; 1 − e = (In−1 en−1)C T(α; 1 − e ∂Vr(α , β) ∂Vc(α , β) n−1β), T m−1α), T agents use gradient ascent, then the new strategies will be: (2) ∂α ∂β αk +1 = Π∆1[αk βk +1 = Π∆2[βk + η∂α Vr(αk , βk)], + η∂βVc(αk , βk)], (3) where η is the gradient step size. If the updates move the strategies out of the valid probability space, the function Π∆ will project it back. Singh et al. [24] analyzed the gradient ascent algorithm by exam- ining the dynamics of the strategies in the case of an infinitesimal step size (limη→0). This algorithm is called Infinitesimal Gradient Ascent (IGA). IGA cannot converge in some 2-agent 2-action zero- sum game. GIGA-WoLF and IGA-PP extended IGA and provide theoretical guarantee of Nash equilibrium in 2-agent 2-action game through similar methods. However, these algorithms require a in- finitesimal step size, which is not practical. We will describe a new gradient ascent algorithm that enables the agents' strategies to converge to a Nash equilibrium with a finite step size in a larger game setting. 3 GRADIENT ASCENT WITH SHRINKING POLICY PREDICTION (GA-SPP) As shown in Eq. 3, the gradient used by IGA to adjust the strategy is based on current strategies. Suppose that an agent can estimate the change direction of the opponent's strategy, i.e., its strategy derivative, in addition to its current strategy. Then the agent can forecast the opponent's strategy and adjust its own strategy in response to the forecasted strategy. With this idea, we design a gradient ascent algorithm with shrinking policy prediction (GA- SPP). Its updating rule consists of three steps. In Step 1, the new derivative terms with γ serve as a short-term prediction of the opponent's strategy. If the opponent's forecasted strategy is out of boundary of simplex, it will be projected back to the valid space. In Step 2, agents update their strategies on the basis of the fore- casted strategy of its opponent. In Step 3, agents terminate or adjust their prediction lengths. If predicted strategies are equal to the current strategies, the algo- rithm will terminate. Step 3 can make sure GA-SPP only converges to Nash equilibrium (NE) instead of other points. Because when (αk +1, βk +1) = (αk , βk), GA-SPP will stop, if there is no Step 3, then (α k +1, βk +1) (cid:44) (αk , βk) may happen. In this situation, GA- SPP may converge to a non-NE point. We will prove this property of GA-SPP in Proposition 1. Algorithm 1: Updating rule of GA-SPP 1 α k +1 = Π∆1[αk + γk ∂α Vr(αk , βk)]; βk +1 = Π∆2[βk + γk ∂βVc(αk , βk)]; + η∂α Vr(αk , βk +1)]; 2 αk +1 = Π∆1[αk + η∂βVc(α k +1, βk)];; βk +1 = Π∆2[βk 3 if (α k +1, βk +1) == (αk , βk) then else terminate; if (αk +1, βk +1) == (αk , βk) & (α k +1, βk +1) (cid:44) (αk , βk) then γk +1 = µkγk , (0 < µk < 1), back to (1); γk +1 = γk, back to (1); else end end The prediction length γk and gradient step size η will affect the convergence of the GA-SPP algorithm. With a too large prediction length, the gradient computed with the forecasted strategy will deviate too much from the gradient computed with the opponent's current strategy. As a result, the agent may adjust its strategy in the improper direction and cause their strategies to fail to converge. Following conditions ensure that γ and η are appropriate: Condition 1: Condition 2: Condition 3: γ0 > 0, η > 0 2 4γ 0 δr δc < 1 1 η, γ0 < δr +δc where δr = rmax − rmin, δc = cmax − cmin, rmax and cmax is the maximum reward for the row and column agent, rmin and cmin is the minimum reward for the row and column agent. Condition 3 makes sure that the theoretical guarantee of Nash convergence in the game settings analyzed in Section 4. In exper- iments, the algorithm can still work in some other games if we choose larger prediction length or let agents have different predic- tion lengths. 3.1 Analysis of GA-SPP In this section, we will show that if agents' strategies converge by following GA-SPP, then they must converge to a Nash equi- librium, which is described by Proposition 1. Using this proposi- tion, we will then prove the Nash convergence of GA-SPP in three classes of games: m× n positive semi-definite games, a class of 2× n general-sum games, and 2 × 2 general-sum games, respectively, in the following sections. Before proving Proposition 1, we will first show that if the pro- jected gradients of a strategy pair are zero, then this strategy must be a Nash equilibrium, which is described by Lemma 3.1. For brevity, let ∂α denotes ∂α Vr(α , β), ∂β denotes ∂βVr(α , β). Lemma 3.1. In (m×n)-action games, if the projected partial deriva- tives at a strategy pair (α∗, β∗) are zero, that is, P∆1(α∗, ∂α ∗) = 0 and P∆2(β∗, ∂β∗) = 0, then (α∗, β∗) is a Nash equilibrium. Proof. Assume that (α∗, β∗) is not a Nash equilibrium. Then at least one agent, for example, the column agent, can increase its expected payoff by changing its strategy unilaterally. Assume that the improved point is (α∗, β). Because of the convexity of the strategy space ∆2 and the linear dependence of Vc(α , β) on β, then, for any ϵ > 0, (α∗, (1 − ϵ)β∗ + ϵβ) must also be an improved point, which implies that the projected gradient of β at (α∗, β∗) is not zero. By contradiction, (α∗, β∗) is a Nash equilibrium. □ Proposition 1. In 2-agent, m × n games, if two agents follow GA-SPP with appropriate γ , η (satisfying Condition 1, 2, and 3) and GA-SPP converges, then (α∗, β∗) is a Nash equilibrium. Here is a proof sketch (the detailed formal proof is described in supplementary material1). According to Step 3 in the algorithm 1, if the strategy pair trajectory converges at (α ∗, β∗), then (α ∗, β∗) = (α k +1, β k +1) = (αk , βk)or (α ∗, β∗) = limk→∞(α k +1, β k +1) = limk→∞(αk , βk). For both cases, we can have α ∗ = Π∆1[α ∗ + η ∂α∗] and β∗ = Π∆2[β∗ + η ∂β∗]. From here, we can show that, for any arbitrary small ϵ > 0, α ∗ = Π∆1[α ∗+ϵ ∂α∗]and β∗ = Π∆2[β∗+ϵ ∂β∗], which imply P∆1(α ∗, ∂α∗) = 0 and P∆2(β∗, ∂β∗) = 0. Then according to Lemma 3.1, (α ∗, β∗) is a Nash equilibrium. 4 CONVERGENCE OF GA-SPP We will show the Nash convergence of GA-SPP in three classes of games in this section. 4.1 m × n Positive Semi-Definite Games A function Φ(v, w) is called a positive semi-definite function if it obeys the inequality defined in [3]: Φ(w, w) − Φ(w, v) − Φ(v, w) + Φ(v, v) ≥ 0. (4) To facilitate the proof, we define the normalized value function for a game: Φ(v, w) = Vr(α 1, β2) + Vc(α 2, β1), where v = (α 1, β1) ∈ {∆1 × ∆2}, w = (α 2, β2) ∈ {∆1 × ∆2}. (5) Definition 1. A 2-agent m×n game is called positive semi-definite (PSD) game if its normalized value function obeys Φ(w, w) − Φ(w, v) − Φ(v, w) + Φ(v, v) ≥ 0. It means that for a PSD game, its payoff matrices satisfies Vr(α 1, β1) + Vc(α 1, β1) + Vr(α 2, β2) + Vc(α 2, β2) ≥Vr(α 1, β2) + Vc(α 1, β2) + Vr(α 2, β1) + Vc(α 2, β1) ∀α 1, α 2 ∈ ∆1, ∀β1, β2 ∈ ∆2. (6) (7) Zero-sum games are a subset of PSD games, because their value functions satisfy Vr(α , β) + Vc(α , β) = 0, then both sides of inequality 7 are equal to zero. 1https://drive.google.com/file/d/1TZeRf0xp4g4wg-JX7zA9TjqC2S619pAp/view?usp= sharing For a PSD game, if (α∗, β∗) is a Nash equilibrium and v∗ = (α∗, β∗), then its normalized function obeys ⟨∇2Φ(w, w), w − v∗⟩ ≥ 0 ∀w ∈ {∆1 × ∆2}. (8) In the proof of Theorem 1, we will use this inequality. theorem 1. If, in a 2-agent, m × n iterated positive semi-definite norm-form game, both agents follow the GA-SPP algorithm (with Condition 1, 2, and 3), then their strategies will converge to a Nash equilibrium. Proof. Motivated by [2], our proof will use some variational inequalities techniques. (9) From the first and second step of GA-SPP (Algorithm 1), we have estimates α k +1 − αk +1 ≤ γk ∂α Vr(αk , βk) − η∂α Vr(αk , βk +1), βk +1 − βk +1 ≤ γk ∂βVc(αk , βk) − η∂βVc(α k +1, βk). We present the first and second step of GA-SPP in the form of variational inequalities: ⟨α k +1 − αk − γk ∂α Vr(αk , βk), z1 − α k +1⟩ ≥ 0 ∀z1 ∈ ∆1, ⟨βk +1 − βk − γk ∂βVc(αk , βk), z2 − βk +1⟩ ≥ 0 ∀z2 ∈ ∆2; (10) ⟨αk +1 − αk − η∂α Vr(αk , βk +1), z1 − αk +1⟩ ≥ 0 ∀z1 ∈ ∆1, ⟨βk +1 − βk − η∂βVc(α k +1, βk), z2 − βk +1⟩ ≥ 0 ∀z2 ∈ ∆2. (11) . Put z1 = α∗, z2 = β∗ in Eq. 11, then set z1 = αk +1, z2 = βk +1 in Eq. 10, and take into account of Eq. 9, we can get (the detailed computation is listed in our supplementary material) (cid:18) α 1 Let v = (cid:19) β1 ⟨v k +1 − v +η⟨∇2Φ(v 2∥∇2Φ(v +h k , v∗ − v k +1, v k , v k +1⟩ + ⟨v k +1), v∗ − v k) − ∇2Φ(v k +1 − v k +1⟩ k +1, v k +1)∥2 ≥ 0, k +1 − v k +1⟩ k , v (12) where h = max{γ0, η}. By means of identity, the first two scalar products in Eq. 12 can be rewritten as k − v∗∥2 − 1 2 ∥v k +1∥2 − 1 2 ∥v 1 2 ∥v k +1 in Eq. 8, then the third term in Eq.12 is non- positive. For the last term of Eq. 12, if ∇2Φ(v k) satisfies the Lipschitz condition with constant L, then following estimate is correct k +1 − v∗∥2− k ∥2 k +1 − v 1 2 ∥v k +1 − v Set w = v k , v (13) . ∇2Φ(v k) − ∇2Φ(v k , v k +1, v k +1) ≤ Lv k +1 − v k . (14) 2 Now put Eq. 13 and Eq. 14 in Eq. 12, we can yield k +1∥2+ k +1 − v∗∥2 + ∥v ∥v (1 − 2h k +1 − v Note that ∇2Φ(v 2)∥v k) = ∂α Vr(α , β) + ∂βVc(α , β). According to Eq. 2, ∂α Vr(α , β) is a function of β, ∂βVc(α , β) is a function of α. The maximum value of 2-norm of ∂α is not greater than 2/2, and not greater than δc . So the Lipschitz δr k +1 − v k ∥2 ≤ ∥v 2/2 for 2-norm of ∂β k − v∗∥2 k , v (15) L . lows K K constant L ≤ δr√2 + δc√2 √2 2 and 1 − 2h 1 . According to Condition 3, h = max{γ0, η} < > 0. Sum up inequality Eq. 15 , so hL < L 2 2 δc +δr from k = 0 to k = K, we get ∥vK +1 − v∗∥2 + K 2) K k =0 k =0 ∥v k +1 − v ∥v k +1 − v k +1∥2+ (16) k ∥2 ≤ ∥v0 − v∗∥2 . (1 − 2h 2 L From the gained inequality (Eq. 16) the bound of trajectory fol- ∥vK +1 − v∗∥2 ≤ ∥v0 − v∗∥2 , (17) and the series are convergent v ∥v ∥v k =0 k ∥2 < ∞, < ∞. k +1 − v k +1 − v k +1 − v k +1−v k =0 k +1∥2 = 0, limk→∞ ∥v k +1∥2 k +1 − As a result, limk→∞ ∥v k ∥2 = 0, so limk→∞ ∥v k ∥2 = 0. It implies limk→∞ ∥αk +1− αk ∥2 = 0 and limk→∞ ∥βk +1 − βk ∥2 = 0. So GA-SPP can converge. With Proposition 1, GA-SPP must converge to a Nash equilibrium. Therefore, proof of Theorem 1 is completed. □ theorem 2. If, in a 2-agent, m × n iterated positive semi-definite norm-form game, one agent follows the GA-SPP algorithm (with Condition 1, 2, and 3), another agent uses GA, then their strategies will converge to a Nash equilibrium. The proof of this theorem is omitted, which is similar to that of Theorem 1. 4.2 A Subclass of 2 × n General-Sum Games In this section, we will show that GA-SPP converges to a Nash equilibrium in a subclass of 2-agent 2×n general games (Theorem 3). A 2-agent, 2 × n, general-sum normal-form game's payoff matri- ces can be written as (cid:21) (cid:20)c11 c21 ... ... r1n r2n , C = ... ... c1n c2n . (cid:20)r11 r21 R = Let (cid:21) r1 = [r11 ... r1,n−1]T, c1 = [c11 ... c1,n−1]T, r2 = [r21 ... r2,n−1]T, c2 = [c21 ... c2,n−1]T. Then agents' expected payoffs (Eq. 1) are Vr(α, β) = (α βT)r1 + r1n(α(1 − βTen−1)) + (1 − α)βTr2 + r2n((1 − α)(1 − βTen−1)), Vc(α, β) = (α βT )c1 + c1n(α(1 − βTen−1)) + (1 − α)βTc2 + c2n((1 − α)(1 − βTen−1)). The gradients (Eq. 2) can be written as ∂αVr(α, β) = ∂βVc(α, β) = ∂Vr(α, β) ∂Vc(α, β) ∂α ∂β = βTur + br , = αuc + bc , (18) (19) where br = r1n − r2n, bc = c2 − c2nen−1, ur = r1 − r2 − br en−1, and uc = c1 − c2 − (c1n − c2n)en−1. theorem 3. If, in a 2-agent, 2× n, norm-form game, if there exists a δ > 0 such that the payoff matrices obey ur + δuc = 0, (20) and both agents follow the GA-SPP algorithm (with Condition 1, 2, and 3), then their strategies will converge to a Nash equilibrium. Proof. For a 2-agent 2×n game, if we put Eq. 18 into Definition 1, then we derive ur +uc = 0. It shows that 2×n games in Theorem 3 with δ = 1 are PSD games. First we consider 2 × n positive semi-definite games (ur + uc = 0). According to Theorem 1, in this particular case, GA-SPP can converge to a Nash Equilibrium. It means the following iteration can converge: αk +1 = Π∆1[αk + γk(β T kur1 βk +1 = Π∆2[βk − γk(αkur1 T αk +1 = Π∆1[αk + η(β kur1 βk +1 = Π∆2[βk − η(αkur1 + br1)], + bc1)]; + br1)], + bc1)]. (21) For brevity, we omit step 3 of GA-SPP. For a 2 × n, norm-form game that obeys Eq. 23, we have ur2 √ + δ β. If α and β follows GA-SPP, then , y = δuc2 the update rule of x and y is = 0. Let x = α√ δ xk +1 = Π∆x [xk + γk(y yk +1 = Π∆y xk +1 = Π∆x [xk + η(y T kur2 [yk − γk(αkur2 T kur2 [yk − η(xkur2 + + + )], br2√ √ δ δbc2)]; + )], br2√ √ δ δbc2)]. yk +1 = Π∆y (22) Comparing Eq. 22 with Eq. 21, (x, y) can be viewed as a strategy pair of another 2 × n PSD game following GA-SPP. Notice that the proof of Theorem 1 only requires that the valid space is a bounded convex set. Therefore, if (α, β) follows GA-SPP, (x, y) can converge, then (x, y) can still converge in 2 × n, norm-form game can converge. With Proposition 1, we finish the proof of Theorem 3. □ theorem 4. If, in a 2-agent, 2× n, norm-form game, if there exists δ > 0, and the payoff matrices obey and one agent follow the GA-SPP algorithm (with Condition 1, 2, and 3), another agent uses GA, then their strategies will converge to a Nash equilibrium. The proof of this theorem is omitted, which is similar to that of Theorem 3. ur + δuc = 0, (23) λ1 = γkur uc + 4.3 2 × 2 General-Sum Games In this section, we will prove the Nash convergence of GA-SPP in 2 × 2 general-sum games. theorem 5. If, in a 2-agent, 2 × 2, iterated general-sum game, both agents follow the GA-SPP algorithm (with Condition 1, 2, and 3), then their strategies will converge to a Nash equilibrium. Proof. With Proposition 1, in order to prove Theorem 5, we just need to prove the convergence of GA-SPP in 2 × 2 games, which is accomplished by Lemma 4.1, 4.2, and 4.3. □ Next, we will analyze the structure of 2 × 2 games firstly, and then show the convergence in different cases respectively. In a 2-agent, 2-action game, the reward functions (Eq. 1) can be written as Vr(α, β) = r11(α β) + r12(α(1 − β)) + r21((1 − α)β) Vc(α, β) = c11(α β) + c12(α(1 − β)) + c21((1 − α)β) + r22((1 − α)(1 − β)), + c22((1 − α)(1 − β)). And the gradient function (Eq. 2) can be written as ∂αVr(α, β) = ∂βVc(α, β) = ∂Vr(α, β) ∂Vc(α, β) ∂α ∂β = ur β + br , = uc α + bc , where ur = r11 +r22−r12−r21, br = r12−r22, uc = c11 +c22−c12−c21, and bc = c21 − c22. We have ur ≤ 2δr , uc ≤ 2δc. We can formulate the first two update rules of GA-SPP (1): αk +1 = Π∆[αk + η∂αk Vr(αk , Π∆[βk + γ ∂βk , βk])], βk +1 = Π∆[βk + η∂βk Vc(βk , Π∆[αk + γ ∂αk , αk])], where ∆ = ∆1 = ∆2 = [0, 1]. To prove the Nash convergence of GA-SPP, we will examine the dynamics of the strategy pair following GA-SPP. In a 2-agent, 2-action, general-sum game, (α, β) can be viewed as a point in R2 constrained to lie in the unit space. According to Eq. 24, if (αk , βk) is a unconstrained point, then value of (αk +1, βk +1) is (24) (cid:21)(cid:20)αk (cid:21) (cid:20)γkur uc (cid:20)γkur bc + br uc γkucbr + bc ur (cid:21) . = η +η γkur uc βk (25) (cid:21) (cid:20)αk +1 βk +1 (cid:21) (cid:20)αk βk − We denote the 2 × 2 matrix in Eq. 25 as U. If the matrix U is invertible, in the unconstrained condition, there exists and only exists one point so that the left hand side of Eq. 25 is zero. We call this point the center (or origin) and denote it as (αc , βc). The eigenvalues of U is given by √ ur uc and λ2 = γkur uc − √ (26) k δr δc < 1) and ur ≤ 2δr , uc ≤ 2δc, 2 ur uc . According to Condition 2 (4γ then γ 2 kur uc < 1. There are three cases of U: • Case 1: ur uc = 0, i.e., U is not invertible; • Case 2: ur uc < 0, i.e., having two imaginary conjugate eigen- values with negative real; • Case 3: ur uc > 0, i.e., having two real eigenvalues. If U is invertible, then ur uc (cid:44) 0. Let x = α + bc uc Eq. 25 can be reformulated as: , y = β + br ur , (cid:21) (cid:20)xk +1 yk +1 (cid:21) (cid:20)xk yk − (cid:20)γur uc uc = η (cid:21)(cid:20)xk (cid:21) yk ur γur uc (27) By setting the left hand side of Eq. 27 to zero, we can get an equation, the only solution of which is x = 0, y = 0. Now we give the proof of Lemma 4.3. Proof. From Eq. 26, real eigenvalues imply ur uc > 0. So without the loss of generality, we assume that ur > 0 and uc > 0 (the analysis for the case ur < 0 and uc < 0 is analogous and thus omitted). Proof of Lemma 4.3 depends on the location of (αc , βc), which has three possibilities: (1) both αc and βc are in the valid probability range [0,1], (2) only one of αc , βc is in the valid probability range [0,1], (3) neither αc nor βc is in the valid probability range [0,1]. Proofs of convergence in these three cases are given in Property 4.1, 4.2, and 4.3, respectively. □ Notice that U has two real eigenvalues: λ1 > 0 and λ2 < 0 and two nonparallel eigenvectors. The central point (x = 0, y = 0) with two eigenvectors (v1 = [√ uc]) can form a new 2D coordinate system. The basic idea of proof is to analyze coordinates of the strategy pair update trajectory in the (cid:114)ur new coordinate system. To be brief, we introduce two functions to compute it instead of converting coordinate. uc], v2 = [√ √ (cid:114)ur ur , −√ ur , y, G = x − (28) F = x + uc y. uc Property 4.1. If U has real eigenvalues, both of αc , βc are in the valid probability range([0, 1]), GA-SPP leads the strategy pair trajectory to converge to a NE. Proof. As shown in Fig. 2(a), the initial point will affect the Nash convergence result because there are three Nash equilibrium points. The first case is F0 = 0. Then the strategy pair point will keep staying in the line F = 0 while the absolute value of G decreases, which means that the point moves to the center point (F = 0, G = 0), i.e., (α∗, β∗). For example, if P2 is the initial point, the point will travel along the line F = 0 and moves to (F = 0, G = 0). We can compute Fk +1 and Gk +1 by Fk +1 = (1 + ηλ1)Fk . Gk +1 = (1 + ηλ2)Gk , (29) According to Condition 1, 2 and 3, 0 < (1 + ηλ2) < 1, so the GA-SPP will converge to (F = 0, G = 0), i.e., (x = 0, y = 0). Another case is when F0 > 0, from Fig. 2(a), we can tell that the strategy pair point first touches the boundary xmax (α = 1) or ymax (β = 1) after finite iteration steps, after then it travels along the boundary and moves to (xmax , ymax). For example, if P1 is the initial point, the point will touch the boundary α = 1 (i.e., xmax ), then it travels along α = 1 and moves to (xmax , ymax). Without no more than one exceptional case, we can derive Fk +1 > Fk in each iteration. From the monotone bounded theorem, the GA-SPP will converge to Fmax , i.e., (xmax , ymax). Figure 1: Strategy updating directions of the GA-SPP. a) when U has real eigenvalues and b) when U has imaginary eigenvalues with negative real part. To prove Theorem 5, we only need to show that GA-SPP always leads the strategy pair to converge in these three cases. Lemma 4.1. If, in a 2-agent, 2-action, iterated general-sum game, U is not invertible, for any initial strategy pair, GA-SPP leads the strategy pair trajectory to converge to a Nash equilibrium (NE) with finite steps. Proof. From Eq. 26, if U is not invertible, then ur uc = 0. Assume uc = 0 (the analysis for the case ur = 0 is analogous and thus omitted for brevity). According to Eq. 25, βk +1 = Π∆[βk + ηbc]. Because ηbc is con- stant and β ∈ [0, 1], strategy β will no longer change after finite steps. We denote this value by β∗. Then, αk +1 = Π∆[αk + η(ur β∗ + br)]. Because η(ur β∗ + br) is a constant and α ∈ [0, 1], after a certain number (finite) of steps, strategy α will also stop chang- ing. We denote this value by α∗. So in this case, the strategy pair will converge to (α∗, β∗), and with Proposition 1, this is a Nash equilibrium. Note that the index of ηk was omitted in the proof, which is because the situation of (αk +1, βk +1) = (αk , βk) & (αk +1, βk +1) (cid:44) (αk , βk) did not occur in this case. Lemma 4.3 also has this property. □ Lemma 4.2. If, in a 2-agent, 2-action, iterated general-sum game, U has two imaginary conjugate eigenvalues with negative real, for any initial strategy pair, GA-SPP leads the strategy pair trajectory to converge to a NE. Proof. Since ur uc < 0, there exists a δ such that ur + δuc = 0. This is a 2-dimensional situation of Theorem 3. So GA-SPP can converge to a NE. □ In the rest of this section, we will introduce Lemma 4.3 and the basic idea of proof. For the detailed mathematical proof, we refer readers to the supplementary material. Lemma 4.3. If, in a 2-agent, 2-action, iterated general-sum game, U has real eigenvalues, for any initial strategy pair, GA-SPP leads the strategy pair trajectory to converge to a point that is a NE. Before proof, we first introduce some variables to simplify the expressions. (a) (b) (c) Situation when F0 < 0 is similar to that when F0 > 0, so we omit Figure 2: Updating directions of strategy pair in Lemma 4.3. (a) Both αc and βc are in the valid probability range, F(P1) > 0, F(P2) = 0; (b) only one of αc and βc is in the valid range, F(P3) = 0, F(P4) < 0; (c) neither αc and βc is in the valid range. (b) Chicken Swerve (-2,-2) (-1,1) Table 1: Benchmark games Straight (1,-1) (-1,-1) Swerve Straight (a) Prisoners' Dilemma Silent Betray Silent (-1,-1) (0,-3) Betray (-3,0) (-2,-2) it for brevity. In all, GA-SPP can converge for any initial strategy pair. □ Property 4.2. When U has real eigenvalues and only one of αc and βc is in the valid probability range, GA-SPP leads the strategy pair trajectory to converge to a NE. Proof of Property 4.2 can be classified into 4 cases. Without loss of generality, we just consider one of them, where βc < 0 and αc ∈ [0, 1]. As shown in Fig. 2(b), we can also divide the proof into 3 parts: F0 > 0, F0 < 0, and F0 = 0. If the point is in the part F > 0, according to Property 4.1, the algorithm will converge to (xmax , ymax). If F0 ≤ 0, we can see that the point will first touch a boundary of the valid probability space, after that it will move into the part F > 0. For example, if P3 (F = 0) is the initial point, the point will travel along line F = 0 until it hits the boundary, then it will be projected to the subspace where F > 0. If P4 (F < 0) is the initial point, it will touch the boundary β = 0 (ymin) and then y remains ymin while x increases until it move into the subspace where F > 0. Property 4.3. If U has real eigenvalues and neither αc nor βc is in the valid probability range [0, 1], GA-SPP leads the strategy pair trajectory to converge to a NE. Updating directions of strategy pair is shown in Fig. 2(c) for this case. For the detailed proof, please refer to supplementary material. theorem 6. If, in a 2-agent, 2 × 2, iterated general-sum game, one agent follow the GA-SPP algorithm (with Condition 1, 2, and 3), another agent uses GA, then their strategies will converge to a NE The proof is omitted, which is similar to that of Theorem 5. 5 EXPERIMENTAL ANALYSIS IN NORMAL-FORM GAMES In this section, we will illustrate GA-SPP in games with experiments and compare GA-SPP with IGA-PP and GIGA-WoLF, both of which have theoretical guarantees, in some larger games. 5.1 Benchmark games We first illustrate the results of GA-SPP on four representative benchmark games presented in Tab. 1. GA-SPP converges to NE in all of these games (Fig. 3). (c) Battle of Sexes Opera Football Opera (3,2) (0,0) Football (1,1) (2,3) (d) Rock-Paper-Scissors R (0,0) (1,-1) (-1,1) P (-1,1) (0,0) (1,-1) S (1,-1) (-1,1) (0,0) R P S Figure 3: Action probabilities of row agent following GA- SPP in four benchmark games. Parameters: η = 0.001, γ = 0.1. Initial polices: (0.7, 0.3) and (0.3, 0.7). 5.2 Games beyond theoretical settings We also evaluate GA-SPP in Shapley's game and a 2 × 3 game, presented in Tab. 2. Although the theoretical analyses of GA-SPP have not covered these games, empirical results show that it still converge. We now compare GA-SPP, GIGA-WoLF, and IGA-PP in these two games. Fig. 4 shows the row player's action probabilities over time if both players follow GA-SPP, GIGA-WoLF, or IGA-PP in Shapley's game respectively. GIGA-WoLF fails to converge in this non-zero sum game, but GA-SPP and IGA-PP can converge to a Nash equilibrium. 00.20.40.60.8100.10.20.30.40.50.60.70.80.91 ⇐ G=0 ⇐ F=0 (α*,β*)P1P200.20.40.60.8100.10.20.30.40.50.60.70.80.91 ⇐ F=0P4P300.20.40.60.8100.10.20.30.40.50.60.70.80.91 ⇐ G=0P502004006008001000iteration steps00.10.20.30.40.50.60.70.80.91Prisoners' DilemmaPr(Silent) of row playerPr(Betray) of row player050100150200250300iteration steps00.10.20.30.40.50.60.70.80.91ChickenPr(Swerve) of row playerPr(Straight) of row player0100200300400500iteration steps00.10.20.30.40.50.60.70.80.91Battels of the SexesPr(Opera) of row playerPr(Football) of row player0200040006000800010000iteration steps00.10.20.30.40.50.60.70.80.91Rock-Paper-ScissorsPr(Rock) of row playerPr(Paper) of row playerPr(Scissors) of row player Figure 4: Comparison between GA-SPP, GIGA-WoLF, and IGA-PP in Shapley's game. GIGA-WoLF cannot converge while GA- SPP and IGA-PP converge to NE. GA-SPP has a slighter oscillation. Parameters: γ = 3, η = 0.001. Initial polices: (0.1, 0.8, 0.1) and (0.8, 0.1, 0.1). Table 2: Games with larger settings (b) A 2x3 Game C1 (3,3) (2,2) C2 (0,5) (1,1) C3 (1,-2) (-1,0) (a) Shapley's Game C1 (0,0) (0,1) (1,0) C2 (1,0) (0,0) (0,1) C3 (0,1) (1,0) (0,0) R1 R2 R1 R2 R3 Figure 6: Following GA-SPP, action probabilities of agents fail to converge in three player matching pennies. Parameters: η = 0.001, γ = 0.3. Initial polices: (0.1, 0.9), (0.4, 0.6) and (0.7, 0.3). 5.3 Problem games Although GA-SPP has better performance than other MAL algo- rithms, the convergence of GA-SPP is not perfect. As shown in Fig. 6, in the three player matching pennies, GA-SPP cannot converge with a constant prediction length. This failed case show the difficulties of MAL work and indicate that gradient method may not be the ideal way to handle a complex game. Because dynamic of gradient method in such game is not linearly, the chaotic phenomenon will occur. We may need different approaches to deal with such problems. In order to make MARL work effectively in more cases, it is important to analyze and solve these problems. 6 CONCLUSION This paper introduced a new gradient-based multi-agent learning algorithm, called gradient-ascent with shrinking policy prediction (GA-SPP). We proved Nash convergence of GA-SPP with a finite step size in three classes of general-sum games: m × n positive semi-definite games, a subclass of 2 × n general-sum games, and 2 × 2 general-sum games, respectively, which provide a stronger theoretical guarantee than existing gradient-based MAL algorithms. We also empirically verified the strong convergence property of GA-SPP with example games. In future work, we aim to relax as- sumptions of GA-SPP and extend it to stochastic games where each agent only has observations of their in-game payoffs and has no gradient information about other agents. Figure 5: Comparison between GA-SPP, and IGA-PP in a 2×3 game under different prediction lengths. IGA-PP's conver- gence to Nash Equilibrium is affected by prediction length, while GA-SPP can always converge to NE. Parameters: η = 0.001, γ = 0.01 in upper and γ = 0.1 in lower. Initial polices: (0.8, 0.2) and (0.1, 0.8, 0.1). Fig. 5 shows results of GA-SPP and IGA-PP in a 2×3 game under different prediction lengths. Although IGA-PP can converge, it does not converge to a Nash equilibrium. On the contrary, the strategies lead by GA-SPP successfully converge to Nash equilibrium under different prediction lengths. The essential reason is that GA-SPP projects the predicted strategies to a valid space at every step. By examining with different learning rates, we observe that GA- SPP often converges faster than GIGA-WoLF. A possible explanation is introduced in [27]. We do not show these results for sake of space. 05001000150020002500300035004000iteration steps00.10.20.30.40.50.60.70.80.91GA-SPP in Shapley's GamePr of row agent selecting 1st actionPr of row agent selecting 2nd actionPr of row agent selecting 3rd action0246810iteration steps×10400.10.20.30.40.50.60.70.80.91GIGA-WoLF in Shapley's GamePr of row player selecting 1st actionPr of row player selecting 2nd actionPr of row player selecting 3rd action05001000150020002500300035004000iteration steps00.10.20.30.40.50.60.70.80.91IGA-PP in Shapley's GamePr of row agent selecting 1st actionPr of row agent selecting 2nd actionPr of row agent selecting 3rd action00.511.522.53iteration steps×10500.10.20.30.40.50.60.70.80.91GA-SPP in game (h)Pr of row player selecting 1st actionPr of column player selecting 1st actionPr of column player selecting 2nd action0246810iteration steps×10400.10.20.30.40.50.60.70.80.91IGA-PP in game (h)Pr of row player selecting 1st actionPr of column player selecting 1st actionPr of column player selceting 2nd action00.511.522.53iteration steps×10400.10.20.30.40.50.60.70.80.9GA-SPP in game (h)Pr of row player selecting 1st actionPr of column player selecting 1st actionPr of column player selecting 2nd action0200040006000800010000iteration steps00.10.20.30.40.50.60.70.80.91IGA-PP in game (h)Pr of row player selecting 1st actionPr of column player selecting 1st actionPr of column player selceting 2nd action0500100015002000iteration steps00.20.40.60.81GA-SPP in Three Player Matching PenniesPr of fisrt agent selecting 1st actionPr of second agent selecting 1st actionPr of third agent selecting 1st action REFERENCES [1] Sherief Abdallah and Victor R. Lesser. 2008. A multiagent reinforcement learning algorithm with non-linear dynamics. Journal of Artificial Intelligence Research 33, 1 (2008), 521 -- 549. [2] Anatoly Antipin. 2003. Extragradient approach to solution of two person non-zero sum games. Optimization And Optimal Control. 1 -- 28 pages. [3] A. S. Antipin. 1995. The convergence of proximal methods to fixed points of extremal mappings and estimates of their rate of convergence. Computational Mathematics and Mathematical Physics 35, 5 (1995), 539 -- 551. [4] Bikramjit Banerjee and Jing Peng. 2007. Generalized multiagent learning with performance bound. Autonomous Agents and Multi-Agent Systems 15, 3 (2007), 281 -- 312. [5] Michael Bowling. 2005. Convergence and no-regret in multiagent learning. In [6] Michael Bowling and Manuela Veloso. 2001. Convergence of gradient dynamics Advances in neural information processing systems. 209 -- 216. with a variable learning rate. In ICML. 27 -- 34. [7] Branislav BoÅąanská, Viliam Lisá, Marc Lanctot, JiÅŹÃŋ ÄŇermÃąk, and Mark H.M. Winands. 2016. Algorithms for computing strategies in two-player simultaneous move games. Artificial Intelligence 237 (2016), 1 -- 40. [8] Johanne Cohen, Amélie Héliou, and Panayotis Mertikopoulos. 2017. Learning with bandit feedback in potential games. In Proceedings of the 31th International Conference on Neural Information Processing Systems. [9] Jacob W. Crandall. 2014. Towards minimizing disappointment in repeated games. Journal of Artificial Intelligence Research 49, 1 (2014), 111 -- 142. [10] Jacob W. Crandall and Michael A. Goodrich. 2011. Learning to compete, coordi- nate, and cooperate in repeated games using reinforcement learning. Machine Learning 82, 3 (2011), 281 -- 314. [11] Steven Damer and Maria L. Gini. 2017. Safely Using Predictions in General-Sum Normal Form Games. adaptive agents and multi agents systems (2017), 924 -- 932. [12] Constantinos Daskalakis, Alan Deckelbaum, and Anthony Kim. 2011. Near- optimal no-regret algorithms for zero-sum games. In Proceedings of the twenty- second annual ACM-SIAM symposium on Discrete Algorithms. Society for Indus- trial and Applied Mathematics, 235 -- 254. [13] Jakob Foerster, Ioannis Alexandros Assael, Nando de Freitas, and Shimon White- son. 2016. Learning to communicate with deep multi-agent reinforcement learn- ing. In Advances in Neural Information Processing Systems. 2137 -- 2145. [14] Jakob Foerster, Gregory Farquhar, Triantafyllos Afouras, Nantas Nardelli, and Shimon Whiteson. 2017. Counterfactual multi-agent policy gradients. arXiv preprint arXiv:1705.08926 (2017). [15] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672 -- 2680. [16] Walid Krichene, Benjamin Drighès, and Alexandre M Bayen. 2015. Online learn- ing of nash equilibria in congestion games. SIAM Journal on Control and Opti- mization 53, 2 (2015), 1056 -- 1081. [17] Joel Z Leibo, Vinicius Zambaldi, Marc Lanctot, Janusz Marecki, and Thore Graepel. 2017. Multi-agent reinforcement learning in sequential social dilemmas. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 464 -- 473. [18] C. E. Lemke and J. T. Howson. 1964. Equilibrium Points of Bimatrix Games. J. Soc. Indust. Appl. Math. 12, 2 (1964), 413 -- 423. [19] Reshef Meir, Maria Polukarov, Jeffrey S. Rosenschein, and Nicholas R. Jennings. 2017. Iterative voting and acyclic games. Artificial Intelligence 252 (2017), 100 -- 122. [20] Luke Metz, Ben Poole, David Pfau, and Jascha Sohl-Dickstein. 2016. Unrolled Generative Adversarial Networks. CoRR abs/1611.02163 (2016). arXiv:1611.02163 http://arxiv.org/abs/1611.02163 [21] Ryan Porter, Eugene Nudelman, and Yoav Shoham. 2004. Simple search methods for finding a Nash equilibrium. In National Conference on Artifical Intelligence. [22] H. L. Prasad, L A Prashanth, and Shalabh Bhatnagar. 2015. Two-Timescale Algorithms for Learning Nash Equilibria in General-Sum Stochastic Games. adaptive agents and multi-agents systems (2015), 1371 -- 1379. [23] David Silver, Thomas Hubert, Julian Schrittwieser, Ioannis Antonoglou, Matthew Lai, Arthur Guez, Marc Lanctot, Laurent Sifre, Dharshan Kumaran, Thore Graepel, et al. 2017. Mastering chess and shogi by self-play with a general reinforcement learning algorithm. arXiv preprint arXiv:1712.01815 (2017). [24] Satinder P. Singh, Michael J. Kearns, and Yishay Mansour. 2000. Nash Conver- gence of Gradient Dynamics in General-Sum Games. In UAI '00: Proceedings of the 16th Conference in Uncertainty in Artificial Intelligence, Stanford University, Stanford, California, USA, June 30 - July 3, 2000. 541 -- 548. [25] Sainbayar Sukhbaatar, Rob Fergus, et al. 2016. Learning multiagent communica- tion with backpropagation. In Advances in Neural Information Processing Systems. 2244 -- 2252. [26] Ardi Tampuu, Tambet Matiisen, Dorian Kodelja, Ilya Kuzovkin, Kristjan Kor- jus, Juhan Aru, Jaan Aru, and Raul Vicente. 2017. Multiagent cooperation and competition with deep reinforcement learning. PloS one 12, 4 (2017), e0172395. [27] Chongjie Zhang and Victor R Lesser. 2010. Multi-Agent Learning with Policy Prediction.. In AAAI.
1803.09792
1
1803
2018-03-26T18:54:40
Min-Max Tours for Task Allocation to Heterogeneous Agents
[ "cs.MA", "cs.RO", "eess.SY" ]
We consider a scenario consisting of a set of heterogeneous mobile agents located at a depot, and a set of tasks dispersed over a geographic area. The agents are partitioned into different types. The tasks are partitioned into specialized tasks that can only be done by agents of a certain type, and generic tasks that can be done by any agent. The distances between each pair of tasks are specified, and satisfy the triangle inequality. Given this scenario, we address the problem of allocating these tasks among the available agents (subject to type compatibility constraints) while minimizing the maximum cost to tour the allocation by any agent and return to the depot. This problem is NP-hard, and we give a three phase algorithm to solve this problem that provides 5-factor approximation, regardless of the total number of agents and the number of agents of each type. We also show that in the special case where there is only one agent of each type, the algorithm has an approximation factor of 4.
cs.MA
cs
Min-Max Tours for Task Allocation to Heterogeneous Agents Amritha Prasad∗, Han-Lim Choi† and Shreyas Sundaram∗∗ Abstract We consider a scenario consisting of a set of heterogeneous mobile agents located at a depot, and a set of tasks dispersed over a geographic area. The agents are partitioned into different types. The tasks are partitioned into specialized tasks that can only be done by agents of a certain type, and generic tasks that can be done by any agent. The distances between each pair of tasks are specified, and satisfy the triangle inequality. Given this scenario, we address the problem of allocating these tasks among the available agents (subject to type compatibility constraints) while minimizing the maximum cost to tour the allocation by any agent and return to the depot. This problem is NP-hard, and we give a three phase algorithm to solve this problem that provides 5-factor approximation, regardless of the total number of agents and the number of agents of each type. We also show that in the special case where there is only one agent of each type, the algorithm has an approximation factor of 4. 1 Introduction Multi-robot systems will play a large role in a variety of modern and future applications including exploration, surveillance, search and rescue operations, cooperative control and operations in haz- ardous environments. In order to effectively utilize these multi-robot systems in such applications, it is necessary to allocate an appropriate set of tasks to each robot or agent in the system. Such problems have been widely considered in the literature [1–5], most typically for the case where all agents are the same. However, future multi-robot systems are also projected to have a large amount of diversity in terms of the capabilities of the agents, and the applications will consist of tasks that can only be done by agents that possess certain capabilities [6–10]. We address this problem in this paper, namely allocating tasks efficiently to heterogeneous agents while meeting task-agent compatibility constraints. Gerkey and Mataric [11] gives a taxonomy of task allocation in multi-robot systems. Prorok et. al. [6] distributes a swarm of heterogeneous robots (of different types, with each type having different traits) among a set of tasks that require specialized capabilities in order to be completed. They optimize the transition rates for each type of robot so that the desired trait distribution is reached, but do not consider travel time between tasks. In this paper, we focus on task allocation to heterogeneous robots (of different types, with different capabilities) such that the task-agent compatibility constraints are satisfied and the maximum tour cost incurred by any agent is mini- mized. The existing literature has several works on task allocation to agents where the total tour cost (i.e., sum of tour costs incurred by all agents) is minimized. Bektas [12] gives an overview on ∗∗Amritha Prasad and Shreyas Sundaram are with the School of Electrical and Computer Engineering at Purdue University. Email: {prasad20,sundara2}@purdue.edu †Han-Lim Choi is with the Department of Aerospace Engineering at Korea Advanced Institute of Science and Tech- nology. Email: [email protected] the work on the Traveling Salesperson Problem (TSP) with multiple (homogeneous) salespersons, where the sum of the cost of tours by all salespersons is minimized. Frieze [13] extends Christofides' 3 2 -approximation algorithm [14] for the single Traveling Salesperson Problem to the k-person Trav- eling Salesperson Problem (where all salespersons are identical and start at the same node). Xu and Rodrigues [15] provide a 3 2 -approximation algorithm for multiple TSP with a fixed number of depots. Malik, Rathinam and Darbha [16] provide a 2-approximation algorithm for a generalized multiple depot, multiple TSP with symmetric travel costs. Yadlapalli and Rathinam [17] provide a 3-approximation algorithm for a case where two heterogeneous vehicles with associated travel costs start from distinct initial locations and are jointly required to visit a set of targets. Bae and Rathinam [18] provide a 2-approximation algorithm for a special case of the above problem where the travel cost for one vehicle is at most that of the other. As opposed to the above works that minimize the sum of the costs of each agent, the following works focus on minimizing the maximum tour cost incurred by any agent in a group of homogeneous agents. Frederickson, Hecht and Kim [19] give tour splitting heuristics for the k-person variants of the Traveling Salesperson Problem. Given a tour constructed (using an F -approximation algorithm) on a set of nodes, they provide a 1 + F − 1 k factor algorithm that outputs k subtours such that the cost of the largest subtour is minimized. Yu and Liu [20] consider networks with multiple depots (or start nodes) and provide a 6-approximation factor algorithm. Even et. al. [21] and Arkin et. al. [22] provide a 4-approximation algorithm for a problem known as the min-max tree cover problem. This was improved by Khani and Salavatipour [23] who proposed a 3-approximation algorithm. The recent work by Sadeghi and Smith [4] give a decentralized auction based multi- robot task allocation where the objective is to minimize the total time taken to perform all tasks. They consider a case of heterogeneous robots, where the heterogeneity is captured by constraints on the motion of the robots. The above works focus either on minimizing the total cost incurred by all agents or on mini- mizing the maximum cost incurred by any agent in a set of agents, where all agents have the same functionality. In this paper, we combine the idea of heterogeneity in agent functionality with that of minimizing the maximum cost incurred by any agent. Specifically, consider a scenario where a set of tasks at different locations need to be executed; however, not all tasks can be done by all agents and certain task-agent compatibility constraints must be satisfied. Agents are partitioned into different types based on functionality of the agents. Tasks are partitioned into sets of type- specific tasks and generic tasks, where type-specific tasks can only be performed by agents of a given type and generic tasks can be performed by any agent. To capture this scenario, we present the Heterogeneous Task Allocation Problem (HTAP) which aims to allocate a set of tasks among heterogeneous agents such that the maximum time to complete tasks by any agent is minimized. This is an important metric, especially when the tasks to be performed are time critical or when the quality of service is characterized by maximum delays. We find tours for each agents that start and end at a start node (e.g., home base), such that the task- agent compatibility constraints are met, and approximately minimize the maximum cost incurred by any agent to complete its tour. The rest of this paper is organized as follows. In the next section, we state our problem formulation. We then present a naive algorithm and show that the approximation factor of this algorithm, although bounded, increases linearly with the number of agents. This motivates the need to develop better algorithms that perform well as the number of agents increase. We present two such algorithms in the subsequent section. We first develop an algorithm called CycleSplit. We leverage insights learned from CycleSplit and use it as a baseline to develop an alternate algorithm which we call HeteroMinMaxSplit. We show that these are 5-approximation algorithms for HTAP. We also show that in the special case where each of the heterogeneous agents are distinct, the proposed algorithms haves an approximation factor of 4. 2 Problem Statement let mi be the number of agents of type i, with Pm Consider a set of tasks T that are required to be completed by a set of k heterogeneous agents A = {A1, A2,..., Ak}. Each agent is one of m types. Let f : {1, . . . , k} → {1, . . . , m} be a function that takes an agent number as input and outputs the type of that agent. For each i ∈ {1, 2, . . . , m}, i=1 mi = k. Let T be composed of two broad classes of tasks: type-specific tasks and generic tasks. Type-specific tasks can be performed only by a specific type of agent, whereas generic tasks can be performed by any agent. Let T0 denote the set of generic tasks and Ti, 1 ≤ i ≤ m, denote the set of type-specific tasks that can be performed by agents of type i. Thus, T = T0 ∪ (∪m i=1Ti). Let all agents start at a node vs, called the start node (or home base). Consider a complete graph G(V, E) with vertex set V = T ∪ {vs} and edge set E = {(u, v) : u, v ∈ V, u 6= v}. Let each edge e = (u, v) ∈ E have a weight d(u, v) given by the distance between the nodes u and v. Let the direct travel cost between two nodes be the weight of the edge connecting the two nodes in G. We assume the distances satisfy the triangle inequality. The cost of executing a task is assumed to be very small compared to travel costs and is hence neglected. A tour on a subset of nodes V ′ ⊆ V is a closed path from vs through all nodes in V ′ (in some order) ending at vs. All tours start and end at the start vertex vs. The cost of the tour is defined as the sum of weights of all edges on that tour. Let C ∗(V ′) denote the tour cost of the optimal tour on set V ′. The objective of the allocation problem is to partition the set of tasks T among the agents subject to the task-agent compatibility constraints, such that the maximum cost among all agents to tour their allocated tasks is minimized. This is framed as the Heterogeneous Task Allocation Problem given below. Heterogeneous Task Allocation Problem (HTAP): min S1,S2,...,Sk⊆T subject to ∪k max 1≤j≤k C ∗(Sj) j=1 Sj = T, Sj = Vj ∪ Rj, ∀j ∈ {1, 2, . . . , k}, Vj ⊆ Tf (j), Rj ⊆ T0. In the above formulation, Sj is the task set allocated to agent Aj, for 1 ≤ j ≤ k. The first constraint implies that each task must be executed by some agent. The remaining conditions state that the task set allocated to each agent Aj is a union of type-specific tasks Vj (which is a subset of Tf (j), where f (j) is the type of agent Aj) and generic tasks Rj (which is a subset of generic tasks T0). Remark 1. Although we do not explicitly specify the condition that a task cannot be performed by more than one agent, minimization of the objective function implicitly ensures that the optimal solution does not have any node appearing in multiple subsets due to the triangle inequality. Any instance of the Traveling Salesperson Problem (TSP) can be trivially reduced to an instance of the Heterogeneous Task Allocation Problem (HTAP) by setting the number of agents k = 1 and all tasks to be generic. Thus, the HTAP is trivially NP-Hard, and has no polynomial time solution unless P = NP. Hence, in the rest of this paper we develop approximation algorithms for HTAP. An α-approximation algorithm for a problem is an algorithm that efficiently finds a solution within a factor α of the optimum solution for every instance of that problem. 3 A Naive Approximation Algorithm for the Heterogeneous Task Allocation Problem We start with the following simple algorithm to solve HTAP. In this naive algorithm, we allocate all tasks in T to a single agent A1. To every other agent, we allocate the type-specific tasks associated with that agent. Agent A1 computes a tour using some approximation algorithm (e.g., Christofides' algorithm) on set T (which includes type-specific tasks of all agents and all the generic tasks). Each other agent Aj, j 6= 1, computes a tour on its type-specific tasks using some approximation algorithm (e.g., Christofides' algorithm). Algorithm 1 describes this naive allocation. Algorithm 1 NaiveAllocation Algorithm 1: procedure NaiveAllocation(A, T, G) 2: 3: 4: Allocate type-specific tasks to each agent of that type. Allocate all generic tasks to agent A1. Compute tour (starting and ending at node vs) for the set of tasks allocated to each agent using an approximation algorithm. Return tours for each agent. 5: 6: end procedure We provide the approximation factor of this algorithm in the following theorem. Theorem 1. Suppose the algorithm that is used to compute the tour for each agent in line 4 of NaiveAllocation algorithm has approximation factor α. Then, NaiveAllocation is an αk approximation algorithm for the Heterogeneous Task Allocation Problem (HTAP). Proof. For 1 ≤ j ≤ k, let S∗ allocation for HTAP. Note that S∗ given by S∗ j where R∗ optimal allocation policy. Note that R∗ j ⊆ Tf (j) ∪ R∗ j denote the set of tasks allocated to agent Aj under the optimal j ⊆ T ∀j, S∗ j is j is the subset of tasks in T0 allocated to agent Aj under the i = ∅ if j 6= i and ∪k j = T . The set S∗ j ∩ S∗ j=1S∗ j ⊆ T0 ∀j, R∗ j ∩ R∗ i = ∅ for j 6= i and ∪k j=1R∗ j = T0. For 1 ≤ j ≤ k, let Sj denote the set of tasks allocated to agent Aj by NaiveAllocation. Note that Sj ⊆ T ∀j, S1 = T and Sj = Tf (j), j 6= 1. Let C ∗(·) denote the cost to optimally tour a given set of tasks and let CN A(·) denote the tour costs returned by the NaiveAllocation algorithm. The approximation ratio R for the NaiveAllocation algorithm is given by R = max 1≤j≤k max 1≤j≤k CN A(Sj) C ∗(S∗ j ) = CN A(S1) C ∗(S∗ j ) max 1≤j≤k = CN A(T ) max 1≤j≤k C ∗(S∗ j ) ≤ αC ∗(T ) max 1≤j≤k C ∗(S∗ j ) ≤ α(Pk max 1≤j≤k j=1 C ∗(S∗ j )) C ∗(S∗ j ) ≤ αk. The inequality CN A(T ) ≤ αC ∗(T ) follows from the fact that an α-approximation algorithm is used j=1 C ∗(Sj) as Sj, 1 ≤ j ≤ k, to compute the tour in line 4 of NaiveAllocation. Also, C ∗(T ) ≤Pk form a partition of T and the triangle inequality holds. The previous theorem shows that the approximation factor of even a naive algorithm as the one described by Algorithm 1 is bounded. However, the bound grows linearly with the number of agents k. This motivates us to look for more efficient algorithms to solve the task allocation problem at hand, in particular, algorithms that perform well as the number of agents become large. We provide two constant factor algorithms in the following section. 4 Constant Factor Approximation Algorithms for the Heteroge- neous Task Allocation Problem 4.1 Cycle Splitting Approach Consider an instance of HTAP. In order to find an allocation of tasks to agents, we must allocate type-specific tasks among agents of the required type and allocate generic tasks among all agents. We approach the problem by handling these two allocations separately. Given a set of tasks Ti and a number k, let TaskSplitter be any algorithm that splits the set of tasks Ti into k sub-tours {Ti1, Ti2, ..., Tik} within some factor β of the optimal split (in the min-max sense). For example, Frederickson, Hecht and Kim [19] give a tour splitting heuristic that takes a tour on a set of locations to be visited (first node of which is set as the start node), and a positive integer k as input and gives a set of k subtours (starting and ending at the start node) as the output. The cost of these subtours are within a factor of 1 + F − 1/k of the optimal min-max cost, where F is the approximation factor of the algorithm used to generate the initial tour on all input locations. Consider the following algorithm to allocate a given set of tasks T to a group of k heterogeneous agents. Algorithm 2 Min-Max Tour by CycleSplit Algorithm 1: procedure CycleSplit(A, T, G) 2: for each agent type i, 1 ≤ i ≤ m do Find Christofides' tour (starting and ending at vs) on the set of type-specific tasks of type i. Use TaskSplitter to get mi subtours (starting and ending at vs) on set Ti. Allocate one subtour to each agent of type i. end for Find Christofides' tour (starting and ending at vs) on the set of generic tasks T0. Use TaskSplitter to split tour on T0 into k subtours (starting and ending at vs), denoted by {R1, R2, . . . , Rk}. Allocate subtour Rj to agent Aj, 1 ≤ j ≤ k. Combine the type-specific task subtour and generic task subtour allocated to each agent. Return a tour for each agent. 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: end procedure Theorem 2. CycleSplit is a 2β-approximation algorithm for the Heterogeneous Task Allocation Problem (HTAP), where β is the approximation factor of the algorithm TaskSplitter used in steps 4 and 8. Proof. For 1 ≤ j ≤ k, let S∗ HTAP. Then, S∗ allocated to agent Aj and R∗ j be the allocation of tasks to agent Aj under an optimal algorithm for is the subset of type-specific tasks j is the subset of generic tasks assigned to agent Aj. Let Sj = Vj ∪ Rj j , where V ∗ j j can be expressed as S∗ j = V ∗ j ∪ R∗ be the allocation to agent Aj by the CycleSplit algorithm, where Vj is the subset of type-specific tasks allocated to agent Aj and Rj is the subset of generic tasks allocated to agent Aj. Let C ∗(·) denote the cost to optimally tour a given set of tasks starting and ending from the node vs. Let CT S(Rj) and CT S(Vj) denote the cost of the subtours Rj and Vj returned by the TaskSplitter algorithm in steps 4 and 8 respectively. Let CCS(Sj) denote the cost of a tour on Sj returned by the CycleSplit algorithm. Thus, the approximation factor of the CycleSplit algorithm is given by R = ≤ ≤ max 1≤j≤k max 1≤j≤k max 1≤j≤k max 1≤j≤k max 1≤j≤k max 1≤j≤k CCS(Sj) C ∗(S∗ j ) CT S(Vj) C ∗(S∗ j ) CT S(Vj) C ∗(V ∗ j ) + + max 1≤j≤k max 1≤j≤k max 1≤j≤k max 1≤j≤k max 1≤j≤k ≤ {CT S(Vj) + CT S(Rj)} max 1≤j≤k C ∗(S∗ j ) CT S(Rj) C ∗(S∗ j ) CT S(Rj) , C ∗(R∗ j ) (1) where we use the facts that Sj = Vj ∪ Rj, S∗ j = V ∗ j ∪ R∗ j and that the triangle inequality holds. 1, V ′ 2, . . . , V ′ Consider a case with the same set of type-specific tasks as above, but with no generic tasks. Let V ′ k denote the set of tasks allocated to agents under an optimal allocation (in the sense of minimizing the maximum cost to tour any subset). Since the CycleSplit algorithm allocates type-specific tasks independent of generic tasks, the allocation under this algorithm will be V1, V2, . . . , Vk. Since the set of tasks with only type-specific tasks is a subset of the total set of tasks (including generic tasks), min-max cost for case with only type-specific tasks cannot exceed the min-max cost for the set of total tasks. Thus, max 1≤j≤k CT S(Vj) ≤ β max 1≤j≤k C ∗(V ′ j ). (2) The inequality in the equation above follows from the fact that TaskSplitter algorithm splits a tour into subtours that are within a factor β of the optimal min-max cost. By the same argument as before, min-max cost to optimally tour {V ′ j }, 1 ≤ j ≤ k cannot exceed the min-max cost to optimally tour {V ∗ j }, 1 ≤ j ≤ k, by the optimality of the partition {V ′ j }, 1 ≤ j ≤ k. Thus, max 1≤j≤k C ∗(V ′ j ) ≤ max 1≤j≤k C ∗(V ∗ j ). Combining equations (2) and (3), we get max 1≤j≤k CT S(Vj) ≤ max 1≤j≤k βC ∗(V ∗ j ). (3) (4) Using a similar procedure as before, this time comparing the allocation of a case with no type specific tasks against the set of all tasks, we get, max 1≤j≤k CT S(Rj) ≤ max 1≤j≤k βC ∗(R∗ j ). Substituting equations (4) and (5) in equation (1), we get R ≤ 2β. (5) (6) Frederickson, Hecht and Kim [19] provide an algorithm SPLITOUR1 that splits a tour (starting and ending at a start-node) on a set of nodes into k subtours each starting and ending at the start node. This algorithm has an approximation factor 1 + F − 1 k , where F is the approximation factor of the algorithm used for constructing the initial tour. Corollary 1. CycleSplit algorithm using the SPLITOUR algorithm from [19] for task splitting is a 5 − 2 k approximation algorithm for the Heterogeneous Task Allocation Problem (HTAP). Proof. The algorithm SPLITOUR is a 5 algorithm into k subtours (since Christofides provides an F = 3 tour). Equation (1) can be written as 2 − 1 k factor algorithm to split a tour using Christofides' 2 factor approximation for the initial R ≤ 5 2 − 1 max 1≤i≤m mi! + 5 2 − 1 k!. We can upper bound max 1≤i≤m mi with k. Thus, R ≤ 5 − 2 k . (7) (8) Corollary 2. In the special instance of HTAP where there is exactly one agent of each type (i.e., the heterogeneous agents are distinct), CycleSplit is a 4 − 1 k approximation factor algorithm. Proof. In this special case, mi = 1, 1 ≤ i ≤ m. Thus max 1≤i≤m mi = 1. So, equation (7) can be simplified as R ≤ 5 2 − 1! + 5 2 − 1 k! = 4 − 1 k . Remark 2. From Corollary 1, we see that regardless of the value of k, CycleSplit is a 5- approximation algorithm for HTAP. Furthermore, from Corollary 2, we can see that for the special instance of HTAP where all heterogeneous agents are distinct, CycleSplit is a 4-approximation algorithm. Note that the CycleSplit algorithm while using SPLITOUR as TaskSplitter in lines 4 and 8, splits a TSP tour on the set of tasks into k subtours evenly and allocates each subtour to one of the agents. While this approach works well when all agents have same the capacity (or balanced initial load), it may not perform as well when different agents have different capacity or initial load. In a case where agents have type-specific tasks that they must perform, each agent may have different task loads prior to allocation of generic tasks. In order to optimize the min-max tour cost, it is advantageous to take this into consideration. This motivates the formulation of an algorithm that takes into consideration the existing "load" of each agent from type-specific tasks when allocating generic tasks to agents. To address this, we propose a modified algorithm in the following section. 1Frederickson, Hecht and Kim call the algorithm k-SPLITOUR in their paper; however, we refer to it as SPLI- TOUR in order to avoid confusing k with the number of agents as we use it in this paper. 4.2 Min-Max Splitting Approach for Heterogeneous Agents Based on the intuition gained from the CycleSplit algorithm, we propose a modified algorithm called HeteroMinMaxSplit. This algorithm considers the fact that agents may have different "loads" after the allocation of type-specific tasks. Specifically, instead of splitting a tour on the set of generic tasks into nearly equal segments of a given size, the generic tasks are allocated to agents while taking into consideration the cost incurred by the agent to tour its specific tasks. In the HeteroMinMaxSplit algorithm, we allocate tasks to agents in three phases. • Phase 1: Type-specific task allocation • Phase 2: Generic task allocation (accounting for Phase 1 allocation) • Phase 3: Rebalancing tasks within agents of each type. In Phase 1, type-specific tasks are allocated among agents of the associated type as in Cy- cleSplit. The generic tasks are allocated among all agents in Phase 2. Unlike in CycleSplit, however, the allocation during Phase 2 tries to balance the total cost incurred by agents by taking into account the existing allocation to agents after Phase 1. Phase 3 is a post-processing step aimed to further balance the load among agents. After Phase 2, all tasks allocated to agents of the same type can be done by all agents in that type. Thus, we pool all tasks allocated to agents of the type i into a set T ′ i into mi sub-tours (Algorithm SPLITOUR may be used for this purpose [19]). Balancing the load in this fashion can lower the min-max tour cost by distributing the load more evenly among agents, as we will show later. i and re-allocate them to agents of type i by splitting the Christofides' tour on T ′ We present the algorithm in two steps. We first give an algorithm HeteroSplit that takes an additional input λ, which we take to be a rational number. This algorithm finds tours (if they exist) for each agent such that cost for each agent to complete its tour is less than λ. The HeteroMinMaxSplit algorithm then performs a binary search on λ, running HeteroSplit in each iteration, to find the best set of tours for the agents. Algorithm 3 Heterogeneous Task Split within bound λ ⊲ Let λ be a rational parameter that denotes the desired upper bound for the tour length for any agent 1: procedure HeteroSplit(A, T, G, λ) 2: 3: 4: 5: 6: 7: 8: 9: ⊲ Phase 1: Type-specific task allocation for each agent type i, 1 ≤ i ≤ m do Find Christofides' tour (starting and ending at vs) on the set of type-specific tasks of type i. Use TaskSplitter to split the tour on Ti into mi subtours (starting and ending at vs). Allocate one subtour to each agent of type i. end for ⊲ Phase 2: Generic task allocation Mark all agents as free. Remove from G, all vertices in Ti, 1 ≤ i ≤ m and all edges incident on these vertices. Denote the resulting graph by G′. Mark all tasks in graph G′ as unallocated. Find Christofides' tour starting and ending at vs on nodes in G′. Denote the tour by H. Consider the next unallocated task, say t, along H starting from vs. For each free agent j, find cost to tour (starting and ending at vs) all tasks allocated to it along with t using Christofides' algorithm. Select agent with the minimum cost provided the minimum cost is less than λ. If no free agent can add the task to its tour without exceeding cost λ, return failure. Allocate t to the selected free agent. Keep allocating unallocated tasks along H to the selected agent as long as adding the task does not cause the agent's tour cost to exceed λ. Remove the tasks allocated in the previous step from the set of unallocated tasks and mark agent as busy. Go to step 10 if the set of unallocated tasks is non-empty and free agents remain. ⊲ Phase 3: Rebalancing within agent types for each agent type i, 1 ≤ i ≤ m do Deallocate tasks from all mi agents of type i. Let T ′ from agents of type i. Find Christofides' tour on T ′ Run TaskSplitter on H ′ to split it into mi subtours. Allocate one subtour to each agent of type i. i to get tour H ′. i denote the set of tasks deallocated 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: end for Return tours for each agent. 20: 21: end procedure A binary search can be performed to find the optimal value for λ to be provided as a parameter to HeteroSplit. The value cannot be less than than twice the largest edge from the start node d(vs, t), where d(vs, t) is the distance from the start node vs to to any task location, i.e., 2 max t∈T the location of a task t. Also, λ cannot exceed max 1≤i≤k C(Ti) + C(T0), where C(·) is the cost to do a Christofides' tour on the given set of tasks. Hence, we can perform a binary search within this window to find the optimal value of λ. Algorithm 4 Min-Max Tour by HeteroMinMaxSplit Algorithm 1: procedure HeteroMinMaxSplit(A, T, G) 2: Do binary search in the interval [2 max t∈T d(vs, t), max 1≤i≤k C(Ti) + C(T0)] to find smallest value of λ for which HeteroSplit(A, T, G, λ) returns a set of valid tours. Return the set of tours returned by HeteroSplit(A, T, G, λ). 3: 4: end procedure 4.3 Bound on Approximation Ratio of HeteroMinMaxSplit Algorithm For the purpose of applying SPLITOUR from Frederickson, Kim and Hecht's work, we now provide a brief sketch of the algorithm SPLITOUR [19]. It takes as input a set of n nodes labeled v1 through vn (with the initial node as the start node) and a positive number k. First, the algorithm constructs a Christofides' tour on all the nodes. Let L be the cost of this tour and let cmax d(v1, vn). be the maximum direct distance of any node from the start node, i.e., cmax = max 1<i≤n For 1 ≤ j < k, it finds the largest vertex vp(j) along the tour such that the cost to traverse the tour from the start node to vp(j) does not exceed j k (L − 2cmax) + cmax. It returns k subtours (v1, . . . , vp(1), v1), (v1, vp(1)+1, . . . , v1), . . ., (v1, vp(k−1)+1, . . . , vn, v1), each of which has cost less than 1 k (L − 2cmax) + 2cmax. Frederickson, Hecht and Kim [19] show that if the length of the subtours do not exceed 1 ( 5 2 − 1 k ) of the optimal min-max cost. k (L − 2cmax) + 2cmax, then the min-max cost of the subtours is no worse than a factor The following proposition leverages the splitting heuristic summarized above to establish results on the performance of our algorithms. Theorem 3. HeteroMinMaxSplit is a (5 − 2 Task Allocation Problem (HTAP). k )-approximation algorithm for the Heterogeneous Proof. Let λ1 be the maximum cost among all the subtours returned by running SPLITOUR on Christofides' tours on type-specific tasks after line 6 of the CycleSplit algorithm, i.e., λ1 = CT S(Vj), where Vj denotes the set of type-specific tasks allocated to agent Aj and CT S(·) max 1≤j≤k denotes the cost associated with the subtour returned by SPLITOUR. Note that λ1 is also the maximum cost after Phase 1 of the HeteroSplit algorithm. Set λ to be λ1 + 1 Running SPLITOUR on a Christofides' tour on the set of generic tasks T0 to split it into k subtours will returns subtours of length (or cost) no more than 1 k (L − 2cmax) + 2cmax, where L is the length (or cost) of the initial Christofides' tour on T0, and cmax is the maximum direct distance of any node in T0 from the start node. No matter how each of these subtours are assigned to agents (such that each agent gets one subtour), the total cost is no more than λ1 + 1 k (L − 2cmax) + 2cmax. k (L − 2cmax) + 2cmax. Consider HeteroSplit with this value of λ. In Phase 1, HeteroSplit allocates type-specific tasks to agents, same as steps 2-6 of CycleSplit. The maximum cost of any agent's tour after Phase 1 is λ1. In Phase 2, the HeteroSplit algorithm computes a Christofides' tour on the set of generic tasks. The algorithm selects an agent that has minimum cost to complete its current allocated tasks in addition to the next task along the Christofides' tour on generic tasks. The algorithm then allocates tasks along the tour to the selected agent as long as the cost does not exceed λ. Regardless of which agent gets selected first, the set of tasks that are allocated to the selected agent in HeteroSplit will contain the tasks in the first subtour generated by SPLITOUR. The allocation by HeteroSplit to the first selected agent may contain more tasks than the first subtour of SPLITOUR, but not less. Thus, after allocating tasks to the first agent, the number of tasks left to be allocated to the remaining k − 1 agents in HeteroSplit is no more than the number of tasks left in the k − 1 subtours to be allocated to the remaining k − 1 agents in SPLITOUR. In SPLITOUR, after the allocation of the first subtour to the an agent, it is guaranteed that the remaining k − 1 subtours can be allocated to the remaining k − 1 agents, since the allocation is possible regardless of the order in which agents are selected. Given that the set of tasks left for allocation in HeteroSplit is no bigger than the set of tasks left to be allocated in SPLITOUR, it is guaranteed that the remaining tasks can be allocated to other k − 1 agents in HeteroSplit algorithm for this value of λ. Thus, by inducting on the number of agents to which tasks have been allocated along the initial tour, the HeteroSplit algorithm is guaranteed to return a feasible solution to HTAP for λ = λ1 + 1 k (L − 2cmax) + 2cmax. Since HeteroSplit checks tour cost against λ before further allocation of tasks to an agent, it guarantees that the tour costs for all agents is no more than λ. Thus, the approximation factor is given by, R ≤ ≤ max 1≤j≤k max 1≤j≤k max 1≤j≤k λ C ∗(S∗ j ) = λ1 C ∗(S∗ j ) max 1≤j≤k + 1 k (L − 2cmax) + 2cmax max 1≤j≤k C ∗(S∗ j ) CT S(Vj) C ∗(V ∗ j ) + 1 k (L − 2cmax) + 2cmax max 1≤j≤k C ∗(R∗ j ) (9) 1 max 1≤i≤m mi! + 5 2 − 1 k! ≤ 5 2 ≤ 5 − − 2 k , (10) (11) j are subsets of j . Equation (10) is obtained from the results of Frederickson, Hecht and Kim [19], summarized where equation (9) is given by the triangle inequality and the fact that V ∗ S∗ prior to this theorem. j and R∗ The HeteroMinMaxSplit algorithm performs a binary search over λ and is thus guaranteed k approximation to find the λ used above by HeteroSplit. Thus, HeteroMinMaxSplit is a 5− 2 algorithm for HTAP. Corollary 3. HeteroMinMaxSplit is a (4− 1 of HTAP where all agents are distinct. k )-approximation algorithm for the special instance Proof. In this special instance, mi = 1, for 1 ≤ i ≤ m. Substituting in equation (10), we get the approximation factor R ≤ 4 − 1 k . From Theorem 3, we see that HeteroMinMaxSplit is a 5-approximation algorithm regardless of the value of k. In this special instance where all heterogeneous agents are distinct, we see from Corollary 3 that HeteroMinMaxSplit is a 4-approximation algorithm regardless of the value of k. 4.4 Examples Illustrating HeteroMinMaxSplit and CycleSplit Algorithms HeteroMinMaxSplit takes into consideration the "load" from type-specific tasks while allocating generic tasks and can outperform CycleSplit when the type-specific tasks are not uniformly distributed among agents. We illustrate this through the following examples. Example 1. Consider the scenario where three agents are collectively required to do nine tasks. Agent A1 is a type 1 agent, A2 is a type 2 agent and A3 is a type 3 agent. All agents are located at node vs. The start node vs is located at distance d′ > 2 from nodes V1 and V2 as shown in Figure 1. Nodes A, B and C are located at unit distance from node V1, and node V2 is located at a distance d > 3 (such that the triangle inequality is satisfied) from node C as shown in Figure 1. Distances between nodes not directly connected are defined as the sum of distances along the shortest path traversed to reach the node (the graph can be considered as a road network that the agents can traverse). vs d′ d V2 t9 d′ C t5 t6 A t1 t2 t7 t8 V1 1 1 B 1 t3 t4 Figure 1: Task locations in Example 1 Tasks in set T0 = {t1, t2, t3, t4, t5, t6} are generic tasks. Tasks {t1, t2} are located at node A, {t3, t4} are located at node B, and {t5, t6} are located at node C. Agent A1 has one type-specific task t7, i.e. T1 = {t7}. Agent A2 has one type-specific task t8, i.e. T2 = {t8}. Tasks t7 and t8 are located at node V1. Agent A3 has one type-specific task t9, i.e., T3 = {t9} and t9 is located at node V2. Both CycleSplit and HeteroMinMaxSplit algorithms first allocate the type-specific tasks to the respective agents. Thus, agent A1 is allocated task t7, agent A2 is allocated task t8 and agent A3 is allocated task t9. CycleSplit algorithm splits the generic tasks at nodes A, B and C to the three agents. Thus, agent A1 gets allocated tasks {t1, t2}, agent A2 gets allocated tasks {t3, t4}, and agent A3 gets allocated tasks {t5, t6}. The min-max cost is thus max{2d′ + 2, 2d′ + 2, 2d′ + d + 1} = 2d′ + d + 1. The HeteroMinMaxSplit algorithm allocates tasks in Phase 2 based on the allocation done in Phase 1. Thus, for λ = 2d′ + 4 < 2d′ + d + 1, HeteroSplit allocates all tasks at the nodes A, B and C to agents A1 and A2 (which already travel to node V1 to do their type-specific tasks). Thus, tasks {t1, t2} located at node A are allocated to agent A1, and tasks {t3, t4, t5, t6} located at nodes B and C are allocated to agent A2. Since only one agent of each type is present, agents retain their allocation after Phase 3. The min-max cost is thus max{2d′ + 2, 2d′ + 4, 2d′} = 2d′ + 4. For large values of d′ and d, HeteroMinMaxSplit gives a factor of 2 over CycleSplit on the min-max tour cost. Note that in the above example, Phase 3 does not improve the min-max cost. We illustrate the benefit of Phase 3 (rebalancing "load" between agents of a given type) of the HeteroMinMaxS- plit algorithm in the following example. Example 2. Consider a scenario with two type 1 agents A1 and A2 located at the start node vs. Let type-specific tasks for type 1 agents T1 = {t1, t2} be located at node A, which is at a distance of 1 unit from vs as shown in Figure 2. Generic tasks T0 = {t3, t4} are located at node B which is at a distance of 1 from vs as shown in Figure 2. A 1 vs B 1 t1 t2 t3 t4 Figure 2: Task locations in Example 2 In Phase 1, one type-specific task gets allocated to each of the agents, say t1 gets allocated to agent A1 and t2 gets allocated to agent A2. In Phase 2, one generic task gets allocated to each of the agents, say t3 gets allocated to agent A1 and t4 gets allocated to agent A2. So at the end of Phase 2, both agents need to visit nodes A and B to complete their allocated tasks. In Phase 3, all tasks allocated in the previous phases to agents of the same type are deallocated and redistributed amongst them. In this phase, tasks {t1, t2, t3, t4} are pooled and the TaskSplitter algorithm SPLITOUR is run on this set of tasks. Thus, one agent, say A1, gets tasks at node A and the other agents A2 gets tasks at node B. In this example, Phase 3 reduces the tour cost from 4 to 2 for both the agents, thus reducing the min-max cost by a factor of 2. Example 3. Consider two agents: A1 of type 1 and A2 of type 2. Task t1 is of type 1 and must be performed by agent A1, and tasks t2, t3 are generic tasks that can be done by either of the agents, i.e., T1 = {t1}, T2 = ∅, T0 = {t2, t3}. Task t1 is located at node A. Tasks t2 and t3 are located at node B. Agents start from start node vs. A t1 vs 1 B 1 t2 t3 Figure 3: Task locations in Example 3 CycleSplit algorithm allocates type-specific task t1 to agent A1 and splits generic tasks {t2, t3} among agents A1 and A2. Hence, A1 is allocated tasks {t1, t2} and A2 is allocated {t3}. The tour costs for agents A1 and A2 are 4 and 2 respectively, and thus, the min-max tour cost is max{4, 2} = 4. HeteroMinMaxSplit algorithm allocates type-specific task t1 to agent A1 in Phase 1. In Phase 2, generic tasks {t2, t3} are split among agents A1 and A2 based on remaining capacity. For λ = 2, HeteroSplit allocates {t1} to agent A1 and {t2, t3} to agent A2. The min-max tour cost for the tour returned by HeteroMinMaxSplit is thus max{2, 2} = 2. In this example, HeteroMinMaxSplit algorithm gives an improvement by a factor of 2 over CycleSplit. The following example extends it to a general case with k agents. Example 4. Consider the following generalization of the previous example for k agents. Agents {A1, A2, . . . , Ak} are located at start node vs. Tasks Ti = {ti} located at node Vi has to performed by Ai for i = 1, 2, . . . , k − 1, and tasks T0 = {tk, tk+1, . . . , t2k−1} located at node Vk are generic tasks and can be completed by any agent. Let d(·, ·) denote the distance function. The distance between the start node vs and any other node is 1 unit, i.e., d(vs, Vi) = 1, for 1 ≤ i ≤ k. The distance between two nodes Vi and Vj is given by d(Vi, Vj) = d(Vi, vs)+d(vs, Vj) = 2 if i 6= j and zero if i = j. In this case, CycleSplit algorithm allocates tasks {ti, tk+i−1} for agents Ai, 1 ≤ i ≤ k − 1 and task {t2k−1} to agent Ak. This allocation has a min-max tour cost of 4. HeteroMinMaxSplit allocates task {ti} to agent Ai for 1 ≤ i ≤ k − 1 and tasks {tk, tk+1, . . . , t2k−1} to agent Ak. This allocation brings down the min-max tour cost to 2. 5 Summary In this work, we considered the Heterogeneous Task Allocation Problem (HTAP) where we aim to allocate tasks to heterogeneous agents subject to agent-task compatibility while minimizing the min-max tour cost. We provide two approximation algorithms to solve the Heterogeneous Task Allocation Problem (HTAP). We first propose a 2β approximation algorithm CycleSplit, where β is the approximation factor of the algorithm used by CycleSplit to split tours. We then use the CycleSplit algorithm to develop the HeteroMinMaxSplit algorithm which has an approximation ratio 5 − 2 k , where k is the number of agents available. The HeteroMinMaxSplit algorithm works in three phases and allocates tasks to agents in a "balanced" way. An interesting extension to the work would be to study the case of allocation when tasks can be done by different subsets of agents (as opposed to agents of only a certain type). References [1] K. Sundar and S. Rathinam, "An exact algorithm for a heterogeneous, multiple depot, multiple traveling salesman problem," in Unmanned Aircraft Systems (ICUAS), 2015 International Conference on. IEEE, 2015, pp. 366–371. [2] H.-L. Choi, L. Brunet, and J. P. How, "Consensus-based decentralized auctions for robust task allocation," IEEE Transactions on Robotics, vol. 25, no. 4, pp. 912–926, 2009. [3] L. Bertuccelli, H.-L. Choi, P. Cho, and J. How, "Real-time multi-uav task assignment in dy- namic and uncertain environments," in AIAA Guidance, Navigation, and Control Conference, 2009, p. 5776. [4] A. Sadeghi and S. L. Smith, "Heterogeneous task allocation and sequencing via decentralized large neighborhood search," Unmanned Systems, vol. 5, no. 02, pp. 79–95, 2017. [5] F. Bullo, E. Frazzoli, M. Pavone, K. Savla, and S. L. Smith, "Dynamic vehicle routing for robotic systems," Proceedings of the IEEE, vol. 99, no. 9, pp. 1482–1504, 2011. [6] A. Prorok, M. A. Hsieh, and V. Kumar, "Adaptive distribution of a swarm of heterogeneous robots," Acta Polytechnica, vol. 56, no. 1, pp. 67–75, 2016. [7] E. G. Jones, B. Browning, M. B. Dias, B. Argall, M. Veloso, and A. Stentz, "Dynamically formed heterogeneous robot teams performing tightly-coordinated tasks," in Robotics and Au- tomation, 2006. ICRA 2006. Proceedings 2006 IEEE International Conference on. IEEE, 2006, pp. 570–575. [8] T. H. Labella, M. Dorigo, and J.-L. Deneubourg, "Division of labor in a group of robots inspired by ants' foraging behavior," ACM Transactions on Autonomous and Adaptive Systems (TAAS), vol. 1, no. 1, pp. 4–25, 2006. [9] R. Kilgore, K. Harper, C. Nehme, and M. Cummings, "Mission planning and monitoring for heterogeneous unmanned vehicle teams: A human-centered perspective," in AIAA Infotech@ Aerospace 2007 Conference and Exhibit, 2007, p. 2788. [10] Office of Naval Research, "Autonomous systems innovation summit final report," Office of Naval Research, Tech. Rep., 2008. [11] B. P. Gerkey and M. J. Matari´c, "A formal analysis and taxonomy of task allocation in multi- robot systems," The International Journal of Robotics Research, vol. 23, no. 9, pp. 939–954, 2004. [12] T. Bektas, "The multiple traveling salesman problem: an overview of formulations and solution procedures," Omega, vol. 34, no. 3, pp. 209 – 219, 2006. [13] A. M. Frieze, "An extension of Christofides heuristic to the k-person travelling salesman prob- lem," Discrete Applied Mathematics, vol. 6, no. 1, pp. 79–83, 1983. [14] N. Christofides, "Worst-case analysis of a new heuristic for the travelling salesman problem," DTIC Document, Tech. Rep., 1976. [15] Z. Xu and B. Rodrigues, "A 3/2-approximation algorithm for the multiple TSP with a fixed number of depots," INFORMS Journal on Computing, vol. 27, no. 4, pp. 636–645, 2015. [16] W. Malik, S. Rathinam, and S. Darbha, "An approximation algorithm for a symmetric gen- eralized multiple depot, multiple travelling salesman problem," Operations Research Letters, vol. 35, no. 6, pp. 747–753, 2007. [17] S. Yadlapalli, S. Rathinam, and S. Darbha, "3-approximation algorithm for a two depot, heterogeneous traveling salesman problem," Optimization Letters, vol. 6, no. 1, pp. 141–152, 2012. [18] J. Bae and S. Rathinam, "A primal-dual approximation algorithm for a two depot heteroge- neous traveling salesman problem," Optimization Letters, vol. 10, no. 6, pp. 1269–1285, 2016. [19] G. N. Frederickson, M. S. Hecht, and C. E. Kim, "Approximation algorithms for some routing IEEE, problems," in Foundations of Computer Science, 1976., 17th Annual Symposium on. 1976, pp. 216–227. [20] W. Yu and Z. Liu, "Improved approximation algorithms for min-max and minimum vehicle Springer, routing problems," in International Computing and Combinatorics Conference. 2015, pp. 147–158. [21] G. Even, N. Garg, J. Konemann, R. Ravi, and A. Sinha, "Min–max tree covers of graphs," Operations Research Letters, vol. 32, no. 4, pp. 309–315, 2004. [22] E. M. Arkin, R. Hassin, and A. Levin, "Approximations for minimum and min-max vehicle routing problems," Journal of Algorithms, vol. 59, no. 1, pp. 1–18, 2006. [23] M. R. Khani and M. R. Salavatipour, "Improved approximation algorithms for the min-max tree cover and bounded tree cover problems," Algorithmica, vol. 69, no. 2, pp. 443–460, 2014.
1207.2697
1
1207
2012-07-11T16:22:08
Genetic agent approach for improving on-the-fly web map generalization
[ "cs.MA", "cs.CG", "cs.NE" ]
The utilization of web mapping becomes increasingly important in the domain of cartography. Users want access to spatial data on the web specific to their needs. For this reason, different approaches were appeared for generating on-the-fly the maps demanded by users, but those not suffice for guide a flexible and efficient process. Thus, new approach must be developed for improving this process according to the user needs. This work focuses on defining a new strategy which improves on-the-fly map generalization process and resolves the spatial conflicts. This approach uses the multiple representation and cartographic generalization. The map generalization process is based on the implementation of multi- agent system where each agent was equipped with a genetic patrimony.
cs.MA
cs
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 GENETIC AGENT APPROACH FOR IMPROVING ON- THE-FLY WEB MAP GENERALIZATION Brahim lejdel1 and Okba kazar2 1Computer science departement, University of el-Oued, Algeria. [email protected] 2Computer science department, University of Biskra, Algeria. [email protected] ABSTRACT The utilization of web mapping becomes increasingly important in the domain of cartography. Users want access to spatial data on the web specific to their needs. For this reason, different approaches were appeared for generating on-the-fly the maps demanded by users, but those not suffice for guide a flexible and efficient process. Thus, new approach must be developed for improving this process according to the user needs. This work focuses on defining a new strategy which improves on-the-fly map generalization process and resolves the spatial conflicts. This approach uses the multiple representation and cartographic generalization. The map generalization process is based on the implementation of multi- agent system where each agent was equipped with a genetic patrimony. KEYWORDS On-the-fly maps generalization, genetic agent, spatial constraints, genetic algorithm, multiple representation. 1. INTRODUCTION The web mapping has known great growth in parallel of the rapid development of the internet. To provide on-the-fly web mapping to the user, the process of on-the-fly map generalization must rely on fast, effective, and powerful methods. An principals challenge of such on-the-fly maps generalization is to offer the user a spatial data in real time and in height quality , it must allow also to solve spatial conflicts that may appear between objects especially due to lack of space on display screens [1]. Many research works have proposed solutions to on-the-fly map generalization, an important work that was done by [1], he proposed a new approach based on the implementation of a multi- agent system for the generation of maps on the fly and the resolution of spatial conflicts. This approach is based on the use of multiple representation and cartographic generalization. Also, to improve the process of on-the-fly map generalization, another approach was proposed in [2] which based on a new concept called SGO (Self-generalizing object). In the same context and for reducing the spatial conflicts in the map, a good method was proposed in [3] which based on the genetic algorithm. The work presented in this paper comes under the research favouring the use of agents were equipped with genetic patrimony; it based on the approach presented in [4]. It uses the genetic agent in order to generate data on arbitrary scales thanks to an on-the-fly map generalization process. The proposed approach exclusively aims to solve the following problems related to on-the-fly web mapping applications: DOI : 10.5121/ijitcs.2012.2301 01 International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 - How can we adapt the contents of maps to users' needs and improve the time of generalization process of spatial data, which improve in result the transfer time of data map? - How can we solve spatial conflicts in order to improve the quality of map? The paper is structured as follows. In the part 2, we present on-the-fly map generalization process and its problems. Part 3 briefly reminds the approaches of on-the-fly map generalization. Part 4 presents the proposed approach for improving on-the-fly web mapping generalization. In part 5, we present the experimentation and some results. Finally, part 6 concludes and cites some perspectives of this work. 2. ON-THE-FLY WEB MAP GENERALIZATION The on-the-fly web map generalization is defined as; the creation in real-time and according to the user's request, of a cartographic product appropriate to its scale and purpose, from a largest- scale database. The main characteristics of on-the-fly web mapping are [1]: - Required maps must be generated in real-time. - Generation of a temporary and reduced scale dataset for visualization purposes from the database [5] in order to use the computer's memory efficiently [6]. - A real-time map generation process has to take into account users' preferences and contexts. - A real-time map generation process must adapt maps' contents to display space and resolution of display media as well as to the contextual use of these maps. - The scale and theme of the map are not predefined [6]. - There is no way to verify the quality of the final map that will be sent to the user. The main problems linked to on-the-fly map generalization are the time of delivering the cartographic data and its quality. The generalization process time is a crucial factor to provide a user cartographic data. The waiting time must be compatible with Newell's cognitive band, which is less than 10 seconds [7]. Also, in order to produce maps suited to a user's requests, on- the-fly map generalization must be flexible enough to take into account the level of detail, the kind of the map…etc. 3. APPROACHES OF ON-THE-FLY MAP GENERALIZATION There are three fundamental approaches to providing on the fly map generalization: 3.1 Generalization-oriented approaches This approach based on map generalization which is known to be a complex and time consuming process. In order to accelerate this process, certain authors propose methods based upon pre-computed attributes [1]. Cartographic generalization operators have to be applied to spatial objects on-the-fly. The generalization operators are principally the selection, the simplification and the displacement. The generalization oriented approach is very flexible [2]. However, it is not widely used because of the time it takes to provide requested maps. Furthermore, due to its complexity, generalization process cannot be carried out by simply applying generalization algorithms sequentially without taking into account the objects' spatial neighbourhood. 2 International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 3.2 Representation-oriented approaches Currently, it is the ideal solution to allow users to get data at the desired level of abstraction compared by the previous approach. This approach proposes to store several pre-defined representations of a given object (usually at different scales) within the same database [2]. The simplest representations are usually obtained from the manual or semi-automatic generalizations of the most detailed representations. However, in terms of personalization, multi-representations are extremely limited because all scales are predefined. Other important problems related to multiple representations are the difficulty to create necessary map scales [2]. All these problems limit the effective use of multi-representations for on-the-fly map generalization. 3.3 Hybrid approaches Hybrid approaches take advantage of the flexibility of generalization oriented approaches and the suitability of representation-oriented approaches to generate maps in real-time by combining their use [1]. Several authors proposed an approach based on this hybrid approach, such as [1], [2] and [6]. Its advantage is that it reduces the effort needed for generalization process and improves the quality of the result because smaller the difference between the initial map scale and the desired one, easier the generalization process. However, to be truly efficient, this method must rely on a database that includes several scales, leading to the typical problems associated with multiple representations [2]. To improve this third approach, it is necessary to develop new methods that minimize, as much as possible, the problems associated with automatic generalization and multiple representations and resolve all the spatial conflicts. 4. PROPODED APPRAOCH This work is based on the approach proposed in [4]. We combine genetic agent, map generalization process and multiple representations approach for improving the delivery time of map and resolving spatial conflicts to increase the quality of result map. This approach aims exclusively to improve the map generalization process. The spatial objects are modelled as agent. This agent is a concept of artificial intelligent. Each agent is equipped with genetic patrimony. Thus, genetic agent has some knowledge of its internal state, and some sensory information concerning environmental context, which permit it to decide what action (or action sequence) executed in order to achieve its goals. In this context, the role of genetic agent is identifying the best sequence of generalization's algorithms with good parameters that allow to perform the best map generalization process. In order to implement this process, each agent is able to identify and assess its internal constraints, and applies generalisation algorithms to itself in order to satisfy as well as possible these constraints. They are divided into two kinds [8]: -Internal constraints: The constraints relate an isolated object. In this context, we take account for building agent; constraints of size, granularity, squareness, preservation of shape, etc. -Relationalships constraints: They are the constraints which involve more than one spatial object, the constraint that prevents symbols from overlapping each others (, e.g the symbol of a road should not overlap with that of a house), or the constraint that requires aligned buildings to remain aligned. In this section, the genetic agent architecture is presented. We describe also the structure of plan executed by the genetic agent, its different modules and the cycle life of genetic agent. 3 International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 4.1.Genetic Agent architecture As previously mentioned, this research work based upon the use of hybrid approach which allows to improve the generalization process of spatial data described in [4]. This approach consists to model the geographic objects contained in databases (roads, buildings, etc.) into the decisional entities of the generalization process. In this approach, every geographic object becomes a software agent whose goal is to satisfy its constraints as much as possible. Each geographic agent has three main components: -Patrimony genetic. -An optimizer: using the genetic algorithm to find the best solution according to the internal constraints or relationships ones. -Ability to communicate with neighbouring agents. Environnement Perception of environment Message received from others agents Creation of population Optimizer Evaluation of selection Optimizat ion Control Module Selection Crossover, mutation N o Stop ? Yes Evaluation Best action Execution Message sent to others agents Figure 1. Genetic agent architecture 4 International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 4.2 Plan Structure of genetic agent The genetic agent is an agent which has a patrimony genetic. In this context, we consider two main kinds of genetic agent; road's genetic agent and building's genetic agent. In the following, we represent the gene of these two kinds: 4.2.1 Plan of Road gene An agent road can be characterized by its identified, and a set of algorithms that can be applied on it, to perform its generalization. These algorithms can take parameters. The coding of gene is made by multiple forms; we use character code for coding the identifiers, the binary form to implement the application or not of such algorithms (0 to say that the algorithm is not applied, 1 for say that the algorithm is applied) and the real forms to encode the parameters of the algorithms. Thus, we can represent agent's plan of roads by the figure 2: P1 DP -- 1 -- 10-6 Accor-1 Schemat-0 Figure 2. Example of road's plan 4.2.2 Plan of Building gene The agent Building can be characterized by its identifier and by its generalization's algorithms: simplification algorithm and displacement one... etc. The same type of coding is used to encode this type of gene. So, the following figure represents an example of building's plan: P2 Simp -- 1 ∆X(displacement) ∆Y(displacement) Figure 3. Example of building's Plan 4.3 Genetic agent Modules The main role of a genetic agent is to generalize its self, in order to adapt it to the level of detail requested by the user. For this reason, the genetic agent is responsible for the satisfaction of its constraints. It must be collaborate with the other agent for avoid a constraints violation. It applies the proper solution composed of a sequence of generalization's algorithms, which is generated by its optimizer. The architecture of genetic agent is composed of two main modules. The one is called generalization module which perform the map generalization process and the other is the optimization control module which controls the data flow and the condition of optimization, such as the number of agent in conflicts and the elapsed time of generalization process. 4.3.1 Map Generalization module This module carries out the map's generalization process; it applies the solution defined by the optimizer. The optimizer execute genetic algorithm to define the best chromosome. It is represented by sequence of algorithms and their good parameters, depending on the environment condition and the genetic agent state. For finding the solution, the optimizer follows the classical steps of a genetic algorithm are selection, crossover and mutation [4]. The figure 4 represents a solution generated by the optimizer, such as, each two chromosomes' parents together to make two chromosomes' child, in result. The solution is refined gradually over the iterations until convergence to a solution that approaches the optimal solution, a certain degree of imperfection is acceptable. 5 International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 Figure 4. Solution generated by the optimizer The solution evaluated by a fitness, we use in this work a fitness based on certain measures that assess the quality of spatial data, is restricted to a set of measures: • OS (object shape): calculates the loss of the object's shape during processing. For buildings, we compute the differentiation in the surface S and for roads, using measures of McMaster [9]: OS = ∑ (McMaster ∆+∆ S ) (1) A minimum number is a good solution. • NC: number of objects in conflict, a minimum number is a good solution. • DP: sums the normalised, absolute, distance of each object has been displaced from its starting position. DB = n ∑ 1 ( 2 idx + dy ) 2 i (2) Also, a minimum number is a good solution. So, the general function is: f = NC + DP + OS (3) The best solution is one that has the smallest value of general function. After each iteration (selection, crossover, mutation), agents in conflicts exchange the messages for calculate the value of general fitness which allow to select the bests chromosomes, i.e. chromosomes with minimum fitness. After this step, it retains only the most relevant solutions. 6 International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 4.3.2 Optimization Control module This module controls principally the time constraint and the quality of the map. It controls generalization's time for not exceeds the maximum limits and the number of spatial conflicts. The optimizer stops the execution of the genetic algorithm for three reasons, when it achieve certain fitness, when it achieve a set number of iterations or when it have passed a certain running time. In the two latter cases, we choose the solution that has the best fitness. The optimization control module assures a compromise between the time of delivering spatial data and its quality. Spatial BD Generalization module Control optimization module Internet Genetic Agent I N T E R F A C E Figure 5. System architecture It exists also an interface between the user and the map generalization module; it allows user to transmit its requests. The request transmitted carries important information for the researched data, such as identification of the zone, the kind of map and its level of detail. The level of detail is arbitrary and not predefined. This module permits also to drawing the final generalized data. In this approach, genetic agents negotiate with each other agent, via message that are used as input in genetic algorithm, these data allow agent to solve various conflicts at once and prevent new conflicts from appearing and achieve a best generalization process. 4.4 Cycle life of Genetic Agent In the beginning of map generalization process, the geographic agent has evaluated its internal constraints and relationalship ones, in its agents group. In our multi-agent system, the agents aim to satisfy the offensive constraints without violating one of defensive constraints [10]. Fitness is utilised for measuring the satisfaction of the constraints (calculate the degree of constraints satisfaction). A list of possible plans is attached which represent the populations of the genetic algorithm. A plan proposes a sequence of generalization's algorithms and its required parameters which improves the agent's state. The agents active and run theirs genetic algorithms in parallel for reducing the time of map generalization process. The process of improving an agent's state represented in the following sequence: constraints evaluation, proposing plans which represent the population of genetic, the execution of the genetic algorithm by the optimizer. The generalization process is controlled by the optimization control module for selecting the best plan, the previously steps are the same generic behaviour of all genetic agents, the figure 5 represent the life cycle of agent. 7 International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 Control optimization module Best plan Begin Evaluate constraints Optimizer Update Data base End Propose plans 5.IMPLEMENTATION AND RESULTS Figure 6. Genetic agent cycle life We use in this work the Jade platform [11], JADE is a software framework, fully implemented in Java that simplifies the implementation of multi-agent systems through a middleware. JADE implements FIPA's (Foundation of Intelligent Physical Agents) specifications [2]. The algorithms of generalization and the genetic algorithm are implemented in Java. The agents execute their genetic algorithms in parallel to decrease the response time of the map generalization process. We implement also the various steps of the genetic algorithm; selection, crossover, mutation, and the fitness function for evaluate the solution that was composed of a sequence of generalization's algorithms with good parametric values to improve the map generalization process. Initially, for avoid the complexity; we have used a limited number of objects. We used data in a Shapefile format (ESRI) from the Habitats' direction of el-oued (Algeria). These data are on a scale of 1:1000 and cover a little part of Choot city. Two classes of objects, namely "buildings" and "roads", were used. The scale requested by the user is 1:1500. For drawing the generalized object we use a visualization tool which is based upon the GeoTools library [12]. We present in figure 7 the initial results of our approach. 8 International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 6.CONCLUSION Figure 7. Initial results In this approach, each type of map features (buildings, roads) is modelled as agent; these agents are equipped with patrimony genetic which allows improving the map generalization process. Multi-agent systems and genetic algorithms provide various advantages to real-time map generalization and quality of generalized data such as, the autonomy and flexibility which improve the personalization of maps at the time of their creations, finding the best solution and resolve all the appearance spatial conflicts. Moreover, the genetic agent has equipped with sensor to check its environment, a communicator to send requests or responses, and the ability to move itself into a new position. Also, to decrease the time of on-the-fly map generalization process, the agents execute theirs genetic algorithms, in parallel and at the same time of the transfer of generalized data. The initial experiments have shown us the potential advantages of using collaborative agent. Each agent is equipped with patrimony genetic that enable it to generate maps in real-time and with height quality. Thus, each agent can: - Define the optimal or near optimal actions (sequence of algorithms) of generalization and it can generate its self. - Adapt its generalization with the other geographic agents. - Collaborate with the others agent for accelerating the time of map generalization process and resolves all the spatial conflicts. This research work opens various directions of researches, such as: - Improving the performance of our approach with the utilization of other methods of optimization that allow the agent to define the optimal solution. - Customizing the map according to user's needs. In another work, we will model the spatial constraints in the form of ontology for different kinds of map. For example, one can have ontology for constraints semantic of tourist maps. Thus, when using the system, the most appropriate ontology can be selected according to the kind of map that will be generated. 9 International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.3, June 2012 REFERENCES [1] Nafaa jabeur (2006), A multi-agent system for on-the-fly web map generation and spatial conflict resolution, University of Laval, Quebec. [2] Mamane Nouri SABO (2007), Généralisation et des patrons géométriques pour la création des objets auto-generalisants (sgo) afin d'améliorer la généralisation cartographique à la volée, Université de laval , Quebec. [3] Wilson, I.D. & Ware, M. (1995), Reducing Graphic Conflict In Scale Reduced Maps Using A Genetic Algorithm, ICA Map Generalization Workshop, Paris, 2003. [4] Lejdel brahim & kazar okba (2012), Genetic agent for optimizing generalization process of spatial data, International Journal of Digital Information and Wireless Communications (IJDIWC), Vol. 1, No. 3, pp-729-737. [5] Van Oosterom & V. Schenkelaars. (1995), The development of an interactive multi-scale GIS, International Journal of Geographical Information Systems, Vol. 9(5):489-507. [6] Cecconi, A. (2003), Integration of cartographic generalization and multi-scale databases for enhanced web mapping, PhD. Thesis, University of Zurich. [7] A. Newell. (1990), Unified Theories of Cognition, Harvard University Press, Cambridge MA, p549. [8] Lejdel brahim & Mrs K. amieur & Zaia alimazighi, (2009), modelling and managing multiples representations of spatial data by a hybrid approach (application them: road network), proceeding of International conference on information & communication systems, pp219-226. [9] McMaster, R.B. (1983), Mathematical measures for the evaluation of simplified lines on maps, PhD thesis, University of Kansas., USA. [10] Bader M. (2001), Energy Minimizing Methods for Feature Displacement in Map Generalization, PhD thesis, Department of Geography, University of Zurich. [11] JADE (2006), Java Agent Development Framework, http://jade.tilab.com/. [12] GeoTools (2006), the open source java GIS toolkit, http://docs.geotools.org/. 10
1807.03646
1
1807
2018-07-10T13:48:29
Ontology-based multi-agent system to support business users and management
[ "cs.MA", "cs.CY" ]
For some decision processes a significant added value is achieved when enterprises' internal Data Warehouse (DW) can be integrated and combined with external data gained from web sites of competitors and other relevant Web sources. In this paper we discuss the agent-based integration approach using ontologies (DSS-MAS). In this approach data from internal DW and external sources are scanned by coordinated group of agents, while semantically integrated and relevant data is reported to business users according to business rules. After data from internal DW, Web sources and business rules are acquired, agents using these data and rules can infer new knowledge and therefore facilitate decision making process. Knowledge represented in enterprises' ontologies is acquired from business users without extensive technical knowledge using user friendly user interface based on constraints and predefined templates. The approach presented in the paper was verified using the case study from the domain of mobile communications with the emphasis on supply and demand of mobile phones.
cs.MA
cs
Ontology-based multi-agent system to support business users and management Dejan Lavbič, Olegas Vasilecas and Rok Rupnik Dejan Lavbič, Olegas Vasilecas and Rok Rupnik. 2010. Ontology-based multi-agent system to support business users and management, Technological and Economic Development of Economy (TEDE), 16(2), pp. 327 - 347. Abstract For some decision processes a significant added value is achieved when enterprises' internal Data Warehouse (DW) can be integrated and combined with external data gained from web sites of competitors and other relevant Web sources. In this paper we discuss the agent-based integration approach using ontologies (DSS- MAS). In this approach data from internal DW and external sources are scanned by coordinated group of agents, while semantically integrated and relevant data is reported to business users according to business rules. After data from internal DW, Web sources and business rules are acquired, agents using these data and rules can infer new knowledge and therefore facilitate decision making process. Knowledge represented in enterprises' ontologies is acquired from business users without extensive technical knowledge using user friendly user interface based on constraints and predefined templates. The approach presented in the paper was verified using the case study from the domain of mobile communications with the emphasis on supply and demand of mobile phones. Keywords Decision support, agent, multi-agent system, ontology, data warehouse, information retrieval, business rules, business process management 1 Introduction There is a growing recognition in the business community about the importance of knowledge as a critical resource for enterprises. The purpose of knowledge management is to help enterprises create, derive, share and use knowledge more effectively to achieve better decisions, to increase of competitiveness and to decrease the number of errors. In order to run business effectively an enterprise needs more and more information about competitors, partners, customers, and also employees as well as information about market conditions, future trends, government policies and much more. There are several products and technologies available on the market that support advanced Business Process Management (BPM) (Trkman et al., 2007) and advanced decision support. Enterprises expect these applications to support wide range of functionalities - analysing customer profiles, building and analysing business strategies, developing customer-specific products, carrying out targeted marketing and predicting sales trends. Amount of documents in the Web, enterprise data repositories, and public document management systems with documents are rapidly growing. This huge amount of data is managed in some extent, but knowledge workers, managers, and executives still have to spend much of their working time reading dozens of various types of electronic documents spread over several sources in process of making decisions. There is just too much information to digest in a daily life. The tremendous amount of documents that is still growing has far exceeded the human ability for comprehension without intelligent tools. Different applications within information systems (IS) that support wide range of functionalities need to be integrated in order to provide the appropriate level of information support. One of 1 the prominent approaches for IS integration is the use of ontologies and Multi-Agent Systems (Fuentes et al., 2006; Soo et al., 2006; Dzemydiene and Tankeleviciene, 2009). The approach presented in this paper is targeted towards using ontologies for several tasks, where emphasis is on using business rules (BR) approach for interoperability between business user and IS. By introduction of BR approach business users do not have to be fully familiar with the technology to manipulate the common understanding of a problem domain in a form of ontology and therefore enabling agents to execute defined analyses models. The use of ontologies in Multi-Agent System (MAS) environment enables agents to share a common set of concepts about contexts, user profiles, products and other domain elements while interacting with each other. Agents can exploit the existing reasoning mechanisms to infer derived contexts from known contexts, to make decisions and to adapt to the environment, current status, and personal setting of the user. The purpose of this paper is to present the approach of integration of several information resources for Decision Support in Enterprises using agent-oriented approach based on ontologies. The goal of our research is to minimize the gap between business users and agents as special type of application systems that perform tasks in their behalf. The intention was to apply BR approach for ontology manipulation in MAS. Ontology used in our Multi-Agent System for Decision Support in Enterprises (DSS-MAS) was divided into task and domain ontologies while business users were enabled to manipulate them directly in a user friendly environment without requirement of detailed technical knowledge. The remainder of this paper is structured as follows. First we present some background in the following section 2 with emphasis on agents, ontologies and related work with clear definition of the problem and solution proposal. Next, in section 3, we introduce our case study of integrated Multi-Agent environment from the domain of mobile communications with emphasis on architecture and the roles of agents and ontologies. The case study is focused in one of the mobile operators and furthermore oriented to supply and demand of mobile phones. After presentation of system architecture and decomposition of ontology of every agent from DSS-MAS will be presented in detail. Details of case study implementation will be given in section 4.3. Finally the last section 5 presents conclusions. 2 Some background on decision support, multi-agent systems and ontologies Decision support systems (DSS) have evolved significantly and there have been many influences from technological and organizational developments (Shim et al., 2002). DSS once utilized more limited database, modelling, and user interface functionality, but technological innovations enabled more powerful DSS function- ality. DSS once supported individual decision makers, but later DSS technologies are applied to workgroups or teams, especially virtual teams. The advent of the Web has enabled inter-organizational DSS and has given rise to numerous new applications of existing technology as well as many new decision support technologies themselves. Internet facilitates access to data, information and knowledge sources, but at the same time, it threatens to cognitively overload the decision makers. Authors in (Vahidov and Kersten, 2004) claim that internet technologies require a new type of decision support that provides tighter integration and higher degree of direct interaction with the problem domain. Based on that they propose a generic architecture for dynamic and highly complex electronic environments where DSS's should be situated in the problem domain. Chen et al. (2001) conducted an interesting research about integrated interactive environment for knowledge discovery from heterogeneous data resources. Their work is grounded on acquiring, collecting, and extracting relevant information from multiple data sources, and then forming meaningful knowledge patterns. The proposed system employs common DW and OLAP1 techniques to form integrated data repository and generate database queries over large data collections from various distinct data resources. Multi-Agent Systems (MAS) offer a new dimension for cooperation and coordination in an enterprise. The MAS paradigm provides a suitable architecture for a design and implementation of integrated IS, especially DSS. With agent-based technology a support for complex IS development is introduced by natural decomposition, abstraction and flexibility of management for organisational structure changes (Kishore et al., 1OnLine Analytical Processing (OLAP) 2 2006). The MAS consists of a collection of autonomous agents that have their own goals and actions and can interact and collaborate through communication means. In a MAS environment, agents work collectively to solve specific enterprises' problems. MAS provide an effective platform for coordination and cooperation among multiple functional units in an enterprise. The research on agents and MAS has been on the rise over the last two decades. The stream of research on IS and enterprise integration (Lei et al., 2002; Kang and Han, 2003; Tewari et al., 2003) makes the MAS paradigm appropriate platform for integrative decision support within IS. Similarities between the agent in the MAS paradigm and the human actor in business organisations in terms of their characteristics and coordination lead us to a conceptualisation where agents in MAS are used to represent actors in human organizations. Several approaches (Tewari et al., 2003; Rivest et al., 2005; Kishore et al., 2006; Soo et al., 2006) deal with agent support for integration and decision support. Research in (Kishore et al., 2006) has shown that MAS paradigm provides an excellent approach for modelling and implementing integrated business IS. Authors within that research proposed a conceptual framework for MAS based integrative business IS. Some promising results were also found in (Soo et al., 2006), where authors propose a cooperative MAS platform to support the invention process based on the patent document analysis. The platform allows the invention process to be carried out through the cooperation and coordination among software agents delegated by the various domain experts in the complex industrial R&D environment. Today, semantic technologies based on ontologies and inference are considered as a promising means towards the development of the Semantic Web (Davies et al., 2006). In the field of Computer Science and Information Technology (IT) in general ontology has become popular as a paradigm for knowledge representation in Artificial Intelligence (AI), by providing a methodology for easier development of interoperable and reusable knowledge bases (KB). The most popular definition, from an AI perspective, is given in (Gruber, 1993) as follows: "An ontology is an explicit specification of a conceptualization", where a conceptualization is abstracted view of the world that we wish to represent for some purpose. Ontologies can be considered as conceptual schemata, intended to represent knowledge in the most formal and reusable way possible. Formal ontologies are represented in logical formalisms, such as OWL, which allow automatic inferencing over them. An important role of ontologies is to serve as schemata or intelligent views over information resources. Thus they can be used for indexing, querying, and reference purposes over non-ontological datasets and systems, such as databases, document and catalogue management systems. Because ontological languages have a formal semantics, ontologies allow a wider interpretation of data that is inference of facts which are not explicitly stated. In this way, they can improve the interoperability of the conceptualization behind them, their coverage of arbitrary datasets. Ontology can formally be defined as specific sort of knowledge base and can be characterized as comprising a 4-tuple (Davies et al., 2006) O = hC, R, I, Ai (1) Where C is set of classes representing concepts we wish to reason about in the given domain (Offer, Finding, Phone, Customer, etc.). R is set of relations holding between those classes (Message hasRecipient Actor). I is a set of instances, where each instance can be an instance of one or more classes and can be linked to other instances by relations (Nokia is A PhoneBrand; Finding309 hasValue 11,23). A is a set of axioms (If a new customer buys is A Nokia E72, promotional discount of 10% should be offered). It is widely recommended that knowledge bases, containing concrete data (instance data or ABox) are always encoded with respect to ontologies, which encapsulate a general conceptual model of some domain knowledge, thus allowing easier sharing and reuse of KBs. Typically, ontologies designed to serve as schema for KBs do not contain instance definitions, but there is no formal restriction in this direction. Drawing the borderline between the ontology (i.e. the conceptual and consensual part of the knowledge) and the rest of the data, represented in the same formal language, is not always trivial task. In our approach we include instances as part of ontologies because instances we define are a matter of conceptualization and consensus and are not only descriptions, crafted for some purpose. Related work on using ontologies in information systems for decision support is extensive. Regarding the domain of DW and OLAP analyses research has dealt with Document Warehousing (Tseng and Chou, 2006) where extensive semantic information about the documents is available but still not fully employed as in traditional DW. The use of ontologies was found useful as a common interpretation basis for data and metadata. Furthermore research has extended to Web DW (Marotta et al., 2002) with the emphasis on 3 managing the volatile and dynamic nature of Web sources. Utilization of ontologies is also addressed in Information Retrieval (IR) where it has been used for fuzzy tagging of data from the Web (Buche et al., 2006; Macias and Castells, 2007), query construction tool in semi-automatic ontology mapping (Suomela and Kekalainen, 2006) and semantic based retrieval of information from the World Wide Web (Shan et al., 2003; Garces et al., 2006). Use of ontologies in Data Mining (DM) has also been considered in (Bernaras et al., 1996; Zhou et al., 2002; Singh et al., 2003; Cao et al., 2004) where ontology was used for representation of context awareness and handling semantics inconsistencies. Ontologies have been widely used for data, application and information integration in the context of domain knowledge representation (Qiu, 2006). Jovanović and Gašević (2005) concludes that the need for knowledge sharing and interoperable KBs exists and the key element for achieving interoperability are domain ontologies. In that approach XSLT2 transformation is used to enable knowledge interoperability. Authors in (Vasilecas and Bugaite, 2006) use ontologies for ontology based IS development and they address the problem of automation of information processing rules. There are also other approaches (Fuentes et al., 2006; Orgun and Vu, 2006; Clark and McCabe, 2007) that use ontologies as knowledge representation mechanisms. Authors in (Clark and McCabe, 2007) use a formal ontology as a constraining framework for the belief store of a rational agent. The static beliefs of the agent are the axioms of the ontology, while dynamic beliefs are the descriptions of the individuals that are instances of the ontology classes. Another work presented in (Fuentes et al., 2006) also uses heterogeneous domain ontology for location based IS in a MAS framework with the emphasis on context-aware MAS. They propose a global ontology to let agents work with heterogeneous domains using a wireless network and the intention is to provide customization about different environment services based on user location and profile. 2.1 Problem and proposal for solution The review of related work presented in this section pointed out that modern DSS's changed quite substantially especially with the advent of the Web and availability of extensive information in online repositories. For managing complexity and integration issues with decision support many approaches relied on MAS paradigm and used ontologies as knowledge representation mechanism. The existing approaches mainly focused on either supporting existing business processes or improving decision support at some level of detail or integration of several structured resources to achieve better decision support. To our knowledge none of the approaches addressed the problem of enriching data from internal data sources with unstructured data found on internet. The interactivity of reviewed solutions is also limited; meaning that business users are usually limited to small set of parameters they can define to alter default behaviour of the system. These user requirements are usually entered directly into the system and no abstraction layers are provided as in business rules management systems (BRMS) to enable users without technical skills to manipulate the content. This paper introduces a novel approach in integration of unstructured information found in the Web with information available in several internal data sources (e.g. database, DW, ERP3, etc.). The MAS paradigm with agents was used for implementation purposes, mainly because related work pointed out that it is a very appropriate solution for integration of business IS. One of the reasons to choose agents is also modelling notion where business users and agents are modelled in a very similar manner. Problem of interaction between human actors and computer programs is also addressed by introduction of ontologies as knowledge representation mechanism. The approach presented in this paper is targeted towards using ontologies for several tasks, where emphasis is on using BR approach to ensure interoperability between business user and IS. Ontology is used not only for every agent to represent the interpretation of a problem domain but also for communication between agents and business users. The use of ontologies in MAS enables agents to share a common set of facts used in user profiles, product descriptions and other domain elements, while interacting with each other. With exploiting reasoning mechanisms new findings can be derived from initially known facts and improve the KB by extending it with new knowledge. To simplify this communication template system based on BR was introduced to enable manipulation of knowledge within the system by users with less technical skills and to control behaviour of individual agent. The approach will be further explained in the following section. The case study presented in this paper is from the domain of mobile telecommunications. 2XSLT (XSL Transformations) is a declarative, XML-based language used for the transformation of XML documents into other XML documents 3Enterprise Resource Planning (ERP) 4 It is presented in detail (with the impact it has on improving decision support within enterprise) in section 4.3. In the domain of mobile communications that was used for case study we had to define several tasks in DSS-MAS, needed for decision support - OLAP analyses, DM, IR, context and profile definition, notification, etc. 3 DSS-MAS 3.1 DSS-MAS architecture DSS-MAS that we propose in this paper is introduced in Figure 1. The case study presented in this paper is from the domain of mobile telecommunications and is based on business environment and information resources from one of the mobile operators. DSS-MAS is situated in the environment of several existing systems, like Data Mining Decision Support System (DMDSS), or DW and various resources available outside of an enterprise on the World Wide Web. Global goal that agents in DSS-MAS should achieve is to support decision making process while using existing systems for business analysis and employing information from environment where enterprise resides. To support this goal DSS-MAS includes several agent roles that are as following: Data Mining Agent (DMA), OLAP Agent (OLAPA), Information Retrieval Agent (IRA), Knowledge Discovery Agent (KDA), Notifying Agent (NA) and Mobile Agent (MA). The agents in DSS-MAS have both reactive and proactive characteristics. Reactive are mainly due to responding to the environment according to the model defined in the KB they use. Proactive are due to their ability to learn from the environment and change the initially defined KB to for example improve performance. Ontologies are used as a main interconnection object for domain knowledge representation, agent-to-agent communication and most important for agent-to-business user communication. An important element of an environment is the World Wide Web, where agents acquire information for the purpose of decision making. Retrieved information is saved in a KB and available for further employment for DM and DW analyses. All information gathered from internal and external sources is considered by KDA, where inference over several task ontologies used by individual agents (DMA, OLAPA, IRA, etc.) is performed. Moreover the sub goal of DSS-MAS is delivering of the right information at the right time and to the right users. The system needs to be context aware and to consider the relevant features of the business, i.e. context information such as time, location, and user preferences (Liao et al., 2005). Business users in DSS-MAS are able to employ agents to perform tasks on their behalf. For example, managers in enterprises have to request reports from their systems - OLAP or from transactional databases, and managers have to review reports every appointed period of time (day, week, month, etc.). This task of information acquisition is predecessor for decision making and is more or less straightforward - business user sends a request for analyses and reviews the content according to some Key Performance Indicators (KPI). KPI is simply a measure of performance and is commonly used in enterprises to evaluate how successful they are. In DSS-MAS tasks like this are automated and user participation is reduced as much as possible. An initial analysis model (e.g. OLAP or DM) has to be captured in the ontology by business users, while execution and optimisation is left for agents. Business users first define initial parameters for analyses to be performed, while agents perform these analyses and recommend improvements. When some action is required from business user, he is notified and has the ability to act or change rules of agent's execution. To enable these functionalities we introduce ontologies as a mediation mechanism for knowledge exchange between actors (agents and business users) that cooperate in DSS-MAS. The following section will present the structure and organization of ontologies we have used for the case study. 3.2 The role of ontology According to Guarino (1998), ontology can be structured into different sub-ontologies - upper ontology, domain ontology, task ontology and the application ontology. Following similar guidelines we have defined upper ontology named Common ontology and combined domain and task ontologies in Notifying ontology, Information retrieval ontology, Data Mining and Warehousing ontology (see Figure 2). The 5 Figure 1: Architecture of MAS used for Decision Support in Enterprises 6 proposed clustering of ontologies is based on the common understanding of the problem domain being defined in Common ontology. Every agent has its own interpretation of a KB, which is a specialization of a Common ontology with detail definition of knowledge required by individual agent. Common ontology is limited to abstract concepts and it covers reusable dimensions, which are primarily used by KDA. Task ontologies specify concepts of notification, IR, DM and DW. Mobile communications in our case is the domain of all task ontologies and the emphasis is on supply and demand of mobile phones. As already mentioned, we have used the knowledge management approach in our research where every agent has knowledge about its own problem domain. In this case whenever new facts about the common knowledge are discovered, which might be of interest for other agents, they are updated to the common ontology. The role of ontology in our approach is therefore twofold: • knowledge representation mechanism used by agents and • common understanding of problem domain used for communication between business users and agents by utilizing business rules manipulation with introduced templates (see section 4.2). Figure 2 shows an excerpt from intersection of several ontologies used in our case study. This part of ontology clearly defines the common elements being used for communication between agents and business users (domain specific elements such as phones, new phones and customers, all described with domain specific characteristics). A part of OLAP elements needed for conducting OLAP analyses is also presented. Ontology also presents notification with taxonomy of various warning levels and business users classification by organizational unit and decision making level. 3.3 The role of agents Our case study uses domain of mobile telecommunications as a platform where we focus on the sales of mobile phones and their accessories. Manipulation with internal data storage is handled by two types of agents - OLAPA and DMA. They both have distinct tasks but still share common goal – periodically or on demand autonomously execute analyses models. Business users at first define these models and describe them with all required parameters (e.g. search for anomalies in sales of Nokia phones in last month period). The information about the execution is stored in the ontology (based on business user preferences) or is requested by another agent of the system. Business user preferences in this context define the execution parameters about the analysis, for example the period at which the analysis is performed (e.g. perform analysis every other day at 13:00). OLAPA has on firsthand straightforward task of performing OLAP analyses on behalf of an agent or a business user and reporting its findings back to the requesting entity and all other entities that should be informed, according to the business policy. Nevertheless OLAPA does much more - after each execution it prepares the report for business user based on findings – movements and KPIs. If certain finding is substantially different from finding obtained in previous case further analysis is performed to discover the reason of change by drilling down (more detailed) or up (less detailed) the hierarchies and levels. The knowledge is acquired in ontology. Business users can change the behaviour of agents by changing the ontology using graphical user interface. This interface incorporates all logical restrictions defined in ontology and does not allow users to enter unacceptable values and the most important is that it does not require technical knowledge from users. Previous our experiences have shown that business users have great difficulties especially with setting the parameters required to run DM and DW analyses models. So, user interface really has to be friendly and intuitive. In our approach this issue was solved by introducing the architecture depicted in Figure 3 and using templates as further discussed in section 4.3. Nowadays Web-based information retrieval systems are widely distributed and deeply analysed from different points of view. The main objective of all such systems is to help users to retrieve information they really need (obviously as quickly as it is possible) (Garces et al., 2006). While the techniques regarding DW, multi-dimensional models, OLAP, or even ad-hoc reports have served enterprises well, they do not completely address the full scope of existing problems. It is believed that, for the business intelligence (BI) of an enterprise, only about 20% of information can be extracted from formatted data stored in relational databases (Tseng and Chou, 2006). The remaining 80% of information is hidden in unstructured or semi-structured documents. This is because the most prevalent medium for expressing information and knowledge is text. 7 Figure 2: Excerpt from intersection of several ontologies used in our case study 8 Figure 3: Prototype of selected case study For instance, market survey reports, project status reports, meeting records, customer complaints, e-mails, patent application sheets, and advertisements of competitors now are all recorded in documents. For that reason in DSS-MAS we introduced IRA for retrieval of data mainly from the World Wide Web. The tasks that IRA performs in presented case study can be grouped into three categories: • identification of new online shops, • analysis of mobile phones presented online and • extending Data Warehouse with information found online. First two tasks are concerned about the supply of mobile phones at various online shops worldwide. Identifi- cation of new online shops is conducted with web crawling and the use of several existing services on the Internet, such as Google, Google Product Search and Bing. Not only these internet resources are managed through ontology, but also rules for text extraction are defined as rules which make all domain knowledge available in IR ontology and not encoded in agent itself. More details about implementation of DSS-MAS case study can be found in section 4.3. Furthermore every shop found online is analysed to identify unique patterns for searching phones. Search patterns include guidelines for agents performing search at various web pages. They are based on XQuery4 and regular expressions. To search for phones at Google Products Search, the following URL search pattern http://www.google.com/products?q=((\w+\s*)+) is used, accompanied with additional information for web scrapping of required information (e.g. price, availability etc.). Using these search patterns IRA is searching through online shops and determines phones with their market prices and stores this information into IR ontology to be available for further knowledge inference by KDA. Information of found phones is used to determine new market trends, enable price comparison between competitors, facilitate possible inclusion in enterprise's sales program, etc. One of the tasks that IRA also performs is extending DW with information found online. While business users perform OLAP analyses, they deal with only internal information about the business, but in process of decision making other resources also have to be examined, e.g. news about the suppliers and competitors, opinions about certain products and organisations, etc. IRA therefore scans the DW dimension data (through hierarchies and levels) from DW dimensional schema and uses this information for searching several internet resources (news archives, forums, stock changes, Google trends, etc.). When users review OLAP reports these data from the Internet is also displayed according to their restrictions in dimensions. For example, when business users are making decision whether to increase support to Nokia or Sony Ericsson phones it only has reports about sales of selected brand names from their market program. Using our approach the user is provided with additional data that is found online and what will make decision better founded. By this integration of internal and external information users have integrated data source available that they can query from single location. 4XQuery is a query language that is designed to query collections of structured and semi-structured data 9 KDA is an important element of DSS-MAS since it consolidates all findings from IR, DM and DW and furthermore delivers derived findings to NA. To employ inference capabilities over several ontologies the enterprises' BR are essential. While business concepts are captured in ontology, these concepts further have to be restricted to define specific meaning. Generally BR are prepared by business users and also some parts of BR in enterprises tend to change frequently; therefore we introduced architecture for BR management (see Figure 3 and further discussion in section 4.3). Findings of KDA are presented as instances of Domain-specific-element and Findings classes (see ontology in Figure 2). As it can be seen from Figure 1 NA represents an interface to DSS-MAS for all external applications and business users. The main role of NA is the information dissemination by simply delivering the right information at the right time to the right users. While in vast majority of today's applications users have to request the information using so called "pull model" in our approach we implemented the "push model", where information is proactively delivered by agents to the user without a specific request. This is achieved by making system context aware and considering the relevant features of the business, i.e. context information such as time, location, position in the organisational hierarchy, etc. All knowledge about notification is defined in Notifying ontology, where every user has his own context defined and the position within organisation across two dimensions - organisational unit (e.g. Marketing, Sales, Human resources, etc.) and decision making level (e.g. Chief Executive Officer (CEO), Chief Information Officer (CIO), Chief Financial Officer (CFO), Chief Marketing Officer (CMO), Chief Analytics Officer (CAO), etc.). According to that position rules for delivery of several message types are defined. These message types range from Notification to Warning and Critical alert. Each message also addresses the domain of specific organisational unit, e.g. when a new mobile phone is found online at competitor's website, CMO and CAO have to be notified. Organisational structure, as part of Notifying ontology, also defines that both CMO and CAO are inferior to CEO therefore he is also notified, but only in a case of a Critical alert. According to the business user profile, notification can be sent using several technologies from Windows Alert, e-mail, Really Simple Syndication (RSS), Short Message Service (SMS), etc. These notification types are also ordered by priority for each business user and according to this type the content is also adapted. Mobile agent is an example of an application that can reside on a mobile device (e.g. Personal Digital Assistant (PDA), mobile phone, etc.) and uses resources of DSS-MAS through NA. The typical use case includes sending mobile agent across network to DSS-MAS, where all needed information according to owner context is collected and then the mobile agent is returned back to originating location on a mobile device and presents the collected data to business user. When the process of acquiring data is in progress, business user does not have to be connected to the network, he can just wait offline until mobile agent is ready to return with the findings. In the following section details about the case study implementation will be presented with technologies used, templates for business rules acquisition and presentation of one specific scenario from case study. 4 Case study implementation and discussion 4.1 Technology The selected language for ontology presentation is OWL DL (Russomanno and Kothari, 2004), since it offers the highest level of semantic expressiveness for selected case study and is one of the most widely used and standardised ontology language nowadays that has extensive support in different ontology manipulation tools. Besides OWL logical restrictions, Semantic Web Rule Language (SWRL) rules were also used due to its human readable syntax and support for business rules oriented approach to knowledge management (Horrocks et al., 2005). SWRL rules are stored as OWL individuals and are described by OWL classes contained in the SWRL ontology. The use of SWRL enables storing schema, individuals and rules in a single component, which makes management much easier. SWRL rule form in a combination with templates that is introduced in the following subsection b is very suitable for knowledge formalization by business users that do not have extensive technical knowledge. 10 The ontology manipulation interface for business users is based on Protégé Ontology Editor and Knowledge Acquisition System (Stanford Medical Informatics, 2006a) and SWRL Tab (Stanford Medical Informatics, 2006b) for Protégé. It enables entering OWL individuals and SWRL rules where a step further is made towards using templates for entering information (see Figure 3). At the execution level KAON2 inference engine is used to enable inference capabilities. Due to limitation of SHIQ(D) subset of OWL-DL and DL-safe subset of SWRL language, before inference is conducted, semantic validation takes place to ensure that all preconditions are met. We selected FIPA5 compliant MAS platform JADE6 in DSS-MAS because it offers broad range of functionalities and is most widely used platform. This is due to very good support and availability of agent framework, where a lot of common agents' tasks are already implemented (i.e. agent communication at the syntax level, agent management, migration of agents, etc.). For Mobile Agent implementation an add-on JADE-LEAP7 was used to support the mobility of agents. 4.2 Mediation with BR templates Using templates with ontology, business logic is excluded from the actual software code whereas the majority of data for templates is acquired from ontology axioms and natural language descriptions in ontology, while other templates are prepared by users with technical knowledge. The main goal of using mediation with BR templates is to enable acquiring knowledge from actual knowledge holders i.e. business users and enable transformation of this high-level knowledge into information system level, where this data together with concepts from business vocabulary can be directly used for inference purposes and bring added value without any further programming by technically educated users. When acquiring new knowledge into the system from business users, the process always starts with focusing on concepts of business vocabulary that are persisted in a form of ontology. Users can freely traverse through this information space, select concepts and further manipulate all related information within the selected context. Altering and adding new information is all time limited to formal definition of concepts that is defined in ontology. For easier manipulation business user is aided with template and business vocabulary, so BR building process is simplified as it will be presented in detail in the following section. Example 4.1 presents a BR template that is used for definition of aggregation of findings or domain specific elements. The user interface that is available is directly linked to ontology, where constraints on classes, properties and individuals are considered in realtime. This approach allows to minimize the risk of entering wrong constraints. The DSS-MAS system supports entering of new statements in several forms from simple IF-THEN form to decision table or decision tree. Example 4.1 (BR template for general finding definition). IF Condition = {∃x : x ∈ Domain specific element ∪ Finding} ∧ Condition ≥ 1 THEN Result = {∃y : y ∈ Finding} ∧ Result ≥ 1 The following Example 4.2 represents a BR that states: If there exist two consequent increases of sold phones of the same phone brand and a new phone of this phone brand was found online within last 2 weeks, then offer a promotion discount of 10% on this new phone to all new customers. 5Foundation for Intelligent Physical Agents (FIPA) 6Java Agent DEvelopment Framework (JADE) 7Java Agent Development Environment-Lightweight Extensible Agent Platform (JADE-LEAP) 11 Example 4.2 (Example of a rule, developed by using template). IF First finding is Increase (Finding) which { is related to first amount sold which is Measure (OLAP element) AND is related to first date which is Dimension (OLAP element) AND is related to first phone which is Phone (Domain specific element) which { has characteristic brand which is Phone brand (Domain specific characteristic) } AND Second finding is Increase (Finding) which { } } } is related to second amount sold which is Measure (OLAP element) AND is related to second date which is Dimension (OLAP element) which { is greater than first date } AND is related to second phone which is Phone (Domain specific element) which { has characteristic brand which is Phone brand (Domain specific characteristic) } AND Found phone is New phone (Domain specific element) which { has characteristic brand which is Phone brand (Domain specific element) AND has date of appearance found date which is Dimension (OLAP element) which { is greater than now - 14 days } AND New customer is New customer (Domain specific element) THEN } Promotion discount is Discount price (Finding) which { is related to new customer AND is related to found phone AND has value "10" AND has unit "%" When constraint presented in Example 4.2 is transformed to execution form at information system level, standardized SWRL and OWL languages are used to enable reusability (see Figure 4). By this transformation a rule is produced that can be directly used in the inference engine to produce results in a form of inferred triples that are presented to the user. 4.3 Case study One of the most common cases of using DSS-MAS system is combing information found online with BI reports (DW, DM, IR, etc.) developed on internal data in enterprise DW. Figure 5 presents one of this scenario. Scenario presented at Figure 5 is triggered by results of IRA activity, when three new mobile phones: Apple iPhone 3GS, Nokia E72 and Sony Ericsson Xperia 1 are found by IRA at online mobile shops. According 12 Figure 4: Constraint presented in ontology in SWRL and OWL syntax to the execution policy from Common ontology, OLAPA is notified with a request to rebuild all DW reports where brands of identified phones can be found in dimension elements. After running OLAP on Sales schema with constrains of Nokia brand in Phone dimension and last year in Date dimension OLAPA creates a report as depicted in Example 4.3. Example 4.3 (Business Intelligence findings). [Phone] by brand [Nokia], by date [Q1, 2010] → [Amount sold], [risen by 11, 23%] [Phone] by brand [Nokia], by date [Last month] → [Amount sold], [risen by 5, 87%] At the information system level the first finding is represented as an excerpt from ontology and is depicted in Figure 6. The fields that appear in the report are all instances of Domain specific element, OLAP element and Finding from ontology (see Figure 2). After these findings have been asserted, KDA will be executed to derive new knowledge. Based on these new facts represented at Example 4.3 and enterprise business rules (see Example 4.2), the KDA produced results represented in Example 4.4, by using inference engine knowledge is asserted in ontology. Example 4.4 (Derived finding). [New customer] , [Nokia E72] → [Promotion discount], [10%] After consolidation of all new findings KDA sends message to NA with request to forward notifications to appropriate users. The result of triggered activity of NA is the list of business users that have to be notified about this event. The list shows that in this case CMO and CEO have to be notified whereas their context has to be considered. According to CMO's preferences an e-mail is sent with the following content presented in Example 4.5. Example 4.5 (Report of findings with explanation). FACTS New [Phone][Nokia E72] is available on the market. [Amount sold] of [Phone] by brand [Nokia] and by date [Q1, 2010] have [risen by 11, 23%] and by date [last month] have [risen by 5, 87%]. CONCLUSION [Phone][Nokia E72] should be offered to [new customer] and offered at [promotion discount] of [10%]. 13 Figure 5: Case study of using DSS-MAS in mobile phone domain Figure 6: Example of representing the finding in ontology 14 The CEO uses a Mobile Agent on his mobile device and is also notified by a truncated message with new finding, while explanation is available upon request. 5 Conclusion In this paper we have discussed DSS-MAS where internal and external data is integrated using agent-oriented approach and ontologies as a common understanding of a problem domain and for communication between business users and agents. Agents were used due to their mentalistic notions for modelling, similarities between the agent in the MAS paradigm and the human actor in business organisations, and also possibilities for the use of ontologies as means of agents' internal knowledge base representation. The external information from the Web was integrated by IRA agent with the data in organisation's DW and after applying BR new knowledge was derived by employing agents' inference capabilities. Tasks like information retrieval from competitors, creating and reviewing OLAP reports are autonomously performed by agents, while business users have control over their execution through manipulation of knowledge base. The research also has emphasized agent-to-business user communication, trying to minimize that gap. This was accomplished by introducing different views on ontologies for business user and agent. While agents deal with formal description of business concepts, logical constraints and rules, business user has a simplified view of formal description of knowledge. User is able to manipulate with ontology through templates, where little technical knowledge is required. The mediation mechanism transforms these business level concepts into formal specification at the level of information system. Presented approach was verified and implemented using a case study from the domain of mobile telecommu- nications, where the aim was to provide the knowledge worker an intelligent analysis platform that enhances decision making process. The application domain was reduced to its sub domain dedicated for supply and analysis of demand of mobile phones in one of the mobile operators. DW system is constructed from several heterogeneous data sources where majority of those sources are internal to the enterprise. Our approach added information found on the Web (i.e. competitors' offers, stock rates, etc.) to these internal data sources and improved the decision support process within the enterprise. The proposed approach also addressed business users and their communication with the system which was simplified by using templates to define some business requirements that were transformed into analyses models (OLAP, DW, etc.), automatically performed by agents which reported results back to users in charge. The case study presented in the paper was implemented in Java and using mainly open source technologies. References Bernaras, A., Laresgoiti, I., and Corera, J. (1996). Building and reusing ontologies for electrical network applications. In European Conference on Artificial Intelligence (ECAI '96). Buche, P., Dibie-Barthelemy, J., Haemmerle, O., and Hignette, G. (2006). Fuzzy semantic tagging and flexible querying of XML documents extracted from the Web. Journal of Intelligent Information Systems, 26(1):25–40. Cao, L. B., Chao, L., Dan, L., and Li, L. (2004). Ontology services-based information integration in mining telecom business intelligence. Pricai 2004: Trends in Artificial Intelligence, Proceedings, 3157:85–94. Chen, M., Zhu, Q. M., and Chen, Z. X. (2001). An integrated interactive environment for knowledge discovery from heterogeneous data resources. Information and Software Technology, 43(8):487–496. Clark, K. L. and McCabe, F. G. (2007). Ontology schema for an agent belief store. International Journal of Human-Computer Studies, 65(7):640–658. Davies, J., Studer, R., and Warren, P. (2006). Semantic Web technologies - trends and research in ontology- based systems. John Wiley & Sons, Chichester, England. 15 Dzemydiene, D. and Tankeleviciene, L. (2009). Multi-layered knowledge-based architecture of the adaptable distance learning system. Technological and Economic development of Economy, 15(2):229–244. Fuentes, V., Carbo, J., and Molina, J. M. (2006). Heterogeneous domain ontology for location based information system in a multi-agent framework. Intelligent Data Engineering and Automated Learning - Ideal 2006, Proceedings, 4224:1199–1206. Garces, P. J., Olivas, J. A., and Romero, F. P. (2006). Concept-matching IR systems versus word-matching information retrieval systems: Considering fuzzy interrelations for indexing Web pages. Journal of the American Society for Information Science and Technology, 57(4):564–576. Gruber, T. R. (1993). A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition, 5(2):199–220. Guarino, N. (1998). Formal Ontology and Information Systems. In FOIS'98, pages 3–15. IOS Press. Horrocks, I., Patel-Schneider, P. F., Bechhofer, S., and Tsarkov, D. (2005). OWL rules: A proposal and prototype implementation. Journal of Web Semantics, 3(1):23–40. Jovanović, J. and Gašević, D. (2005). Achieving knowledge interoperability: An XML/XSLT approach. Expert Systems with Applications, 29(3):535–553. Kang, N. and Han, S. (2003). Agent-based e-marketplace system for more fair and efficient transaction. Decision Support Systems, 34(2):157–165. Kishore, R., Zhang, H., and Ramesh, R. (2006). Enterprise integration using the agent paradigm: foundations of multi-agent-based integrative business information systems. Decision Support Systems, 42(1):48–78. Lei, Y., Motta, E., and Dominque, J. (2002). IIPS: An Intelligent information presentation system. In 7th International Conference on Intelligent User Interfaces. Liao, L. J., Xu, K. Q., and Liao, S. S. Y. (2005). Constructing intelligent and open mobile commerce using a semantic web approach. Journal of Information Science, 31(5):407–419. Macias, J. A. and Castells, P. (2007). Providing end-user facilities to simplify ontology-driven web application authoring. Interacting with Computers, 19(4):563–585. Marotta, A., Motz, R., and Ruggia, R. (2002). Managing source schema evolution in Web Warehouses. journal of the Brazilian Computer Society, 8(2):20–31. Orgun, B. and Vu, J. (2006). HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems. Computers in Biology and Medicine, 36(7-8):817–836. Qiu, R. G. (2006). Towards ontology-driven knowledge synthesis for heterogeneous information systems. Journal of Intelligent Manufacturing, 17(1):99–109. Rivest, S., Bedard, Y., Proulx, M. J., Nadeau, M., Hubert, F., and Pastor, J. (2005). SOLAP technology: Merging business intelligence with geospatial technology for interactive spatio-temporal exploration and analysis of data. ISPRS Journal of Photogrammetry and Remote Sensing, 60(1):17–33. Russomanno, D. J. and Kothari, C. R. (2004). Expressing inter-link constraints in OWL knowledge bases. Expert Systems, 21(4):217–228. Shan, F., Jun, M., Chao, T., and Xu, L. D. (2003). A programmable agent for knowledge discovery on the web. Expert Systems, 20(2):79–85. Shim, J. P., Warkentin, M., Courtney, J. F., Power, D. J., Sharda, R., and Carlsson, C. (2002). Past, present, and future of decision support technology. Decision Support Systems, 33(2):111–126. Singh, S., Vajirkar, P., and Lee, Y. (2003). Context-based data mining using ontologies. Conceptual Modeling - ER 2003, Proceedings, Lecture Notes in Computer Science, 2813:405–418. 16 Soo, V. W., Lin, S. Y., Yang, S. Y., Lin, S. N., and Cheng, S. L. (2006). A cooperative multi-agent platform for invention based on patent document analysis and ontology. Expert Systems with Applications, 31(4):766–775. Stanford Medical Informatics (2006a). Protégé. Stanford Medical Informatics (2006b). SWRLTab. Suomela, S. and Kekalainen, J. (2006). User evaluation of ontology as query construction tool. Information Retrieval, 9(4):455–475. Tewari, G., Youll, J., and Maes, P. (2003). Personalized location-based brokering using an agent-based intermediary architecture. Decision Support Systems, 34(2):127–137. Trkman, P., Štemberger, M. I., Jaklič, J., and Groznik, A. (2007). Process approach to supply chain integration. Supply chain management - An International journal, 12(2):116–128. Tseng, F. S. C. and Chou, A. Y. H. (2006). The concept of document warehousing for multi-dimensional modeling of textual-based business intelligence. Decision Support Systems, 42(2):727–744. Vahidov, R. and Kersten, G. E. (2004). Decision station: situating decision support systems. Decision Support Systems, 38(2):283–303. Vasilecas, O. and Bugaite, D. (2006). Ontology-based information systems development: The problem of automation of information processing rules. In Advances in Information Systems, Proceedings, volume 4243 of Lecture Notes in Computer Science, pages 187–196. Zhou, L., Booker, Q. E., and Zhang, D. (2002). ROD - Toward Rapid Ontology Development for Underdevel- oped Domains. In 35th Hawaii International Conference on System Sciences, pages 957–965. 17
1906.06863
2
1906
2019-06-18T13:01:39
A Generic Approach for Accelerating Belief Propagation based DCOP Algorithms via A Branch-and-Bound Technique
[ "cs.MA" ]
Belief propagation approaches, such as Max-Sum and its variants, are a kind of important methods to solve large-scale Distributed Constraint Optimization Problems (DCOPs). However, for problems with n-ary constraints, these algorithms face a huge challenge since their computational complexity scales exponentially with the number of variables a function holds. In this paper, we present a generic and easy-to-use method based on a branch-and-bound technique to solve the issue, called Function Decomposing and State Pruning (FDSP). We theoretically prove that FDSP can provide monotonically non-increasing upper bounds and speed up belief propagation based DCOP algorithms without an effect on solution quality. Also, our empirically evaluation indicates that FDSP can reduce 97\% of the search space at least and effectively accelerate Max-Sum, compared with the state-of-the-art.
cs.MA
cs
A Generic Approach to Accelerating Belief Propagation based Incomplete Algorithms for DCOPs via A Branch-and-Bound Technique Ziyu Chen,1Xingqiong Jiang,1Yanchen Deng2,∗ and Dingding Chen1 and Zhongshi He1 College of Computer Science, Chongqing University, Chongqing, China 1 {chenziyu, jxq, dingding, zshe}@cqu.edu.cn, 2 [email protected] 9 1 0 2 n u J 8 1 ] A M . s c [ 2 v 3 6 8 6 0 . 6 0 9 1 : v i X r a Abstract Belief propagation approaches, such as Max-Sum and its variants, are important methods to solve large-scale Dis- tributed Constraint Optimization Problems (DCOPs). How- ever, for problems with n-ary constraints, these algorithms face a huge challenge since their computational complexity scales exponentially with the number of variables a func- tion holds. In this paper, we present a generic and easy-to- use method based on a branch-and-bound technique to solve the issue, called Function Decomposing and State Pruning (FDSP). We theoretically prove that FDSP can provide mono- tonically non-increasing upper bounds and speed up belief propagation based incomplete DCOP algorithms without an effect on solution quality. Also, our empirically evaluation indicates that FDSP can reduce 97% of the search space at least and effectively accelerate Max-Sum, compared with the state-of-the-art. Introduction Distributed Constraint Optimization Problems (DCOPs) which require agents to coordinate their decisions to op- timize a global objective, are a fundamental framework for modeling multi-agent coordination in multi-agent sys- tems (Hirayama and Yokoo 1997). Thus, DCOPs are widely deployed in some real world coordination tasks including meeting scheduling (Enembreck and Barths 2012), sensor networks (Farinelli, Rogers, and Jennings 2014), power net- works (Fioretto et al. 2017), etc. Algorithms for DCOPs can be classified into two cat- egories: complete and incomplete, according to whether they guarantee to find the optimal solution. Complete al- gorithms (Hirayama and Yokoo 1997; Modi et al. 2005; Petcu and Faltings 2005; Yeoh, Felner, and Koenig 2008; Vinyals, Rodriguez-Aguilar, and Cerquides 2009; Gersh- man, Meisels, and Zivan 2009) can get the optimal solu- tions but incur exponential communication or computation overheads since DCOPs are NP-hard. In contrast, incom- plete algorithms (Maheswaran, Pearce, and Tambe 2004; Arshad and Silaghi 2004; Zhang et al. 2005; Ottens, Dim- itrakakis, and Faltings 2012; Nguyen, Yeoh, and Lau 2013; ∗Corresponding author. Copyright c(cid:13) 2019, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Okamoto, Zivan, and Nahon 2016) trade accuracy for com- putation time and memory so that they can be applied to large-scale problems. As a kind of incomplete algorithms based on belief propagation, Max-Sum (Farinelli et al. 2008) and its variants (Rogers et al. 2011; Zivan and Peled 2012; Chen, Deng, and Wu 2017) have drawn a lot of attention since they can easily be deployed to any DCOP setting. Moreover, they can explicitly handle n-ary constraints and more variables per agent (Cerquides et al. 2014). In more detail, agents in Max-Sum propagate and accumulate beliefs through the whole factor graph. And each agent only holds its belief about the utility for each possible assignment and continuously updates its belief based on the messages re- ceived from its neighbors. In spite of many advantages of belief propagation ap- proaches, they suffer from a huge challenge in scalability. Specifically, they perform maximization operations repeat- edly to locally accumulate beliefs for the involved variables, given the local utility function and a set of incoming mes- sages. The computation complexity of this step grows expo- nentially as the number of constraint arities. In other words, when a constraint function holds n variables and the do- main size of each variable is d, Max-Sum needs to perform dn maximization operations to yield the best assignment for each variable. To address the issue, two kinds of methods were proposed to improve the scalability of belief propagation approaches. The first kind is the algorithms based on a branch-and-bound technique including BnB-MS (Stranders et al. 2009) and BnB-FMS (Macarthur et al. 2011) which both consist of a preprocessing phase and a pruning phase. In the preprocess- ing phase, the two algorithms use localized message-passing to simplify DCOPs. Specifically, BnB-MS reduces the num- ber of moves that each agent needs to consider in coordinat- ing mobile sensors while BnB-FMS removes tasks that an agent should never perform in dynamic task allocations. In the pruning phase, both algorithms reduce the search space using a branch-and-bound technique to speed up maximiza- tion operations. Unfortunately, these algorithms require to exchange a lot of messages in their preprocessing phases. Moreover, the bounds in these algorithms are computed by either brute force or domain-specific knowledge, which lim- its their applicability. The second kind of approaches is sorting based, such as 2 n−1 G-FBP(Kim and Lesser 2013) and GDP(Khan et al. 2018), which is applicable to all DCOP settings. G-FBP uses par- tially sorted lists to adapt FBP. Specifically, it selects and sorts the top cd values of the search space, presuming that the maximum value can be found from the selected range. Here, c is a constant. However, G-FBP will incur additional computation once the maximum value cannot be found within the selected range. Different from G-FBP, the main idea of GDP is to explore only the rows that can cover the differences between the sum of the maximal utility of each message and the message utility corresponding to the assignment that produces the largest local utility. Thus, GDP needs to sort the local utilities of all function-nodes inde- pendently by each assignment of each variable in the pre- processing phase and Vi is the sorted result of each assign- ment i. Then, GDP returns a pruned range [p, q] or [p, q) according to whether q == p − t, where p = max(Vi), q = maxc{c ∈ Vi : c ≤ (p − t)} and t = m − b. Here, m is the summation of the maximum value for each received mes- sage from other variable-nodes and b is the summation for the corresponding values of p from the incoming messages of a function-node. However, GDP needs additional time to perform sorting operations in the preprocessing phase. More importantly, GDP is an one-shot pruning procedure that can- not use the learned experience from the assignment combi- nations explored to dynamically prune the search space. Given the background, we devote to develop a generic and fast method for belief propagation based on a branch-and- bound technique, called Function Decomposing and State Pruning (FDSP). In more detail, we propose a domain- independent approach based on dynamic programming to effectively evaluate the upper bound of a given partial as- signment, which overcomes the aforementioned drawbacks of BnB-MS and BnB-FMS. We further enforce the upper bounds by exploiting the fact that the assignment of the tar- get variable is given. Finally, we prune the search space whenever the upper bound of a partial assignment is no greater than the best lower bound explored so far. The exper- imental results show the effectiveness of FDSP which can prune at least 97% of the search space when solving com- plex problems. Background Distributed Constraint Optimization Problems A distributed constraint optimization problem can be repre- sented by a tuple (cid:104)A, X, D, F(cid:105) such that: • A = {a1, a2, . . . , ah} is a set of agents. • X = {x1, x2, . . . , xq} is a set of variables. • D = {D1, D2, . . . , Dq} is a set of finite and discrete do- mains, variable xi taking an assignment value in Di. • F = {F1, F2, . . . , Fr} is a set of constraints, where each constraint Fk : xk → R+ denotes how much utility is assigned to each possible combination of assignments of the involved variables xk ⊆ X. Thus, a constraint function Fk(xk) denotes the utility for each possible assignment combination of the variables in xk, Figure 1: A DCOP instance using a factor graph n = xk represents the arity of Fk, and d = Di denotes the domain size of variable xi. Note that the variables in xk are ordered according to their own indices, where a variable xk,i is ordered before a variable xk,j if i < j. Given this, the goal for a DCOP is to find the joint variable assignment X∗ such that a given global objective function is maximal. Generally, the objective function is described as the sum over F : (cid:88) X∗ = arg max X Fk(xk)∈F,xk⊆X Fk(xk) Max-Sum Algorithm As a belief propagation approach, Max-Sum is a message- passing inference-based algorithm operating on factor graphs which comprise variable-nodes and function-nodes. Function-nodes which represent the constraints in a DCOP are connected to variable-nodes they depend on, while variable-nodes which represent the variables in a DCOP are connected to function-nodes they are involved in. As shown in Fig. 1, F1 and F2 are two function-nodes, x1, x2, x3, x4 and x5 are variable-nodes, where x1, x2, x3 and x4 are con- nected to F2, and x1, x4 and x5 are connected to F1. Here, F1 (i.e., F1(x1), where x1 = {x1, x4, x5}) is a 3-ary con- straint and F2 (i.e., F2(x2), where x2 = {x1, x2, x3, x4}) is a 4-ary one. In Max-Sum, beliefs are propagated and accumulated through the whole factor graph via the messages exchanged between variable-nodes and function-nodes. The message from a variable-node xi to a function-node Fk (xk), called the query message. It is defined by (cid:88) (1) Fj∈Ni\Fk RFj→xi (xi) Qxi→Fk (xi) = αik + where αik is a scalar set such that(cid:80) (cid:32) Fk (xk) + (cid:80) Qxi→Fk (xi) = 0, xi ∈ xk and Ni\Fk is a set of neighbors of xi except the target function-node Fk. The response message sent from a (cid:33) function-node Fk (xk) to a variable-node xi is given by Qxj→Fk (xj) (2) RFk→xi(xi) = max xk\xi xi xj∈xk\xi When a variable-node xi makes its decision, it first ac- cumulates the belief for each possible assignment from all messages it receives. Then, it selects a value to maximize the total utilities. The procedure can be formalized by: (cid:88) Fk∈Ni x∗ i = arg max xi RFk→xi(xi) (3) x5F1x4x1F2x3x2 the base case t = (20+17+10)−(9+17+8) = 13. Hence, p − t = 0. Accordingly, GDP returns a fixed pruned range [13, 1] for value G. Obviously, the pruned range contains the entire search space of value G, and cannot be reduced in the subsequent search process. Under such circumstances, we propose a generic, fast and easy-to-use approach based on a branch-and-bound tech- nique, called FDSP that can use the learned experience from the combinations explored to dynamically prune the search space. FDSP FDSP generally consists of two components: estimation to provide upper bounds and pruning to reduce the search space. To provide the optimal upper bound for a partial assignment, the estimation must return the upper bounds for both the local function and the incoming messages. FDSP computes the function estimations in the preprocess- ing phase, called Function Decomposing (FD), while the message estimations are (re)constructed once the messages have changed. Pruning is implemented by a procedure called State Pruning (SP) which is based on a branch and bound technique. That is, the algorithm does not expand any partial assignment whose upper bound is less than the known lower bound. FDSP can be easily applied to any belief propagation based incomplete algorithms to deal with DCOPs with n-ary constraints. Function Decomposing serves in a preprocessing phase to compute the function estimation for each variable of a function-node Fk(xk). Given a partial assignment P Axk,i to variables {xk,w ∈ xk1 ≤ w ≤ i}, the upper bound of the xk,1 local function is maximization of Fk(xk) over the remaining unassigned variables. That is F unEstxk,i (P Axk,i xk,1 , z) (4) Here, F unEstxk,i (·) is the uninformed function estimation for the i-th variable xk,i in xk, which provides optimistic up- per bounds on the utilities of the subsequent search spaces of P Axk,i xk,1. Macarthur et al. (2011) tried to compute the esti- mation by using brute force, which incurs exponential oper- ations for each partial assignment. They also suggested that the domain characteristics can be used to compute the esti- mation, which has a limited generalization and cannot guar- antee the tightness. In contrast, our proposed FD is an one- shot preprocessing procedure that uses dynamic program- ming to compute the estimation, which can significantly re- duce the computation efforts. Specifically, the estimations are computed recursively according to Eq. (5). z={xk,jj>i} Fk(P Axk,i xk,1 ) = max (cid:40)Fk (xk) F unEstxk,i = max xk,i+1 F unEstxk,i+1 i = n otherwise (5) That is, the estimation for a variable is maximization of the one for the next variable. Particularly, the estimation for the last variable is the function itself. Note that, compared to the exponential overhead for each partial assignment in BnB- MS, our proposed FD only requires O(di+1) operations to (a) (b) Figure 2: The utility matrix and message exchange for F2 In this paper, we use the term "target variable" to denote the destination variable-node of the outgoing message being computed, and Mxk,i represents the message from variable xk,i. Proposed Method Motivation The maximization operation in Eq. (2) is the most com- putationally expensive operation in Max-Sum. For a n-ary DCOP, the complexity of computing the response message is O(dn). Take Fig. 2 as an example. Assume that each vari- able takes a value in {R, G} and the function-node F2 has received the messages Mx1 = {9, 20}, Mx2 = {17, 11} and Mx3 = {8, 10} from x1, x2 and x3, respectively. Then, F2 requires dn = 24 = 16 operations to generate the mes- sage RF2→x4 (x4) since its domain size d = 2 and arity n = 4. Obviously, the complexity of this step grows ex- ponentially as d and n scale up. Therefore, this is a huge challenge for scalability of belief propagation algorithms. As mentioned earlier, some efforts have been made to op- timize this maximization operation. Nevertheless, the im- proved algorithms based on a branch-and-bound technique including BnB-MS and BnB-FMS require a number of mes- sages to be passed in the preprocessing phase. And, these algorithms were proposed for the exact application, which makes it difficult to directly solve general DCOPs. Be- sides, the algorithms based on sorting, such as G-FBP and GDP, suffer from some drawbacks although they are generic. Specifically, G-FBP cannot guarantee that the maximum value can be found in the selected range, which can lead to a complete traverse to all the possible combinations in the worst case, while GDP requires sorting for each value in the domain of each variable in the preprocessing phase, which makes its use prohibitively expensive. Additionally, GDP cannot use the learned knowledge from the combi- nations explored to dynamically prune the search space. In other words, GDP is actually an one-shot pruning method. Taking Fig. 2 for example, according to GDP, the local util- ities of F2 are sorted independently by each value of the do- main. When computing the pruned range of value G, there are VG = {13, 9, 8, 7, 5, 5, 4, 1}, p = max(VG) = 13 and x1x2x3x4F2RRRR4RRRG13RRGR26RRGG5RGRR1RGRG5RGGR2RGGG4GRRR10GRRG7GRGR6GRGG9GGRR11GGRG8GGGR12GGGG1......x4x1F2x3x2RF2→x4(x4){9,20}{8,10}{17,11} Figure 3: The sketch of function decomposing compute the function estimation for each variable xk,i in the preprocessing phase. In fact, the uninformed function estimation F unEstxk,i for xk,i could provide a tighter upper bound if we know the assignment of a variable xk,j such that j > i. In this way, we can compute a tight upper bound even if there are many unassigned variables between the last assigned variable and the target variable in a partial assignment. By considering all the possible assignments of each variable ordered after xk,i, we further reinforce the upper bound and propose the informed function estimations. Eq. (6) gives the formal def- inition to the informed function estimation for xk,i in terms of xk,j where j > i. (cid:40)F unEstxk,j (vk,j) max xk,i+1 F unEstxk,j=vk,j xk,i+1 i = j − 1 otherwise (6) F unEstxk,j=vk,j xk,i = Similar to the uninformed function estimations, the in- formed function estimations are computed in a recursive fashion by maximizing the estimation for the next variable. And the estimation for the last variable before xk,j is the corresponding uninformed function estimation with a given assignment xk,j = vk,j. Fig. 3 gives the sketch of FD. The procedure begins with computing the uninformed function estimation for each vari- able in Fk according to Eq. (5) from the last one to the first one (line 1-3). Then, for every possible assignment of each variable, we compute the informed function estimation for each variable whose index is smaller than the current vari- able according to Eq. (6) (line 4-6). Taking Fig. 2 for example, we can compute the unin- formed function estimations for variable x1, x2, x3 and x4 as follows: F unEstx4 = F2, F unEstx3 = maxx4 F unEstx4 F unEstx2 = maxx3 F unEstx3 F unEstx1 = maxx2 F unEstx2 These estimations can provide the upper bounds for the par- tial assignments with respect to their variables. Besides, the informed function estimations in terms of x4 = R are com- puted as follows: F unEstx4=R F unEstx4=R F unEstx4=R State Pruning is geared towards speeding up the com- putation of the messages from function-nodes to variable- nodes by branch and bound. That is, when the upper bound = F unEstx4(x4 = R) = maxx3 F unEstx4=R = maxx2 F unEstx4=R x3 x2 x3 x2 x1 Figure 4: The sketch of state pruning of a partial assignment is no greater than the lower bound, the search space corresponding to the partial assignment will be discarded. Fig. 4 gives the pseudo code of SP. The algorithm begins with calculating the message esti- mation for each variable xk,i ∈ xk\xk,t, which gives the maximal message utility with respect to all non-target vari- ables after it given these variables unassigned, according to Eq. (7) (line 7-15). M sgEstxk,i = max(Mxk,j) (7) (cid:88) j>i∧j(cid:54)=t Here, xk,t is the target variable and M sgEstxk,i denotes the upper bounds on the received messages from the vari- ables after xk,i except xk,t. In order to reduce the unneces- sary computation, Fk recomputes the message estimations for each variable ordered before xk,i only when the mes- sage from xk,i changes. Besides, instead of directly comput- ing message estimations according to Eq. (7), Fk further re- duces the computation efforts by recursively backing up the maximal message utilities from the last non-target variable Algorithm1:FunctionDecomposing(FD)foreachfunction-nodeFk(xk)FunctionDecompose(Fk(xk))1n←xk2fori←nto1do3computeFunEstxk,ibyEq.(5)4forj←nto2do5foreachvk,j∈Dxk,j∧i<jdo6computeFunEstxk,j=vk,jxk,ibyEq.(6)Algorithm2:StatePruning(SP)foreachfunction-nodeFk(xk)FunctionFDSP(Fk(xk),xk,t,Mxk\xk,t)7n←xk8Result←∅9lb←−∞10msgChanged←false11fori←nto1do12ifMxk,ihaschangedthen13msgChanged←true14ifmsgChanged=truethen15∀xk,i∈xk\xk,t,computeMsgEstxk,ibyEquation716start←117ifxk,start=xk,tthen18start←219foreachvk,t∈Dxk,tdo20Assignxk,t←vk,t21util∗←FDSPRec(Fk(xk),xk,start,xk,t,Mxk\xk,t,0)22Result←Result∪{(vk,t,util∗)}23returnResultFunctionFDSPRec(Fk(xk),xk,i,xk,t,Mxk\xk,t,msgUtil)24next←i+125ifxk,next=xk,tthen26next←next+127util∗←−∞28foreachvk,i∈Dxk,ido29Assignxk,i←vk,i30msgUtilxk,i=msgUtil+Mxk,i(vk,i)31computeubxk,ibyEq.(8)32ifubxk,i>lbthen33ifxk,next(cid:54)=nullthen34retUtil←FDSPRec(Fk(xk),xk,next,xk,t,Mxk\xk,t,msgUtilxk,i)35util∗←max(util∗,retUtil)36else37retUtil←Fk(Assign)+msgUtilxk,i38util∗←max(util∗,retUtil)39lb←max(lb,util∗)40returnutil∗ to the first one. That is, the message estimation of a variable is the sum of the maximal message utility and the message estimation of the non-target variable next to it. Consider the function-node F2 in Fig. 2(b). When we are computing the message for x4, the message estimations for x1, x2 and x3 are computed as follows: M sgEstx3 = 0 M sgEstx2 = M sgEstx3 + maxMx3 = 10 M sgEstx1 = M sgEstx2 + maxMx2 = 10 + 17 = 27 Then, Fk computes the maximum utility util∗ of each as- signment of the target variable xk,t in Dxk,t (line 16-22). Specifically, Fk assigns assignment vk,t to xk,t according to the order of values in Dxk,t (line 19). Thus, the current partial joint state Assign = {∅, . . . , vk,t, . . . ,∅}, where ∅ represents an unassigned variable (line 20). After that, FD- SPRec is called for the variable xk,start which is the first unassigned variable to recursively expand the search space (line 21). Finally, Fk stores util∗ to Result when util∗ for the current assignment vk,t is returned (line 22). The proce- dure (line 20 - 22) repeats until all the assignments of xk,t have been visited. In FDSPRec, Fk first finds xk,next that is the unassigned variable next to xk,i (line 24-26). Note that xk,t is an as- signed variable. Then, Fk decides to expand the search space or update the maximum utility and the lower bound (line 28- 39). In more detail, Fk expands the search space by append- ing the assignment vk,i of xk,i to the partial joint state (line 29). And then, Fk computes the utilities contributed (i.e., msgU tilxk,i) by the incoming messages with respect to the current Assign by summing the accumulated msgU til with the entry in terms of Mxk,i and assignment vk,i (line 30). Then, Fk computes the current upper bound ubxk,i accord- ing to Eq. (8) (line 31). (cid:26)msgU tilxk,i + M sgEstxk,i + F unEstxk,i msgU tilxk,i + M sgEstxk,i + F unEstxk,t=vk,t xk,i (cid:0)Assignxk,i (cid:1) (cid:0)Assignxk,i xk,1 xk,1 (cid:1) i < t i > t ubxk,i = (8) Specifically, if i > t(i.e., xk,i is after xk,t), which means the assignments of all variables before xk,t have been given, the current upper bound of the local function is provided by the uninformed function estimation of variable xk,i. Otherwise, the upper bound is computed by the informed function esti- mation. In other words, the informed function estimation is used to compute a tight upper bound whenever it is applica- ble. Next, Fk decides whether to expand the search space ac- cording to the lower bound (line 32-39). If the upper bound ubxk,i is greater than the current lower bound lb and xk,i is not the last variable, the algorithm proceeds by calling the recursive function FDSPRec to expand the search space (line 33-35). Otherwise, the search space corresponding to Assign can be discarded. If xk,i is the last non-target vari- able, i.e., the search space has been fully expanded, Fk com- putes the current utility retU til of the complete assignment by adding the local utility Fk(Assign) and msgU tilxk,i. Then, Fk updates the maximum utility util∗ and the lower bound lb (line 36-39). Finally, when all the assignments of xk,i have been visited, the algorithm returns util∗ (line 40). Figure 5: Calculating RF2→x4(x4 = R) using FDSP Fig. 5 shows an example for calculating the message from function F2 to variable x4 when x4 = R (i.e., RF2→x4(x4 = R)) in Fig. 2, where the numbers with circles represent the trace of SP. Since x4 is fixed to assignment R, F2 needs to compute the maximum utility util∗ by extending the partial assignment Assign = {∅,∅,∅, R}. Firstly, F2 visits the first assignment R of x1 and computes ubx1 = 9 + 27 + 26 = 62 by Eq. (8). Then, it expands Assign = {R,∅,∅, R} by vis- iting the first assignment R of x2 since ubx1 > lb(= −∞). Similarly, F2 expands Assign = {R, R,∅, R}. At this point, since ubx3 > lb and Assign is fully assigned, F2 computes the utility retU til of Assign = {R, R, R, R}: retU til = F2(Assign) + msgU tilx3 = 4 + (9 + 17 + 8) = 38, and updates util∗ = 38 and lb = 38. Next, F2 vis- its the next assignment G of x3. Similarly, F2 computes the current upper bound ubx3 = 62 and the current utility retU til = 62 corresponding to Assign = {R, R, G, R}, and updates lb and util∗. After that, F2 visits the second assignment G of x2 since all assignments of x3 have been exhausted. And, F2 computes ubx2 = 32 which is less than lb, so Assign = {R, G,∅, R} is discarded. Similarly, Assign = {G,∅,∅, R} is also discarded. Finally, F2 finds the maximum utility util∗ = 62, i.e., RF2→x4 (x4 = R) = 62. As seen from the example, FDSP can prune at least 75% of the search space during computing the message from the function-node F2 to variable-node x4, where d = 2 and n = 4. Theoretical Analysis In this section, we will theoretically prove that FDSP can speed up belief propagation based incomplete algorithms without an effect on solution quality, i.e., FDSP can pro- vide monotonically non-increasing upper bounds and never prunes the optimal assignment with the maximum utility util∗. Lemma 1. For a function-node Fk(xk) and a given partial assignment P A with (xk,t = vk,t) in which (xk,i = vk,i) is the last non-target entry, the upper bound of any direct subsequent partial assignment P A(cid:48) = P A ∪ (xk,j = vk,j) is at least as low as the one of P A, where xk,j is the variable next to xk,i such that j (cid:54)= t. Proof. Recall that the upper bound of a given partial as- signment is computed according to either the uninformed function estimation or the informed function estimation, de- pending on the index of the target variable. Thus, three cases {∅,∅,∅,R}{R,∅,∅,R}{R,R,∅,R}{R,R,R,R}{R,R,G,R}[−∞,62]1[62,59]6[−∞,62]2[62,32]5[−∞,38]3[38,62]4 need to be discussed: 1) all the upper bounds are computed according to the uninformed function estimations; 2) the up- per bound of P A is computed according to the uninformed function estimation, while the one of P A(cid:48) is computed ac- cording to the informed function estimation; 3) all the up- per bounds are computed according to the informed func- tion estimations. Here, we only give the prove for case 2) (i.e., i + 1 = t, t + 1 = j) due to the limited space. Similar analysis can be applied to case 1) and 3). ubxk,i (P A) = F unEst xk,t=vk,t xk,i (P A) + msgU tilxk,i + M sgEstxk,i l≤i (cid:88) Mxk,l (vk,l) + (cid:88) Mxk,l (vk,l) + (cid:88) l≤i l>i∧l(cid:54)=t (cid:88) max(Mxk,l ) (cid:88) (cid:88) max(Mxk,l ) max(Mxk,l ) l>i∧l(cid:54)=t Mxk,l (vk,l) + l≤j∧l(cid:54)=t l>j = F unEstxk,t (P A) + (cid:48) ≥ F unEstxk,j (P A (cid:48) ≥ F unEstxk,j (P A ) + ) + (cid:48) = ubxk,j (P A ) the second step holds since i = t − 1. Thus, Here, according to Eq. (6) we have F unEst (P A) = F unEstxk,t (P A). and the step = maxxk,j F unEstxk,j (P A, xk,j) ≥ F unEstxk,j (P A(cid:48))(Eq. (5)) and max(Mxk,j ) ≥ Mxk,j (vk,j), respectively. step since F unEstxk,t (P A) xk,t=vk,t xk,i third Besides, hold fourth the Thus the lemma is proved. Theorem 1. FDSP does not affect the optimality of Eq. (2). Proof. Prove by contradiction. For a function-node Fk(xk), assume that the optimal assignment of Eq. (2) is Assign∗, and the corresponding utility value is val(Assign∗). As- sume that FDSP has missed that assignment. Thus, there must exist a partial assignment P A ⊂ Assign∗ such that ub(P A) < lb ≤ val(Assign∗). According to Lemma 1, the upper bound is monotonically non-increasing, i.e., ub(P A) ≥ ub(Assign∗). Note that (cid:88) ∗ ) = F unEstxk,n (Assign ) + msgU tilxk,n + M sgEstxk,n ∗ ubxk,n (Assign ∗ = Fk(Assign ) + Mxk,l (vk,l ) l≤n∧l(cid:54)=t ∗ = val(Assign ) Here, n = xk. Thus, we have ub(P A) ≥ ub(Assign∗) = val(Assign∗), which is contradict to the assumption. There- fore, the upper bound of a partial assignment cannot be less than the value of any subsequent full assignment and the op- timality is hereby guaranteed. Complexity Analysis Each variable xk,i needs to compute and stores an unin- formed function estimation and d(n − i) informed function estimations in the preprocessing phase. Thus, the time and space of each variable require O([1 + d(n − i)]di+1) and O([1 + d(n − i)]di), respectively, where the value of i be- comes smaller as FD performs. Thus, FDSP in the prepro- cessing phase needs a small overhead. Besides, since each function-node needs to explore the search space with respect to the target variable, the time complexity in the worst case is O(dn). However, with SP, only the small search space needs to be explored. Therefore, the overall overhead is small. For this point, our empirical evaluation also verifies that FDSP only requires little time to run. Empirical Evaluation We empirically evaluate the performances of FDSP and GDP which are both applied to Max-Sum on four config- urations of n-ary random DCOPs. Since BnB-MS and BnB- FMS are not generic algorithms and G-FBP is inferior to GDP (Khan et al. 2018), we do not include them for com- parison. The complexity of a n-ary DCOP can be quantified by the number of function-nodes, the average/maximal ar- ity and the domain size (Kim and Lesser 2013; Khan et al. 2018). In addition to these parameters, we also find the num- ber of variable-nodes can affect the complexity. Intuitively, given the number of function-nodes and the average arity per function-node, the graph density is actually determined by the number of function-nodes. Therefore, we introduce a new parameter called variable tightness (denoted as var T ) to depict the complexity from another perspective, which is defined as follows. var T = 1 − number of variable-nodes total number of arities It can be concluded that given the function-node number and total arity number, the number of variable-nodes decreases as var T increases, which will generate a denser and more complex problem since each variable-node has to connect more function-nodes. For each configuration other than the first one, we gener- ate sparse factor graphs and dense factor graphs by randomly selecting var T from [0.1, 0.5] and (0.5, 0.9], respectively. In the first configuration, we set the number of function-nodes to 100 and the minimal arity to 2, and uniformly select the costs, the domain size and the maximal arity from [1, 100], [2, 10] and [2, 7], respectively. And, var T varies from 0.1 to 0.9. In the second one, we vary the maximal arity from 2 to 7. In the third configuration, we vary the number of function-nodes from 10 to 100. In the last one, we set the number of function-nodes to 50 and vary the domain size from 2 to 7. Also, we benchmark Max-Sum ADVP+FDSP to demonstrate the generalization of FDSP. To guarantee Max-Sum ADVP to converge, we alternate its directions ev- ery 100 iterations. All the omitted parameters except var T in each configuration are the same as the ones in the first configuration. For each of the setting, we generate 25 ran- dom instances and the results are averaged over all instances. The algorithms terminate after 200 iterations for each in- stance. Fig. 6 gives the comparison under different var T. It can be observed that FDSP clearly outperforms GDP under dif- ferent var T, and the gap is widen as var T grows. Con- cretely, FDSP can prune at least 97% of the search space while GDP only prunes at most 87% of the search space when computing Eq. (2). Moreover, FDSP performs simi- larly as var T grows, which indicates FDSP is less sensitive to the complexity of problems. On the other hand, the perfor- mance of GDP decreases as var T increases, and GDP per- Figure 6: Performance comparison on different var T Figure 8: Performance comparison on different function- node numbers Figure 7: Performance comparison on different arities Figure 9: Runtime on different domain sizes forms poorly when solving the problems with var T>= 0.5. This is because the sum of the difference between the maxi- mal value and the value corresponding to the maximal local utility in each message will increase when the graph density increases as var T grows. As a result, GDP provides a large pruned range so as to prune only a small proportion of the search space. Fig. 7 shows the performance comparison on different maximal arities. It can be concluded that FDSP outperforms GDP in both sparse and dense factor graphs, especially in dense factor graphs. FDSP prunes around 60%-99% of the search space in both sparse and dense factor graphs, while GDP can only prune at most 80% and 36%, respectively. That is because FDSP provides tighter bounds to make Max- Sum explore fewer combinations. Fig. 8 presents the results under different number of function-nodes. Similar to the first configuration, FDSP prunes at least 97% of the search space in both sparse and dense factor graphs, while GDP can only prune at most 88% and 55% of the search space in sparse and dense factor graphs, respectively. This is because GDP is an one-shot pruning procedure and cannot use the learned experience from the assignment combinations explored to dynamically prune the search space. Fig. 9 gives the runtime under different domain sizes. It can be seen that our FDSP exhibits great superiority over GDP and Max-Sum ADVP when solving the problems with large domain sizes, which indicates that FDSP can scale up well and only requires few computation efforts. GDP would perform even worse in practice since the runtime presented in Fig. 9 actually does not take sorting, which is quite expen- sive when the domain size is large, into consideration. Be- sides, one can easily observe that Max-Sum ADVP+FDSP is superior to Max-Sum ADVP when solving the problems with large domain sizes in sparse and dense factor graphs, which indicates that FDSP can also effectively accelerate the variants of Max-Sum. Conclusion In this paper, we propose FDSP, a generic, fast and easy-to- use method based branch and bound, which significantly ac- celerates belief propagation based incomplete DCOP algo- rithms. Specifically, we first propose function decomposing (FD) to effectively compute the function estimation, which dramatically reduces the overheads in computing an upper bound of a partial assignment. Then, we further present state pruning (SP) based on branch and bound to reduce the search space. Besides, we theoretically prove that our bounds are monotonically non-increasing during the search process and FDSP never prunes the assignment with the maximum utility. Our experimental results clearly show that FDSP can prune around 97%-99% of the search space and only requires little time, especially for the large and complex problems. 0.10.20.30.40.50.60.70.80.9var_T0102030405060708090100% of Search Space PrunedFDSPGDP234567Maximal Arity0102030405060708090100% of Search Space PrunedFDSP-Sparse SettingsGDP-Sparse SettingsFDSP-Dense SettingsGDP-Dense Settings102030405060708090100Function-node Number0102030405060708090100% of Search Space PrunedFDSP-Sparse SettingsGDP-Sparse SettingsFDSP-Dense SettingsGDP-Dense Settings234567Domain Size101102103RunTime(s)FDSP-Sparse SettingsGDP-Sparse SettingsMax-Sum_ADVP-Sparse SettingsMax-Sum_ADVP+FDSP-Sparse SettingsFDSP-Dense SettingsGDP-Dense SettingsMax-Sum_ADVP-Dense SettingsMax-Sum_ADVP+FDSP-Dense Settings Acknowledgment This research is funded by Chongqing Research Pro- gram of Basic Research and Frontier Technology (No. cstc2017jcyjAX0030), Fundamental Research Funds for the Central Universities (No. 2018CDXYJSJ0026) and Grad- uate Research and Innovation Foundation of Chongqing, China (Grant No. CYS18047). References J.; Farinelli, [Arshad and Silaghi 2004] Arshad, M., and Silaghi, M. C. 2004. Distributed simulated annealing. Distributed Con- straint Problem Solving and Reasoning in Multi-Agent Sys- tems 112. A.; [Cerquides et al. 2014] Cerquides, 2014. A tutorial Meseguer, P.; and Ramchurn, S. D. on optimization for multi-agent systems. Computer Journal 57(6):799 -- 824. [Chen, Deng, and Wu 2017] Chen, Z.; Deng, Y.; and Wu, T. 2017. An iterative refined max-sum ad algorithm via single- side value propagation and local search. In Proc. of the 16th Conference on AAMAS, 195 -- 202. [Enembreck and Barths 2012] Enembreck, F., and Barths, J. P. A. 2012. Distributed constraint optimization with mulbs: A case study on collaborative meeting scheduling. Journal of Network & Computer Applications 35(1):164 -- 175. [Farinelli et al. 2008] Farinelli, A.; Rogers, A.; Petcu, A.; and Jennings, N. R. 2008. Decentralised coordination of low-power embedded devices using the max-sum algorithm. In Proc. of the 7th Conference on AAMAS, 639 -- 646. [Farinelli, Rogers, and Jennings 2014] Farinelli, A.; Rogers, A.; and Jennings, N. R. 2014. Agent-based decentralised coordination for sensor networks using the max-sum al- Autonomous Agents and Multi-Agent Systems gorithm. 28(3):337 -- 380. [Fioretto et al. 2017] Fioretto, F.; Yeoh, W.; Pontelli, E.; Ma, Y.; and Ranade, S. J. 2017. A distributed constraint opti- mization (dcop) approach to the economic dispatch with de- mand response. In Proc. of the 16th Conference on AAMAS, 999 -- 1007. [Gershman, Meisels, and Zivan 2009] Gershman, A.; Meisels, A.; and Zivan, R. 2009. Asynchronous for- ward bounding for distributed cops. Journal of Artificial Intelligence Research 34:61 -- 88. [Hirayama and Yokoo 1997] Hirayama, K., and Yokoo, M. 1997. Distributed partial constraint satisfaction problem. In International Conference on Principles and Practice of Constraint Programming, 222 -- 236. Springer. [Khan et al. 2018] Khan, M.; Tran-Thanh, L.; Jennings, N.; et al. 2018. A generic domain pruning technique for gdl- based dcop algorithms in cooperative multi-agent systems. In Proc. of the 17th Conference on AAMAS, 1595 -- 1603. [Kim and Lesser 2013] Kim, Y., and Lesser, V. 2013. Im- proved max-sum algorithm for dcop with n-ary constraints. In International Conference on Autonomous Agents and Multi-Agent Systems, 191 -- 198. [Macarthur et al. 2011] Macarthur, K. S.; Stranders, R.; Ramchurn, S. D.; and Jennings, N. R. 2011. A distributed anytime algorithm for dynamic task allocation in multi- In AAAI Conference on Artificial Intelli- agent systems. gence, 701 -- 706. [Maheswaran, Pearce, and Tambe 2004] Maheswaran, R. T.; Pearce, J. P.; and Tambe, M. 2004. Distributed algorithms for dcop: A graphical-game-based approach. In Proceedings of the International Conference on Parallel and Distributed Computing Systems (PDCS), 432 -- 439. [Modi et al. 2005] Modi, P. J.; Shen, W.-M.; Tambe, M.; and Yokoo, M. 2005. Adopt: Asynchronous distributed con- straint optimization with quality guarantees. Artificial Intel- ligence 161(1-2):149 -- 180. [Nguyen, Yeoh, and Lau 2013] Nguyen, D. T.; Yeoh, W.; and Lau, H. C. 2013. Distributed gibbs: A memory-bounded sampling-based dcop algorithm. In Proc. of the 12th Con- ference on AAMAS, 167 -- 174. [Okamoto, Zivan, and Nahon 2016] Okamoto, S.; Zivan, R.; and Nahon, A. 2016. Distributed breakout: beyond satisfac- tion. In Proc. of the 25th IJCAI, 447 -- 453. [Ottens, Dimitrakakis, and Faltings 2012] Ottens, B.; Dimi- trakakis, C.; and Faltings, B. 2012. Duct: An upper confi- dence bound approach to distributed constraint optimization In Twenty-Sixth AAAI Conference on Artificial problems. Intelligence, 528 -- 534. [Petcu and Faltings 2005] Petcu, A., and Faltings, B. 2005. A scalable method for multiagent constraint optimization. In Proc. of the 19th IJCAI, 266 -- 271. [Rogers et al. 2011] Rogers, A.; Farinelli, A.; Stranders, R.; and Jennings, N. R. 2011. Bounded approximate decen- tralised coordination via the max-sum algorithm. Artificial Intelligence 175(2):730 -- 759. [Stranders et al. 2009] Stranders, R.; Farinelli, A.; Rogers, A.; and Jennings, N. R. 2009. Decentralised coordination of mobile sensors using the max-sum algorithm. In IJCAI 2009, Proceedings of the International Joint Conference on Artificial Intelligence, Pasadena, California, Usa, July, 299 -- 304. [Vinyals, Rodriguez-Aguilar, and Cerquides 2009] Vinyals, M.; Rodriguez-Aguilar, J. A.; and Cerquides, J. 2009. Gen- eralizing dpop: Action-gdl, a new complete algorithm for dcops. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, 1239 -- 1240. International Foundation for Autonomous Agents and Multiagent Systems. [Yeoh, Felner, and Koenig 2008] Yeoh, W.; Felner, A.; and Koenig, S. 2008. Bnb-adopt: an asynchronous branch-and- bound dcop algorithm. In International Joint Conference on Autonomous Agents and Multiagent Systems, 591 -- 598. [Zhang et al. 2005] Zhang, W.; Wang, G.; Xing, Z.; and Wit- tenburg, L. 2005. Distributed stochastic search and dis- tributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks. Ar- tificial Intelligence 161(1-2):55 -- 87. [Zivan and Peled 2012] Zivan, R., and Peled, H. 2012. Max/min-sum distributed constraint optimization through value propagation on an alternating dag. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 1, 265 -- 272. International Foundation for Autonomous Agents and Multiagent Sys- tems.
1904.00820
2
1904
2019-05-28T18:34:59
A Game-Theoretic Framework for Resource Sharing in Clouds
[ "cs.MA", "cs.NI" ]
Providing resources to different users or applications is fundamental to cloud computing. This is a challenging problem as a cloud service provider may have insufficient resources to satisfy all user requests. Furthermore, allocating available resources optimally to different applications is also challenging. Resource sharing among different cloud service providers can improve resource availability and resource utilization as certain cloud service providers may have free resources available that can be ``rented'' by other service providers. However, different cloud service providers can have different objectives or \emph{utilities}. Therefore, there is a need for a framework that can share and allocate resources in an efficient and effective way, while taking into account the objectives of various service providers that results in a \emph{multi-objective optimization} problem. In this paper, we present a \emph{Cooperative Game Theory} (CGT) based framework for resource sharing and allocation among different service providers with varying objectives that form a coalition. We show that the resource sharing problem can be modeled as an $N-$player \emph{canonical} cooperative game with \emph{non-transferable utility} (NTU) and prove that the game is convex for monotonic non-decreasing utilities. We propose an $\mathcal{O}({N})$ algorithm that provides an allocation from the \emph{core}, hence guaranteeing \emph{Pareto optimality}. We evaluate the performance of our proposed resource sharing framework in a number of simulation settings and show that our proposed framework improves user satisfaction and utility of service providers.
cs.MA
cs
A Game-Theoretic Framework for Resource Sharing in Clouds 1 Faheem Zafari∗, Kin K. Leung∗, Don Towsley†, Prithwish Basu(cid:5), and Ananthram Swami‡ ∗Imperial College London, †University of Massachusetts Amherst, (cid:5)BBN Technologies, ∗{faheem16, kin.leung}@imperial.ac.uk, †[email protected], (cid:5)[email protected], ‡U.S. Army Research Laboratory ‡[email protected] 9 1 0 2 y a M 8 2 ] A M . s c [ 2 v 0 2 8 0 0 . 4 0 9 1 : v i X r a Abstract Providing resources to different users or applications is fundamental to cloud computing. This is a challenging problem as a cloud service provider may have insufficient resources to satisfy all user requests. Furthermore, allocating available resources optimally to different applications is also challenging. Resource sharing among different cloud service providers can improve resource availability and resource utilization as certain cloud service providers may have free resources available that can be "rented" by other service providers. However, different cloud service providers can have different objectives or utilities. Therefore, there is a need for a framework that can share and allocate resources in an efficient and effective way, while taking into account the objectives of various service providers that results in a multi-objective optimization problem. In this paper, we present a Cooperative Game Theory (CGT) based framework for resource sharing and allocation among different service providers with varying objectives that form a coalition. We show that the resource sharing problem can be modeled as an N−player canonical cooperative game with non-transferable utility (NTU) and prove that the game is convex for monotonic non-decreasing utilities. We propose an O(N ) algorithm that provides an allocation from the core, hence guaranteeing Pareto optimality. We evaluate the performance of our proposed resource sharing framework in a number of simulation settings and show that our proposed framework improves user satisfaction and utility of service providers. I. INTRODUCTION With the wide-scale proliferation of cloud computing, a large number of individuals and businesses have transitioned towards the use of cloud computing platforms [1]. Users (applications)1 request resources from a cloud service provider for a particular task and service provider needs to provide requested resources based on a Service Level Agreement (SLA). The goal for any service provider is to satisfy as many applications as possible by a timely provision of resources, resulting in an increase in user satisfaction as well as utility of service providers. However, the provider often lacks sufficient available resources and thus allocation of resources to different users is not straightforward. Optimal allocation of resources for cloud computing is a fundamental research problem [2] -- [4]. Due to the recent advent of paradigms such as Big Data [5], Internet of Things (IoT) [6], and Machine to Machine (M2M) communication, the problem is further exacerbated as the demand for limited resources has increased further. Even when resources are available, allocating them optimally to different applications requires efficient algorithms. Hence, it is important to ascertain the availability of resources and allocate them optimally to different applications. To ensure the availability of resources, numerous solutions have been proposed in the literature ranging from buying more resources to meet peak demands, to creating shared resource pools among geographically co-located service providers. However, different service providers may have different objectives and existing resource pool based mechanisms do not consider utilities of different service providers. Ideally, a resource sharing mechanism should consider objectives of different service providers, which results in a multi-objective optimization (MOO) problem. Furthermore, while resource sharing or creation of a resource pool may tackle the resource availability problem, it does not address resource allocation problem, i.e., optimally allocating the available resources to different users. Therefore, there is a need for a framework that not only ascertains resource availability by enabling resource sharing among different service providers, but also optimally allocates resources to users, while accounting for the service providers' objectives. We present a cooperative game theory based framework that can be used for resource sharing and allocation in cloud computing. We allow resource sharing among different cloud service providers, while considering the objectives (utilities) of cloud service providers. Rather than considering a specific resource, we consider a wide range of resources that are present across different cloud service providers. We show that different resource providers can benefit by creating a coalition among This work was supported by the U.S. Army Research Laboratory and the U.K. Ministry of Defence under Agreement Number W911NF-16-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Army Research Laboratory, the U.S. Government, the U.K. Ministry of Defence or the U.K. Government. The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copy-right notation hereon. Faheem Zafari also acknowledges the financial support by EPSRC Centre for Doctoral Training in High Performance Embedded and Distributed Systems (HiPEDS, Grant Reference EP/L016796/1), and Department of Electrical and Electronics Engineering, Imperial College London. 1Throughout the paper, we use the term "users" and "applications" interchangeably. 2 service providers and then allocating resources to users. We also show that the coalition of service providers is stable, where no service provider will incur any loss (when compared with working alone). Also, we obtain a Pareto optimal (details in Section II) solution to our multi-objective resource sharing problem. The main contributions of this paper are: 1) We propose a cooperative game theory (CGT) based multi-objective resource sharing and allocation framework for cloud computing that guarantees Pareto optimality and consider different objectives of the service providers that share their resources. 2) We show that the resource sharing and allocation problem can be modeled as a canonical game with non-transferable utility. Furthermore, when service provider objectives are represented by monotone non-decreasing utilities, we show that our canonical game is convex. Due to the convexity of game, the core is non-empty and the grand coalition formed by all service providers is stable. 3) We address the problem of obtaining an allocation from the core by proposing a computationally efficient O(N ) algorithm that is guaranteed to provide an allocation from the core. 4) We evaluate the performance of our proposed framework through extensive experiments and show that resource sharing can improve utility of all service providers and also increase user satisfaction. The paper is further structured as: Section II provides a primer on multi-objective optimization, cooperative game theory, canonical games, and the core. Section III presents the system model used in this paper. It also presents the resource sharing and allocation problem along with theoretical properties of the cooperative game used to obtain the Pareto optimal solution. Section IV presents our experimental results. Section V provides a review of different solutions proposed in literature for resource allocation, while Section VI concludes the paper. In this section, we present a discussion on multi-objective optimization, cooperative game theory, and the core. II. PRELIMINARIES A. Multi-Objective Optimization For m inequality constraints and p equality constraints, MOO identifies a vector x∗ = [x∗ 1, x∗ 2,··· , x∗ t ]T that optimizes a (1) (2) vector function such that ¯f (x) = [f1(x), f2(x),··· , fN (x)]T gi(x) ≥ 0, i = 1, 2,··· , m, hi(x) = 0 i = 1, 2,··· , p. where x = [x1, x2,··· , xt]T is a vector of t decision variables and the feasible set is denoted by F . The fundamental difference between a single objective optimization (SOO) and MOO is that MOO involves a vector of objective functions rather than a single objective function. Therefore, in MOO, the optimal solution is not a single point but a frontier of solutions known as Pareto frontier or Pareto boundary (see [7] for details). Some basic definitions related to MOO are: Definition 1. Pareto Optimality: For any maximization problem, x∗ is P areto optimal if the following holds for every x ∈ F , (3) ¯f (x∗) ≥ ¯f (x). where ¯f (x) = [f1(x), f2(x),··· , fN (x)]T and ¯f (x∗) = [f1(x∗), f2(x∗),··· , fN (x∗)]T . Figure 1 shows a MOO problem (minimization problem) with two objective functions f1 and f2. The boundary Pareto frontier as it consists of all the Pareto optimal solutions. ←→ ab is the B. Cooperative Game Theory Cooperative game theory provides a set of analytical tools that assists in understanding the behavior of rational players in a cooperative setting [8]. Players can have agreements among themselves that affect the strategies as well as obtained utilities of game players. Coalition games are one of the basic types of cooperative games that deal with the formation of coalitions, namely groups of two or more cooperating players. Formally, Definition 2. Coalition Games [8]: Any coalition game with non-transferable utility (discussed below) can be represented by the pair (N ,V) where N is the set of players that play the game, while V is a set of payoff vectors such that [9]: 1) V(S) is a closed and convex subset of RS. 2) V(S) is comprehensive, i.e., if we are given payoffs x ∈ V(S) and y ∈ RS where y ≤ x, then y ∈ V(S). In other words, if the members of coalition S can achieve a payoff allocation x, then the players can change their strategies to achieve an allocation y. 3 Fig. 1. MOO with two objective functions 3) The set {xx ∈ V(S) and xn ≥ zn,∀n ∈ S}, with zn = max{yny ∈ V({n})} ≤ ∞ ∀n ∈ N is a bounded subset of RS. In other words, the set of vectors in V(S) for a coalition S where the coalition members receive a payoff at least as good as working alone (non-cooperatively) is a bounded set. Definition 3. Value of a coalition: The sum of all players' payoff from a particular pay-off vector for any coalition is known as the value of a coalition. It is worth mentioning that V is the set of payoff vectors, while v is the sum of payoffs that all players get in a particular payoff vector (coalition). Definition 4. Non-Transferable Utility (NTU) [8]: If the total utility of any coalition cannot be assigned a single real number or if there is a rigid restriction on utility distribution among players, then the game has a non-transferable utility. Definition 5. Characteristic function [8]: The characteristic function for any coalition game with NTU is a function that assigns a set of payoff vectors, V(S) ⊆ RS, where each element of the payoff vector xn represents a payoff that player n ∈ S obtains, depending on the selected strategy, within the coalition S. Definition 6. Characteristic form Coalition Games [8]: A coalition game is said to be of characteristic form, if the value of coalition S ⊆ N depends only on the members of coalition. Definition 7. Superadditivity of NTU games [9]: A canonical game with NTU is said to be superadditive if the following property is satisfied. v(S1 ∪ S2) ⊃ {x ∈ RS1∪S2(xn)n∈S1 ∈ v(S1), (xm)m∈S2 ∈ v(S2)} ∀S1 ⊂ N , S2 ⊂ N , S1 ∩ S2 = ∅. (4) i.e., if any two disjoint coalitions S1 and S2 form a large coalition S1 ∪ S2, then the coalition S1 ∪ S2 can always give its members the payoff that they would have received in the disjoint coalition S1 and S2. Definition 8. Canonical Game: A coalition game is canonical if it is superadditive and in characteristic form. The core is a widely used solution concept for canonical games as discussed below. C. Core We first define some terms related to the core [8], [9]. Definition 9. Group Rational: A payoff vector x ∈ RN is group-rational if(cid:80) Definition 10. Individually Rational: A payoff vector x ∈ RN is individually-rational if every player can obtain a payoff no less than acting alone, i.e., xn ≥ v({n}),∀n ∈ N . Definition 11. Imputation: A payoff vector that is both individually and group rational is an imputation. Definition 12. Grand Coalition: The coalition formed by all game players in N is the grand coalition. Based on the above definitions, we can now define the core of an NTU canonical coalition game. n∈N xn = v(N ). 4 Fig. 2. Our system model with multiple cloud service providers Definition 13. Core [8]: For any NTU canonical game (N ,V), the core is the set of imputations in which no coalition S ⊂ N has any incentive to reject the proposed payoff allocation and deviate from the grand coalition to form a coalition S instead. This can be mathematically expressed as CN T U = {x ∈ V(N )∀S, (cid:64)y ∈ V(S), such that yn > xn,∀n ∈ S}. (5) Remark 1. Any payoff allocation from the core is Pareto-optimal as evident from definition of the core. Furthermore, the grand coalition formed is stable, i.e., no two players will have an incentive to leave the grand coalition to form a smaller coalition. However, the core is not always guaranteed to exist. Even if the core exists, it may be very large as it a convex set. Therefore, finding a suitable allocation from the core is challenging. III. SYSTEM MODEL type k available at service provider n. The vector C = {(cid:80) Let N = {1, 2,··· , N} be the set of all the cloud service providers that act as players in our game. We assume that each player has a set of K = {1, 2,··· , K} different types of resources such as communication, computation and storage resources. The nth service provider represents its available resources as C n = {C (n) is the amount of resources of K } represents all available resources at different service providers. Each service provider n has a set of native applications Mn = {1, 2,··· , Mn} that ask for resources. The set of all applications that ask for resources from the set of service providers (coalition of service providers) is given by M = M1 ∪ M2 ··· ∪ MN , where Mi ∩ Mj = ∅, ∀i (cid:54)= j, i.e., each application originally asks only one service provider for resources. Every player n ∈ N has a request (requirement) matrix R(n). ,··· ,(cid:80) K }. C (n) ,··· , C (n) ,(cid:80) n∈N C (n) n∈N C (n) n∈N C (n) k 2 1 1 where the ith row corresponds to the ith application while columns represent different resources, i.e., r(n) is the amount of ij jth resource that application i ∈ Mn requests. Request matrix R is an augmentation of all the request matrices (from all the service providers) as given below. R(n) = = (cid:34) r(n) (cid:35) 1. . . r(n) Mn (cid:34) r1. (cid:35) . . rM R = = (cid:35) (cid:34) r(n) ··· ··· . . . . . . 11 . . . Mn1 ··· ··· r(n) r(n) r(n) 1K . . . MnK (cid:35) (cid:34) r11 ··· ··· r1K . . . . . . . . . rM 1 ··· ··· rMK . . . where rij is the amount of jth resource that application i ∈ M requests. The resource sharing and allocation framework, based on R and C, has to make an allocation decision X that optimizes the utilities un(X ) of all the service providers n ∈ N and satisfy user requests as well. The allocation decision X is a vector given by X = {X (1), X (2),··· , X (N )} that indicates how much of each resource k ∈ K is allocated to application i at service provider n ∈ N . The matrix X (n) is an augmentation of different matrices {X (n) }, where X (n) is the allocation decision at service provider n for the applications i originally belonging to service provider i∈Mj j ∈ N\n. X (n) is the allocation decision at service provider n for applications i belonging to service provider n, i.e., the original applications of the service provider n. Mathematically, ,··· , X (n) ,··· , X (n) i∈MN i∈Mn i∈Mn i∈M1 (cid:34) x(n) (cid:35) 1. . . x(n) M (cid:35) (cid:34) x(n) 11 ··· ··· x(n) 1K . . . . . . . . . . . . M 1 ··· ··· x(n) x(n) MK X (n) = = where x(n) ik is the amount of resource k ∈ K belonging to player n ∈ N that is allocated to application i ∈ M. (6) (7) (8) A. Optimization Problem 5 In this section, we first present the resource allocation problem for a single service provider (no resource sharing with other service providers). Then we present the MOO problem for resource sharing and allocation. For a single cloud n ∈ N (not part of a coalition), the allocation decision matrix X (n) SO, where SO stands for single objective, is given by: X (n) SO = The optimization problem is: (cid:34) x(n) (cid:34) x(n) (cid:35) 1. . . x(n) Mn = ··· ··· x(n) 1K . . . . . . 11 . . . Mn1 ··· ··· x(n) x(n) . . . MnK (cid:35) . (cid:88) SO ) + i∈Mn ik ≤ C (n) x(n) k (cid:88) x(n) ik r(n) k∈K ik ∀k ∈ K, un(X (n) max X (n) SO s.t. (cid:88) ∀n ∈ N , ∀i ∈ Mn, i ik ∀ i ∈ Mn, k ∈ K, ik ≤ r(n) x(n) ik ≥ 0 ∀ i ∈ M, k ∈ K. x(n) (cid:80) resources only to its own applications.(cid:80) The goal of this single objective optimization problem for every service provider is to maximize its utility by allocating available ik captures the satisfaction of resource requests by applications. Next, we present the resource allocation problem for different service providers that share their resources with each other. In the resource sharing case, each service provider aims to maximize sum of utilities obtained by a) allocating resources to its native ), ∀j ∈ N\n; applications, i.e., un(X (n) and c) satisfying requests of applications. This leads to: ); b) allocating resources to applications of other service providers, i.e., un k∈K x(n) ik /r(n) j (X (n) i∈Mn i∈Mn i∈Mj (9) (10a) (10b) (10c) (10d) (cid:80) (cid:88) (cid:88) i∈Mn k∈K ik l∈N x(l) r(n) ik (cid:19) maxX ) + ζn (cid:88) wnun(X (n) (cid:18) s.t. (cid:88) (cid:88) j∈N ik ≥ 0 ∀ i ∈ M, k ∈ K, n ∈ N . x(n) i∈Mn ik ≤ C (n) x(n) ik ≤ r(n) x(j) j∈N\n ik k i ∀k ∈ K,∀n ∈ N ,∀i ∈ M, ∀ i ∈ M, k ∈ K, n ∈ N , j (X (n) un i∈Mj ) + ∀n ∈ N , (11a) (11b) (11c) (11d) The first constraint in both optimization problems, (10) and (11), indicates that the allocated resources cannot be more than the capacity. The second constraint in (10c) and (11c) indicates, that the allocated resources should not be more than the required resources. The last constraint, (10d) and (11d), indicates that allocation decision cannot be negative. j (X (n) un i∈Mj ) is the utility that domain n receives for sharing its resources with domain j. wn is the weight associated with the utility un and ζn is the weight affiliated with all un j . In this paper, we assume that utility of the service providers is a non-decreasing monotone function. We also assume that a subset N1 ⊂ N of service providers has resource deficit, while a subset N2 ⊂ N has a resource surplus. B. Game Theoretic Solution As mentioned earlier, we model each cloud service provider as a player in our game to obtain the solution for the MOO problem in (11). Let N be the set of players that can play the resource sharing and allocation game. The value of coalition for the game players S ⊆ N is given by (12), where FS is the feasible set. (cid:18) (cid:88) n∈SX∈FS (cid:88) j∈S, j(cid:54)=n (cid:80) (cid:88) (cid:88) i∈Mn k∈K ik l∈S x(l) r(n) ik (cid:19) . v(S) = wnun(X ) + ζn j (X ) + un (12) Theorem 1. Resource allocation and sharing problem (with multiple objectives) for the aforementioned system model can be modeled as a canonical cooperative game with NTU. Proof. To prove this, we need to show that the characteristic function of resource sharing and allocation problem satisfies the following two conditions: • Characteristic form of payoff: As the utility function in a resource sharing and allocation problem only relies on the service providers that are part of the coalition, the game or payoff function is of characteristic form. = wnun(X ) + ζn (cid:80) n ∈ S2, X ∈ FS2 (cid:18) (cid:88) (cid:88) (cid:88) (cid:88) k∈K i∈Mt ζt n∈S1, n(cid:54)=t l∈(S2∪t) x(l) ik j (X ) + un (cid:18) j∈S2∪t, (cid:88) (cid:32) (cid:88) (cid:80) j(cid:54)=n − r(t) ik (cid:88) (cid:88) n ∈ S1, X ∈ FS1 l∈(S1∪t) x(l) ik i∈Mt k∈K r(t) ik n(X ) + ut (cid:18) (cid:88) wnun(X ) + ζn j∈{(S2∪t)\(S1∪t)}, n ∈ S2\S1, X ∈ FS2\FS1 = ζt (cid:88) n∈S2, n(cid:54)=t (cid:33) (cid:88) (cid:88) (cid:88) j(cid:54)=n n∈S1, n(cid:54)=t n∈S2, n(cid:54)=t (cid:80) l∈{(S2∪t)\(S1∪t)} x(l) ik r(n) ik (cid:88) k∈K (cid:19) + wtu(S2) t (X )+ (cid:88) j (X ) + un (cid:80) (cid:88) (cid:88) i∈Mn i∈Mt k∈K n(X ) − wtu(S1) ut t (X ) − ζt n(X ) + ut l∈{(S2∪t)\(S1∪t)} x(l) ik (cid:80) (cid:19) l∈(S2∪t) x(l) ik (cid:88) (cid:88) i∈Mn k∈K r(n) ik (cid:88) j∈S1∪t, j(cid:54)=n (cid:88) n∈S2, n(cid:54)=t n(X )+ ut (cid:19) + wtu(S2) t (X ) + ζt (cid:80) (cid:88) (cid:88) i∈Mn k∈K r(n) ik wnun(X ) + ζn j (X ) + un l∈(S1∪t) x(l) ik + wtu(S1) t 6 (X )+ = v(S2) − v(S1) + wtu(S2) t (X ) + ζt ≥ v(S2) − v(S1) n(X ) − wtu(S1) ut t (X ) − ζt r(t) ik (cid:88) n∈S1, n(cid:54)=t (cid:88) (cid:88) i∈Mt k∈K n(X ) + ut (cid:80) l∈{(S2∪t)\(S1∪t)} x(l) ik r(t) ik (14) • Superadditivity: For any S1, S2 ⊆ N where S1 ∩ S2 = ∅, S1, S2 ⊂ (S1 ∪ S2). The proof follows from definition of monotone utilities. Definition 14 (Convex Games). A coalition game is said to be convex if and only if for every player n ∈ N , the marginal contribution of the player is non-decreasing with respect to (W.R.T.) set inclusion. Mathematically, for S1 ⊆ S2 ⊆ N\{n} v(S1 ∪ {n}) − v(S1) ≤ v(S2 ∪ {n}) − v(S2). (13) Theorem 2. Our canonical game is convex. Proof. Let us consider two coalition S1 and S2, where S1 ⊆ S2 ⊆ N\{t}, t ∈ N , and FS1 and FS2 are the feasible sets for S1 and S2 respectively that it achieves by allocating resources to its own applications. We calculate v(S2 ∪{t})− v(S1 ∪{t}) in Equation (14), where u(S1) l(X ) ≥ are the utilities of player t in S1 and S2 respectively. l(X )−wtu(S1) The last inequality in (14) follows from the fact that wtu(S2) 0 (monotonicity of the utility). Remark 2. The core of any convex game (N ,V) is non-empty and large [10]. Remark 3. Our canonical cooperative game (N ,V) with NTU can be used to obtain the Pareto-optimal solutions for the multi-objective optimization problem given in (11). n∈S1,n(cid:54)=t ut n∈S2,n(cid:54)=t ut (X )+ζt (X )−ζt and u(S2) (cid:80) (cid:80) t t t t While the existence of core, i.e., core being non-empty, guarantees the grand coalition is stable, finding a suitable allocation from the core is challenging particularly when the core is large (our game). Algorithm 1 provides an allocation from the core2, by solving N + 1 optimization problems. Theorem 3. The allocation decision obtained using Algorithm 1 lies in the core. Proof. To prove the theorem, we need to show that the allocation decision obtained using Algorithm 1: a) is individually rational; b) is group rational; and c) no players have the incentive to leave the grand coalition and form another sub-coalition S ⊂ N . Individual Rationality: For each player n ∈ N , the solution obtained using (15) is individual rational due to the constraint Group Rationality: The value of the grand coalition v{N} as per Equation (15a) is the sum of utilities of all players that in (15b). Hence the solution obtained as a result of Algorithm 1 is individually rational. they achieve from the pay-off vector V(N ) ⊆ RN. Hence the allocation obtained from Algorithm 1 is group rational. 2Provided that the aforementioned assumptions hold. Algorithm 1 Game-theoretic Pareto optimal allocation 7 Input: R, C, and vector of utility functions of all players u Output: X , u(X ) Step 1: u(X ) ←0, X ←0 Step 2: for n ∈ N do v({n}) ←Optimal objective function value in (10) Step 3: X ←Optimal allocation decision from (15) u(X ) ←Payoff vector from (15) TABLE I SIMULATION NETWORK SETTINGS. Setting 1 2 3 4 Parameters N = 3, Mn = 3, ∀n ∈ N N = 3, Mn = 20, ∀n ∈ N N = 6, Mn = 6, ∀n ∈ N N = 6, Mn = 20, ∀n ∈ N Furthermore, due to super-additivity of the game and monotonic non-decreasing nature of the utilities, no subgroup of players have an incentive to form a smaller coalition. Hence Algorithm 1 provides a solution from the core. In algorithm 1, we first solve the single objective optimization problem (10) for all players n ∈ N . We then solve the problem in (15) that provides the allocation from the core. v({n}) in (15b) is the payoff a player n receives when working alone. (cid:18) (cid:88) (cid:18) n∈N maxX wnun(X (n) i∈Mn ) + ζn j (X (n) un i∈Mj ) + j∈N\n s.t. constraints in (11b)-(11d), (cid:88) (cid:88) j∈N\n (cid:19) , (cid:80) (cid:88) (cid:88) i∈Mn (cid:88) (cid:80) k∈K (cid:88) ik l∈N x(l) r(n) ik i∈Mn k∈K ik l∈N x(l) r(n) ik (cid:19) (15a) (15b) wnun(X (n) i∈Mn ) + ζn j (X (n) un i∈Mj ) + ≥ v({n}),∀n ∈ N . In the next section, we evaluate the performance of our resource sharing and allocation framework. IV. EXPERIMENTAL RESULTS We evaluate the performance of proposed resource sharing and allocation framework for a number of settings as shown in Table I. Each player has three different types of resources (K = 3), i.e., storage, communication and computation. Without loss of generality, the model can be extended to include other type of resources/parameters. We used linear and sigmoidal utilities (see (16)) for all the players. However, the results hold for any monotone non-decreasing utility. (cid:88) (cid:18) K(cid:88) i∈Mn k=1 un(X ) = (cid:19) 1 1 + e−µ(x(n) ik −r(n) ik ) ∀n ∈ N . (16) µ is chosen to be either 0.01 or 0.1 to capture the requirements of different applications. The request matrices R(n),∀n ∈ N and the capacity vectors C (n),∀n ∈ N are randomly generated for each setting within a pre-specified range3. To show the advantage of resource sharing, we allocate larger capacities to certain players that, for improving their utilities, share the available resources with other domains and assist other players in meeting demand. Since all the service providers do not differentiate between their native and applications of other service providers, we set wn and ζn, ∀n ∈ N to 1. The simulations were run in Matlab R2016b on a Core-i7 processor with 16 GB RAM. To solve the optimization problems, we used the OPTI-toolbox. Below, we provide detailed experimental results. A. Verification of game-theoretic properties In Table II, we present results for a 3-player 20-application game that verify different game theoretic properties such as individually rationality, group rationality, super additivity and show that the obtained allocation is from the core. The pay-off all players receive in the grand coalition, i.e., {1, 2, 3} is at least as good as players 1, 2 and 3 working alone. This shows that the solution obtained using Algorithm 1 for the grand coalition is individually rational. Similarly, the value of coalition 3The larger the number of applications in our simulation settings, the larger is range for random number generation. 8 PLAYER PAYOFF IN DIFFERENT COALITIONS FOR A 3 PLAYER - 20 APPLICATION GAME WITH µ = 0.01 TABLE II Coalition {1} {2} {3} {1, 2} {1, 3} {2, 3} {1, 2, 3} Player 1 584.40 0 0 584.40 584.40 0 584.40 Player 2 0.00 90 0 227.15 0 118.91 205.11 Player 3 0.00 0 90 0 229.84 119.50 202.30 Value of coalition 584.40 90 90 811.55 814.24 238.41 991.81 Fig. 3. Player utilities working alone and in the grand coalition (GC) for different simulation settings with µ = 0.01 and µ = 0.1. is the sum of pay-off all players receive is the value of coalition, hence our solution is group rational. Furthermore, with an increase in the coalition size, value of coalition also increases. Hence, the grand coalition has the largest value, which shows the superadditive nature of the game. Also, no set of players has any incentive to divert from the grand coalition and form a smaller coalition. Hence, the grand coalition is stable and the allocation we obtain using Algorithm 1 is from the core. Similar results were seen for other settings given in Table I. However, we do not include them here due to space constraints. B. Efficacy of the resource sharing framework 1) Player utilities: Figure 3 shows the utility of game players in different simulation settings. It is evident from the figure that the utility of players in grand coalition (GC) in all simulation settings either remains as good as working alone (very small number of cases) or drastically improves with our game theoretic resource sharing framework. This shows that cloud service providers can greatly benefit by employing a resource sharing scheme. The average improvement in the utility of players seen in our simulations is almost 207%. However, it is worth mentioning that the improvement greatly depends on parameters such as resource surplus, deficit, and the utilities used. 2) User satisfaction: Satisfying user requests is important for cloud service providers as it is mandated by the SLA. Furthermore, it helps in retaining their users (customers) resulting in long-term profits. Figure 4 shows the average user request satisfaction in different player-application settings. For a 3− player game with 3 and 20 applications respectively, player 1 has a resource deficit and is not able to satisfy all of its user's request when operating alone. Players 2 and 3 have a resource surplus so they can satisfy their users even working alone. When all the three players work in a coalition, the request satisfaction for all three players is 100%. Similarly, for a 6−player game with 6 and 20 applications respectively, we see that players who could not satisfy their applications alone are able to satisfy all their user requests by joining the coalition and "renting" resources from the players that have a resource surplus. It is worth mentioning that resource sharing can drastically improve user satisfaction. However, the extent of improvement depends on the nature of the utility function, capacity and resource requests. 3) Resource utilization: Figure 5 shows the resource utilization at different players in various simulation settings. For a 3−player game with 3 and 20 applications respectively, we see that the resource utilization for player 2 and 3 (players with 3 Applications, =0.01AloneGC050100150UtilityPlayer 1Player 2Player 33 Applications, =0.1AloneGC050100150UtilityPlayer 1Player 2Player 320 Applications, =0.01AloneGC0200400600UtilityPlayer 1Player 2Player 320 Applications, =0.1AloneGC0200400600UtilityPlayer 1Player 2Player 36 Applications, =0.01AloneGC050100150UtilityPlayer 1Player 2Player 3Player 4Player 5Player 66 Applications, =0.1AloneGC050100Utility20 Applications, =0.01AloneGC0100200300400Utility20 Applications, =0.1AloneGC0100200300400Utility 9 Fig. 4. Improvement in user request satisfaction for various player-application settings and µ = 0.01. Fig. 5. Resource utilization for various player-application settings and µ = 0.01. resource surplus) increases in the grand coalition when compared with working alone. This is because these players rent out their resources to player 1 that may need them resulting in an increased utility. Player 1 with resource deficit had 100% resource utilization rate working alone. However, resource utilization for player 1 in grand coalition either may remain the same or reduce, since its users' requests may be satisfied by other players. Similar results are seen for a 6−player game with 6 and 20 applications as evident from the figure. It is evident from our results that the use of resource sharing and allocation is beneficial for cloud service providers. By allowing different cloud service providers to cooperate, the utility of service providers increases and resources are utilized in an optimal manner. All the service providers in the game have the incentive to work together and use their resource capacities in the best possible way. V. RELATED WORK There have been a number of solutions proposed in literature related to resource availability and resource allocation in cloud computing. Alicherry et al. [11] presented a 2-approximation algorithm for network resource allocation in a distributed cloud environment. Ergu et al. [12] proposed a model for resource allocation in cloud computing environment. Tsai et al. [13] proposed an improved differential evolution algorithm for resource allocation in cloud that combines differential evolution algorithm with Taguchi method. Pawar et al. [14] proposed a dynamic resource allocation that considers different SLA parameters and premptable task execution. Wei et al. [15] proposed a non-cooperative game theory based approach for resource allocation in the cloud. The objective of the algorithm is to maximize fairness among different users. Duan et al. [16] modeled scheduling in hybrid clouds as a sequential cooperative game. The authors proposed a storage and communication aware algorithm that jointly optimizes the execution time and economic cost of scheduling Bag-of-Tasks work flows. Shi et al. [17] proposed a Shapley value based mechanism for on-demand bandwidth allocation between data centers. They focus on network bandwidth and do not take computing and storage resources into account. Shi et al. [1] also proposed an online auction mechanism for 3 Player - 3 ApplicationAloneGrand Coalition020%40%60%80%100%User SatisfactionPlayer 1Player 2Player 33 Player - 20 ApplicationAloneGrand Coalition020%40%60%80%100%User Satisfaction Player 1Player 2Player 36 Player - 6 ApplicationAloneGrand Coalition020%40%60%80%100%User SatisfactionPlayer 1Player 2Player 3Player 4Player 5Player 66 Player - 20 ApplicationAloneGrand Coalition020%40%60%80%100%User SatisfactionAloneGrand Coalition020%40%60%80%100%Resource Utilization3 Player - 3 ApplicationPlayer 1Player 2Player 3AloneGrand Coalition020%40%60%80%100%Resource Utilization 3 Player - 20 ApplicationPlayer 1Player 2Player 3AloneGrand Coalition020%40%60%80%100%Resource Utilization6 Player - 6 ApplicationPlayer 1Player 2Player 3Player 4Player 5Player 6AloneGrand Coalition020%40%60%80%100%Resource Utilization6 Player - 20 Application 10 dynamically providing virtual clusters in geo-distributed clouds. Zafari et al. [18] modeled resource sharing among mobile edge clouds as a canonical game with transferable utility (TU). However, our work in this paper differed from [1], [11], [15] -- [17]. We considered the multi-objective nature of the resource sharing problem and allowed different cloud service providers to share resources and improve their utilities, while satisfying the requests of different users. Our work is closest to [18]. However, authors in [18] considered the case where each service provider first allocates resources to its own applications and shares the remaining resources with the applications of other service providers. They only considered the utility of the service provider and did not consider the user satisfaction. Our framework guarantees Pareto optimality like [18], however, it is more generic than [18] as TU games can be modeled as a special case of NTU [9]. VI. CONCLUSIONS In this paper, we proposed a cooperative game theory based framework for resource sharing and allocation among cloud service providers. We showed that for a monotonic non-decreasing utility, resource sharing among multiple cloud service providers can be modeled as a canonical game with non-transferable utility. We prove that the game is convex, hence the core of the game is non-empty. We proposed an O(N ) algorithm that provides allocation decision from the core. Simulation results showed that our proposed framework improves utility of cloud service providers. Furthermore, request satisfaction of users also improved. REFERENCES [1] W. Shi, C. Wu, and Z. Li, "An Online Auction Mechanism for Dynamic Virtual Cluster Provisioning in Geo-Distributed Clouds," IEEE Transactions on Parallel and Distributed Systems, vol. 28, no. 3, pp. 677 -- 688, 2017. [2] Z. Xiao, W. Song, Q. Chen et al., "Dynamic resource allocation using virtual machines for cloud computing environment." IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1107 -- 1117, 2013. [3] W.-Y. Lin, G.-Y. Lin, and H.-Y. Wei, "Dynamic Auction Mechanism for Cloud Resource Allocation," in Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. IEEE Computer Society, 2010, pp. 591 -- 592. [4] A. Beloglazov, J. Abawajy, and R. Buyya, "Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing," Future generation computer systems, vol. 28, no. 5, pp. 755 -- 768, 2012. [5] V. Mayer-Schonberger and K. Cukier, "Big Data: A Revolution That Will Transform How We Live, Work, and Think," 2013. [6] L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A Survey," Computer networks, vol. 54, no. 15, pp. 2787 -- 2805, 2010. [7] J.-H. Cho, Y. Wang, R. Chen, K. S. Chan, and A. Swami, "A Survey on Modeling and Optimizing Multi-Objective Systems," IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1867 -- 1901, 2017. [8] Z. Han, Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge University Press, 2012. [9] R. B. Myerson, Game theory. Harvard university press, 2013. [10] W. W. Sharkey, "Cooperative Games with Large Cores," International Journal of Game Theory, vol. 11, no. 3-4, pp. 175 -- 182, 1982. [11] M. Alicherry and T. Lakshman, "Network Aware Resource Allocation in Distributed Clouds," in Infocom, 2012 proceedings IEEE. IEEE, 2012, pp. [12] D. Ergu, G. Kou, Y. Peng, Y. Shi, and Y. Shi, "The Analytic Hierarchy Process: Task Scheduling and Resource Allocation in Cloud Computing Environment," The Journal of Supercomputing, vol. 64, no. 3, pp. 835 -- 848, 2013. [13] J.-T. Tsai, J.-C. Fang, and J.-H. Chou, "Optimized Task Scheduling and Resource Allocation on Cloud Computing Environment using Improved Differential Evolution Algorithm," Computers & Operations Research, vol. 40, no. 12, pp. 3045 -- 3055, 2013. [14] C. S. Pawar and R. B. Wagh, "Priority Based Dynamic Resource Allocation in Cloud Computing with Modified Waiting Queue," in Intelligent Systems and Signal Processing (ISSP), 2013 International Conference on. IEEE, 2013, pp. 311 -- 316. [15] G. Wei, A. V. Vasilakos, Y. Zheng, and N. Xiong, "A Game-Theoretic Method of Fair Resource Allocation for Cloud Computing Services," The journal 963 -- 971. [16] R. Duan, R. Prodan, and X. Li, "Multi-Objective Game Theoretic Scheduling of Bag-of-Tasks Workflows on Hybrid Clouds," IEEE Transactions on [17] W. Shi, C. Wu, and Z. Li, "A Shapley-Value Mechanism for Bandwidth on Demand between Datacenters," IEEE Transactions on Cloud Computing, of supercomputing, vol. 54, no. 2, pp. 252 -- 269, 2010. Cloud Computing, vol. 2, no. 1, pp. 29 -- 42, 2014. vol. 6, no. 1, pp. 19 -- 32, 2018. [18] F. Zafari, J. Li, K. K. Leung, D. Towsley, and A. Swami, "A Game-Theoretic Approach to Multi-Objective Resource Sharing and Allocation in Mobile Edge," in Proceedings of the 2018 on Technologies for the Wireless Edge Workshop. ACM, 2018, pp. 9 -- 13.
1711.08615
1
1711
2017-11-23T08:36:17
Controlling Elections through Social Influence
[ "cs.MA", "cs.SI" ]
Election control considers the problem of an adversary who attempts to tamper with a voting process, in order to either ensure that their favored candidate wins (constructive control) or another candidate loses (destructive control). As online social networks have become significant sources of information for potential voters, a new tool in an attacker's arsenal is to effect control by harnessing social influence, for example, by spreading fake news and other forms of misinformation through online social media. We consider the computational problem of election control via social influence, studying the conditions under which finding good adversarial strategies is computationally feasible. We consider two objectives for the adversary in both the constructive and destructive control settings: probability and margin of victory (POV and MOV, respectively). We present several strong negative results, showing, for example, that the problem of maximizing POV is inapproximable for any constant factor. On the other hand, we present approximation algorithms which provide somewhat weaker approximation guarantees, such as bicriteria approximations for the POV objective and constant-factor approximations for MOV. Finally, we present mixed integer programming formulations for these problems. Experimental results show that our approximation algorithms often find near-optimal control strategies, indicating that election control through social influence is a salient threat to election integrity.
cs.MA
cs
Controlling Elections through Social Influence Department of Computer Science and Center for Artificial Intelligence in Society Bryan Wilder University of Southern California [email protected] Yevgeniy Vorobeychik Department of Electrical Engineering and Computer Science Vanderbilt University [email protected] Abstract Election control considers the problem of an adversary who attempts to tamper with a voting process, in order to either ensure that their favored candidate wins (constructive control) or another candidate loses (destructive control). As online social networks have become significant sources of information for potential voters, a new tool in an attacker's arsenal is to effect control by harnessing social influence, for example, by spreading fake news and other forms of misinformation through online social media. We consider the computational problem of election control via social influence, studying the conditions under which finding good adversarial strategies is computationally feasible. We consider two objectives for the adversary in both the constructive and destructive control settings: probability and margin of victory (POV and MOV, respec- tively). We present several strong negative results, showing, for example, that the problem of maximizing POV is inapproximable for any constant factor. On the other hand, we present approximation algorithms which provide somewhat weaker approximation guarantees, such as bicriteria approximations for the POV objective and constant- factor approximations for MOV. Finally, we present mixed integer programming formulations for these problems. Experimental results show that our approximation algorithms often find near-optimal control strategies, indicating that election control through social influence is a salient threat to election integrity. 1 Introduction The integrity of elections is crucial to the functioning of democratic institutions. As a result, a large body of work has focused on the robustness of elections to various forms of control, where a malicious party attempts to manipulate election results, for example, by bribing voters and adding or removing votes. While it is important to understand the vulnerability of elections to such control, there are many countries where blatant tampering is (fortunately) uncommon. For instance, outright voter fraud is very rare in the United States federal and state elections [1, 12]. However, more subtle forms of election control may attempt to subvert legitimate information channels towards malicious means. For example, political advertising and news (in the editorial form) are common legitimate means for convincing prospective voters. Such communication, when sufficiently transparent, is often critical to the effective functioning of democracy, and can exert considerable influence on voting behavior [23, 15, 5]. Malicious control over information promulgated through these channels can thus have considerable impact, but is also difficult to achieve due to the relative transparency of traditional media sources. The increasing importance of social media, such as Facebook and Twitter, for propagating information, including about political issues [11, 42, 27], is a game changer. Both the decentralized nature of information sources on social media, and their associated lack of transparency, present malicious parties with an unprecedented opportunity to influence a democratic political process. Recent evidence of deliberate election tampering in the 2016 US presidential election through fake news-deliberately falsified news content-suggests that this issue is a major concern for election integerity for years to come [2]. For example, it is estimated that the typical American adult saw at least one fake news story during the election cycle [2], and such stories have been shown to impact voters' judgment [39]. 1 Motivated by these concerns, we initiate the first algorithmic study of the problem of election control through social influence. In our setting, there is a social network of voters who elect a single winner by plurality vote. An outside party may select a subset of nodes as seed nodes for a news story or advertisement. Each of these seed nodes shares the story with their friends. Each friend has some probability of being influenced in their voting preferences, as well as sharing the story further. The question is whether, given a limited budget, the attacker can influence enough voters to ensure that a target candidate wins or loses the election. This problem is closely related to influence maximization, which has been studied primarily in the context of viral advertising. There, the objective is simply to maximize the expected number of people who receive a message. While influence maximization admits a simple (1 − 1/e)-approximation algorithm, election control through social influence presents a number of new algorithmic challenges. We study both constructive and destructive control for two different objectives: 1) maximizing the expected margin by which a target candidate wins (loses) the election (margin of victory, or MOV), and 2) maximizing the probability that a target candidate wins (loses) election (probability of victory, or POV). Summary of main results: We provide a mix of negative (hardness and inapproximability) and positive (algorithmic) results for the problem of election control through social influence. Our main contributions are the following: • We show that the MOV objective in the two candidate case is monotone submodular and hence admits a (1−1/e) greedy approximation algorithm. • We prove that the POV objective is hard to approximate to within any multiplicative factor for both constructive and destructive control, even in elections with only two candidates. • We provide a bicriteria approximation algorithm for the POV objective in the two-candidate case. In fact, our algorithm applies to the more general problem of maximizing the probability that a submodular function exceeds a given threshold value and may be of general interest. • In the multicandidate case, we provide algorithms which achieve similar guarantees as the two-candidate case up to the loss of a constant factor (independent of the number of candidates). Such guarantees hold for both constructive and destructive control, for both the MOV and POV objectives. • We give mixed integer linear programming (MILP) formulations for all of the above settings which can be used to find optimal solutions. • We experimentally compare our approximation algorithms to the optimal strategies produced by the MILP. Despite formal hardness results, our approximation algorithms often find near-optimal solutions, particularly for the MOV objective. This suggests that computational hardness may not always be a practical barrier to controlling elections via social influence. 2 Related work Our work is closely related to two research areas: election control and influence maximization. These bodies of work are separate: to our knowledge there is no previous work which considers election control using social influence. The computational study of election control was started by Bartholdi et al. [3], who considered constructive control. The destructive control setting was introduced by Hemaspaandra et al. [26]. A large body of work has studied election control under different settings and voting rules [14, 18] including bribing voters [20, 22, 4, 19, 44], adding or deleting voters [17, 32, 21, 31], and adding or deleting candidates [7, 21, 31]. Another topic is strategic behavior on the part of the voters themselves [34, 37, 38]. The main difference between our work and previous work on election control is that we introduce and analyze social influence as a novel mechanism for both constructive and destructive control. There is a large, parallel literature devoted to influence maximization in social networks. This line of work was in- troduced by Kempe et al. [28] who introduced influence maximization in the independent cascade model and proposed a greedy algorithm based on submodularity. Since then, a number of newer algorithms have been proposed, mostly attempting to scale up the greedy algorithm to very large graphs [9, 13, 41, 24]. Subsequent work has also introduced several related settings, e.g., continuous time dynamics [40, 16], bandit settings where dynamics are learned over time [10, 30, 6], or robust problems where influence probabilities are uncertain [25, 8, 33, 43]. None of this work considers using social influence to control an election, and our setting brings a range of new technical challenges. Almost all 2 work on influence maximization is founded on submodularity of the objective function. However, even though we use the same model of influence spread, objectives related to election control often violate submodularity, and we need to develop new algorithmic techniques. We mention here work by Krause et al. [29] on robust submodular optimization. For optimizing the POV objective, we use a similar form of surrogate objective. However, our objective is to maximize the probability of a desired outcome, not the worst-case value, so both our final algorithm and analysis are novel. ci votes. 3 Problem formulation We consider an election with candidates C = {c∗, c1, c2, ...c(cid:96)}. c∗ is a special target candidate, and the objective of the election control problem is to make c∗ either win the election (constructive control) or lose (destructive control). The voters are the nodes of a graph G = (V, E). Each voter v has an ordering πv over the candidates and casts a vote for πv(1), i.e., their first ranked candidate. We assume that voters do not behave strategically. The winner is decided via the plurality rule (the candidate with the most votes wins the election). If there is a tie, we say that the attacker = {v ∈ V : πv(j) = ci} be the set of voters who fails. This tie-breaking does not impact any of our results. Let V j rank candidate ci in place j. Initially, ci has V 1 ci Social influence: There is an attacker who wishes to change the results of the election by spreading messages which cause voters to change their ordering over candidates. In constructive control, the attacker can spread a message which causes any voter v who becomes influenced to promote c∗ by one place in πv (exchanging c∗ with the candidate previously ranked above them). If πv(c∗) = 1, the message has no effect on v, but v may still decide to share the message with their neighbors. In destructive control, a voter who is influenced demotes c∗ by one place in πv. Influence spreads via the independent cascade model (ICM), the most common model in the influence maximization literature. Each edge (u, v) ∈ E has a propagation probability pu,v. If u is influenced, it makes one attempt to influence each neighbor v. Each attempt succeeds independently with probability pu,v. The attacker may select a set of k seed nodes who are influenced at the start of the process. The diffusion then proceeds in discrete time steps until no new activations are made. We also introduce a useful alternate view of the ICM, the live-graph model. We can equivalently see the ICM as removing each edge (u, v) from the graph with probability 1 − pu,v. A node is influenced if it is reachable from any seed node via the edges that remain. Call any specific setting of present/absent edges a scenario y, with induced graph Gy. Let m = 2E be the total number of scenarios. Let f (S, y) denote the number of nodes which are reachable from any seed node in S on graph Gy. The expected number of nodes influenced under the ICM is just f (S) = Ey [f (S, y)]. Similarly, the probability that the number of influenced nodes exceeds any threshold value ∆ is Pry [f (S, y) ≥ ∆]. At times, we will want to specifically reason about the probability some subset of V is influenced. For any A ⊆ V , let f (S, y, A) denote the number of nodes in A reachable from S in scenario y. Analogously, f (S, A) = Ey[f (S, y, A)]. We remark that such functions can be evaluated up to arbitrary precision by averaging over random samples for y. For simplicity, we ignore such issues here since they are well understood [41, 9, 13]. Objectives: We now formally introduce our two objectives, starting with the simpler two-candidate case. In a two-candidate election, constructive and destructive control are clearly equivalent since maximizing the probability that c∗ loses is the same as maximizing the probability that the other candidate wins (and vice versa). Hence, we study only constructive control without loss of generality. In the margin of victory (MOV) objective, we want to maximize the expected number of votes by which c∗ wins the election. We define our objective as the change in the expected margin: (cid:2)f (S, y, V 2 c∗ )(cid:3) . MOV(S) = 2 E y The factor 2 is present since reaching a voter in V 2 c∗ both adds a vote for c∗ and removes a vote for the opponent. We study the expected change in the margin (not the margin itself) so that approximation ratios are well defined even when the margin is negative. c∗(cid:1) + 1 be the number of voters that c∗ needs to reach in order to win the election. The POV In the probability of victory (POV) objective, we want to maximize the probability that c∗ wins the election. Let (cid:0)V 1 −V 1 c1 ∆ = 1 2 objective is (cid:2)f (S, y, V 2 c∗ ) ≥ ∆(cid:3) POV(S) = Pr y 3 which is just the probability that at least ∆ of the voters who have c∗ in second place are reached. In the multicandidate case, constructive and destructive control are no longer equivalent. Further, the impact of messages is more complex than before. E.g., in constructive control not only does c∗ gain a vote, but another candidates loses a vote; we need to keep track of the number of votes lost by each other candidate. We start out by defining functions which give the change in the margin between c∗ and another candidate ci in a given scenario y when seed set S is chosen. Let χ(v, S, y) be 1 if node v is reachable from seed set S in the graph Gy. The change in margin (in constructive and destructive control, respectively) is given by gC(S, y, ci) = gD(S, y, ci) = χ(v, S, y) + 2 χ(v, S, y) + 2 χ(v, S, y) χ(v, S, y) (cid:88) (cid:88) v∈V 2 c∗\V 1 ci v∈V 1 c∗\V 2 ci (cid:88) (cid:88) v∈V 2 c∗∩V 1 ci v∈V 1 c∗∩V 2 ci which gives value 2 for every node that is flipped from ci to c∗ (or vice versa) and hence count double towards the margin, and 1 for other nodes. Based on this, we now give expressions for the change in margin given any fixed scenario y and seed set S. We start with constructive control. Note that before any intervention, the margin is just maxciV 1 c∗. Hence, the change in margin is −gC(S, y, cj) − V 1 −V 1 cj ci c∗. Afterwards, the margin is maxcjV 1 (cid:21) c∗ −V 1 mC(S, y) = V 1 (cid:20) max ci (cid:20) (cid:18) ci = min cj gC(S, y, cj) + max ci (cid:21) c∗ −gC(S, y, cj) − V 1 − max cj V 1 cj −(cid:12)(cid:12)(cid:12)V 1 cj (cid:12)(cid:12)(cid:12)(cid:19) V 1 ci . That is, the change in margin is driven by candidate with largest starting vote (V 1 ) and smallest loss in vote cj (gC(S, y, cj)). Now considering all scenarios y, the constructive control objectives are MOVC(S) = E y [mC(S, y)] POVC(S) = Pr y [mC(S, y) ≥ ∆C] . where ∆C = maxciV 1 ci −V 1 c∗+1 is the necessary change in margin for c∗ to win. For destructive control, we can similarly write the change in margin and corresponding objectives as (cid:0)gD(S, y, ci) + V 1 (cid:1) − max ci cj [mD(S, y)] y POVD(S) = Pr y mD(S, y) = max MOVD(S) = E ci cj V 1 [mD(S, y) ≥ ∆D] . where ∆D = V 1 c∗− maxciV 1 ci +1. 4 Elections with two candidates We start with elections with only two candidates. Recall that in this setting, constructive and destructive control are equivalent, so our results are stated only for constructive control (trying to ensure c∗ wins the election). In order to state our algorithmic results, we first introduce some background on submodular optimization and influence maximization. A set function f : V → R is submodular if for all A ⊆ B ⊆ V and all x (cid:54)∈ B, f (A∪{x})−f (A) ≥ f (B∪{x})−f (B). Intuitively, submodularity formalizes the property of diminishing returns. The function f (S) which gives the expected number of nodes reached by S under the independent cascade model is known to be monotone submodular. It is well known that whenever f is a monotone submodular function, the greedy algorithm gives a (1 − 1/e)-approximation to the problem maxS≤k f (S). It is natural to hope that submodularity would transfer to our election control objectives MOV and POV. Our first result is that submodularity does in fact hold for the MOV objective with two candidates. Previous results for influence maximization do not directly apply because the MOV objective only counts nodes who have c∗ in second place. Nevertheless, similar reasoning applies. 4 Algorithm 1 Algorithms for MOV objective 1: function GREEDY(h, k) 2: 3: 4: 5: S ← ∅ while S< K do v ← arg maxv∈V \S h(S ∪ {v}) − h(S) S ← S ∪ {v} 6: 7: function MOVCONSTRUCTIVE(k) 8: 9: 10: function MOVDESTRUCTIVE(k) 11: 12: return S h(S) :− Ey return GREEDY(h, k) h(S) :− Ey return GREEDY(h, k) (cid:2)f (S, y, V 2 c∗ )(cid:3) (cid:2)f (S, y, V 1 c∗ )(cid:3) Algorithm 2 Algorithms for POV objective 1: function ENUMERATETHRESHOLD(h, ∆, k) 2: 3: 4: h(cid:48)(S) :− Ey [min (β, h(S, y))] Sβ = GREEDY(h(cid:48), k) for β = ∆...n do return arg maxSβ ,β=∆....n Pry [h(Sβ, y) ≥ ∆] 5: 6: function POVCONSTRUCTIVE(k) 7: 8: 9: function POVDESTRUCTIVE(k) 10: //recall mC(S, y) = Ey return ENUMERATETHRESHOLD(mC, ∆C, k) return ENUMERATETHRESHOLD(mD, ∆D, k) (cid:2)f (S, y, V 2 c∗ )(cid:3) for 2-candidate case Theorem 1. In an election with two candidates, MOV is a monotone submodular function. Proof. We first fix a particular scenario y and show that the function f (·, y, V 2 c∗ ) is submodular. This suffices to show that Ey[f (·, y, V 2 c∗ )] is submodular since a nonnegative linear combination of submodular functions remains submodular. Monotonicity is clear since adding additional seeds to A can only make more nodes reachable. To show submodularity, we can write the marginal gain as (cid:88) v∈V 2 c∗ f (A ∪ {x}, y, V 2 c∗ ) − f (A, y, V 2 c∗ ) = (1 − χ(v, A, y))χ(v,{x}, y). Compare the above expression for a set A and any B ⊇ A. For any single node v, χ(v, B, y) = 1 whenever c∗ )− c∗ ) ≥ χ(v, A, y) = 1. Hence, the term in the above summation for each node v can only be smaller for f (B ∪{x}, y, V 2 c∗ ) − f (A, y, V 2 f (B, y, V 2 f (B ∪ {x}, y, V 2 c∗ ). We conclude that f (A ∪ {x}, y, V 2 c∗ ) and submodularity now follows by taking the expectation over y. c∗ ) than for f (A ∪ {x}, y, V 2 c∗ ) − f (A, y, V 2 c∗ ) − f (B, y, V 2 Hence, we can apply a greedy algorithm to MOV to obtain a (1 − 1/e)-approximation (MOVCONSTRUCTIVE in Algorithm 1). Moreover, this ratio is tight since MOV contains regular influence maximization as a special case when all nodes have c∗ in second place (V 2 c∗ = V ). It is NP-hard to approximate influence maximization with ratio better than 1 − 1/e [28]. Hence, two-candidate MOV is computationally intractable with respect to exact optimization but high quality and efficient approximation algorithms exist. We now turn to the POV objective, where we maximize the probability that c∗ wins the election. It is natural to think that submodularity may also carry over to this setting. However, this is not the case; we can provide a simple 2 − k + 1 have c∗ as their first counterexample where POV violates submodularity. Consider n isolated nodes, where n choice. Hence, to win the election it is necessary and sufficient to influence k nodes, which can be accomplished by any choice of k seeds from among those with c∗ as their second choice. Fix a seed set B containing k − 1 of these nodes and consider any A ⊂ B (that is, A is strictly smaller). We have POV(B) = POV(A) = 0. By adding a node 5 v ∈ V 2 c∗ \ B to B, we have POV(B ∪ {v}) − POV(B) = 1. However, since A< k − 1, POV(A ∪ {v}) = 0 and hence POV(A∪{v})− POV(A) = 0. This contradicts the definition of submodularity. Essentially, the POV objective displays a sharp threshold behavior, where additional seed nodes have no value until we are close to winning. This behavior in fact translates into the following strong hardness result: Theorem 2. It is NP-hard to compute an α-approximation to the problem maxS≤k POV(S) for any α > 0, even for two candidates and even when the instance is deterministic. Proof. We consider a deterministic objective: the ICM with all propagation probabilities either 0 or 1. Without loss of generality, we have only a single scenario and will drop the dependence on y in f. Suppose that we have an α-approximation for POV-maximization. We show how we can use this algorithm to optimally solve the influence maximization problem (i.e., maximizing f (·, V )), which is known to NP-hard since it includes maximum coverage as a special case. Let OP TIM be the optimal value of the influence maximization problem and OP TP OV (∆) be the optimal value for Problem 1 with the given threshold. Fix any ∆ > 0. If ∆ ≤ OP TIM , then there is a set S with POV(S) = 1 and hence OP TP OV (∆) = 1. Otherwise, there is no set with value ∆ and OP TP OV (∆) = 0. Since the objective to the POV problem is either 0 or 1, any α-approximation algorithm for it must return 1 whenever OP TP OV (∆) = 1. Now, we can just enumerate over ∆ = 1...n, where n is the number of nodes in the graph. At each value of ∆, we ask the α-approximation algorithm to solve the POV maximization problem with that value of ∆. We return the solution corresponding to the highest value of ∆ for which we can find a set with f (S, V ) ≥ ∆. By the above, this set is an optimal solution to the influence maximization problem. (cid:2)f (S, y, V 2 c∗ ) ≥ ∆(cid:3) We remark that since this hardness result has broader implications. Recall that POV(S) = Pry c∗ ) is a submodular function. Therefore, the inapproximability result in Theorem where by Theorem 1, f (S, y, V 2 2 shows that it is in general hard to approximate the problem of of maximizing the probability that a submodular function exceeds a given threshold value. This is a natural objective in other domains, e.g. for a risk-averse decision maker who wants to control the probability of a bad outcome. We pair this hardness result with a positive algorithmic result regarding bicriteria approximations. A bicriteria approximation algorithm gives up solution quality in more than one dimension, and is of interest when hardness results preclude the usual notion of approximation (as for our problem). We provide an algorithm which has a solution quality guarantee whenever the election is winnable by a "large margin". That is, there is a seed set with high probability of greatly exceeding ∆ votes. Our algorithm will attempt to maximize the probability of exceeding exactly ∆ votes, but has a guarantee relative to the optimal value for threshold 1 α ∆ for some α < 1. That is, it is only compared to the optimal value of a harder problem. Our algorithm is a greedy strategy based on the surrogate function h(S) = Ey (cid:2)min{β, f (S, y, V 2 c∗ )}(cid:3), where β is a chosen threshold value. The intuition is to replace the sharp discontinuity of the original POV objective by a surrogate which interpolates smoothly up to the threshold β. However, we do not give any "credit" for nodes reached beyond β since (unlike in the MOV case) we only care about crossing the threshold. It is easy to see that the minimum of a submodular function and a constant is itself submodular [29]. Hence, h is submodular and amenable to greedy optimization. POVCONSTRUCTIVE (Algorithm 2) iterates over a series of possible thresholds for h, optimizes each one greedily, and outputs the best of the resulting seed sets. Specifically, it tries every value of β from ∆...n. For each β, it finds a seed set Sβ by greedily optimizing Ey the Sβ which maximizes Pry objective (Line 5). c∗ )}(cid:3) (Algorithm 2, Lines 3-4). Then, it outputs c∗ ) ≥ ∆(cid:3), i.e., the one which has the best probability of exceeding the true (cid:2)min{β, f (S, y, V 2 (cid:2)f (Sβ, y, V 2 The reason that we need to enumerate over values for β, instead of just using the true threshold ∆, is that optimizing the surrogate h might result in a solution which has value below β in every scenario. However, we can show that if OP T (β) is high, there must be many scenarios where Sβ has value close to β (a notion formalized in our proof). Hence, if we try a sufficiently large β > ∆ and OP T (β) is still high, there must be many scenarios with value at least ∆. This is formalized in the following guarantee: Theorem 3. In an election with two candidates, POVCONSTRUCTIVE produces a solution S such that (cid:0)1 − 1 e (cid:1) OP TP OV α ∆(cid:1) − α (cid:0) 1 1 − α [f (S, y, V 2 c∗ ) ≥ ∆] ≥ max 0<α<1 Pr y 6 β . We will prove that Pry[f (Sβ, y, V 2 Proof. POVCONSTRUCTIVE enumerates over values of α by trying thresholds β = ∆...n. Fix a specific β and set . This suffices the prove the theorem α = ∆ because we output the best of the Sβ. A minor point is that the theorem takes the max over 0 < α < 1, while we try only the discrete points α = ∆ A = {y : f (Sβ, y, V 2 c∗ ) ≥ ∆] ≥ (1− 1 n . However, these are equivalent because f (S, y, V 2 We divide the set of scenarios into those where the Sβ has value at least αβ and those where it has less value. Let c∗ ) is always integral. ∆+1 , ..., ∆ e )OP TP OV ( 1 α ∆)−α ∆ , ∆ 1−α c∗ ) < αβ}. We have c∗ ) ≥ αβ} and B = {y : f (Sβ, y, V 2 c∗ )} + (cid:18) min{β, f (Sβ, y, V 2 (cid:88) (cid:19) (cid:88) (cid:18) (cid:19) 1 m 1 − 1 e min{β, f (Sβ, y, V 2 c∗ )} y∈B βm · OP TP OV (β) 1 m ≥ y∈A 1 − 1 e h(S) ≥ max S≤k where the first inequality follows from submodularity and the second follows since the solution attaining value OP TP OV (β) for the POV maximization problem is a feasible solution to the problem maxS≤k h(S) which has value at least βm · OP TP OV (β). We are interested in the minimum possible size of A given that the total value is lower bounded as above. By inspection, A is minimized when min{β, f (S, y)} = β for each y ∈ A and f (S, y) = αβ for each y (cid:54)∈ A. In this case, we have (cid:18) 1 − A (cid:19) m (cid:18) A m + α (cid:19) ≥ 1 − 1 e OP TP OV (β) and hence A m ≥ = 1 m (cid:0)1 − 1 e m(cid:88) (cid:1) OP TP OV i=1 1 − α 1[f (Sβ, y, V 2 c∗ ) ≥ αβ] = Pr y (cid:0) 1 α ∆(cid:1) − α (cid:2)f (Sβ, y, V 2 c∗ ) ≥ ∆(cid:3) which completes the proof. Theorem 3 in fact applies to the general problem of maximizing the probability that a submodular function exceeds a threshold value (complementing our hardness result in Theorem 2). As discussed above, this may be of interest independently of election control. 5 Multiple candidates We now consider election control with more than two candidates. There is a target candidate c∗ and other candidates c1...c(cid:96). Note that constructive and destructive control are distinct in this setting. We will give algorithms for both cases for both the MOV and POV objectives. The problem becomes significantly harder in the multicandidate setting because we must now reason simultane- ously about several objectives – whether each alternate candidate ci will accumulate more votes that c∗. We demon- strate that, up to the loss of a constant in the approximation ratio, it suffices to concentrate only on the number of votes gained or lost by c∗ (not the margin against each ci individually). This concept yields (bicriteria) approximation algorithms for each setting along the lines of the two-candidate case. We start out with the MOVC objective (constructive control for the margin of victory), since the idea is simpler to illustrate in this case. The basic intuition is that the change in margin between candidate ci and c∗ can be re-expressed as follows: gC(S, y, ci) = χ(v, S, y) (cid:88) = f(cid:0)S, y, V 2 c∗\V 1 v∈V 2 ci c∗ (cid:88) c∗∩V 1 v∈V 2 c∗ ∩ V 1 ci ci (cid:1) χ(v, S, y) + 2 (cid:1) + f(cid:0)S, y, V 2 7 Now, we can express the final margin in scenario y as mC(S, y) = f(cid:0)S, y, V 2 (cid:1) + min c∗ cj (cid:18) f (cid:16) S, y, V 2 c∗ ∩ V 1 cj (cid:17) V 1 ci + max ci −(cid:12)(cid:12)(cid:12)V 1 cj (cid:12)(cid:12)(cid:12)(cid:19) ci ci ci ci = cj n1− V 1 ci min cj (cid:19) (cid:18) max S≤k −V 1 −V 1 where the first term is common to all candidates and reflects the total number of voters who switch to c∗ and the min term selects the cj who has the most remaining votes. In general, this second term can be very difficult to approximate because it is the minimum of submodular functions, which is not in general submodular (or even approximable [29]). We might hope that there is some special structure to the election control problem, but this is not the case: Theorem 4. For any  > 0, it is NP-hard to compute any Ω(cid:0) 1 (cid:1)-approximation to the problem (cid:1) + max 0 for all cj. Thus, the problem is just maxS≤k mincj f(cid:0)S, y, V 2 Kempe [25] show that it is NP-hard to compute Ω(cid:0) 1 (cid:1). We reduce from the robust influence (cid:1)-approximation to the problem maxS≤k mini=1...r fi(S). maximization (RIM) problem [25, 8]. In RIM, we are given a set of objectives f1...fr, each of which represent expected influence spread in an instance of the independent cascade model on a common underlying graph G. He and Proof. We will consider instances where all of the cj start with an equal number of votes and so maxciV 1 f(cid:0)S, y, V 2 c∗ ∩ V 1 c∗ ∩ V 1 Their proof holds when each fi is deterministic (assigns probability 0 or 1 to each edge), so we will assume that the instance is in this form. Let Gi be a graph in which each edge of G assigned probability 0 by fi has been removed. We create a graph G(cid:48) as follows. G(cid:48) contains each Gi as a disconnected subgraph. For every v ∈ G, we add a vertex v(cid:48) to G(cid:48). v(cid:48) has an outgoing edge to the copy of node v in each of the Gi subgraphs. Each such edge has propagation probability 1. There is a target candidate c∗ and r additional candidates c1...cr. Each of the v(cid:48) nodes that were added has c∗ as their first choice. Each node in subgraph Gi has ci as their first choice and c∗ as their second choice. generality, we will assume that this algorithm only selects nodes from the v(cid:48) (since if a seed set contains the copy of v in any subgraph, we can only obtain greater influence spread by exchanging it for v(cid:48)). Note that, for any such set of seed nodes, fi(S) = f (S, V 2 ) Thus, if S is an α-approximate solution for our problem, it is also an Suppose that we have an α-approximation algorithm for our problem for some α = Ω(cid:0) 1 (cid:1)-approximate solution to the RIM problem. Ω(cid:0) 1 n1− Therefore, we should not hope for any algorithm which can closely approximate the entirety of the objective; the min component is too difficult to handle. However, we can leverage the fact that the first term, f (S, y, V 2 c∗ ), is easy to optimize because it is just a submodular function. Hence, the objective is the sum of an easy term and a hard term. Importantly, we can show that optimizing just the easy term (which is what MOVCONSTRUCTIVE does) is sufficient to obtain a constant factor approximation. (cid:1). Without loss of c∗ ∩ V 1 (cid:1)- approximation to the MOVC problem with any number of (cid:0)1 − 1 n1− n1− cj ci Theorem 5. MOVCONSTRUCTIVE obtains a 1 3 candidates. e Proof. Let c(S, y) = arg minci f (V 2 mC. Let S∗ be an optimal seed set. Note that for all scenarios y, seed sets S, and candidates ci, f (S, y, V 2 f (S, y, V 2 be the candidate achieving the minimum in the definition of c∗ ) ≥ ). Hence, we have c∗ ∩ V 1 ) − V 1 ci ci c∗ ∩ V 1 ci (cid:104) f(cid:0)S∗, y, V 2 c∗ (cid:1)(cid:105) ≥ 1 (cid:104) f(cid:0)S∗, y, V 1 c∗ E y 3 E y (cid:16) (cid:1) + f (cid:16) (cid:17) (cid:17)(cid:105) S∗, y, V 1 c∗ ∩ V 1 c(S∗,y) + f S∗, y, V 1 c∗ ∩ V 1 c(S,y) Note that Ey[f (·, y, V 2 Let S be the resulting seed set. We have c∗ )] is a monotone submodular function, which MOVCONSTRUCTIVE greedily maximizes. 8 (cid:17)(cid:105) c∗ ∩ V 1 c(S,y) (cid:16) (cid:1) + f (cid:104) E y ≥ E y c∗ c∗ S, y, V 2 1 − 1 e (cid:16) f(cid:0)S, y, V 2 (cid:1) + f (cid:1)(cid:105) (cid:104) f(cid:0)S, y, V 2 (cid:19) (cid:18) (cid:104) f(cid:0)S∗, y, V 2 (cid:16) (cid:104) (cid:1) + min f(cid:0)S, y, V 2 (cid:104) (cid:16) f(cid:0)S, y, V 2 (cid:1) + f (cid:18) (cid:19) (cid:104) f(cid:0)S∗, y, V 1 E y c∗ f 1 − 1 e E y c∗ c∗ ≥ 1 3 S∗, y, V 2 c∗ ∩ V 1 which allows us to bound the margin of victory relative to S∗ as V 1 V 1 (cid:17) (cid:17)(cid:105) c∗ ∩ V 1 S, y, V 2 (cid:16) c∗ ∩ V 1 S, y, V 2 + max = E c(S,y) c∗ cj cj ci ci ci y y MOVC(S) = E ci + max c∗ ∩ V 1 (cid:1) + f ≥ 1 3 (cid:105) c(S,y)(cid:105) (cid:104)V 1 (cid:16) cj −V 1 − E y (cid:17) (cid:17) + f (cid:16) S∗, y, V 2 c∗ ∩ V 1 c(S,y) (cid:17)(cid:105) c(S∗,y) S∗, y, V 2 c(S∗,y) + f S∗, y, V 2 c∗ ∩ V 1 c(S,y) (cid:17)(cid:105) c(S,y)(cid:105) (cid:104)V 1 + max ci V 1 ci − E y and some additional algebra (deferred to the appendix) yields (cid:18) (cid:19)(cid:32) (cid:104) (cid:16) (cid:17) MOVC(S) ≥ 1 3 1 − 1 e MOVC(S∗) + E f S∗, y, V 2 y c(S,y) Now by definition of c(S∗, y), f (S∗, y, V 2 c(S∗,y)) − V 1 c(S∗,y)≤ f (S∗, y, V 2 c(S,y) and so This yields c(S,y)(cid:105)(cid:33) . + V 1 c(S∗,y)−V 1 c(S,y)) − V 1 c∗ ∩ V 1 (cid:17) c∗ ∩ V 1 (cid:16) (cid:17) − f (cid:104) (cid:16) (cid:16) f c∗ ∩ V 1 (cid:16) (cid:19)(cid:32) c(S,y)≥ f (cid:18) (cid:16) (cid:19)(cid:32) (cid:19) + f MOVC(S∗). c(S∗,y)−V 1 V 1 S∗, y, V 2 c∗ ∩ V 1 c(S∗,y) S∗, y, V 2 c∗ ∩ V 1 c(S,y) MOVC(S) ≥ 1 3 1 − 1 e MOVC(S∗) + E S∗, y, V 2 c∗ ∩ V 1 c(S,y) y (cid:17) − f (cid:16) (cid:104) S∗, y, V 2 c∗ ∩ V 1 c(S∗,y) S∗, y, V 2 c∗ ∩ V 1 MOVC(S∗) + E f y S∗, y, V 2 c∗ ∩ V 1 c(S∗,y) (cid:17) (cid:17)(cid:105)(cid:33) c(S,y) (cid:17)(cid:105)(cid:33) (cid:18) (cid:18) = 1 3 ≥ 1 3 1 − 1 e 1 − 1 e We also have a corresponding result for the destructive control case. Here, we can rewrite the change in mar- . MOVDESTRUCTIVE greedily ) + V 1 (cid:16) (cid:2)f (S, y, V 1 c∗ )(cid:3), which we show is a good surrogate for Ey [mD(S, y)]. (cid:1)-approximation to the multicandidate MOVD problem. (cid:0)1 − 1 − maxcjV 1 c∗ ∩ V 2 f (S, y, V 1 (cid:17) cj ci ci e gin as mD(S, y) = f (S, y, V 1 optimizes the submodular function Ey Theorem 6. MOVDESTRUCTIVE obtains a 1 2 c∗ ) + maxci The proof, which is similar to that of Theorem 5, can be found in the appendix. Now, we extend these ideas to obtain similar guarantees for the POVC and POVD objectives. Starting with POVC, recall that our objective is to maximize Pry [mC(S, y) ≥ ∆C], the probability that the change in margin exceeds the number of votes needed to win. We will prove a guarantee for the same algorithm POVCONSTRUCTIVE as from the two-candidate case. Recall that POVCONSTRUCTIVE optimizes the surrogate Ey enumerating over possible values of the threshold β. We have the following bicriteria approximation guarantee: (cid:2)min(cid:0)β, f(cid:0)S, y, V 2 (cid:1)(cid:1)(cid:3), c∗ 9 Theorem 7. Let OP T (∆) denote the optimal value of the problem maxS≤k Pry [mC(S, y) ≥ ∆]. Let S be the set produced by POVCONSTRUCTIVE. We have 3e−1 OP T(cid:0) 1 e−1 α ∆C 1 − α (cid:1) − α POVC(S) ≥ max 0<α<1 (cid:80) y min(cid:0)β, f (S, y, V 2 (cid:80) The proof can be found in the appendix. The main difference from the two candidate case is that we do not directly y min (β, mC(S, y)) since it may no longer be submodular. Instead, we greedily optimize the submodu- optimize 1 m lar surrogate function 1 y min (β, mC(S, y)). m From there, the same argument as in Theorem 3 extends to the multicandidate case. Analogous reasoning also yields a bicriteria guarantee for destructive control: Theorem 8. Let OP T (∆) denote the optimal value of the problem maxS≤k Pry [mD(S, y) ≥ ∆]. Let S be the set produced by POVDESTRUCTIVE. We have c∗ )(cid:1) and show that this surrogate approximates 1 (cid:80) m POVD(S) ≥ max 0<α<1 e−1 3e−1 OP T ( 1 1 − α α ∆) − α 6 Exact solutions via mixed-integer programming Thus far, we have only considered approximation algorithms for election control, motivated by computational hardness results for exact optimization. Now we give mixed-integer linear programming (MILP) formulations to find exact so- lutions. This serves two purposes. First, it allows us to study the effectiveness of election control for problem instances with are within the range of state of the art MILP solvers. Second, we can determine the empirical effectiveness of the approximation algorithms proposed in earlier sections. an objective over all sv ∈ {0, 1}V which satisfy(cid:80) There are two principal difficulties in obtaining MILP formulations. First, the objective is stochastic, ranging over an exponential number of scenarios. Second, even for a single fixed scenario, the number of nodes reached by a seed set is a nonlinear function. We first show how to linearize the problem when have only a single scenario y. Recall that y corresponds to a sampled graph Gy, where every edge e is removed independently with probability 1 − pe. Our MILP will have a binary variable sv ∈ {0, 1} for each node v ∈ V , where sv = 1 indicates that v is a seed node. We will maximize v∈V sv ≤ k (at most k nodes are seeded). The challenge is to v, v ∈ V be a binary variable indicating whether embed the nonlinear objective into the constraints of the MILP. Let xy v to be 1 only if v truly is reachable in Gy from some node with v is influenced in scenario y. We must constrain xy sv = 1. To accomplish this, let R(v, y) be the set of nodes which have a directed path to v in scenario y. R(v, y) does not depend on the decision variables s and can easily precomputed. Using this set, we constrain the x variables as: v ≤ (cid:88) xy u∈R(v,y) su ∀v ∈ V. Now we deal with stochasticity in the objective using sample average approximation. We first sample a set of v for each sampled scenario. Finally, we average over the scenarios Gyi, i = 1...r, maintaining a separate copy xyi variables in each scenario to obtain the final objective. 6.1 Formulations Using these components, we now give concrete formulations for each of the problem instances that we consider. We will assume that scenarios y1...yr have been sampled, where r is a tunable parameter trading off computational cost and sampling error. 10 6.1.1 Constructive control We create a variable gC(yi, cj) for each scenario yi and candidate cj which represents the change in the margin between cj and c∗ in scenario yi. Using these variables, we set a variable mC(yi) for each scenario yi which represents the overall change in margin. These variables are set using the constraints gC(yi, cj) ≤ (cid:88) (cid:88) xyi v + v∈V 2 c∗ xyi v v∈V 2 c∗∩V 1 −V 1 cj cj V 1 ci ∀i, j mC(yi) ≤ gC(yi, cj) + max ci Using these variables, we have the following MILP to maximize the MOV: r(cid:88) i=1 mC(yi) max s,x,gC ,mC 1 r sv ≤ k (cid:88) v∈V The next formulation maximizes the POV: r(cid:88) 1 r max s,x,gC ,mC ,u ui − M (1 − ui) + max i=1 V 1 ui ∈ {0, 1} ci ci sv ≤ k, (cid:88) v∈V −V 1 c∗+1 − mC(yi) ≤ 0 i = 1...r Here, ui is a binary variable representing whether c∗ wins the election in scenario yi, while M is a large number. 6.1.2 Destructive control Now, we use an analogous set of constraints to set variables gD(yi, cj) and mD(yi): gD(yi, cj) ≤ (cid:88) (cid:88) − M (1 − zj i ≥ 1 ∀i, zj xyi v + (cid:88) (cid:18) i ∈ {0, 1} ∀i, j zj v∈V 1 v∈V 1 c∗ i ) + mD(yi) − xyi v cj c∗∩V 2 gD(yi, cj) + V 1 cj (cid:19) ≤ 0 ∀i, j − max V 1 ck k j The second and third constraints use a new set of binary variables zj mD(yi) is at most the change in margin between cj and c∗. The constraint(cid:80) i = 1 indicates that in scenario yi, i ≥ 1 requires that mD(yi) must be bounded by one such value, and so can be at most the maximum margin. With these variables in place, the MOV and POV MILPs are analogous to those for constructive control. i , where zj j zj 7 Experiments We now present experimental results comparing the performance of our approximation algorithms to the solutions found via mixed integer programming. We show results on four datasets. First, netscience, a collaboration network of researchers in network science, with 1461 nodes [36]. Second, facebook, the subgraph centered on 10 Facebook 11 Table 1: Percent of MILP value obtained by approximation algorithm. netscience facebook polblogs irvine k = 25 50 100 25 50 100 25 50 100 25 50 100 Constructive C= 2 C= 5 C= 10 Destructive C= 2 C= 5 C= 10 99.5 82.8 80.9 99.9 73.8 75.9 99.3 90.1 89.1 99.6 73.2 87.2 100. 91.5 98.3 99.9 83.3 97.2 100 90.8 80.9 100 87.7 81.8 100 90.9 83.7 100 79.7 85.0 100 90.9 88.6 100 81.6 89.0 100 97.4 98.7 100 100 98.9 100 97.8 99.2 100 97.8 99.3 99.4 99.5 99.6 99.4 99.3 99.6 100 97.7 96.9 100 100 100 100 95.4 97.4 99.8 99.0 97.3 99.4 96.8 98.9 98.8 100 99.0 Figure 1: Probability of victory. Top: constructive. Bottom: destructive. Left: netscience. Right: polblogs. users, with 2888 nodes [35]. Third, polblogs, a network of links between political blogs, with 1224 nodes [36]. Fourth, irvine, a graph representing instant messages exchanged between students at U.C. Irvine, with 1889 nodes [35]. We select these datasets because they represent the kinds of social and communication networks on which political messages (such as fake news) spread. We also note that our approximation algorithms can easily be scaled to much larger networks since we can apply the same techniques developed in the influence maximization literature [41, 13]. However, our focus here is to characterize the performance of our algorithms in comparison to the optimal solution, so we select datasets which are feasible for mixed integer programming. For each network, we randomly generated 30 sets of voter preferences. We start out with the MOV objective. Table 1 shows the percentage of the MILP's value which is obtained by our approximation algorithms (MOVCONSTRUCTIVE and MOVDESTRUCTIVE respectively), averaging over the 30 instances on each network with propagation probability p = 0.1. We vary the number of seed nodes k and the number of candidates C. We see that the approximation algorithms perform well across all settings, obtaining expected change in margin at least 73% of that of the MILP. The approximation algorithms fare particularly well for 2-candidate elections, obtaining nearly 100% of the optimal value on all networks. The empirical approximation ratio degrades as the number of candidates grows, particularly when the budget k is small. We conclude that our approximation algorithms are highly effective for election control via the MOV in both constructive and destructive control, particularly in realistic settings with a moderate number of candidates. 12 406080100C0.00.20.40.60.81.0POVApprox.MILP406080100C0.00.20.40.60.81.0POVApprox.MILP6080100120D0.00.20.40.60.81.0POVApprox.MILP406080100120D0.00.20.40.60.81.0POVApprox.MILP We now turn to the POV objectives. We show results for k = 50,C= 5, comparing our bicriteria approxima- tion algorithms POVCONSTRUCTIVE and POVDESTRUCTIVE to the corresponding MILP formulations. To keep the experiments timely, we ran each approximation algorithm for 150 random values of the threshold β instead of enu- merating over all (empirically, this resulted in very similar solution quality). Figure 1 shows the results on netscience and polblogs for constructive and destructive control. Results for facebook and irvine can be found in the appendix. The x axis shows the starting margin (∆C or ∆D) in each randomly generated instance while the y axis shows the probability of victory obtained. The instances fall into three groups. First, when the margin is small, both the approx- imation algorithms and the MILP have a high POV. Second, when the margin is large, both have a small POV. Third are intermediate points where the approximation algorithm and MILP strongly diverge. Averaged over all random instances, the approximation algorithm obtains 40-60% of the MILP's value (depending on the network). However, there are instances among the intermediate cases where, e.g., the approximation algorithm obtains a POV of 0.1%, but the MILP finds a solution with POV 99%. We conclude that election control for the POV objective can be very computationally difficult in narrowly winnable elections. This dovetails with our theoretical results, which show that the problem is inapproximable in general, but bicriteria guarantees are possible when the election is winnable by a large margin. 8 Conclusion Fake news and other targeted misinformation are an increasingly prevalent way of interfering with democratic elec- tions. We introduce and study the problem of election control through social influence, providing algorithms and hardness results for maximizing both the margin and probability of victory for an attacker in both constructive and destructive control. Our results indicate that social influence is a salient threat to election integrity, particularly in the MOV case where we provide high-quality approximation algorithms. Maximizing the probability of victory is manageable in easier instances, but difficult both theoretically and empirically in narrow races. References [1] John S Ahlquist, Kenneth R Mayer, and Simon Jackman. Alien abduction and voter impersonation in the 2012 us general election: Evidence from a survey list experiment. Election Law Journal, 13(4):460–475, 2014. [2] Hunt Allcott, Matthew Gentzkow, et al. Social media and fake news in the 2016 election. Journal of Economic Perspectives, 31(2):211–236, 2017. [3] John J Bartholdi, Craig A Tovey, and Michael A Trick. How hard is it to control an election? Mathematical and Computer Modelling, 16(8-9):27–40, 1992. [4] Dorothea Baumeister, G´abor Erd´elyi, Olivia J Erd´elyi, and Jorg Rothe. Complexity of manipulation and bribery in judgment aggregation for uniform premise-based quota rules. Mathematical Social Sciences, 76:19–30, 2015. [5] Ted Brader. Striking a responsive chord: How political ads motivate and persuade voters by appealing to emotions. American Journal of Political Science, 49(2):388–405, 2005. [6] Alexandra Carpentier and Michal Valko. Revealing graph bandits for maximizing local influence. In Artificial Intelli- gence and Statistics, pages 10–18, 2016. [7] Jiehua Chen, Piotr Faliszewski, Rolf Niedermeier, and Nimrod Talmon. Elections with few voters: Candidate control can be easy. In AAAI, volume 15, pages 2045–2051, 2015. [8] Wei Chen, Tian Lin, Zihan Tan, Mingfei Zhao, and Xuren Zhou. Robust influence maximization. arXiv preprint arXiv:1601.06551, 2016. [9] Wei Chen, Chi Wang, and Yajun Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1029–1038. ACM, 2010. [10] Wei Chen, Yajun Wang, and Yang Yuan. Combinatorial multi-armed bandit: General framework and applications. In International Conference on Machine Learning, pages 151–159, 2013. [11] Feng Chi and Nathan Yang. Twitter adoption in congress. Review of Network Economics, 10(1), 2011. 13 [12] Ray Christensen and Thomas J Schultz. Identifying election fraud using orphan and low propensity voters. American Politics Research, 42(2):311–337, 2014. [13] Edith Cohen, Daniel Delling, Thomas Pajor, and Renato F Werneck. Sketch-based influence maximization and com- putation: Scaling up with guarantees. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, pages 629–638. ACM, 2014. [14] Vincent Conitzer, Tuomas Sandholm, and J´erome Lang. When are elections with few candidates hard to manipulate? Journal of the ACM (JACM), 54(3):14, 2007. [15] Stefano DellaVigna and Ethan Kaplan. The fox news effect: Media bias and voting. The Quarterly Journal of Eco- nomics, 122(3):1187–1234, 2007. [16] Nan Du, Le Song, Manuel Gomez Rodriguez, and Hongyuan Zha. Scalable influence estimation in continuous-time diffusion networks. In Advances in neural information processing systems, pages 3147–3155, 2013. [17] G´abor Erd´elyi, Edith Hemaspaandra, and Lane A Hemaspaandra. More natural models of electoral control by partition. In International Conference on Algorithmic DecisionTheory, pages 396–413. Springer, 2015. [18] G´abor Erd´elyi, Markus Nowak, and Jorg Rothe. Sincere-strategy preference-based approval voting fully resists con- structive control and broadly resists destructive control. Mathematical Logic Quarterly, 55(4):425–443, 2009. [19] G´abor Erd´elyi, Christian Reger, and Yongjie Yang. The complexity of bribery and control in group identification. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pages 1142–1150. International Foundation for Autonomous Agents and Multiagent Systems, 2017. [20] Piotr Faliszewski, Edith Hemaspaandra, and Lane A Hemaspaandra. How hard is bribery in elections? Journal of Artificial Intelligence Research, 35:485–532, 2009. [21] Piotr Faliszewski, Edith Hemaspaandra, and Lane A Hemaspaandra. Multimode control attacks on elections. Journal of Artificial Intelligence Research, 40(1):305–351, 2011. [22] Piotr Faliszewski, Edith Hemaspaandra, Lane A Hemaspaandra, and Jorg Rothe. Llull and copeland voting computa- tionally resist bribery and constructive control. Journal of Artificial Intelligence Research, 35:275–341, 2009. [23] Alan S Gerber, Dean Karlan, and Daniel Bergan. Does the media matter? a field experiment measuring the effect of newspapers on voting behavior and political opinions. American Economic Journal: Applied Economics, 1(2):35–52, 2009. [24] Amit Goyal, Wei Lu, and Laks VS Lakshmanan. Celf++: optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th international conference companion on World wide web, pages 47–48. ACM, 2011. [25] Xinran He and David Kempe. Robust influence maximization. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, August 13-17, 2016, pages 885–894, 2016. [26] Edith Hemaspaandra, Lane A Hemaspaandra, and Jorg Rothe. Anyone but him: The complexity of precluding an alternative. Artificial Intelligence, 171(5-6):255–285, 2007. [27] Jesse Holcomb, Jeffrey Gottfried, and Amy Mitchell. News use across social media platforms. Pew Research Journal- ism Project, 2013. [28] David Kempe, Jon Kleinberg, and ´Eva Tardos. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 137–146. ACM, 2003. [29] Andreas Krause, H Brendan McMahan, Carlos Guestrin, and Anupam Gupta. Robust submodular observation selec- tion. Journal of Machine Learning Research, 9(Dec):2761–2801, 2008. [30] Siyu Lei, Silviu Maniu, Luyi Mo, Reynold Cheng, and Pierre Senellart. Online influence maximization. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 645–654. ACM, 2015. [31] Hong Liu, Haodi Feng, Daming Zhu, and Junfeng Luan. Parameterized computational complexity of control problems in voting systems. Theoretical Computer Science, 410(27-29):2746–2753, 2009. 14 [32] Andrea Loreggia, Nina Narodytska, Francesca Rossi, K Brent Venable, and Toby Walsh. Controlling elections by replacing candidates or votes. In Proceedings of the 2015 International Conference on Autonomous Agents and Multi- agent Systems, pages 1737–1738. International Foundation for Autonomous Agents and Multiagent Systems, 2015. [33] Meghna Lowalekar, Pradeep Varakantham, and Akshat Kumar. Robust influence maximization. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, pages 1395–1396. International Foundation for Autonomous Agents and Multiagent Systems, 2016. [34] Reshef Meir, Ariel D Procaccia, Jeffrey S Rosenschein, and Aviv Zohar. Complexity of strategic behavior in multi- winner elections. J. Artif. Intell. Res.(JAIR), 33:149–178, 2008. [35] KONECT network dataset collection. http://konect.uni-koblenz.de/networks/ego-facebook, 2017. [36] Mark Newman. Network data. http://www-personal.umich.edu/mejn/netdata/, 2017. [37] Svetlana Obraztsova and Edith Elkind. Optimal manipulation of voting rules. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, pages 619–626. International Foundation for Autonomous Agents and Multiagent Systems, 2012. [38] Svetlana Obraztsova, Yair Zick, and Edith Elkind. On manipulation in multi-winner elections based on scoring rules. In Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, pages 359–366. International Foundation for Autonomous Agents and Multiagent Systems, 2013. [39] Gordon Pennycook, Tyrone D Cannon, and David G Rand. Prior exposure increases perceived accuracy of fake news. 2017. [40] Manuel Gomez Rodriguez and Bernhard Scholkopf. Influence maximization in continuous time diffusion networks. arXiv preprint arXiv:1205.1682, 2012. [41] Youze Tang, Xiaokui Xiao, and Yanchen Shi. Influence maximization: Near-optimal time complexity meets practical efficiency. In Proceedings of the 2014 ACM SIGMOD international conference on Management of data, pages 75–86. ACM, 2014. [42] Sunil Wattal, David Schuff, Munir Mandviwalla, and Christine B Williams. Web 2.0 and politics: the 2008 us presi- dential election and an e-politics research agenda. MIS quarterly, pages 669–688, 2010. [43] Bryan Wilder, Amulya Yadav, Nicole Immorlica, Eric Rice, and Milind Tambe. Uncharted but not uninfluenced: Influence maximization with an uncertain network. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pages 1305–1313. International Foundation for Autonomous Agents and Multiagent Systems, 2017. [44] Yongjie Yang, Yash Raj Shrestha, and Jiong Guo. How hard is bribery with distance restrictions? In ECAI, pages 363–371, 2016. A Proofs We now provide proofs that were deferred from the main text. We start out with with the full proofs for the MOVC and MOVD objectives: Theorem 5: MOVCONSTRUCTIVE obtains a 1 3 candidates. Proof. Let c(S, y) = arg minci f (V 2 mC. Let S∗ be an optimal seed set. Note that for all scenarios y, seed sets S, and candidates ci, f (S, y, V 2 f (S, y, V 2 (cid:1)-approximation to the MOVC problem with any number of be the candidate achieving the minimum in the definition of c∗ ) ≥ (cid:0)1 − 1 ). Hence, we have c∗ ∩ V 1 ci ) − V 1 ci e c∗ ∩ V 1 ci (cid:104) f(cid:0)S∗, y, V 2 c∗ (cid:1)(cid:105) ≥ 1 (cid:104) f(cid:0)S∗, y, V 1 c∗ E y (cid:16) (cid:1) + f (cid:17)(cid:105) E y (cid:16) 3 + f S∗, y, V 1 c∗ ∩ V 1 c(S,y) (cid:17) S∗, y, V 1 c∗ ∩ V 1 c(S∗,y) 15 c∗ )] is a monotone submodular function, which MOVCONSTRUCTIVE greedily maximizes. (cid:16) (cid:1) + f S∗, y, V 2 c∗ ∩ V 1 c(S∗,y) (cid:17) c∗ Let S be the resulting seed set. We have Note that Ey[f (·, y, V 2 (cid:104) f(cid:0)S, y, V 2 c∗ (cid:1) + f (cid:16) E y and so MOVC(S) = E S, y, V 2 c∗ ∩ V 1 c(S,y) S, y, V 2 y ci ci f cj c∗ + f c(S,y) c(S,y) + max ≥ 1 3 V 1 V 1 1 − 1 e S∗, y, V 2 (cid:1)(cid:105) (cid:104) (cid:17)(cid:105) ≥ E f(cid:0)S, y, V 2 (cid:18) (cid:19) (cid:104) f(cid:0)S∗, y, V 2 (cid:16) (cid:17)(cid:105) E y c∗ ∩ V 1 (cid:17) (cid:17)(cid:105) c∗ ∩ V 1 S, y, V 2 (cid:16) c∗ ∩ V 1 (cid:1) + f (cid:17)(cid:105) (cid:16) (cid:1) + f (cid:17) (cid:16) (cid:1) + f (cid:1) + min (cid:16) (cid:104) + max c∗ ∩ V 1 S∗, y, V 2 V 1 − E c∗ ∩ V 1 S∗, y, V 2 V 1 −V 1 c∗ ∩ V 1 c(S,y)+V 1 f (S∗, y, V 2 −V 1 V 1 S∗, y, V 2 −V 1 c(S,y)) + max c(S∗,y) c(S∗,y) + max + max + max V 1 (cid:16) c(S,y) c(S,y) c∗ c∗ cj ci ci ci ci ci ci ci ci y ci ci cj −V 1 − E (cid:105) (cid:104)V 1 c(S,y)(cid:105) (cid:17) (cid:104)V 1 c(S,y)(cid:105) (cid:17) c(S,y)(cid:105) (cid:17) y c(S∗,y)(cid:105) (cid:17) c(S∗,y)(cid:105) c(S∗,y) c(S∗,y)−V 1 c∗ ∩ V 1 ) − V 1 c(S,y)+V 1 (cid:17) cj cj + V 1 c(S,y) cj c∗ c∗ c∗ E y + f 1 − 1 e 1 − 1 e c∗ ∩ V 1 S∗, y, V 2 (cid:16) (cid:104) (cid:1) + min f(cid:0)S, y, V 2 (cid:16) (cid:104) (cid:1) + f f(cid:0)S, y, V 2 (cid:18) (cid:19) (cid:104) f(cid:0)S∗, y, V 1 (cid:16) (cid:19) (cid:18) (cid:104) f(cid:0)S∗, y, V 1 (cid:16) (cid:19) (cid:18) (cid:104) c∗ ∩ V 1 f(cid:0)S∗, y, V 1 (cid:16) (cid:17) E y (cid:18) (cid:19) (cid:104) c∗ ∩ V 1 f(cid:0)S∗, y, V 1 E y (cid:19)(cid:32) (cid:18) 1 − 1 e + f (S∗, y, V 2 1 − 1 e S∗, y, V 1 S∗, y, V 1 c∗ ∩ V 1 c(S,y) + f E y c∗ 1 − 1 e MOVC(S∗) + E f S∗, y, V 2 y y = E y ≥ 1 3 ≥ 1 3 = 1 3 + f = = 1 3 1 3 Now by definition of c(S∗, y), f (S∗, y, V 2 c(S∗,y)) − V 1 c(S∗,y)≤ f (S∗, y, V 2 c(S,y) and so V 1 c(S∗,y)−V 1 S∗, y, V 2 c∗ ∩ V 1 c(S∗,y) S∗, y, V 2 This yields c(S,y)(cid:105)(cid:33) . c(S∗,y)−V 1 c(S,y)) − V 1 c∗ ∩ V 1 (cid:17) c(S,y) c∗ ∩ V 1 (cid:17) + (cid:17)(cid:105)(cid:33) (cid:17)(cid:105)(cid:33) c∗ ∩ V 1 (cid:16) (cid:17) − f (cid:104) (cid:16) (cid:17) − f (cid:16) (cid:104) (cid:16) f y y MOVC(S) ≥ 1 3 MOVC(S∗) + E S∗, y, V 2 c∗ ∩ V 1 c(S,y) S∗, y, V 2 c∗ ∩ V 1 c(S∗,y) f S∗, y, V 2 c∗ ∩ V 1 c(S,y) MOVC(S∗) + E f S∗, y, V 2 c∗ ∩ V 1 c(S∗,y) c∗ ∩ V 1 (cid:16) (cid:19)(cid:32) c(S,y)≥ f (cid:18) 1 − 1 e (cid:16) (cid:19)(cid:32) (cid:19) (cid:18) (cid:18) = 1 3 ≥ 1 3 1 − 1 e 1 − 1 e MOVC(S∗). 16 (cid:0)1 − 1 e (cid:1)-approximation to the multicandidate MOVD problem. be the candidate achieving the maximum in the definition y 2 c∗ c∗ ci ci c∗ c∗ ≥ E y E y (cid:104) (cid:18) S, y, V 1 (cid:1) + f (cid:1)(cid:105) (cid:17) ) + V 1 MOVD(S) = E Proof. Now let c(S, y) = arg maxci f (V 1 of mD. Let S∗ be an optimal seed set. Similarly to before, we have MOVDESTRUCTIVE greedily maximizes Ey Theorem 6: MOVDESTRUCTIVE obtains a 1 2 c∗ ∩ V 2 (cid:1)(cid:105) ≥ 1 (cid:104) f(cid:0)S∗, y, V 1 f(cid:0)S∗, y, V 1 (cid:104) f(cid:0)S∗, y, V 1 (cid:104) (cid:16) f(cid:0)S, y, V 1 (cid:1) + f (cid:19) (cid:16) (cid:104) (cid:1)(cid:105) (cid:104) c∗ ∩ V 2 f(cid:0)S∗, y, V 1 (cid:19) (cid:18) (cid:16) (cid:104) + E (cid:1) + f f(cid:0)S∗, y, V 1 (cid:17) (cid:104) (cid:16) (cid:19) (cid:18) (cid:16) (cid:104) (cid:1) + f f(cid:0)S∗, y, V 1 (cid:16) (cid:17) (cid:19) (cid:18) (cid:104) (cid:16) (cid:1) + f f(cid:0)S∗, y, V 1 (cid:16) (cid:17) (cid:19)(cid:104) (cid:18) (cid:16) (cid:104) 1 − 1 e + E c∗ ∩ V 2 S, y, V 1 c∗ ∩ V 2 MOVD(S∗) + E c∗ ∩ V 2 1 − 1 e 1 − 1 e 1 − 1 e ≥ 1 2 ≥ 1 2 ≥ 1 2 S, y, V 1 S, y, V 1 S, y, V 1 y E y c(S,y) c(S,y) c(S,y) c(S,y) + f + f E y E y E y c∗ c∗ c∗ c∗ S∗, y, V 1 + V 1 S∗, y, V 1 + V 1 S∗, y, V 1 + V 1 f ≥ 1 2 1 − 1 e f y f S, y, V 1 y Now using the definition of c(S, y), we have that f (S, y, V 1 V 1 c(S∗,y). This yields (cid:16) S∗, y, V 1 c∗ ∩ V 2 c(S∗,y) (cid:17)(cid:105) . . Call the resulting seed set S. We have (cid:105) (cid:105) + V 1 c(S,y)− max V 1 ci ci V 1 ci ci ci ci c(S,y) (cid:105) V 1 + V 1 (cid:17) c(S,y)− max c∗ ∩ V 2 (cid:17)(cid:105) c∗ ∩ V 2 c(S∗,y) (cid:17) c(S,y)− max (cid:105) c∗ ∩ V 2 (cid:17) c(S,y)− max c∗ ∩ V 2 c(S,y)+V 1 c∗ ∩ V 2 c(S∗,y) V 1 c(S∗,y) (cid:17) c(S∗,y)−V 1 + V 1 c(S,y)) + V 1 (cid:16) c(S,y) ci ci c∗ ∩ V 2 (cid:17) − f (cid:16) (cid:104) (cid:17) (cid:17)(cid:105)(cid:105) (cid:105) c(S∗,y)(cid:105)(cid:105) V 1 ci . c(S∗,y)− max c(S,y)−V 1 ci c(S,y)≥ f (S, y, V 1 c∗ ∩ V 2 c(S∗,y)) + V 1 c(S,y)−V 1 S, y, V 1 c∗ ∩ V 2 c(S∗,y) S, y, V 1 c∗ ∩ V 2 c(S,y) and so we have MOVD(S) ≥ 1 2 ≥ 1 2 MOVD(S∗) + E y f S, y, V 1 c∗ ∩ V 2 c(S∗,y) MOVD(S∗) (cid:16) (cid:19)(cid:104) (cid:19) c(S∗,y)≥ f (cid:18) (cid:18) 1 − 1 e 1 − 1 e We now prove corresponding bicriteria guarantees for the POV objectives. Theorem 7: Let OP T (∆) denote the optimal value of the problem maxS≤k Pry [mC(S, y) ≥ ∆]. Let S be the set produced by POVCONSTRUCTIVE. We have 3e−1 OP T(cid:0) 1 e−1 α ∆C 1 − α (cid:1) − α POVC(S) ≥ max 0<α<1 17 (cid:80) y min(cid:0)β, f (S, y, V 2 (cid:80) (cid:80) Proof. The main difference from the two candidate case is that 1 y min (β, mC(S, y)) is no longer submodular m since mC need not be a submodular function. However, the proof of Theorem 4.3 only uses submodularity in establish- ing an approximation guarantee for greedy optimization of the surrogate. In the multicandidate case, we will greedily optimize 1 m y min (β, mC(S∗, y)) optimizes 1 m for some constant factor γ, then the same argument as in Theorem 4.3 extends to the multicandidate case. Fix any particular value of β. We establish a constant factor approximation as follows: c∗ )(cid:1), which is submodular. Let Sβ be the resulting seed set and S∗ be a set that (cid:80) y min (β, mC(Sβ, y)) ≥ γ 1 y min (β, mC(S, y)). If we can prove that 1 (cid:80) m m (cid:88) y 1 m min (β, mC(S∗, y)) = 1 m ≤ 1 m (cid:88) (cid:88) y y Via the definition of c(S∗, y), we have that V 1 This yields (cid:88) y 1 m (cid:17) (cid:17)−f C(S∗,y)(cid:17) (cid:17) c(S∗,y) . + V 1 c(Sβ ,y)−V 1 c∗ ∩ V 1 S∗, y, V 2 (cid:17)(cid:17) c(Sβ ,y) min (β, mC(Sβ, y) + mC(S∗, y) − mC(Sβ, y)) (cid:16) β, mC(Sβ, y) + f(cid:0)S∗, y, V 2 (cid:17) − f (cid:16) (cid:16) c∗ min + f (cid:1) (cid:1) − f(cid:0)Sβ, y, V 2 (cid:16) c∗ c∗ c(Sβ ,y) c(Sβ ,y) (cid:16) Sβ, y, V 2 c∗ ∩ V 1 S∗, y, V 2 S∗, y, V 2 c(S∗,y) c(S∗,y)≤ f c∗ ∩ V 1 c∗ ∩ V 1 (cid:16) c∗ ∩ V 1 S∗, y, V 2 c(Sβ ,y)−V 1 (cid:16) (cid:16) (cid:16) (cid:16) (cid:16) (cid:19) 1 (cid:1) + f β, mC(Sβ, y) + f(cid:0)S∗, y, V 2 (cid:1)(cid:17) β, mC(Sβ, y) + 2f(cid:0)S∗, y, V 2 (cid:16) (cid:88) β, f(cid:0)S∗, y, V 2 (cid:16) (cid:88) (cid:16) (cid:88) (cid:17) y 2e e − 1 2e e − 1 (cid:17) (cid:17) (cid:17) (cid:16) c∗ (cid:1)(cid:17) β, f(cid:0)Sβ, y, V 2 (cid:17) β, mC(Sβ, y) β, mC(Sβ, y) β, mC(Sβ, y) β, mC(Sβ, y) (cid:88) 1 m 2 m 1 m min min min y y + + + c∗ c∗ min min min min min min β, mC(Sβ, y) y (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) y y y y (cid:1)(cid:17) ≤ 1 + 2e e − 1 m y min (β, mC(S∗, y)) ≤ 1 m ≤ 1 m ≤ 1 m ≤ 1 m ≤ 1 m (cid:18) and now the conclusion follows by applying the same argument as in Theorem 3. Theorem 8: Let OP T (∆) denote the optimal value of the problem maxS≤k Pry [mD(S, y) ≥ ∆]. Let S be the set produced by POVDESTRUCTIVE. We have POVD(S) ≥ max 0<α<1 e−1 3e−1 OP T ( 1 1 − α α ∆) − α Proof. Applying the reasoning as in Theorem 7, we have (cid:88) y 1 m min (∆, mD(S∗, y)) = (cid:88) (cid:88) y y 1 m ≤ 1 m (cid:16) min (∆, mC(S, y) + mD(S∗, y) − mD(S, y)) ∆, mD(S, y) + f(cid:0)S∗, y, V 1 c∗ (cid:1) − f(cid:0)S, y, V 1 c∗ (cid:16) min (cid:17) − f (cid:16) (cid:17) − f c∗ ∩ V 2 (cid:16) S, y, V 1 c∗ ∩ V 2 (cid:16) S, y, V 1 c∗ ∩ V 2 c(S,y) c∗ ∩ V 2 c(S∗,y) (cid:17) + V 1 (cid:1) C(S∗,y)−V 1 (cid:17) C(S,y)(cid:17) . + f S∗, y, V 1 c(S∗,y) S, y, V 1 c(S,y) The definition of c(S, y) implies that V 1 c(S∗,y)−V 1 c(S,y) ≤ f 18 so we have 1 m (cid:88) y min (∆, mD(S∗, y)) ≤ 1 m ≤ 1 m (cid:16) (cid:16) min min (cid:88) (cid:88) y y (cid:1) + f ∆, mD(S, y) + f(cid:0)S∗, y, V 1 (cid:1)(cid:17) ∆, mD(S, y) + 2f(cid:0)S∗, y, V 1 c∗ c∗ (cid:16) (cid:17)(cid:17) S∗, y, V 1 c∗ ∩ V 2 c(S∗,y) and now the theorem follows from the same argument as in Theorem 7. B Additional experimental results Figure 2: Probability of victory in constructive control. Left: irvine. Right: facebook Figure 3: Probability of victory in destructive control. Left: irvine. Right: facebook. On irvine, the MILP was termi- nated after 24 hours, and had not found competitive solutions with the approximation algorithm on the intermediate margin instances by that time. 19 6080100120C0.00.20.40.60.81.0POVApprox.MILP255075100125C0.00.20.40.60.81.0Prob. successApprox.MILP75100125150175200D0.00.20.40.60.81.0POVApprox.MILP20406080100120D0.00.20.40.60.81.0Prob. successApprox.MILP
1209.0308
1
1209
2012-09-03T11:20:57
Optimizing Supply Chain Management using Gravitational Search Algorithm and Multi Agent System
[ "cs.MA", "cs.AI" ]
Supply chain management is a very dynamic operation research problem where one has to quickly adapt according to the changes perceived in environment in order to maximize the benefit or minimize the loss. Therefore we require a system which changes as per the changing requirements. Multi agent system technology in recent times has emerged as a possible way of efficient solution implementation for many such complex problems. Our research here focuses on building a Multi Agent System (MAS), which implements a modified version of Gravitational Search swarm intelligence Algorithm (GSA) to find out an optimal strategy in managing the demand supply chain. We target the grains distribution system among various centers of Food Corporation of India (FCI) as application domain. We assume centers with larger stocks as objects of greater mass and vice versa. Applying Newtonian law of gravity as suggested in GSA, larger objects attract objects of smaller mass towards itself, creating a virtual grain supply source. As heavier object sheds its mass by supplying some to the one in demand, it loses its gravitational pull and thus keeps the whole system of supply chain per-fectly in balance. The multi agent system helps in continuous updation of the whole system with the help of autonomous agents which react to the change in environment and act accordingly. This model also reduces the communication bottleneck to greater extents.
cs.MA
cs
Optimizing Supply Chain Management using Gravitational Search Algorithm and Multi Agent System Muneendra Ojha Department of Information Technology, Indian Institute of Information Technology Deoghat, Jhalwa, Allahabad 211012, UP, India [email protected] Abstract Supply chain management is a very dynamic operation research prob- lem where one has to quickly adapt according to the changes perceived in env i- ronment in order to maximize the benefit or minimize the loss. Therefore we re- quire a system which changes as per the changing requirements. Multi agent system technology in recent times has emerged as a possible way of efficient solu- tion implementation for many such complex problems. Our research here focuses on building a Multi Agent System (MAS), which implements a modified version of Gravitational Search swarm intelligence Algorithm (GSA) to find out an opt i- mal strategy in managing the demand supply chain. We target the grains distribu- tion system among various centers of Food Corporation of India (FCI) as applica- tion domain. We assume centers with larger stocks as objects of greater mass and vice versa. Applying Newtonian law of gravity as suggested in GSA, larger ob- jects attract objects of smaller mass towards itself, creating a vir tual grain supply source. As heavier object sheds its mass by supplying some to the one in demand, it loses its gravitational pull and thus keeps the whole system of supply chain pe r- fectly in balance. The multi agent system helps in continuous updation of the whole system with the help of autonomous agents which react to the change in e n- vironment and act accordingly. This model also reduces the communication bot- tleneck to greater extents. Keywords Multi Agent Systems, Supply Chain management, Particle Swarm Optimization, Gravitational Search Algorithm, Food Corporation of India. 1 Introduction Supply chain management can be defined as “a goal-oriented network of pro- cesses and stockpoints used to deliver goods and services to customers” [1]. Sci- ence of supply chains deals with an array of suppliers, plants, warehouses, cus- tomers, transportation networks and information systems that make up actual 2 supply chains. But to study it we must break the overall complexity to a level which is relevant to the task at hand. We must define the application domain and then address the issues which are most important. In the above definition proces s- es represent activities involved in producing and distributing goods or services. On the other hand stockpoints in this definition refers to the locations in supply chain where inventories are held. Finally processes and stockpoints are connected by a network describing various ways in which goods can be supplied through the chain. Supply chain has four levels of decision classification hierarchy - strategic, tactical, operational, and real time level, where strategic level is the most im- portant among these, dealing with the resource assignment, goods movement, lo- cation of facilities to make it cost effective etc [2]. Success rate at other levels de- pend heavily on the decisions taken at this levels. However, the decision making is a difficult process as it involves the resolution of complex resource allocation and scheduling problem involving selection of different available stakeholders. Ac- cording to the findings of Beamon [3], and Amiri [4], finding the best solution for supply chain management is NP-hard problem, so it must be strategically dealt with, on case to case basis developing efficient methodology that can find out the optimal or near-optimal solution in minimum computational time. Over the last decades, research community has shown greater interest in ana- lyzing natural phenomena and mapping their models to find out optimized sol u- tion for high-dimensional search space cases. Scientists have adopted various me- ta-heuristic methods like Genetic Algorithm [5], Simulated Annealing [6], Ant Colony Search Algorithm [7], Particle Swarm Optimization [8] etc. and shown that these algorithms are able to find efficient solution of complex computational problems like pattern recognition [9], image processing [10], filter modeling [11] etc. As like any other heuristic method, these algorithms do not promise to provide the most accurate and best solution for the problems but try to give the most opt i- mized one, again on the case to case basis. So applying a new optimization algo- rithm on an untested domain is always an open problem. In this paper we discuss the results of applying a relatively new swarm optim i- zation algorithm, the Gravitational Search Algorithm (GSA) [12] in supply chain management domain. We have modeled the software application using multi agent system where intelligent agents autonomously take decision according to the changing environment and adapt to the perceived needs. In the following section we describe the relevance of GSA and Multi agent system in finding the solution of supply chain problem. Later we explain the problem s tructure with a mathemat- ical model for the proposed clustering algorithm. Finally we end with implementa- tion details and further scope of the research work. 2 Combining Multi Agent Technology with Swarm Optimization 3 Particle swarm optimization (PSO) is an evolutionary computational technique used for optimization motivated by the social behavior of individuals in large groups in nature [13]. Scientists and technicians have used different approaches to understand how such algorithms works and applied variations to optimize a large number of real life problems. They have been able to solve a variety of engineer- ing problems, but fine tuning the PSO parameters as well as finding general crite- ria applied to all problems remains a major challenge. Thus we focus on a particu- lar problem and try to find the best algorithm which is well suited to its requirements. 2.1 Why GSA is relevant in supply chain management problem? Swarm based algorithms use a collection of agents like ants or honey bees and perform parallel search with multiple starting points. Each member carries out its intended operation with a target to maximize respective utility function, and shares its information with others. These operations are normally very simple, but their collective result produces astonishing results. This phenomenon in which local i n- teraction between agents produce a global result facilitating the system to solve a problem without involving any central authority is known as swarm intelligence [14]. Gravitational Search Algorithm (GSA) is also a particle swarm optimization algorithm which works on the Newtonian laws of Gravity: “Every particle in the universe attracts every other particle with a force that is directly proportional to the product of their masses and inversely proportional to the square of the distance between them” [12]. It has found a good number of interested audiences albeit be- ing relatively new. Just like other swarm intelligence techniques, it also models the laws of nature to find out an optimized solution to a non linear and dynamic problem domain. In the GS algorithm, each entity is considered an object whose performance is measured by the mass it carries. All objects attract each other by gravitational force which causes global movement towards objects of heavier mass. As heavier masses move slower than lighter ones, this creates virtual clu s- ters representing better solutions. For the case of supply chain management, we assume all stakeholders including producer, consumer, supplier, warehouses, stra- tegic partners, vendors, and haulers etc, as objects with some respective masses. We divide these stakeholder in two groups i.e. suppliers and customers. One can be supplier at some point of time and customer at other. Although we do not con- sider the demand part of the SCM process, if we focus on calculating the total cost of moving goods from a supplier to a customer, we can simulate a major part of the whole process of supply chain management. Cost of moving might include purchase price, cost of quality, inventory losses, transportation costs and any other 4 factor which directly or indirectly affects the amount of money the customer has to shed. Thus suppliers act as objects of heavier masses or stars and customers im- itate objects with lower masses, creating planetary systems revolving around stars. 2.2 Multi Agent System representing the complete supply chain A rational agent is defined as an agent, which has clear preferences, models un- certainty via expected values, and always chooses to perform the action that r e- sults in the optimal outcome for itself from among all feasible actions [15]. A co- ordinated group of rational agents form the basis of multi agent system. Multi agent system is based on the assumption that agents coordinate among each other with the vision of achieving a common global goal. Referring the goal to be global is important here as individual agents have only local knowledge and thus local goals. But the agent system as a whole strives for one par ticular target to achieve. So whatever be the individual motives of agents, it should add an extra step to- wards the combined target of system and this is the raison d‟être of these agents [16]. When an event happens each agent cooperates to organize a collaborative group to solve the problem. Agents communicate among the nearest of neighbors thus eliminating number of communications and form virtual clusters. In supp ly chain management (SCM) also, more and more consumers collect towards a prominent supplier thus forming some kind of demand supply cluster, where d e- mands of consumers are fulfilled by nearest of supplier. Thus MAS presents an in- tuitive method of demand supply chain implementation in which each agent repre- sents one or other real life entity participating in the whole process. Many preceding studies have considered multi -agent system as the most suited way to solve complicated problems under the diverse environmental dynamisms [17][18]. A number of researchers have also successfully applied the multi agent technology for manufacturing, supply chain management, planning, scheduling, and control [19]. Their studies mainly focused on making better manufacturing system using an agent technology for automation and efficiency in the process planning and scheduling. Also, there are representative studies that have used MAS in developing intelligent manufacturing supply chain management systems e.g. the AARIA (Autonomous Agents for Rock Island Arsenal) project of Intell i- gent Automation company [20], ABCDE (Agent-Based Concurrent Design Envi- ronment) system developed by KSI (Knowledge Science Institute) of University of Calgary [21], a virtual manufacturing agent made by LIPS institute of the Uni- versity of Texas at Austin [22] and MASCOT (Multi-Agent Supply Chain cOor- dination Tool) agent of Intelligent Coordination and Logistics team of Carnegie - Mellon University [23]. In the SCM problem, GSA with multi agents system is intuitively the most suited method of implementation. Every participating entity either a consumer or supplier is represented by an agent. Every agent carries some mass. All heavier agents are supplier and lighter ones are consumers. As the problem under consid- eration is the distribution among centers of Food Corporation of India (FCI), mass determines the total amount of food grains one center has in its stock. A center can be at the same time supplier for one type of agricultural produce (e.g. wheat) and consumer for some other type of grains (e.g. rice). Thus effective mass and grav i- tational pull is context dependent. 5 3 FCI distribution system and methodology Food Corporation of India (FCI) was established to fulfill the objectives of pr o- curement of agricultural products, its storage, movement, export if asked, disposal in case of excess amount, and quality control. FCI has five zones with each zone having its member state representing region. Food Corporation of India North East South Zone North Zone East Zone West Zone Delhi Punjab Haryana UP Uttarakhand J&K HP Rajasthan Fig. 1. Hierarchical structure of FCI collection and distribution centers. North zone itself has 54 district centers in total involved in the procurement and other food management activities. For example, North zone of FCI has eight regions namely Delhi, Haryana, HP, J&K, Punjab, Rajasthan, UP and Uttarakhand regions as depicted in the Figure 1, which in turn have 54 district centers. Punjab & Haryana Regions are the major surplus states as far as production/procurement o f food grains is concerned. More than 90% stocks of these supplier states are moved to other parts of the country [24]. Apart from FCI the other major agencies involved in storage and warehous- ing of food grains in public sector are Central Warehousing Corporation (CWC) and 17 State Warehousing Corporations (SWCs). For procuring food grains from farmers, FCI creates nodal centers where it purchases at a price fixed by the Gov- ernment. It is then sent to respective region‟s storage centers or warehouses. Every warehouse has a minimum requirement as well as maximum capacity. With the broad requirements clear about FCI and its supporting agencies, we can model the whole distribution system as MAS. An agent in our system repre- sents a district center of FCI. As there are 54 district centers in North Zone, so there will be 54 agents corresponding to them. Each agent thus would have a min- imum requirement, i.e. a minimum amount of particular food grain, which it has to 6 maintain as reserve at any given instance. This reserve is decided on many factors like, Government of India policy on food security, type of food, population of the region, requirements for the region in near future, rate at which food is being con- sumed in public distribution system, state rules etc. Any amount of food above this reserve level is assumed to be surplus which can be sent to other agents in the system if required. Thus we can clearly differentiate between supplier and con- sumer at any point of time using following definition: Supplier: An agent which has food grains in excess of its set reserve amount and any point of time. Consumer: An agent which has food grains below the decided reserve at an in- stance of time. Farmer FCI purchase centers Procurement ensures minimum selling prices to the farmers and al- so effective market intervention to keep prices under check meanwhile adding the food security of the country. Storage centers of FCI, CWC and SWC Private contrac- tors and Storage centers FCI has 30.52 million tonnes (owned & hired) of storage capac i- ty in over 1820 godowns all over India Food grains are redistributed from surplus states to deficit states. FCI moves about 250 Lakh tonnes of food grains over an average distance of 1500 Kms. Stocks procured in the markets and purchase centers is first collected in the nearest depot and from there dispatched to the recipient States within a limited time. Public Distribution System It‟s the responsibility of state gov- ernments to distribute food to the consumers through the network of Fair Price Shops (FPSs) Fig. 2. Broad functionality and objectives of FCI and its supporting agencies like Central Ware- housing Center, State Warehousing Center and Public Distribution Centers. Source: Food Corpo- ration of India [24] As this definition is dependent on time and type of food grain, any agent can be a supplier for one type and consumer for other type of food grains at the same point of time. Two reasons can be visualized for automatic redistribution of food grains between centers: first, when a center needs it because it has receded below its reserve or when a center has accrued more than what it can efficiently manage. Both of these cases prompt their representative agents to autonomously act in case such scenario is perceived in the environment. Though FCI has its structural lim i- tations and boundaries, we assume it to be free from any such regulations. Al t- hough we do suggest a priority queue for suppliers in which higher priority must be given to consumers of the same zone or state rather than a consumer of diffe r- ent zone. Figure 2 gives a broad idea of the levels at which different agencies work and how food grains purchased from farmer reaches household. 7 4 The mathematical model Each participating physical entity in this supply chain system is represented by an agent. There are agents for zonal offices, regional states, district centers, nodal centers, storage warehouses, and purchase centers. Out of these, any agent can be supplier or consumer depending on the resources it owns. A consumer is consum- er till it has requires food grains to achieve a particular target level referred to as set reserved limit. It is decided by an array of parameters namely, type of food grain, near future requirement prediction, number of Public Distribution Centers (PDCs) it caters, geographical area this agent covers, positional importance, and minimum food reserves it has to maintain (decided as a policy matter by gover n- ment, hardcoded but can be changed if needed). In GSA, initially the system is considered a randomly distributed isolated space of masses (agents). Each agent carries some mass and in gravitational system, eve- ry object gets attracted by gravitational pull of another object. In our system we do not assume an agent to move. Rather we assume that whichever supplier exerts greatest force of attraction on consumer will be the first one to attempt in fulfilling its requirements. At a time „t‟ we define force acting on a consumer mass „Mc‟ from a supplier mass „Ms‟ to be ( ) ( ) ( ) ( ) (1) Where,  Fij(t) = Force of attraction by a supplier and consumer at time t.  Mc(t) = Mass of Consumer at time t = Amount it can supply = Reserve limit – Current Stock  Ms(t) = Mass of Supplier at time t = Amount it needs = Reserve limit – Current Stock  Gc(t) = Urgency factor, initially set randomly between 0 to 1. Increas- es with time.  R = Possible cost incurred in supplying food grains per unit to the consumer. 8 An agent can be attracted by another agent by a positive force of attraction. Put- ting a minus sign in equation 1 ensures that no two consumers or suppliers are a t- tracted towards each other. Unlike the traditional gravitational search algorithm proposed by [12] we have made some changes in our algorithm. We consider the attracting force to be one dimensional only. We were thus able to eliminate the possibility in which multip le smaller suppliers could collaborate and exert greater force than a single large sup- plier. In this case combined force could take a consumer to cluster of smaller sup- pliers but do not consider the cost incurred in multiple smaller transportations. We have also set R to be the cost incurred per unit where, (2) As cost increases attraction between supplier and consumer decreases though it never becomes zero as is the case in gravitational forces of nature as well. Gravita- tional constant Gc is initially randomly set as the urgency factor defining how ur- gent is the need of this particular customer. As food is supplied to it and need d e- creases, value of Gc also changes with time. Thus it is a function of initial value G0 and time t: ( ) ( ) (3) Masses of individual agents are also dependent on time t. As supply starts, the total available stock of both consumer and supplier change. This changes the r e- spective masses and thus mutual force of attraction is also decreased. If there are N agents, position of an agent is defined in 2-dimensional space as: ) ( (4) When agents attract each other they tend to move towards each other in the vi r- tual space. This movement is not reflected in the real scenario nor has any physi- cal significance. Maximum closeness between two agents during clustering phase is restricted to sum of their radii. 5 Implementation and result discussion Application simulation is divided in two phases. First one is the clustering phase when we form virtual clusters of supplier consumer agents depicting some kind of planetary system in which supplier is the star and consumer are the planets revolving around it. As the clustering phase starts, agents get attracted towards those of greater mass and their respective Euclidean distance decreases. When clustering ends each supplier is attached with many consumers as shown in Figure 3. If the supplier has enough capability to fulfill demands of more than one co n- 9 sumer it must decide which consumer to cater first. Thus every supplier creates a priority queue on the basis of first hierarchical boundaries of FCI and then in the decreasing order of consumers‟ urgency factor. Hierarchical boundaries are im- portant here as we assume an agent will cater to the needs of its state prior to send- ing grains to neighboring state. Providing autonomy to the agent system, we a s- sume that if a consumer finds a supplier „A‟ in neighboring state providing cheaper food than agent „B‟ in the same state it will approach „A‟ r ather than „B‟ as long as both states are in same zone of FCI. A A B B Fig. 3. Initially all agents are scattered in the search space and are attracted by more than one supplier. But they move closer to the one which has greater force of attraction forming virtual clusters. Actual supply of goods can only be realized physically and once it is approved and done, agents‟ information must be updated manually. As the system itself no- tifies, how much food is to be provided by a supplier to the consumer; it can a u- tomatically update its inventory after approval . Once the inventory is updated, ef- fective mass of both supplier and consumer changes. Agents that were customer for some time but their needs have been satiated will move out of the SCM pro- cess and similarly an agent that was a supplier for some time but its excess mass is already shed, will also exit the system. This behavior is perfectly represented by multi agent system as MAS gives autonomy and intelligence to its agents to pa r- ticipate in the process as long as required or leave the environment whenever deemed necessary. There is no need of a centralized command to dictate the centers which must be catered. Agents automatically form collaborative supplier-consumer clusters and cater to the needs of each other thus removing the bottleneck of central node. Number of consumers and suppliers as a given time can be generated using Pois- son distribution. As soon as a center becomes consumer the representative agent passes on its identification and requirement message to its immediate neighbors which in turn pass it on to their respective neighbors and so on. With the one hop communication channel, agents do not need to broadcast requirement to whole network thus reducing burden on the network. All the supplier agents respond 10 back with their identification and availability. When consumer receives response of a supplier it refers to the database in order to fetch supplier information like l o- cation, state, zone, modes of transportation, price of grain and any other co n- straints based on which the final cost is calculated. It calculates the attraction force using equation 1 and updates this agent as the global best. A consumer also maintains list of suppliers for as soon as new supplier comes up, the queue is r e- shuffled and new global best is updated if required. In case one supplier is not able to fulfill the requirement, consumer will approach the next in queue without pro- nouncing its need again on the network. 6 Conclusion The current system can be implemented for very large scale real life demand supply chain management. This system can be applied to observe the pattern of product usage, to find out high demand zones, or the consumption rate of an area. It can also draw out the reliability factor of a supplier and cost to benefit ratio for a product. This system can also help organizations in evaluating needs of customer and adapt accordingly. References [1] Hopp, W.J.: Supply Chain Science. McGraw Hill, New York (2006) [2] Poirier, C., Quinn, F.: How are we doing? A survey of supply chain progress, Supply Chain Management Review, 24–31 (2004). [3] Beamon, B.M.: Supply chain design and analysis: models and methods. International Journal of Production Economics 71(1-3), 145–155 (1998). [4] Amiri, A.: Designing a distribution network in a supply chain system: formulation and efficient solution procedure. European Journal of Operation research 171(2), 567–576 (2006). [5] Tang, K.S., Man, K.F., Kwong, S., He, Q.: Genetic algorithms and their applications, IEEE Signal Processing Magazine, 13(6) 22–37 (1996). [6] Kirkpatrick, S., Gelatto, C.D., Vecchi, M.P.: Optimization by simulated annealing, Science 220, 671–680 (1983). [7] Dorigo, M., Maniezzo, V., Colorni, A.: The ant system: optimization by a colony of cooperating agents, IEEE Transactions on Systems, Man, and Cybernetics – Part B 26 (1), 29–41 (1996). [8] Kennedy, J., Eberhart, R.C.: Particle swarm optimization, in Proceedings of IEEE In- ternational Conference on Neural Networks, vol. 4, pp. 1942–1948 (1995). [9] Tan, X., Bhanu, B.: Fingerprint matching by genetic algorithms, Pattern Recognition 39, 465–477 (2006). 11 [10] Nezamabadi-pour, H., Saryazdi, S., Rashedi, E.: Edge detection using ant algorithms, Soft Computing 10, 623–628 (2006). [11] Lin, Y.L., Chang, W.D., Hsieh, J.G.: A particle swarm optimization approach to non- linear rational filter modeling, Expert Systems with Applications 34, 1194–1199 (2008). [12] Rashedi, E., Nezamabadi-pour, H., Saryazdi, S.: GSA: a gravitational search algo- rithm. Information Science, 179(13): 2232–2248 (2009). [13] Fernández-Martínez, J.L. and García-Gonzalo, E.: What Makes Particle Swarm Opti- mization a Very Interesting and Powerful Algorithm? In B.K. Panigrahi, Y. Shi, and M.-H. Lim (Eds.): Handbook of Swarm Intelligence, ALO 8, pp. 37–65 (2011). [14] Tarasewich, P., McMullen, P.R.: Swarm intelligence: power in numbers, Communica- tion of ACM 45 62–67 (2002). [15] Russell, S. J., Norvig, P.: Artificial Intelligence: A Modern Approach (2nd ed.),Prentice Hall, New Jersey, ISBN 0-13-790395-2 (2003) [16] Nwana, H. S., Lee, L. C., & Jennings, N. R.: Coordination in software agent systems. The British Telecom Technical Journal, 14(4), 79-88 (1996). [17] Choi, H. S., Kim, H. S., Park, B. J., & Park, Y. S. : Multi-agent based integration scheduling system under supply chain management environment. Lecture Notes in Ar- tificial Intelligence, 3029, 249-263 (2004). [18] Julka, N., Karimi, I., & Srinivasan, R.: Agent-based supply chain management-2: A refinery application. Computers and Chemical Engineering, 26, 1771 -1781 (2002). [19] Shen, W., Ulieru, M., Norrie, D. H., & Kremer, R. : Implementing the Internet enabled supply chain through a collaborative agent system in Proceedings of Workshop on Agent Based Decision Support for Managing the Internet Enabled Supply-Chain, Se- attle. 55-62 (1999) [20] Baker, A. D., Parunak, H. V. D., & Erol, K.: Manufacturing over the Internet and into your living room: Perspectives from the AARIA project (Tech. Rep. TR208-08-97). ECECS Dept (1997). [21] Balasubramanian, S., & Norrie, D. H.: A multi-agent intelligent design system inte- grating manufacturing and ship-floor control in the Proceedings of the First Interna- tional Conference on Multi-Agent Systems. San Francisco: The AAAI press/The MIT Press. (1995) [22] Chuter, C. J., Ramaswamy, S., & Baber, K. S.: A virtual environment for construction and analysis of manufacturing prototypes. Retrieved from http://ksi.cpsc.ucalgaly.ca/ projects/mediator (1995). [23] Norman, M. S., David, W. H., Dag, K., & Allen, T. : MASCOT: an agent-based archi- tecture for coordinated mixed-initiative supply chain planning and scheduling. Pro- ceedings of the Third International Conference on Autonomous Agent (Agents ‟99), Seattle, WA. (1999). [24] Food Corporation of India. URI: http://fciweb.nic.in
0802.4450
1
0802
2008-02-29T19:05:31
A Study On Distributed Model Predictive Consensus
[ "cs.MA" ]
We investigate convergence properties of a proposed distributed model predictive control (DMPC) scheme, where agents negotiate to compute an optimal consensus point using an incremental subgradient method based on primal decomposition as described in Johansson et al. [2006, 2007]. The objective of the distributed control strategy is to agree upon and achieve an optimal common output value for a group of agents in the presence of constraints on the agent dynamics using local predictive controllers. Stability analysis using a receding horizon implementation of the distributed optimal consensus scheme is performed. Conditions are given under which convergence can be obtained even if the negotiations do not reach full consensus.
cs.MA
cs
1 A Study On Distributed Model Predictive Consensus Tam´as Keviczky∗ and Karl Henrik Johansson Abstract We investigate convergence properties of a proposed distributed model predictive control (DMPC) scheme, where agents negotiate to compute an optimal consensus point using an incremental subgradient method based on primal decomposition as described in [1], [2]. The objective of the distributed control strategy is to agree upon and achieve an optimal common output value for a group of agents in the presence of constraints on the agent dynamics using local predictive controllers. Stability analysis using a receding horizon implementation of the distributed optimal consensus scheme is performed. Conditions are given under which convergence can be obtained even if the negotiations do not reach full consensus. I. INTRODUCTION Engineered systems are becoming increasingly complex and larger in size, which presents a need for the distribution of decision-making processes that interact with or are part of these large- scale technologies and applications. An important problem that arises among such distributed decision-making systems (often called agents), is related to consensus-seeking and rendezvous, which has received a high level of interest in the recent literature [3]. The consensus-seeking and rendezvous problem consists of designing distributed control strategies such that the state or output of a group of agents asymptotically converge to a common value, a consensus point, which is agreed upon either a priori or on-the-fly using some negotiation scheme. In this paper, we assume that a consensus point is not fixed in advance, but is rather determined by an T. Keviczky is with the Delft Center for Systems and Control, Delft University of Technology, 2628 CD, Delft, The Netherlands, [email protected] K.H. Johansson is with the ACCESS Linneaus Center, School of Electrical Engineering, Royal Institute of Technology (KTH), 100 44 Stockholm, Sweden, [email protected] May 9, 2014 Technical Report 2 optimal control problem. We focus on the combination of model predictive controllers and subgradient-based negotiation of optimal consensus (along the lines of the work in [2]), and in- vestigate conditions for asymptotic convergence of such distributed control schemes. We propose an algorithm for distributed model predictive consensus, which guarantees convergence under reasonable assumptions given a sufficient number of subgradient iterations can be performed without interruption. We will model agents as constrained linear dynamical systems and build on the decentralized negotiation algorithm described in [2] to compute exactly or at least approach the optimal consensus point. This negotiation algorithm relies on primal decomposition of the optimal consensus and control problem and makes use of distributed implementation of an incremental subgradient method. Each agent performs individual planning of its trajectory and negotiates with neighbors to find an optimal or near optimal consensus point, before applying a control signal. The paper is structured as follows. Section II introduces the optimal consensus problem and some basic notation and assumptions. The decentralized negotiation scheme of [2] is summa- rized in Section III along with a decentralized receding horizon implementation of the optimal consensus problem. Stability of the proposed decentralized negotiation and control scheme is studied in Section IV for both converged and interrupted negotiations. Finally, Section V presents a numerical simulation example, which illustrates the approach for an aerial refueling scenario, and Section VI the conclusions. II. PROBLEM FORMULATION Consider N > 1 dynamic agents whose dynamics are described by the following discrete-time state equations xi t+1 = Aixi t + Biui t, yi t = C ixi t, (1) for i = 1, . . . , N, where Ai ∈ Rni and inputs of each agent are constrained to lie in polyhedral sets ×ni, Bi ∈ Rni ×mi and C i ∈ Rp×ni. We assume that the states xi t ∈ X i, ui t ∈ U i, t ≥ 0. (2) May 9, 2014 Technical Report Definition 1: [2] The dynamic agents described by (1) reach consensus at time T if yi T +k = θ, ∀k ≥ 0, i = 1, . . . , N, ui T +k = ui T , ∀k ≥ 0, i = 1, . . . , N, 3 (3) where θ lies in a compact and convex set Θ ⊂ Rp. In this paper, the consensus point θ is a vector that specifies, for example, the position and velocity the agents shall converge to. Our objective is to find a consensus point θ ∈ Θ ⊂ Rp and a sequence of inputs ui T −1, t ∈ U i for all t = 1, . . . , T − 1, such that all agent outputs are equal at with i = 1, . . . , N and ui 0, . . . , ui time T : yi T = θ, i = 1, . . . , N. (4) We will also require each agent to be at an equilibrium at time T and denote the state and e(θ)). The control equilibrium pairs of the i-th agent corresponding to a θ value with (xi e(θ), ui set of equilibria for each agent i = 1, . . . , N thus will be a function of θ on the domain Θ: We assume that the following cost function is associated with the i-th system: where Qi ∈ Rni deviations from the equilibrium states corresponding to the consensus point and the use of control ×mi are positive definite symmetric matrices (i.e., we penalize ×ni and Ri ∈ Rmi effort). Assumption 1: Each agent dynamics (Ai, Bi) is controllable and systems (Ai, (Qi) 1 2 ) are observable. We then formulate the following finite-time optimal control problem at time t based on [2]: k,t, k = 0, . . . , T − 1, for all Problem 1: Let T > 0 be fixed. Determine control vectors ui May 9, 2014 Technical Report e(θ), ui E i(θ) =(cid:0)xi e(θ)(cid:1) , u ∈ Rmi =nx ∈ Rni V i(cid:0)xi k, ui x = Aix + Biu, C ix = θo . e(θ)(cid:1)⊺ Qi(cid:0)xi e(θ)(cid:1)⊺ Ri(cid:0)ui e(θ)(cid:1) e(θ)(cid:1) , k − xi k − ui k − xi k, θ(cid:1) =(cid:0)xi +(cid:0)ui k − ui (5) (6) i = 1, . . . , N and the consensus point θt, which solve the following optimization problem: min Ut,θt N Xi=1 T −1 Xk=0 k,t, θt(cid:1) k,t, ui V i(cid:0)xi subj. to xi k+1,t = Aixi k,t + Biui k,t, yi k,t = C ixi k,t, xi k,t ∈ X i, k = 1, . . . , T, k,t ∈ U i, ui k = 0, . . . , T − 1, yi T,t = θt, xi T,t = xi e(θt), 0,t = xi xi t, i = 1, . . . , N, θt ∈ Θ, 4 (7a) (7b) (7c) (7d) (7e) (7f) (7g) k,t, . . . , uN time t + k obtained by starting from the state xi where Ut , [u0,t, . . . , uT −1,t] ∈ RT Pi mi with uk,t , [u1 tion vector containing control inputs, xi k,t], denotes part of the optimiza- k,t denotes the state vector of the i-th agent predicted at t and applying to system (1) the input sequence k−1,t. The full optimization vector consists of the vector Ut defined above and the 0,t, . . . , ui ui consensus variable θt. The subscript t will be significant later in Section III, when this problem will be solved repeatedly in a receding horizon fashion. By implementing the solution to Problem 1, agents reach consensus at time T in the sense of Definition 1. We will make the following assumptions on the feasibility of reaching the consensus point by all agents: Assumption 2: The rendezvous time horizon T is large enough so that all θt in the set Θ are feasible, i.e., reachable consensus equilibrium points for all agents. Assumption 3: For all θt ∈ Θ and i = 1, . . . , N, there exists a sequence ui 0, . . . , ui T −1 in the relative interior of U i such that yi This means that it should be possible to reach θt without saturating the control signal (not necessarily in an optimal way). T = θ. May 9, 2014 Technical Report The solution of Problem 1 was distributed among the agents in [2] by using primal decom- position in combination with an incremental subgradient method [4]. First, a multiparametric solution of the individual optimization problems was defined as 5 qi(xi t, θt) = min Ut T −1 Xk=0 k,t, ui V i(cid:0)xi k,t, θt(cid:1) subj. to (7a) − (7g), k = 1, . . . , T − 1. The optimal consensus problem in (7) can then be written as N q ∗(xt) = min θt qi(xi t, θt) Xi=1 subj. to θt ∈ Θ. The set of optimal consensus points is defined as Θ∗ t =(θt ∈ Θ (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) N Xi=1 qi(xi t, θt) = q ∗(xt)) . (8) (9) (10) It can be established that the cost function qi(·) defined in (8) is a convex function and a subgradient gi for qi(·) at θt is given by the Lagrange multipliers corresponding to the terminal point constraint. A principal method for solving problem (8) is the subgradient method θt(k + 1) = PΘ"θt(k) − α(k) gi(k)# (11) N Xi=1 where gi(k) is a subgradient of qi at θt(k), α(k) is a positive stepsize, and PΘ denotes projection on the set Θ ⊂ Rp. In the following, we will consider the incremental subgradient method proposed in [5]. It is similar to the standard subgradient method (11), the main difference being that at each iteration k, θt is changed incrementally, through a sequence of N steps. Each step is a subgradient iteration for a single component function qi, and there is one step per component function. Thus, an iteration can be viewed as a cycle of N subiterations. If θt(k) is the vector obtained after k cycles, the vector θt(k + 1) obtained after one more cycle is where ϑN t (k) is obtained after the N steps θt(k + 1) = ϑN t (k), ϑi t(k) = PΘ(cid:2)ϑi−1 gi(k) ∈ ∂qi(xi t (k) − α(k)gi(k)(cid:3) , (k)), t, ϑi−1 t i = 1, . . . , N, (12) (13) May 9, 2014 Technical Report starting with ϑ0 t (k) = θt(k), 6 (14) t, ϑi−1 t (k)) denotes the subdifferential (set of all subgradients) of qi at the point where ∂qi(xi ϑi−1 t (k). The updates described by (13) are referred to as the subiterations of the k-th cycle. We will make the following assumptions, which will allow us to formulate well-posed prob- lems and characterize the number of subgradient iterations needed for convergence to a certain tolerance. Assumption 4 (Existence of an Optimal Solution): The optimal solution set Θ∗ t is nonempty. Assumption 5 (Subgradient Boundedness): There exists a scalar β such that kgik ≤ β, (15) ∀gi ∈ ∂qi(cid:0)xi t, θt(k)(cid:1) ∪ ∂qi(cid:0)xi i = 1, . . . , N, k ≥ 0, t, ϑi−1 t (k)(cid:1) , where N is the number of subiterations in each cycle. Definition 2: We will denote the Euclidean distance from a point z to the set Θ∗ Since we assume that the set Θ is compact, Assumptions 4 and 5 are automatically satisfied. t ). t by dist(z, Θ∗ Definition 3: A function γ(·), defined on nonnegative reals, is a K function if it is continuous, strictly increasing with γ(0) = 0. In the next section, we briefly describe the agreement mechanism of [2] and propose a closed- loop feedback control policy, which can be used in a receding horizon fashion, interleaved with subgradient-based negotiation of optimal consensus point updates. III. DECENTRALIZED NEGOTIATION AND RECEDING HORIZON IMPLEMENTATION SCHEME The optimal consensus point θ∗ t can be computed in a distributed way using the incremental subgradient method described in (12)-(14). Reference [2] describes an algorithm, where an estimate of the optimal consensus point is passed around between agents. Upon receiving an estimate from its neighbor, an agent solves the optimization problem (8) to evaluate its cost of reaching the suggested consensus point and to compute an associated subgradient (Lagrange multiplier of terminal point constraint). The agent then performs a subiteration by updating the consensus estimate according to (13) and passing the estimate to the next agent. Each agent only computes a subgradient with respect to its own part of the objective function and not the global May 9, 2014 Technical Report 7 objective function. The convergence of the incremental subgradient algorithm is guaranteed if the agents can be organized into a cycle graph (for more details see [2]). Remark 1: Besides some technical assumptions given in [1], the primal decomposition scheme and convergence to the optimal solution of (7) using sequential local subgradient iterations is possible due to decoupled and independently constrained agent dynamics. Furthermore, the overall objective function is decomposable into a sum of terms that share only a single coupling variable, θt. Thus fixing a θt value in the cost and constraints separates the optimal control problem into local ones. The control solution U ∗ t provides an open-loop control strategy for finite-time optimal consensus. However, this solution is sensitive to t corresponding to a negotiated optimal consensus point θ∗ model mismatch and disturbances, which suggests considering a receding horizon implementation and repeated solution of the finite-time optimal consensus problem due to its feedback nature. Our goal in such an approach is to guarantee constraint fulfillment and asymptotic convergence to a consensus point by repeatedly solving optimal consensus problems and implementing the first sample of the control solution. More formally, let U ∗ the first sample of U ∗ t 0,t, . . . , u∗ t = [u∗ is applied to the collection of agents: T −1,t] and θ∗ t be an optimal solution of (7) at time t. Then, ut = u∗ 0,t. (16) The optimization (7) is repeated at time t + 1, based on the new state xt+1. Remark 2: Stability of such a combination of DMPC and incremental subgradient methods is not a trivial question, especially since the terminal constraint value in the receding horizon scheme based on (7) is an optimization variable as well. The main point of the following investigation is to rule out a scenario where repeatedly solving and implementing the first step of a finite-time optimal control solution with changing terminal constraint value eventually results in divergence or lack of stability. Compared to the work in [1], this question arises because we are no longer considering only the open-loop implementation of a control sequence that terminates with the t ), based on new t ) at time T , but one that is updated every time step (along with θ∗ value ue(θ∗ measurements in a receding horizon fashion. May 9, 2014 Technical Report 8 IV. STABILITY ANALYSIS In this section we will be primarily interested in establishing conditions for asymptotic con- vergence of the combined DMPC and consensus algorithm to the set of equilibria defined as E =(cid:0)E i(θ), . . . , E N (θ), θ(cid:1) , θ ∈ Θ. (17) A. Fully Converged Negotiations For now, we will assume that in each implementation cycle (i.e., at sampling time t), the t have converged before the implemen- tation of the corresponding control actions. In other words, the optimal solution of problem (7) distributed negotiations on the optimal consensus value θ∗ is attained by every agent in each time step by means of the distributed consensus algorithm of [1]. This allows us to consider the overall system as a whole for stability analysis, using the following aggregate dynamics xt+1 = Axt + But, yt = Cxt, (18) where A = diag(Ai) ∈ RPi ni RpN ×Pi ni. The states and inputs of the overall system are constrained by ×Pi ni, B = diag(Bi) ∈ RPi ni ×Pi mi and C = diag(C i) ∈ U i, t ≥ 0, (19) xt ∈ X =Yi X i, ut ∈ U =Yi where the symbol Q denotes the standard Cartesian product of sets. Note that according to (4), consensus for the aggregate system dynamics means yT = CxT = 1N ⊗ θ∗ t . Stability analysis in this case pertains to the study of the receding horizon control scheme given in (7) and (16) with a terminal point constraint to one of its optimization variables θt. This will be performed next. The set of states at time k feasible for Problem 1 is given by Xk = {x ∃u ∈ U such that Ax + Bu ∈ Xk+1} ∩ X , with (20) XT −1 = {x ∃u ∈ U and θ ∈ Θ such that x = Ax + Bu and C(Ax + Bu) = 1N ⊗ θ} ∩ X . May 9, 2014 Technical Report Denote with c(xt) = u∗ 0,t, 9 (21) the control law obtained by applying the receding horizon control policy in (7) and (16) with cost t ]. Consider the aggregate function (6) for each agent, when the current state is xt = [x1 dynamical model (18) and denote with t , . . . , xN xt+1 = Axt + Bc(xt), (22) the closed-loop dynamics of the entire system. In the following theorem, we state sufficient conditions for the asymptotic convergence of the closed-loop system to the set of equilibria E. Theorem 1: Assume that (A0) Qi ≻ 0, Ri ≻ 0 for all i = 1, . . . , N. (A1) For all θt ∈ Θ there exists a unique equilibrium xi e(θt) ∈ X i, ui e(θt) ∈ U i for all i = 1, . . . , N such that xi e = Aixi e + Biui e and C ixi e = θt. (A2) The state and input constraint sets X i and U i contain all xi e and ui e equilibrium pairs in their interior, respectively, for all i = 1, . . . , N. Then, the closed-loop system (22) asymptotically converges to the set of equilibria E with domain of attraction X0. Proof: We introduce the following notation: T −1 and J i(cid:0)xi t, U i t , θt(cid:1) = J(xt, Ut, θt) = Xk=0 Xi=1 N V i(cid:0)xi J i(cid:0)xi t, U i k,t, ui k,t, θt(cid:1) t , θt(cid:1) . (23) (24) The optimal value function obtained from solving problem (7) at time t will thus be denoted as J ∗(xt, U ∗ t , θ∗ t ). We will show first that the optimal value function J ∗(xt, U ∗ t , θ∗ loop trajectories of the overall system at each time step J ∗(xt+1, U ∗ the assumptions of the theorem hold. t ) decreases along the closed- t ), if t+1, θ∗ t+1) ≤ J ∗(xt, U ∗ t , θ∗ Let the initial state at time t be xt = x0,t ∈ X0 and let U ∗ optimizers of problem (7). Denote with x∗ t = [x0,t, x∗ 1,t, . . . , x∗ trajectory, with 1N ⊗ θ∗ t = Cx∗ T,t. Let xt+1 = x∗ 1,t = Ax0,t + Bu∗ 0,t, . . . , u∗ T −1,t] and θ∗ t be the t = [u∗ T,t] the corresponding optimal state 0,t and consider problem (7) for May 9, 2014 Technical Report 10 1,t, . . . , u∗ time t + 1. We will construct an upper bound for J ∗(xt+1, U ∗ Ut+1 = [u∗ xt+1, xt+1 = [x∗ t + 1 if and only if v ∈ U keeps C(Ax∗ t+1). Consider the sequence T −1,t, v] and the corresponding state trajectory resulting from the initial state T,t + Bv]. The input Ut+1 will be feasible for the problem at T,t + Bv) equal to some 1N ⊗ θ with θ ∈ Θ at step T T,t + Bv) = 1N ⊗ θ. Such v exists by hypothesis (A1). Since x∗ T,t is an equilibrium of the system, this also allows us to choose a feasible v, for which in fact of the prediction, i.e., C(Ax∗ 1,t, . . . , x∗ T,t, Ax∗ t+1, θ∗ C(Ax∗ T,t + Bv) = 1N ⊗ θ∗ t . This is accomplished by noticing that x∗ T,t = xe(θ∗ t ) and selecting v = ue(θ∗ t ). (25) J(xt+1, Ut+1, θ∗ generated by U ∗ t ) will be an upper bound for the optimal J ∗(xt+1, U ∗ t+1). Since trajectories t and Ut+1 overlap (except for the first and last sampling intervals), it is immediate t+1, θ∗ to show that J ∗(xt+1, U ∗ t+1, θ∗ t+1) ≤J(xt+1, Ut+1, θ∗ t ) =J ∗(xt, U ∗ t , θ∗ t ) − (x0,t − xe(θ∗ t ))⊺Q(x0,t − xe(θ∗ t )) (26) − (u∗ 0,t − ue(θ∗ t ))⊺R(u∗ 0,t − ue(θ∗ t )) + ((Ax∗ T,t + Bv) − xe(θ∗ t ))⊺Q((Ax∗ T,t + Bv) − xe(θ∗ t )) + (v − ue(θ∗ t ))⊺R(v − ue(θ∗ t )), where Q = diag(Qi) ∈ RPi ni value given in (25) leads to Ax∗ ×Pi ni, R = diag(Ri) ∈ RPi mi ×Pi mi. Choosing the particular v T,t + Bv − xe(θ∗ t ) = 0, so equation (26) becomes J ∗(xt+1, U ∗ t+1, θ∗ t+1) − J ∗(xt, U ∗ t ) t , θ∗ ≤ − (x0,t − xe(θ∗ t ))⊺Q(x0,t − xe(θ∗ t )) (27) − (u∗ 0,t − ue(θ∗ t ))⊺R(u∗ 0,t − ue(θ∗ t )) ≤ − γ(k(xt − xe(θ), ut − ue(θ))k), ∀xt ∈ Xt. where γ is a class K function. This inequality along with hypothesis (A0) on the matrices Q t ) decreases along the state trajectories of the closed-loop system t ) → and R ensure that J ∗(xt, U ∗ (22) for any xt ∈ Xt. Since J ∗(xt, U ∗ J ⋆ as t → ∞, where J ⋆ is a nonnegative constant. We conclude that J ∗(xt+1, U ∗ t , it follows that J ∗(xt, U ∗ t ) ≥ 0 for all xt, U ∗ t , θ∗ t , θ∗ t , θ∗ t , θ∗ t+1, θ∗ t+1) − May 9, 2014 Technical Report 11 t , θ∗ t ) → 0 as t → ∞ and this implies that γ(k(xt − xe(θ), ut − ue(θ))k) → 0. From J ∗(xt, U ∗ γ(·) being a K function, it follows that xt − xe(θ), ut − ue(θ) → 0 as t → ∞. ✷ B. Interrupted Negotiations In case the distributed negotiation process is interrupted (e.g., due to execution time constraints) implemented, the θi or otherwise allowed to run only for a finite number of iterations before the control inputs are t . This means that individual agents will issue control commands that will guide them to possibly close but different t values do not converge to a common optimal value θ∗ terminal consensus points. In such a situation, we desire to find conditions under which repeated negotiation and implementation of intermediate consensus results will still allow asymptotic convergence to a common consensus point for each agent. We propose an algorithm that fulfills the above objective if the subgradient iterations in subsequent time steps approach the optimal consensus point to an increasingly more accurate level and at the same time the local MPC solutions satisfy an improvement property along the closed-loop evolution of the agents’ dynamics. The first requirement ensures that the mismatch t values diminishes as t → ∞. The second requirement is analogous to the standard suboptimal MPC scheme in [6], where it is established that feasibility between different interrupted θi of such an improvement constraint implies stability of the receding horizon control scheme. by agent i in the subgradient negotiation process of time instance t by θi In the following, we will denote the last (i.e., implemented) final consensus point reached t. This intermediate consensus point is not optimal for the global optimization problem (7), but due to Assumptions 2-3 it is certainly feasible for the following local problem: min θi t qi(cid:0)xi t, θi t(cid:1) subj. to θi t ∈ Θ. (28a) (28b) Distinguishing between the local θi t variables allows the original global optimization problem (9) to be restated as N qi(xi t, θi t) min θt Xi=1 subj. to θ1 t = · · · = θN t ∈ Θ. (29) Technical Report May 9, 2014 As opposed to the fully converged subgradient scheme in Section IV-A, the θi t variables do not converge to the globally optimal one, thus we cannot rely on optimality of the MPC scheme to prove global convergence. Instead, an improvement property as shown in [6], which is required for asymptotic convergence to the set of equilibria will be formulated as N 12 Xi=1 (cid:0)J i(cid:0)xi t+1, U i t+1, θi t+1(cid:1) − J i(cid:0)xi t, U i t , θi t(cid:1)(cid:1) (30) ≤ − γ(k(xt − xe(θ), ut − ue(θ))k), where γ is a class K function. A feasible sequence for such a constraint always exists based on Assumptions 2-3 and the earlier developments in Section IV-A. general different. Thus, if the agents’ initial states are close to their local xi optimum, since the common terminal point constraint is missing and the local θi∗ The value function improvement property in (30) is not sufficient for convergence to the global t values are in t ) equilibria, which are significantly different from each other, then any subgradient-based or other adjustment of the t value would necessarily result local terminal point constraints towards the globally optimal θ∗ e(θi∗ in both local and global cost increase. which ensures that the θi This suggests that an additional requirement besides the cost improvement property is needed, t values will also converge over time to a common θt. This can be accomplished by requiring that in each iteration the subgradient-based negotiation scheme is executed at least until kθi t − θ∗ t k ≤ εt ∀i = 1, . . . , N, where the approximation bound is updated for instance according to εt ≤ ǫ 1 t , ǫ > 0. (31) (32) In order to have some information about the required number of incremental subgradient iterations that guarantee fulfillment of constraints (30) and (31), we will make use of the following result from [7]. It can be shown that under a strong convexity type assumption, the incremental subgradient method defined earlier in (12)-(14) with an appropriately chosen stepsize α(k) has a sublinear convergence rate: Proposition 1: [7] Let Assumptions 4 and 5 hold, and assume that there exists a positive scalar µ such that May 9, 2014 q(xt, θt) − q ∗(xt) ≥ µ (dist(θt, Θ∗ t ))2 , ∀θt ∈ Θ. (33) Technical Report Then for the sequence {θt(k)} generated by the incremental subgradient method with the stepsize of α(k) = 1 2µ k+1, µ > 0, we have 1 13 (dist(θt(k + 1), Θ∗ t ))2 ≤ . (34) 1 + ln(k + 1) k + 1 N 2β2 4µ2 In the following, we describe a scheme, which allows the two conditions (30) and (31) to be tested based on the cyclic communication scheme underlying the subgradient-based negotiation. They execute at least the number of iterations dictated by the optimal θ∗ In Algorithm 1, agents perform cyclic iterations of the subgradient (SG) method (12)-(14). t approximation require- ment in (31). Satisfaction of the test (31) is signaled by a flag fSG. If needed, agents continue with subgradient iterations until the global cost improvement property in (30) is satisfied. This is signaled by flag fDMPC. In order to accomplish this, agents pass along besides their current subiterate ϑi t(k) of the consensus point in iteration k at sampling time t, the two binary variables (flags) fDMPC and fSG corresponding to tests (30) and (31), and two vectors of dimension N: Jcurr and Jprev. These vectors contain the individual cost values associated with the current and previous sampling time, respectively. Jprev has values corresponding to the cost of using the final ϑi t−1(k) consensus points for implementation during the previous sampling time t − 1. The current cost Jcurr gets filled up cyclically using the most recent subiterate ϑi t(k) for each agent. When an agent computes its own consensus point subiterate, it calculates the corresponding local cost value and checks the sum of previous and current cost values for each agent to decide whether the improvement property (30) is satisfied. If it is, then it sets a flag fDMPC, which indicates that the improvement property (30) is fulfilled and every other agent should enter in an implementation phase, provided that condition (31) is also satisfied. The message reaches all other agents eventually as they pass along this information in a cyclic pattern. If property (30) is not satisfied, then it puts its current cost value entry in the vector Jcurr and passes it on to the next agent. Theorem 2: Under the assumptions of Section II, Algorithm 1 converges asymptotically to the set of equilibria E. Proof: The main idea of the proof follows along the lines of Theorem 1, except for two crucial points. A feasible sequence for the improvement constraint (30) always exists based on Assumptions 2-3 and the developments in Section IV-A. This improvement property guarantees May 9, 2014 Technical Report 14 that even with interrupted negotiations, the distributed MPC problem converges asymptotically to t are different in this case). However, these terminal points are guaranteed to form a single consensus point, attained asymptotically by the repeated some set of different terminal points (since θi application of the iterative subgradient method, due to (31) and the compactness of Θ. ✷ Remark 3: Although Algorithm 1 guarantees global convergence, it requires an increasing number of subgradient iterations in subsequent time steps in order to approach the optimal value with a decreasing tolerance. The requirements (30) and (31) are only sufficient conditions and thus might be somewhat conservative. Decreasing the initial stepsize of the subgradient iterations may solve this problem. The increasing number of subgradient iterations can also be alleviated in practice in the following way: Once εt gets small enough or another condition indicating closeness to the global consensus point is satisfied, the θ consensus point can be fixed for all agents and the scheme could proceed with a pure decentralized MPC scheme. This would ensure convergence due to the result shown in Section IV-A. V. NUMERICAL EXAMPLE OF AN AERIAL REFUELING SCENARIO This numerical example considers a simplified aerial refueling scenario with three aircraft, which illustrates the importance of negotiating an optimal consensus point and the difference from standard rendezvous problems. The scheme involves the linearized longitudinal dynamics of three aircraft representing the tanker and two smaller aircraft to be serviced, respectively. The simplified objective is to control all three aircraft from their initial status to the same altitude and airspeed, which will allow the refueling process to be initiated. The consensus variable θt = [∆h ∆V ]⊺ will thus be a vector of dimension two, with entries of altitude and true airspeed deviations from the trim values, respectively. The optimal rendezvous altitude and airspeed will be determined using the distributed (cyclic) negotiation process based on local subgradient iterations. Once the corresponding control actions are implemented, the negotiations start again in the subsequent sampling time from the new initial states. This receding horizon procedure controls all three aircraft to a common altitude and airspeed. The optimal choice of the rendezvous parameters depend on the dynamics and constraints of the individual aircraft, along with the weighting matrices of the local cost functions, which penalize deviations in altitude, velocity and the use of control actions. The tanker is represented by a Boeing 747-100/200 aircraft model based on [8]. The two May 9, 2014 Technical Report 15 serviced vehicles are modeled as F-16 aircraft from [9], [10]. The models were all discretized with a sampling time of 0.05 s. The cost function of the tanker penalizes altitude-changes heavily, and the cost functions associated with the two fighters are based on their health or fuel level. The linearized longitudinal models of all aircraft involved correspond to a straight and level flight condition at 4000 m altitude and 184 m/s true airspeed. The control inputs of the linearized Boeing 747-100/200 aircraft represent deviations from the trim values of thrust and elevator deflection, denoted by uB747 = [δB747 δe]⊺, respectively. The F-16 aircraft models are equipped with an inner-loop pitch rate controller so the control inputs of their linearized models are deviation from trim throttle and desired pitch rate command uF16 = [δF16 th The constraints on the aircraft inputs are defined as the following δqcmd]⊺, respectively. th   −50000 lb −10 deg −1000 lb −100 deg/s   δB747 th δe δF16 th δqcmd       +150000 lb +10 deg +5000 lb +100 deg/s   ≤ ≤ . (35) The initial altitudes of the two F-16s are chosen as ±30.48 m around the trim altitude. The tanker’s initial altitude w.r.t. the trim value is −10 m. All aircraft are initialized as flying straight and level with the same trim velocity. If we simply considered the average value of the initial altitudes as a rendezvous point, then the aircraft should approach approximately −3 m. Due to the different dynamics and cost functions of the aircraft representing fuel cost and vehicle health priorities, this average value is not optimal. We consider the following weighting matrices in the local cost functions QF16 QB747 =  1 =  2 =  QF16 0 1 0 0 1  , RB747 =  10 1 =  , RF16  10 2 =  , RF16  0 10 0 0.4 0 10−7 0 10−5 0 0 10−5 0 0 104  , 0.5  , 0.1  . 0 (36) (37) (38) These weights intend to mimic a situation, where the F-16 indexed as #1 penalizes altitude changes and pitch control more heavily due to a restriction posed by limited fuel supply or elevator control authority. May 9, 2014 Technical Report 16 Simulation results of the centralized solution to the optimal finite-time rendezvous problem with time horizon of T = 100 steps (5 seconds) are shown in Figure 1. The optimal rendezvous point is determined to be at 21.2340 m away from the trim altitude and the common terminal velocity at straight and level flight equilibrium is −1.1933 m/s away from the initial trim velocity. Notice that the rendezvous altitude is quite close to F-16 #1 as an indication of its limited maneuvering capabilities represented in its local cost function. The problem can be solved in a distributed fashion using the incremental subgradient method described in [2] and implemented through a cyclic sequential update. Since the optimal ren- dezvous point and the corresponding control solutions converge to the centralized one asymp- totically, only convergence of θi t(k) are shown in Figure 3. In order to have a receding horizon implementation of the incremental subgradient method proposed in Algorithm 1, the maximum number of major subgradient iterations were limited to 15 before applying the local control solutions at each new MPC update. The limited number point θi of subgradient iterations lead to a mismatch between local versions of the common rendezvous t. Still, the MPC implementation of the finite-time optimal rendezvous problem with local rendezvous point mismatch stabilizes the system and provides acceptable performance besides providing feedback action. The resulting trajectories are shown in Figure 2 until sampling time t = 100. The convergence of θB747 one horizontal axis represents the subgradient iterations k (limited at 15) and the other horizontal (k) in each MPC update period is shown in Figure 4, where t axis corresponds to the MPC sampling time index t. Notice that besides the improvement made in each MPC sampling period, there is also a trend indicating that the local θB747 (k) value t (k) and approaches it more and more closely in subsequent MPC t starts from a closer point to θ∗ updates. VI. CONCLUSIONS We have introduced a distributed model predictive control (DMPC) framework, where the control objective is to agree upon and achieve an optimal consensus point for constrained dynamic agents. The negotiation scheme makes use of the cyclic incremental subgradient algorithm described in [2]. Convergence properties of the combined DMPC / incremental subgradient approach were analyzed and a sufficient minimum number of subgradient iterations were es- tablished. An algorithm was proposed that ensures convergence of the decentralized scheme. May 9, 2014 Technical Report 17 F16 #1 B747 F16 #2 20 40 60 80 100 t ] m [ h ∆ 40 30 20 10 0 −10 −20 −30 −40 0 Fig. 1. Centralized solution of the finite-time optimal rendezvous problem in an aerial refueling scenario. ] m [ h ∆ 40 30 20 10 0 −10 −20 −30 −40 0 F16 #1 B747 F16 #2 20 40 60 80 100 t Fig. 2. MPC implementation of the finite-time optimal rendezvous problem with subgradient iterations limited at 15. May 9, 2014 Technical Report 18 F16 #1 B747 F16 #2 100 k ∗ θ − ) k ( i θ k k ∗ θ k 10−1 0 10 20 30 k 40 50 60 Fig. 3. Convergence of local estimates to the optimal rendezvous point using the incremental subgradient algorithm. k ∗ t θ − ) k ( 7 4 7 B θ k t 100 k ∗ t θ k 10−2 0 5 Subgradient iteration number 10 k 60 80 15 100 0 20 40 Sampling time of MPC implementation t Fig. 4. Convergence of local estimates to the optimal rendezvous point during each MPC update. May 9, 2014 Technical Report 19 Besides the aerial refueling numerical example shown in Section V, the approach proposed in this paper can be used in other distributed “synchronization” problems as well, where agents with constrained dynamics have to agree upon and achieve simultaneously an “optimal” consensus value, which is not known a priori. Our current work considers schemes that relax the cyclic, sequential communication requirement and rely on parallel, localized iterations. VII. ACKNOWLEDGEMENTS The authors wish to thank Richard Murray for helpful discussions. The work of Tam´as Keviczky was partially funded by the Boeing Corporation while he was a postdoctoral scholar at the Control and Dynamical Systems, California Institute of Technology. The work by Karl H. Johansson was partially funded by the Swedish Research Council, the Swedish Strategic Research Foundation, and the European Commission through the NoE HYCON. It was partially done during a stimulating sabbatical visit at Caltech, which is gratefully acknowledged. REFERENCES [1] B. Johansson, A. Speranzon, M. Johansson, and K. H. Johansson, “Distributed model predictive consensus,” in Proc. 17th Int’l Symposium on Mathematical Theory of Networks and Systems (MTNS), Kyoto, Japan, July 2006, pp. 2438–2444. [2] ——, “On decentralized negotiation of optimal consensus,” Automatica, 2007, doi: 10.1016/j.automatica.2007.09.003. [3] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and cooperation in networked multi-agent systems,” Proceedings of the IEEE, vol. 95, no. 1, pp. 215–233, 2007. [4] D. P. Bertsekas, A. Nedi´c, and A. E. Ozdaglar, Convex Analysis and Optimization. Athena Scientific, 2003. [5] A. Nedi´c and D. Bertsekas, “Incremental subgradient methods for nondifferentiable optimization,” SIAM J. on Optimization, vol. 12, pp. 109–138, Mar. 2001. [6] P. O. M. Scokaert, D. Q. Mayne, and J. B. Rawlings, “Suboptimal model predictive control (feasibility implies stability),” IEEE Trans. on Automatic Control, vol. 44, no. 3, pp. 648–654, Mar. 1999. [7] A. Nedi´c and D. Bertsekas, “Convergence rate of incremental subgradient algorithms,” in Stochastic Optimization: Algorithms and Applications, S. Uryasev and P. M. Pardalos, Eds. Kluwer Academic Publishers, Dordrecht, Netherlands, 2001, pp. 223–264. [8] A. Marcos, S. Ganguli, and G. J. Balas, “An application of h∞ fault detection and isolation to a transport aircraft,” Control Engineering Practice, vol. 13, pp. 105–119, 2005. [9] B. L. Stevens and F. L. Lewis, Aircraft Control and Simulation. Wiley-Interscience, 1992. [10] T. Keviczky and G. J. Balas, “Receding horizon control of an F-16 aircraft: a comparative study,” Control Engineering Practice, vol. 14, no. 9, pp. 1023–1033, Sept. 2006. May 9, 2014 Technical Report 20 /* M is large number */ Algorithm 1: Cyclic incremental DMPC algorithm 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 Initialize β, µ, ǫ, θi 0; fDMPC, fSG ←− false; k, t ←− 0; Jcurr ∈ RN ←− 0; Jprev ∈ RN ←− −M · 1; loop Measure states xi t; repeat 1 α(k) ←− 1 k+1; 2µ t (k) ←− θt(k); ϑ0 for i = 1 to N do if fDMPC ∧ fSG then J i t (xi prev ←− J i Implement ui∗ t(k) ←− ϑi ϑi t, U i 0,t(ϑi t(k − 1) t(k − 1)); t , ϑi t(k − 1)); else t, ϑi−1 t (k)); Compute a gi(k) ∈ ∂qi(xi ϑi t t (xi t, U i curr ←− J i J i i=1(J i curr − J i Set fDMPC true; t(k) ←− PΘ(cid:2)ϑi−1 if PN (k) − α(k)gi(k)(cid:3); t , ϑi prev) ≤ 0 then t(k)); else Set fDMPC false; end end end θt(k + 1) ←− ϑN if 1+ln(k+1) t (k); N 2β 2 4µ2 ≤ ǫ k+1 Set fSG true; t then else Set fSG false; end k ←− k + 1; until new measurement is available ; t ←− t + 1; k ←− 0; end loop May 9, 2014 Technical Report
1910.05092
1
1910
2019-10-11T11:41:03
Modeling Cyber-Physical Human Systems via an Interplay Between Reinforcement Learning and Game Theory
[ "cs.MA", "cs.LG" ]
Predicting the outcomes of cyber-physical systems with multiple human interactions is a challenging problem. This article reviews a game theoretical approach to address this issue, where reinforcement learning is employed to predict the time-extended interaction dynamics. We explain that the most attractive feature of the method is proposing a computationally feasible approach to simultaneously model multiple humans as decision makers, instead of determining the decision dynamics of the intelligent agent of interest and forcing the others to obey certain kinematic and dynamic constraints imposed by the environment. We present two recent exploitations of the method to model 1) unmanned aircraft integration into the National Airspace System and 2) highway traffic. We conclude the article by providing ongoing and future work about employing, improving and validating the method. We also provide related open problems and research opportunities.
cs.MA
cs
Modeling Cyber-Physical Human Systems via an Interplay Between Reinforcement Learning and Game Theory Mert Albabaa, Yildiray Yildiza aDepartment of Mechanical Engineering, Bilkent University, Turkey Abstract Predicting the outcomes of cyber-physical systems with multiple human interactions is a challenging problem. This article reviews a game theoretical approach to address this issue, where reinforcement learning is employed to predict the time-extended interaction dynamics. We explain that the most attractive feature of the method is proposing a computationally feasible approach to simultaneously model multiple humans as decision makers, instead of determining the decision dynamics of the intelligent agent of interest and forcing the others to obey certain kinematic and dynamic constraints imposed by the environment. We present two recent exploitations of the method to model 1) unmanned aircraft integration into the National Airspace System and 2) highway traffic. We conclude the article by providing ongoing and future work about employing, improving and validating the method. We also provide related open problems and research opportunities. Keywords: Cyber-physical human systems, Game theory, Reinforcement learning, Model validation 1. Introduction In a 2006 NASA report, allocation of tasks, as well as switching, between humans and automation is stated as one of the highest priority research needs for a successful next gen- eration airspace development, where several new automation components are expected to be introduced to cope with the inevitable increase in traffic density (Sheridan et al., 2006). A 2012 U.S. Department of Defense report (Murphy and Shields, 2012) declares that the tax- onomy established by the "levels of autonomy" creates "a focus on machines, rather than on the human-machine system," which in turn "has led to designs that provide specific functions rather than overall resilient capability". The same report suggests that human-system col- laboration should be the defining theme for the design and operation of autonomous systems. In a 2017 review article (Lamnabhi-Lagarrigue et al., 2017), where an in-depth analysis is provided about the current and future roles of the systems and control field, the question "how to optimally conjugate automated systems with the interplay of humans?" is posed as one of the grand challenges. It is therefore clearly understood by engineers and scientists that considering humans as integral parts of complex physical systems that embody commu- nication, computation, control and networking technologies, can potentially accelerate the Preprint submitted to Annual Reviews in Control October 14, 2019 advancement of technology that can address pressing human needs. This requires a new perspective that considers the human, the physical plant and enabling cyber-technologies as a single system, namely a cyber-physical and human system (CPHS). This is in contrast to imagining the human solely as a user who is isolated from the technology. Adopting the CPHS framework brings its own challenges, especially when it comes to obtaining predictive models. Apart from the intricacies of cyber-physical system (CPS) modeling, the human element is usually the most demanding component of a CPHS in terms of forecasting the future behavior. The difficulty intensifies when the system contains more than one human, which requires factoring in multiple human-human and human-automation interactions. The focus of this paper is on the latter type, where human interactions are an inseparable feature of the system. To simplify the exposition in this paper, we use "human-machine interactions", "human-autonomy interactions" and "human interactions" interchangeably, although a more careful use of the language that pays attention to nuances is possible. To obtain realistic models of CPHS, therefore, we need to concentrate on modeling methods that give us the ability to include typical human characteristics. For example, human interactions are generally not deterministic in nature, which can be captured in CPHS models by utilizing a probabilistic modeling framework. Furthermore, before taking an action, a human generally contemplates other intelligent agents' (such as other humans or automation) possible actions and then tries to choose a move that will increase the chances of obtaining the best outcome reflecting his or her preferences. A representational CPHS model needs to incorporate this "strategic behavior" (Camerer, 2011) of humans. Finally, as much as we want to believe otherwise, humans do not always, if at all, act in an optimal fashion. Our cognitive capabilities and computational powers are not always ample enough to provide the best response to a given situation. This final point is important for distinguishing CPHS models from autonomy models, where, based on available information, an algorithm can possibly be designed to react in the most appropriate way. Models that comprise these three attributes of human reactions, namely, being probabilistic, strategic and non-optimal, have a higher chance of success in terms of representing real-life behavior, for the cases where multiple humans are involved. A solution for CPHS modeling that addresses human interactions is proposed by the introduction of the "Semi Network-Form Games" (SNFG) formalism (Lee and Wolpert, 2011; Lee et al., 2013). SNFG merges three modeling tools: Bayesian networks, game theory (GT) and reinforcement learning (RL). While the Bayesian networks form the probabilistic foundation of the method, game theory provides the required mechanism to produce strategic behavior expected from human interactions, and reinforcement learning enables obtaining time-extended scenarios where humans take successive actions. Non-optimal behavior, which is thought to be a typical human trait, emerges naturally in SNFG with the type of the exploited game theoretical solution technique and reinforcement learning. The first research result that exploits the SNFG idea of merging GT and RL to create a CPHS modeling framework for a realistic engineering system, including more than 2 humans, has appeared in Musavi et al. (2016), where the problem of integrating unmanned aircraft systems (UAS) into the national airspace (NAS) is carefully studied. The results reported in 2 Musavi et al. (2016) are supported by extensive simulation capabilities, where the interactions of 180 manned aircraft pilots are modeled. This study builds upon earlier initial attempts to model smaller airspace scenarios with human interactions (Yildiz et al., 2012, 2013, 2014). Simultaneous modeling of a large number of decision making agents (pilots, in this case) in a complex scenario is difficult due to the computational cost. A common approach in the literature is to model a single decision maker, whose actions are of interest, and force the rest to obey certain kinematic and dynamic constraints, to obtain a reasonable model behavior. However, although this approach presents some insight into the dynamics of the system, it is limiting due to grossly simplifying the real-life human interactions. The study conducted by Musavi et al. (2016) provided, for the first time in the literature, probabilistic outcomes of UAS integration scenarios, where each of the 180 aircraft pilots are modeled using the game theoretical decision making process, simultaneously. In this research, Bayesian Networks are not utilized and the probabilistic decision making is obtained through employing a stochastic reinforcement learning algorithm proposed in Jaakkola et al. (1994). Recently, this work is extended for the cases where the aircraft can move both horizontally and vertically in a 3-dimensional airspace (Musavi et al., 2018). This extension required a dramatically larger observation space for the pilots which ruled out the possibility of using exact RL methods. To address this issue, Neural-Fitted Q-iteration (Riedmiller, 2005; Riedmiller et al., 2007; Gabel et al., 2011) is integrated into the game theoretical framework, which uses neural networks (NN) for compactly estimating the exact state-action values needed by the RL algorithm. Another study, exploiting the same approach, conducted by Li et al. (2018) achieved a similar result in the automotive domain, by creating a modeling framework for road traffic consisting of 50 manned vehicles and an autonomous car. This result was a continuation of leading studies conducted by Oyler et al. (2016) and Li et al. (2016). Similar to Musavi et al. (2016) and Musavi et al. (2018), this contribution is also the first in the automotive literature where a large number of decision making drivers are simultaneously modeled using a game theoretical modeling approach. Recently, an extended version of this work, which covers a larger class of interaction scenarios, with the help of a road traffic simulation on a 5-lane highway, is presented in Albaba et al. (2019), where validation studies by processing real traffic data, which is provided in Colyar and Halkias (2007), is conducted. In this paper, we first present the basic components of the modeling approach discussed above and then provide the examples of CPHS framework creation, using GT and RL, for engineering systems that can be employed in predicting the outcomes of having several humans, automation and physical systems interact with each other in extended periods of time. These ideas exist in the literature in a fragmented manner, and by elucidating them in an aggregated form here, we provide a concise single source. The deliberations in this article on employing game theory and reinforcement learning for building CPHS modeling frameworks should benefit control practitioners whose goal is to obtain models of engineering systems where humans are active players. Finally, we discuss ongoing and future work about the topic, together with open problems that may provide several different research opportunities for the CPHS community. 3 The organization of the paper is as follows: In Section 2, we review the existing work. In Section 3, we explain the basic building blocks of the game theoretical model. In Section 4, we show how these blocks are combined together to form the overall modeling approach. In Sections 5 and 6, we present the exploitation of the approach to create models of two different engineering systems containing multiple human interactions. We provide a computational complexity analysis in Section 7. In Section 8 and 9 we discuss ongoing and future work, and related open problems, respectively. Finally, we provide a summary of the article in Section 10. 2. Review of existing work In this section, we review research activities looking for the answer to this question: "How can we predict the outcomes of engineering scenarios involving a cyber-physical human system with not one but several human elements?". The literature revolving around this salient question, either partially or completely, covers a wide range of engineering realms, which is hard to exhaustively examine in the limits of this article. Since, up until now, there has been two main studies addressing this question by exploiting the game theoretical modeling approach elaborated in this paper, we will focus on areas that are in the scope of these two research efforts: Unmanned aircraft system integration into the national airspace and road transportation. 2.1. Unmanned aircraft systems integration into the national airspace Although unmanned aircraft systems (UAS) has been attracting increasingly more at- tention, we have not yet witnessed the maturation of the civil markets. One of the main reasons for this underutilized potential can be attributed to the lack of regular access to the National Airspace System (NAS) (Dalamagkidis et al., 2008). Due to the well-justified risk- averse nature of the aviation industry, advances in developing rules and procedures for UAS integration into NAS are progressing relatively slowly, which results in UAS flying mainly in restricted airspace. Until it is clearly assured that UAS will not pose a danger to the existing air traffic and thus their integration is proven to be safe, routine access to NAS will not be realized (FAA, 2013; European RPAS Steering Group, 2013). There are many studies that address the problem of UAS integration into the airspace in terms of providing methods and tools to ensure safety. Ding et al. (2016) proposes an autonomous decision making system for UAVs for determining a safe landing site in the case of an anomaly. For UAV platoons, controller design frameworks are presented in Chen et al. (2015, 2016, 2017b), where col- lisions are eliminated and target states are reached. In Chen et al. (2017a), collision-free trajectories are designed for large-scale multi-UAV systems in the presence of disturbances in vehicle dynamics, and the method is demonstrated using up to 200 UAVs, in simulation environment. UAS integration still remains to be a challenge (Melnyk, 2019) and since we don't have the necessary experience to evaluate the effects of integration and there is not enough data yet, the only way to predict the outcomes of adding UAS into the airspace is conducting careful simulations (DeGarmo, 2004). To obtain reliable simulation results, a high-fidelity 4 model of the airspace in the presence of manned and unmanned aircraft together with their interactions need to be obtained. A typical approach in the airspace traffic modeling literature includes the assumption of pilots always following an ideal behavior pattern without any deviations. This is an unreal- istic assumption since, as discussed earlier, a representative model should allow probabilistic human behavior. For example, it is well-documented that pilots may ignore controller's commands or do not obey traffic collision avoidance system (TCAS) resolution advisories during emergency situations (Pritchett, 2010). In addition, it is reported that only 13% of pilot reactions agreed with the pilot model, which predicts a deterministic behavior, used for establishing TCAS algorithms (Kuchar and Drumm, 2007; Lee and Wolpert, 2011). One of the main issues that needs to be solved for a safe integration is the development of a dependable sense-and-avoid (SAA) technology for the unmanned aircraft systems. It is not possible to mature this technology without testing its performance through simulations with reliable pilot models (Maki et al., 2012). There exist several SAA methods introduced in the literature, with validations conducted via simulations and experiments. Kuchar et al. (2004) carefully analyzed the utilization of TCAS as the SAA logic, and performed simulation tests using the aircraft encounter model developed by Kochenderfer et al. (2008). During the tests, pilot reactions were assumed to be known beforehand, based on the respective motions of the conflicting aircraft. In another study, Perez-Batlle et al. (2012) suggested maneuvers to solve UAS separation conflicts and tested these suggestions with simulations that contain pilots following the recommended maneuvers without any error. The perfor- mance of the SAA algorithm proposed in Florent et al. (2010) was assessed by simulations and experiments. For these assessments, the manned aircraft in separation conflict with the UAS were assumed to continue their motion unaffected, while the UAS were implementing the proposed SAA technique. Another example where predefined pilot action models are employed for evaluating various SAA algorithms can be found in Billingsley (2006). The modeling framework for UAS integration into NAS that is discussed in this article differentiates itself from the above mentioned environments by providing a platform where pilot actions are not pre-determined but obtained through a decision making process by satisfying a utility function, or a "happiness function", that reflects pilot preferences. Fur- thermore, with the proposed approach, several pilot-pilot and pilot-UAS interactions (180 of them) can be modeled in time-extended scenarios, in a probabilistic manner, with the help of the convergence of game theory and reinforcement learning. The details of this framework are provided in Section 5. 2.2. Road transportation We have reliable physical models of road vehicles that have high predictive power. How- ever, the modeling problem quickly becomes difficult to handle when the task is modeling the vehicle together with the driver operating it. Furthermore, if the desired outcome is a model for traffic containing several vehicles, both manned and unmanned, obtaining answers turns out to be a real challenge. The main obstacle in this matter in question is the lack of accurate human interaction models. 5 Valid human interaction models in road traffic may prove themselves useful for two main tasks: Creating accurate traffic simulators that can be used for initial testing and tuning of autonomous car control algorithms, and designing autonomous vehicle control systems based on human way of driving, which can improve the passengers' comfort by making them feel as if a human driver is in control (Carvalho et al., 2015). There are several successful driver modeling studies in the literature. Real traffic data is employed to obtain Hidden Markov Model based driver models in Lefevre et al. (2014) and Lefevre et al. (2015). A semiautonomous vehicle control architecture is proposed in Vasudevan et al. (2012) and Shia et al. (2014), where the driver model is obtained, through k-means clustering, and used to inform the controller that produces corrections for driver inputs. Logical, if-then-else commands form the driver decisions in a modeling framework created by Salvucci et al. (2001). A multi-agent simulator is employed to model lane changing in Hidas (2002). Lane changing behavior is modeled also in Kumar et al. (2013), where Bayesian filters and support vector machines are utilized to predict driver intent. There is another body of work on modeling drivers as controllers in a closed loop control system, examples of which can be found in Hess and Modjtahedzadeh (1990); Sharp et al. (2000); Treiber et al. (2000); Salvucci and Gray (2004) and Ungoren and Peng (2005). A more recent example of feedback controller type driver modeling can be seen in Wakitani et al. (2018). The proposed modeling framework for road traffic in this article has the following dis- tinctions compared to earlier work: 1) The driver interaction models are scalable and a traffic scenario consisting of several vehicles interacting with each other can be modeled using a game theoretical approach; 2) driver behavior is obtained through employing a de- cision making process, instead of assuming a preset driver action model that is a function of time or states; 3) driver models are simultaneously strategic, meaning that they consider other intelligent agents (drivers, unmanned vehicles) possible actions and produce a response accordingly, based on a utility function representing their priorities. This is in contrast to modeling a single driver as a decision maker while assigning pre-determined trajectory pro- files for the others. All the listed advantages are realized through the game theoretical modeling approach discussed in this article. There are other game theoretical driving mod- eling approaches reported in the literature such as the ones proposed by Yoo and Langari (2012) and Yoo and Langari (2013), where driver interactions are successfully modeled. On the other hand, unlike the method discussed in this article, these studies do not consider a time-extended scenario. Dextreit and Kolmanovsky (2014) also consider a game theoretical approach to model the interactions between the driver and the ego vehicle's power train. By penalizing the vehicle-driver system features of fuel consumption, emissions, battery state and operating conditions, this approach is demonstrated, via experiments, to perform better than the baseline controller, in terms of these system features, while still providing good drivability. However, the utilized game theoretical approach, namely Stackelberg solution, quickly becomes computationally intractable as the number of intelligent agents in the game increases, unlike the hierarchical game theoretical approach used in the method proposed in this article. The details of the proposed method are provided in Section 6. 6 3. The basics In this section, we present the fundamental building blocks of the game theoretical mod- eling framework discussed in this article. These blocks are game theory and reinforcement learning. Below, we explain these pieces with a relatively narrow scope, using a semi-formal language to allow easy access, and with enough details that will enable understanding of the basic ideas necessary to grasp the following sections. There are several sources in the literature that can be used for formal introductions to these topics, such as Fudenberg and Tirole (1991) and Camerer (2011) for game theory, and Wiering and van Otterlo (2012) and Sutton and Barto (2018) for reinforcement learning. 3.1. Game theory Game theory studies the interactions between strategic agents. A strategic agent is one that considers other agents' possible actions and their effects on the game while making his or her own decisions. The theory makes predictions about the outcomes of these interactions using precise mathematics. Players in a game theoretical setting refer to the entities who can effect the game by their moves (or actions, or decisions). Strategy of a player defines the procedure based on which a player chooses his or her actions. A solution concept is a well established set of rules that are used to predict how a game will unfold. A Nash equilibrium is a solution concept, defined similarly to the equilibrium in system dynamics: When players have no incentive to deviate from their selected actions, the game is said to be in Nash equilibrium. This means that in Nash equilibrium, players choose their best actions against each others' actions. A typical example where Nash equilibrium can be observed is a game called the Prisoner's Dilemma. In this game, there are two prisoners, Prisoner A and Prisoner B. They are put in separate rooms so that they can not communicate. Both of them are provided with the following information: If Prisoner A confesses the crime, he will be released provided that Prisoner B denies the crime, which will cause Prisoner B serve 10 years in prison. Similarly, if Prisoner B confesses, he will be released provided that Prisoner A denies the crime, which will put Prisoner A in prison for 10 years. If they both deny, each will serve 3 years. If they both confess, each will serve 5 years in prison. We can represent this game in matrix form as shown in Figure 1, where players' payoffs amount to the negative of the years to be served in prison. It is seen that, although resulting in a low overall payoff, (Confess, Confess) choice is the only Nash equilibrium since no player wants to change their move once they are in this state. It is important to note that Nash equilibrium is not always unique and there may be more than one Nash equilibrium depending on the game. There are other equilibrium concepts such as quantal response equilibrium where instead of giving the best response to other players' actions, the players choose a probability dis- tribution over their action space where actions with higher expected payoffs have higher probability of being played. Not all solution concepts predict an equilibrium. For example, level-k thinking is a non- equilibrium game theoretical model of strategic interactions, which assigns different levels of reasoning for players (Stahl and Wilson, 1995; Costa-Gomes et al., 2009). In this model, the 7 Figure 1: Prisoner's Dilemma lowest level of reasoning is level-0, which represents non-strategic thinking, simply meaning that the players who reason at this level have a strategy that does not take into account other players' possible actions. A level-1 player, on the other hand, takes the best action assuming that his or her opponents are level-0 players. Similarly, a level-k player responds best to his belief that the other players are reasoning at level-(k-1). Therefore, this model assumes an iterated best response (Crawford, 2008). Experimental results presented in Camerer (2011) corroborate the predictions of this solution concept with varying success. An elementary example for the level-k reasoning model can be given considering two people, named Diana and Ritchie, walking towards each other, along a collision path, in a university corridor. If Ritchie decides to continue walking without considering Diana's possible actions, Ritchie can be considered as a level-0, non-strategic thinker. On the other hand, if Diana believes that Ritchie is a level-0 thinker and therefore decides that the best action is stepping right, then Diana can be modeled as a level-1 player. Although there exists experimental evidence for level-k predictions, this simple example presents a difficulty in this approach: The players' beliefs of others may be wrong. Another issue is that even if the players correctly estimate their opponents' levels, the behavior patterns coded by different levels are sensitive to the selection of the level-0 algorithm. That's why level-0 is often referred as the anchoring level. Although these "problems" are real, they may actually be considered as the strengths of this method when it comes to modeling humans. As discussed in the Introduction section, in CPHS with multiple humans, to obtain reasonable predictions, we need models that do not foresee optimal behavior all the time. Another perspective is that level-k thinking represents the interactions between intelligent agents that do not have a long interaction history, therefore it is actually expected that their initial assumptions about each others' strategies may not fully reflect reality. This also helps obtain non-optimal human reactions that are providing best responses to their beliefs about the outside world. 3.2. Reinforcement learning Reinforcement learning (RL) can be defined as a mathematical representation of learning through reward and punishment. To clarify this definition, and to be able explain the RL algorithm used in the CPHS modeling framework discussed in this paper, we first need to identify main elements of RL and make certain definitions that hold true for almost all RL methods. In RL, there exists an agent capable of exerting actions that can change the state 8 ConfessDenyConfess-5, -50, -10Deny-10, 0-3, -3PrisonerBPrisonerA of the environment where the agent operates. The RL problem can be defined as finding the optimal set of action sequence for an agent to achieve a given goal defined as a function of the environment states, through interaction with the said environment. For example, the problem may be making a mobile robot (agent) to go from point A to point B (goal) in a 10 by 10 grid-world with obstacles (environment) by deciding whether to move left, right, forward or backward (actions), in every step of the way. In this scenario, the state can be defined as the grid location the robot is occupying. RL uses the idea of a reward function to describe the preferences of the agent (or the designer of the agent) while its learning to achieve a predetermined goal. In the mobile robot example given above, the reward can simply be defined as zero if the robot is at the goal state of point B, and a fixed negative number, otherwise. A policy is defined as a probabilistic map from states to actions. The task of the RL algorithm is to find a policy that will make the agent maximize a cumulative discounted reward, during the time of its operation. One way to express the cumulative reward is given as C = γtrt, (1) where γ is the discount factor and r is the reward obtained in every step t. There are various RL techniques proposed to discover action sequences that will attain the goal of maximizing (1). Almost all of these different methods are based on estimating value functions, which can be regarded as the value of being in a certain state, based on the policy being implemented. A value function can be given as V π(s) = Eπ γkrt+kst = s (2) where π represents the implemented policy and s represents state. A similar function, the estimation of which also characterizes the RL method, stands for the value of taking a certain action a, in a given state s. This function is defined as Qπ(s, a) = Eπ γkrt+kst = s, at = a . (3) k=0 The aim of RL is to find the optimum policy π∗ that will maximize (optimize) the value function. The optimal value function is written as V π∗ and all its state values are larger than or equal to that of all other value functions that are created by policies different than the (s) ≥ V π(s),∀π,∀s. Similarly, we can write optimal policy. This can be represented as V π∗ (s, a) ≥ Qπ(s, a),∀π,∀(s, a), for the optimal action value function. Once the optimal Qπ∗ action value function is found, the policy π∗(s) = arg max a Qπ∗ (s, a) (4) can be used to select the best action in each state. The answer to the question "how to find the optimal value function" determines the type of RL algorithm. The process of finding the 9 ∞(cid:88) t=0 (cid:40) ∞(cid:88) k=0 (cid:40) ∞(cid:88) (cid:41) (cid:41) optimal policy is sometimes called training. Figure 2 depicts the general training process of RL. In the figure, the agent observes the states and produces an action based on the observed states. This action influences the environment and results in a new set of states. These new states are evaluated by the reward function and a reward signal is formed. The agent uses this signal to update the policy that is being trained and the next cycle starts with the new action. Figure 2: Reinforcement learning process In the following subsections, we explain one of the most basic RL algorithms, Q-learning, and then present two other RL methods that are utilized in the game theoretic modeling framework elaborated in this article. Remark 1. The RL algorithms used in this paper are used to obtain human response poli- cies, which can then be used to quantitatively analyze scenarios where humans are involved, in the simulation environment. Therefore, there is no physical interaction with the environment during learning. 3.2.1. Q-learning One of the RL methods that played a significant role for the success of RL is Q-learning (Watkins, 1989). In Q-learning, an incremental estimate of the optimal action value function is realized using the update rule Qk+1(st, at) = Qk(st, at) + α rt + γ max a Qk(st+1, a) − Qk(st, at) , (5) (cid:18) (cid:19) where α is the step size and γ is the forgetting factor. It is noted that Q-learning is indifferent to the policy that the agent uses during training to explore the environment, which means moving from one state to the other . This type of RL algorithms, where exploration and value function updates (or policy updates) are independent, are called off policy methods. It can be shown that the learned action value function Q converges to the optimal action-value function Q∗ with probability 1, if all state-action pairs (s, a) continue to be visited during training, and if the number of these visits converges to infinity. Convergence is achieved exactly if 10 AgentEnvironmentactionstatesReward Functionreward k=1α2 k=1αk = ∞, Σ∞ the step size parameter obeys a variant of the stochastic approximation conditions, given k ≤ ∞. For a constant step size parameter, convergence is achieved as Σ∞ in the mean if 0 ≤ α ≤ 1. It is noted that continuously visiting state-action pairs is a requirement for any algorithm that is developed for the general case, where a model for the environment is not provided, to achieve convergence to the optimal solution.(Sutton and Barto, 1998). The discount factor γ determines how valuable the future rewards are. For instance, when γ is 0, agent only tries to maximize the immediate rewards. As this value approaches to 1, the agent becomes more far-sighted. 3.2.2. Neural fitted Q-learning Instead of keeping a table of Q values, some RL methods use compact structures that provide approximate Q values. This approach is especially useful when the state space is very large. Neural Networks (NN) are one of the effective tools used to store the Q-values in a compact manner, thanks to their universal approximation property. Unlike the conventional Q-learning method explained above, the state-action values are not stored in a table but instead, computed as the output of a function constructed by the specific NN structure: If a state-action pair is fed to the NN as the input, the corresponding approximate Q-value can be obtained as the NN output. The training of the NN can be achieved by first defining an error function reflecting the difference between the current and the target Q-values, and then minimizing this function by back-propagation. Although calculating the Q-values using a NN provides an effective method, it can fail, either completely or by requiring impractical convergence times, due to the global representation mechanism (Riedmiller, 2005): During the training process, NN weights are updated after the introduction of each individual state- action pair, which also effects the Q-values of other pairs. This may nullify the previous training gains in other regions. On the other hand, the global representation enables the generalization power of NNs by assigning similar Q-values to similar state-action pairs, and thus eliminating the need to train the NN for every possible pair. Therefore, a method is needed that can both exploit this property and eliminate its detrimental effects. Neural Fitted Q-learning, proposed by Riedmiller (2005), achieves to both employ the generalization power of NNs and prevent its potentially harmful effects by storing previous experiences in the form of 3-tuples, (s, a, s(cid:48)), in which s is the original state, a is the action taken and s(cid:48) is the reached state, and reusing these experiences whenever an update is performed after the introduction of a new data point. Calling a collection of these experiences as set E, the NFQ method is given in Algorithm 1. In the implementation of NFQ learning, it is advised that instead of a random collection of experiences, greedy search, using available Q-values, and random exploration are used together. NFQ contains two types of hyper-parameters: parameter of the Q-learning, the forgetting factor γ, and the parameters used for NN training. The selection of the Q-learning hyper- parameter γ is explained in the previous section. For NN training, the resilient propagation algorithm proposed in Riedmiller and Braun (1993), which works well for batch learning, is suggested since NFQ is also based on batch learning. It is discussed in Riedmiller and Braun (1993) that different values of hyperparameters do not effect the performance of the algorithm dramatically and therefore some predefined values suggested in the paper can be 11 Algorithm 1 NFQ Algorithm 1: k = 0 2: Initialize the neural network 3: while k < N do 4: Generate experience set G = {(inputi, targeti), i = 1, 2, ..., #E} where inputi = si, ai, where si is the state and ai is the action of ith experience, targeti = ri + γ mina Qk(s(cid:48)i, a), where ri is the transition cost and γ mina Qk(s(cid:48)i, a) i=1(Qk(si, ai)−targeti)2, where n refers to the experience is the weighted expected maximum path reward for the next state s(cid:48)i. Calculate the batch error as Σn set size. Train the network to minimize the batch error, using resilient back-propagation and obtain Qk+1 . k+ = 1 5: 6: 7: 8: 9: 10: end while used for most of the problems. In many NN training software packages (Abadi et al., 2015; Paszke et al., 2017) these values are already set as default so no further tuning is necessary. 3.2.3. Jaakkola reinforcement learning An agent being trained by RL uses the available information from the environment. This information is generally called the "state" of the environment. When the state of the environ- ment contains all relevant information about the current and the past interaction dynamics between the agent and the environment, this state is said to have the Markov property (Sut- ton and Barto, 2018). A learning task involving interactions with an environment that has Markov property is called a Markov Decision Process (MDP). More specifically, defining the probability of transitioning from state "s" to state "s(cid:48)" and obtaining a reward "r", given an action "a" as P (s(cid:48), rs, a), if this probability depends only on "s" and "a" but not on earlier states and actions, this learning task is called an MDP. In almost all RL methods that have convergence guarantees, the underlying dynamics is assumed to be an MDP. In the aerospace and automotive application scenarios that are investigated in this paper, although the underlying dynamics are MDPs, the agents can realistically observe only a portion of the available states. Therefore, from the agents' point of view, the tasks are Partially Observable Markov Decision Processes (POMDP). Jaakkola reinforcement learning algorithm (Jaakkola et al., 1994) is developed specifically for systems that can be modeled as POMDPs and therefore is a suitable RL method to be employed in the learning tasks that are discussed in this work. In Jaakkola algorithm, along with Q-function, the value function, V , is also used. At the beginning of the Jaakkola Algorithm, Q values are set to zero for each state-action pair. Moreover, for each state, probability distribution of actions is set to a uniform distribution. Then, for each iteration 12 (s, a, s(cid:48)), Q and V values are updated according to following equations: (cid:18) (cid:18) (cid:18) (cid:18) (cid:19) (cid:19) (cid:19) (cid:19) 1 − χt(s, a) Kt(s, a) 1 − χt(s) Kt(a) 1 − χt(s, a) Kt(s, a) 1 − χt(s) Kt(s) βt(s, a) = βt(s) = Qt(s, a) = Vt(s) = γtβt−1(s, a) + χt(s, a) Kt(s, a) γtβt−1(s) + χt(s) Kt(s) Qt−1(s, a) + βt(s, a)(Rt − R) Vt−1(s) + βt(s)(Rt − R) (6) where, s is the state, a is the action and t is the time step. Moreover, χt(s, a) (χt(s)) is equal to 1 if the given state-action pair (state) is visited, and 0 otherwise; Kt(m, a) (Kt(s)) is the number of times the state-action pair (state) is visited; Rt is the reward in time step t; R is average reward and γt is the discount factor. After the calculation of Q and V functions, Jaakkola algorithm updates its trained policy π(as) using the update rule π(as) = (1 − )π(as) + π1(as), (7) where  is the update rate, and π1(as), the policy that the trained policy is being changed towards, is a greedy-policy based on the calculated Q(s,a) values. In other words, π1(as)=1 if the action "a" has the highest Q-value in a given state "s". It can be shown (Jaakkola et al., 1994) that this policy update always increases the average reward, unless the condition [Q(s, a) − V (s)] > 0 max a (8) is satisfied. The algorithm increases the average reward until the condition (8) is false, which constitutes a local maximum. The Jaakkola algorithm consists of two hyper-parameters: the discount factor γ and the update rate . For convergence guarantees, γ should initially be selected as a number between zero and one, and should be scheduled in such a way that it converges to 1 in the limit. , on the other hand, should satisfy 0 ≤  ≤ 1. 4. Bringing the pieces together: An interplay between game theory and rein- forcement learning A schematic of the cyber-physical human system (CPHS) we are interested in, involving multiple human interactions, is depicted in Figure 3. This is a simplified diagram of the overall system, showing how humans' actions change the cyber-physical system states, which are observed by humans who produce the next set of actions and initiate the next cycle accordingly. It is noted that humans' actions are also affecting each other through the closed loop nature of the information flow. Another important take-away from this figure is that 13 human observations are not necessarily the same and an individual human agent does not have full state information. Observation i blocks, where i = 1, 2, ..., n, represent the human observation process. This process is limited and imperfect, therefore each human receives a noisy subset of the whole system state. Human goal blocks represent what each of the human agent is trying to accomplish, which can be driving from point A to point B in a road traffic scenario, or protecting his or her own aircraft from a hacker attack in a cyber-security scenario. Figure 3: Cyber-physical human system with multiple humans Obtaining a model for the system shown in Figure 3 requires considering the interaction of human actions. Humans are strategic thinkers and therefore if we want to build a model that represents reality, to the best of our ability, we need to find a way to have agent models that consider other agents' possible actions before making a move. As discussed in Section 3.1, this is what game theory is all about: Modeling the interactions between strategic agents. Therefore, we may utilize game theory to solve this problem. However, there is one complication in this approach. This is a system where the interaction may last for long periods of time, and therefore obtaining an equilibrium solution can be computationally intractable. If the number of agents get larger, as in several real world applications, even for short periods of interactions, the computational cost grows rapidly. One way around this problem is using the non-equilibrium game theoretical solution concept, level-k thinking, explained in Section 3.1, where human actions are predicted in an iterated manner, instead of being evaluated at the same time. This means that once the anchoring level, level-0, is selected, a level-1 human agent's behavior can be identified as the best response to all the other human actions that are determined by the level-0 policy. Similarly, once level-1 behavior is identified, all the agents in the system are assigned the level-1 policy except the 14 HumansCyber-Physical Systemhuman goal 1statesAgent naction 1action 2action nObservation 1Agent 2Agent 1Physical SystemsAutomationComputationCommunicationNetworkinghuman goal 2Observation 2human goalnObservationn one whose level-2 behavior is to be found. Therefore, to predict the policy of a level-k agent, all the rest of the agents' policies are set to level-(k-1), which effectively make them a part of the environment whose dynamics are known, and level-k policy is determined as the best response to the rest of the level-(k-1) policy actions (see Figure 4). This isolates the level-k policy as the single policy that needs to be computed. It is noted that in Figure 4, the actions of the level-(k-1) agents are not shown and the states still belong to the CPS. These details are omitted for brevity. Figure 4: Obtaining level-k policy Once the difficulty of high computational cost due to multiple decision makers is solved using level-k thinking, the problem reduces to estimating the optimal action sequence of an intelligent agent in a given environment. This problem can be stated as a reinforcement learning (RL) problem by properly defining the states, actions, the environment and the reward function. (Compare Figure 2 and Figure 4.) Therefore, using one of the suitable RL methods described in Section 3.2, modeling of the CPHS with multiple human interactions can be completed. The type of the preferred RL algorithm depends heavily on the observation and action spaces of the agents, which in turn depend on the engineering domain of the CPHS operation. The general algorithm used in obtaining the agent policies, demonstrating the interplay between the game theory and RL, is provided in Algorithm 2, where k is the maximum desired level. It is noted that, a level-k agent can be made to best-respond to all lower levels, k=0, 1, .. (k-1), instead of only best-responding to level-(k-1), which may or may not be desired depending on the application, by including all lower levels in the agent's policy space. In the following sections, based on Musavi et al. (2016) and Albaba et al. (2019), we ex- plain how this interplay between RL and game theory is used to create modeling frameworks for two different engineering realms, where multiple (180 in one case and 125 in the other) human interactions are involved. 15 HumanEnvironmenthuman goalstatesactionObservationAgent level-kPhysical SystemsAutomationComputationCommunicationNetworkingAgent level-(k-1)Agent level-(k-1) Algorithm 2 Interplay between RL and Game Theory 1: Set i = 0 2: while i < k do 3: 4: Load the level-i policy Set cognition levels of all players in the environment other than the learning agent to level-i, i.e. set policies of players to level-i policy Place the learning agent in the initialized environment, in which all players are level-i Start the training of the learning agent using a reinforcement learning method, through which agent learns how to best respond to level-i players 5: 6: 7: Once the training is completed, learning agent becomes a level-(i+1) player 8: 9: 10: end while Save the policy of the learning agent as level-(i+1) policy i += 1 Remark 2. The methods discussed in this paper, which are used to model cyber-physical human systems, are used solely for modeling purposes. Therefore, they are not meant to be used in physical motion systems. Remark 3. There exist several successful cyber-physical system models in the literature. The bottleneck in driving models for cyber-physical human systems, is computing the multi- agent, multi-move decision making dynamics, which corresponds to obtaining the models in the green "Humans" block in Figure 3. Therefore, in this paper, to emphasize the power of the discussed game theoretical modeling approach in predicting human responses, we avoided employing complicated vehicle models. Remark 4. The cyber-physical human systems modeling method explained in this paper merges reinforcement learning and game theory. It is noted that the level-k approach is not the only game theoretical method that can be employed here. Theoretically, other game theo- retical methods can also be used. However, as explained in this section, thanks to the hierar- chical modeling approach inherent in the level-k reasoning, modeling multi-move, multi-agent scenarios with simultaneous decision makers can be handled in a computationally tractable manner, which makes the level-k method a suitable candidate for the scenarios investigated in this paper. 5. Hybrid airspace modeling With hybrid airspace we refer to an airspace where manned and unmanned aircraft coex- ist. As discussed at length in Section 2.1, obtaining hybrid airspace models is a necessity for successful integration of unmanned aircraft systems (UAS) into the National Airspace Sys- tem (NAS). In this section, we present how the game theoretic modeling framework discussed here is used to realize the modeling of these systems. 16 Figure 5: A hybrid airspace scenario where red squares represent manned aircraft and the cyan square is used to indicate an unmanned aircraft (UA). The yellow circles in the 600 km x 300 km airspace are the waypoints assigned to the UA. (Musavi et al. (2016), reprinted with permission of the American Institute of Aeronautics and Astronautics, Inc.) Figure 5 shows a hybrid airspace scenario where a UAS (cyan) is assigned to follow certain waypoints (yellow) in a crowded airspace filled with manned aircraft (red). We are interested in how the overall system will evolve in time. To be able to predict the possible outcomes of this scenario, we need to create a model that will capture the reaction dynamics of manned aircraft pilots in cases of separation conflicts. As discussed earlier, the game theoretical modeling approach produces policies, which are probabilistic maps from observations to actions, to represent human reactions. Therefore, to obtain these policies, we first need to clearly define the observation and action spaces and represent them in a way that is meaningful for the RL algorithm. Once these spaces are explicitly defined, pilot goals and preferences need to be expressed in form of a reward function. Furthermore, to train pilot policies in a simulation environment, we need to realize the motions of the aircraft, manned and unmanned, using their physical models. Finally, sense and avoid algorithms need to be integrated to UAS dynamics for collision avoidance. Below, we explain how these pieces are obtained and then assembled to create the overall hybrid airspace model. Furthermore, we discuss the validation studies conducted using data. 5.1. Observation and action spaces Self-separation concept, where the pilots (and crew) are responsible for keeping a safe distance from encountered traffic, is a procedure that is being explored for Next Generation (NextGen) Air Transportation System (Wing et al., 2013). One of the technologies that can make this possible is Automatic Dependent Surveillance Broadcast (ADSB), which provides 17 state information of the surrounding traffic, with a precision better than the radar (Kacem et al., 2018). In the above scenario, we assume that aircraft are equipped with this technology. To factor in cognitive limitations, the observation space is set as a pie shaped region formed by two circles sharing a common center, which is depicted in Figure 6, on the left. The inner circle radius is taken as 1 nmi and the outer circle radius is taken as 5 nmi, reflecting the standard separation requirements for manned aircraft (Perez-Batlle et al., 2012). These circles are then divided into 3 slices resulting in 6 different observation regions. If an intruder approaches one of these regions, the region that is being approached is coded with number 1, 2, 3 or 4, depending on the approach angle, while the rest obtains a zero value. For example, in Figure 6, Aircraft B is approaching Aircraft A's observation space with a 120 degree angle which makes the corresponding entry for the approached region take the value of 2, while the rest are assigned 0. This is shown under the state components section on the rightmost side of the figure. The information of the best immediate actions that will make the aircraft approach its predetermined trajectory (Best Trajectory Action, BTA) and to its predetermined destination (Best Destination Action, BDA), together with the pilot's Previous Action (PA) are also coded into the state components. The pilot action space consists of 3 actions: 45 degrees left, straight and 45 degrees right, and these actions are coded as 0, 1 and 2, respectively, in the state components. It is noted that these actions go through aircraft dynamics to produce the actual aircraft motion. During training, the state components entries are continuously updated, based on the explanations given above, and used in the RL algorithm. With the aforementioned observation and action spaces, the RL algorithm need to assign Q values to 56 × 33 × 3 = 1, 265, 625 state-action pairs. Remark 5. The actions described in this section are not the actions of the aircraft but the decision inputs to the real continuous aircraft dynamics, whose outputs are the aircraft actions. The aircraft dynamics is explained in Section 5.3. 5.2. Reward function For the RL algorithm to evaluate the desirability of selecting a certain action given a state, a reward function that specifies pilot preferences and goals is required. For the UAS integration into NAS scenario, the reward function r = −ω1C − ω2S − ω3I + ω4D + ω5P − ω6E (9) is used, where C and S represent the number of aircraft (manned or unmanned) occupying a space within the collision and separation regions of the ego aircraft, respectively. The definition of these regions can be found at Planning et al. (2007) and Perez-Batlle et al. (2012). I is binary and gets the values of 1 or 0 depending on whether the ego aircraft is approaching or distancing from the intruder. D and P are the degrees of approach (or distancing) by the ego aircraft to its destination and to its defined trajectory, respectively, normalized by the distance covered in one time step. To accommodate the tendency of humans to minimize energy consumption as much as possible, E is introduced to represent effort, taking the values of 1 or 0, depending on whether the pilot takes a new action or not, respectively. 18 Figure 6: Observation space. (Musavi et al. (2016), reprinted with permission of the American Institute of Aeronautics and Astronautics, Inc.) Remark 6. The selection of the reward function plays a crucial role in the performance of the reinforcement learning algorithm. A formal procedure for the determination of a proper reward function is an open area of research. However, addressing context-dependent problems that reflect the agent's preferences, while keeping the function simple is the general approach for determining the reward functions. One problem that needs to be solved in this section is avoiding collisions and separation violations, which is addressed by the terms C, S and I in (9). Another problem is reaching a given destination while following a predetermined trajectory, which is addressed by the terms D and P . Finally, the problem of energy con- servation is addressed by the term E. An alternative to (9) could be a reward function that uses continuous variables for all the terms. This would increase the resolution but could unnecessarily complicate the function. In certain problems such as learning a policy from an expert, the reward function selection can be done using a more systematic approach by solving an inverse reinforcement learning problem (Sutton and Barto, 2018). 5.3. Physical models of manned and unmanned aircraft As explained above, aircraft are controlled by pilots' commands of heading angle changes (±45 degrees). Using the standard turn rate of 3 deg/s angular velocity (Nancy, 2016), we model the aircraft turning motion with a first order dynamics having a time constant of 10 seconds. The related differential equation is Ψ = −0.1(Ψ − Ψd), (10) 19 Agent AAgent B000020121Observation Space & Approach AngleBDABTAPA120°Starting PointDestinationState Components where Ψ and Ψd represent the current and the desired heading angles, respectively. The manned aircraft are assumed to be flying in en route phase with a constant velocity v, having the x and y coordinate components and vx = v sin Ψ vy = v cos Ψ. (11) (12) Unmanned aircraft are assumed to fly autonomously while avoiding collisions using an on- board sense and avoid (SAA) algorithm. This algorithm commands velocity vector changes if an intruder is detected. Using a 1 second time constant (Mujumdar and Padhi, 2011) and a first order dynamics, the velocity vector dynamics are modeled as (cid:126)v = −((cid:126)v − (cid:126)vd), (13) where (cid:126)vd is the desired velocity vector. Two SAA algorithms are employed in the simula- tion environment with different velocity vectoring properties. Both of them first detects a probable conflict by forecasting the future trajectories of both the ego and intruder aircraft, and checking whether the minimum calculated distance, R, between them is smaller than a predetermined threshold value. If a conflict is detected, a desired velocity vector command, (cid:126)vd, is produced. One of the SAA algorithms (SAA1) proposed by Fasano et al. (2008) issues the velocity command (cid:126)vd = (cid:126)vei cos(η − ξ) sin(ξ) sin(η) (cid:126)vei (cid:126)vei − sin(η − ξ) (cid:126)r (cid:126)r + (cid:126)vi , (14) (cid:32) (cid:18) (cid:19) (cid:33) in cases of conflict, where the ego unmanned aircraft velocity command and intruder aircraft velocity are represented by (cid:126)vd and (cid:126)vi, respectively. Similarly, (cid:126)r and (cid:126)vei refer, respectively, to the relative position and velocity between these two aircraft, and η is the angle between these two vectors. Angle ξ is determined as ξ = sin−1(R/(cid:126)r). The other SAA algorithm (SAA2) used in simulations provides the velocity command (cid:126)vd = −(cid:126)ve( (cid:126)r0·(cid:126)vei (cid:12)(cid:12)(cid:12)(cid:12) − (cid:126)ve( (cid:126)r0·(cid:126)vei (cid:126)vei ) − (R − (cid:126)rm) (cid:126)rm(cid:126)rm (cid:126)vei ) − (R − (cid:126)rm) (cid:126)rm(cid:126)rm (cid:12)(cid:12)(cid:12)(cid:12) (15) to resolve conflicts, where (cid:126)r0 and (cid:126)rm stand for the initial and minimum relative positions between the ego unmanned aircraft and the intruder (Mujumdar and Padhi, 2011). 5.4. Simulation results After the necessary pieces explained above are set to create the overall hybrid airspace model, pilot reactions are obtained using the interplay, explained in Section 4, between the level-k game theoretical approach (Section 3.1) and Jaakkola reinforcement learning method 20 Algorithm 3 Interplay between RL and Game Theory in NAS 1: i = 0 2: while i < k (k is the maximum cognition level) do 3: 4: Load the level-i policy Set the policies of all the pilots in the scenario, other than the ego pilot (the pilot being trained), to level-i Start the training of the ego pilot using reinforcement learning, through which the pilot learns how to best respond to level-i pilots 5: 6: Once the training is completed, the ego pilot becomes a level-(i + 1) pilot 7: 8: 9: end while Save the policy of the ego pilot as level-(i + 1) policy i+ = 1 (Section 3.2.3). The algorithm that details this process is given in Algorithm 3. Once the pilot reaction dynamics are created, quantitative analyses on the integration scenario are conducted using Monte Carlo simulations. Since one of the bottlenecks of UAS integration into NAS is the maturation of SAA algorithms, we present how the modeling method dis- cussed in this article can be used to conduct comparative quantitative analysis on various aspects of different SAA methods. Specifically, we analyze the effect of distance horizon and time horizon variables used in the SAA development. In this article, we define the former as the scan radius of the algorithm, and the latter as the amount of projection time used to detect a conflict. Figure 7 and Figure 8 depict the effect of varying distance and time horizons on tra- jectory deviations, flight times and number of separation violations, for SAA1 and SAA2, respectively. A few conclusions, not in increasing or decreasing importance, can be drawn from these results. First, although time horizon makes a significant effect on both safety (separation violations) and performance (trajectory deviations and flight times) measures for SAA1, the unmanned aircraft equipped with SAA2 is not affected as much with the vari- ation of this parameter. Second, the effect of the distance horizon on separation violation numbers levels out quickly for SAA1, while SAA2 keeps showing lesser and lesser violation rates, although SAA1 provides a safer traffic in the same parameter range. Third, UAS trajectory deviations are generally smaller when SAA2 is employed. Fourth, an interesting but expected phenomenon is observed: the trajectory deviations of manned and unmanned aircraft have negative correlation. As the UAS trajectory deviations increase, showing that SAA is doing more work for keeping a safe distance, manned aircraft pilots spend less effort and have less trajectory deviations. All these results obtained in a simulation environment with real-time decision making pilots can be used in testing and tuning of SAA algorithms, as well as making a quantitative comparison between different approaches. 21 (a) manned aircraft trajectory deviation (b) UAS trajectory deviation (c) UAS flight time (d) number of separation violations Figure 7: When SAA1 is employed in HAS, effects of varying time and distance horizons on separation viola- tions, flight times and trajectory deviations are presented. (Musavi et al. (2016), reprinted with permission of the American Institute of Aeronautics and Astronautics, Inc.) 22 . (a) manned aircraft trajectory deviation (b) UAS trajectory deviation (c) UAS flight time (d) number of separation violations Figure 8: Safety vs. performance in HAS, when SAA2 is employed is depicted by showing the changes in trajectory deviations, flight times and separation violations with the changes in distance and time horizons. (Musavi et al. (2016), reprinted with permission of the American Institute of Aeronautics and Astronautics, Inc.) 23 5.5. Validation Although we do not have enough, if at all, UAS integration data to test against the predictions of the game theoretical modeling approach, the resulting models created by the method need to be validated using other means, to achieve at least a minimum level of credibility. Several validation methods are introduced in the literature, such as face validity, comparison with validated models, historical data validation, parameter sensitivity analysis and predictive validation (MITRE Corp., 2014). Among these, the ones that are based on data are the most effective validation methods. It is noted that when the data becomes available, one needs to test if relevant statistics between the data and the model are matching. For example, average aircraft trajectory deviation and the average number of separation violations can be compared. Furthermore, during individual encounters, pilot decisions and minimum distances between UAS and manned aircraft, predicted by the model and obtained from the data can be investigated to see whether or not they show similar characteristics. It is noted that the game theoretical modeling approach has enough degrees of freedom, such as reward function terms and weights, to be able to be modified, in case some discrepancies between data and the model are observed when the data becomes available in the future. This is an important feature that needs to be found in predictive models (Law, 2008). Since currently data is not available, we discuss two methods that can be used without data: face validation and comparison with a validated model. Face validation evaluates two aspects of the model: the logic behind the modeling method, and input-output relationships of the model. Two main approaches used in the proposed model, namely reinforcement learning and game theory, are well-established fields that showed promise in modeling real-life behavior. Experimental backing of the level-k game theory is also provided in relevant references discussed in the review of existing work sections in this article. Also, the logic behind the selection of reward function terms is explained in earlier sections. We also discussed above the input-output relationships when we explained the effects of different parameters on the airspace scenario with figures, and showed that the results are reasonable. Sample trajectories of a data-validated model developed by the Lincoln Laboratory (Kochenderfer et al., 2008) is available online in two text files that are open to public: cor ac1.txt and cor ac2.txt. A comparison of one of the available trajectories (encounter 3) with the game theoretical model prediction is provided in Figure 9. In the figure, start- ing points of aircraft are indicated by thick dots. It is seen that pilot decisions, as well as minimum distance between aircraft during the encounter are similar. Further trajectory comparisons between the game theoretical model and this data-validated model can be found in Musavi et al. (2016). 6. Road traffic modeling Similar to the unmanned airspace system (UAS) integration study, to obtain the model of the road traffic, we need the physical models of the cars, driver observation and action spaces, and a reward function reflecting the goals and preferences of the drivers. Below, we 24 (a) Trajectories created by the validated model. (b) Trajectories created by the proposed model. (c) Separation distances for each model. Figure 9: Comparison of the trajectories created by the validated model and the game theoretical modeling approach for sample encounter number 3. (Musavi et al. (2016), reprinted with permission of the American Institute of Aeronautics and Astronautics, Inc.) explain these components and also provide validation of the resultant overall model with traffic data. 6.1. Driver observation and action spaces Several different traffic scenarios can be modeled via the proposed approach. To be able to test the results with data, we developed the model of a 5-lane highway, similar to the US101 Hollywood Freeway, whose raw data is available at Colyar and Halkias (2007). In this scenario, the human drivers are assumed to be observing (or being able to process from all available data), his or her immediate neighboring lane cars (front left, front right, rear left, rear right) and the car in front. Figure 10 presents a snapshot of a typical ego vehicle (red) motion, where the driver can observe the surrounding 5 cars. As in the UAS integration scenario, the observation space is quantized and the distances are coded as nominal, close and far. It is noted that this quantization introduces noise and uncertainty to driver obser- vations since instead of the exact location of neighboring cars, only a certain region occupied by the car is known. The importance of introducing noise and uncertainty to the human observations are discussed in Section 4 and represented by Observation blocks in Figure 3. To determine reasonable values for quantization, the distance distribution between cars are processed from the raw data provided in Colyar and Halkias (2007) and plotted in Figure 11. Based on this distribution, nominal range is defined to be between 11 m - 27 m, close is 25 Figure 10: Ego vehicle and surrounding traffic Figure 11: Distribution of distances to car in front. defined as smaller than 11 m and far is used for distances larger than 27 m. It is noted that nominal region consists of approximately half of the area under the curve depicted in the figure. Once the positions of the surrounding cars are defined, their relative motions against the ego car are expressed as stable, approaching and distancing. As a result, the observation space of the ego car consists of quantized positions and relative motions of the surrounding cars. As we use traffic data to obtain a meaningful observation space, part of the action space is also formed by considering the acceleration distribution, the plot of which is given in Figure 12, obtained by processing the same traffic data. According to this acceleration distribution, acceleration inputs of the drivers are categorized into 5 separate continuous sub-distributions: 1) Maintain, a normal distribution with zero mean and 0.075 standard deviation, 2) accelerate a uniform distribution between 0.5 m/s2 - 2.5 m/s2, 3) decelerate a uniform distribution between -0.5 m/s2 and -2.5 m/s2, 4) hard accelerate, a half normal 26 Figure 12: Acceleration distribution distribution with a 3.5 m/s2 mean and 0.3 m/s2 standard deviation, 5) hard decelerate, a half normal distribution with -3.5 m/s2 mean and 0.3 m/s2 standard deviation. Drivers sample these distributions to create an acceleration action, if they choose to. Two other action choices for the drivers are move to the left lane and move to the right lane, during both of which the velocity is assumed to remain constant. 6.2. Reward function The driver reward function used in the reinforcement learning (RL) algorithm is r = ω1C + ω2S + ω3D + ω4E, (16) where C is binary, taking values of -1 and 0, depending on whether a collision occurred or not; S is the normalized deviation of the ego vehicle speed from the mean speed of the traffic; D is related to the distance between the ego vehicle and the car in front, and takes the values of -1, 0 or 1 depending on whether the distance is close, nominal or far, respectively. This term reflects the driver preference of having as much headway as possible. E is the effort variable taking the value of 0 if the action is maintain; a value of -0.25, if the action is accelerate or decelerate; and -0.5 if it's hard accelerate or hard decelerate. E receives -1 if the driver changes lane. Remark 7. The terms of the reward function provided in (16) are determined based on the specific problems that need to be solved to obtain driver dynamics. The solution of these problems reflects the driver's preferences. Specific issues to be solved can be listed as col- lision avoidance (term C), performance (term S), safety (term D) and comfort or energy conservation (term E). Instead of discrete valued terms used in (16), continuously vary- ing terms could be employed. However, while this would reflect the driver preferences in a finer manner, it could introduce unnecessary complexity. A more systematic selection of the reward function can be conducted for problems such as imitation learning, where inverse reinforcement learning methods are applied (Sutton and Barto, 2018). 27 6.3. Physical models For the modeled traffic scenario, simple kinematic models are used to obtain vehicle motion. Once the driver command is received, velocity and position dynamics are obtained as x(t + ∆t) = x(t) + vx(t) ∗ ∆t + y(t + ∆t) = y(t) + vy(t) ∗ ∆t vx(t + ∆t) = vx(t) + a(t) ∗ ∆t, 1 2 a(t)∆t2 (17) where vx and vy are the velocity components in the x and y directions, x and y coordinates are the same as given in Figure 10, and ∆t is the simulation time step. It is noted that the dynamics are not discrete but continuous, and have to be approximated due to computer implementation. 6.4. Training, average rewards and entropy Driver policies with various levels are trained using the Jaakkola reinforcement learning algorithm explained in Section 3.2.3. During training, up to 125 vehicles are used in the 5-lane traffic scenario. Figures 13-15 show the time evolution of average rewards during the training of level-1, level-2 and level-3 policies, together with the average entropy of the probability distribution over actions. The entropy of a probability distribution is calculated as E = − n(cid:88) pi log(pi), (18) i=1 where n is the number of probability values pi. Since the drivers have 7 actions, we have n = 7. The entropy is highest when the distribution is uniform, which is the case in the beginning of training, and drops as the training progresses and the distribution gets away from uniform. However, as seen from the figures, although the average reward converges relatively fast, entropy continues to drop at a very slow rate. The reason for this is that there are several states with lower probability of being visited during training and after a certain driving pattern emerges, the effect of these rarely visited states becomes very small. This can also be observed from Figure 16, where the entropies of the two frequently visited states are shown to converge to very small values. 28 (a) Average reward per episode in level- 1 training (b) Entropy per episode in level-1 train- ing Figure 13: Level-1 training (a) Average reward per episode in level- 2 training (b) Entropy per episode in level-2 train- ing Figure 14: Level-2 training (a) Average reward per episode in level- 3 training (b) Entropy per episode in level-3 train- ing Figure 15: Level-3 training 29 (a) Entropy per visit of a state (b) Entropy per visit of a different state Figure 16: Entropy per visit plots of two randomly selected states. 6.5. Data validation The driver policies obtained using the game theoretical framework are compared with real traffic data provided by Colyar and Halkias (2007). The data provides acceleration values of the drivers at each measurement instant. This data is first processed to obtain the states the drivers are in and then to find the frequency of taken actions at each state. These state- action frequency distributions form the real driver policies. To compare the distributions modeled using the proposed game theoretical approach and the distributions obtained from data, we use the Kolmogorov-Smirnov (KS) Test for Discontinuous Distributions (Conover, 1972). In this test, if the unknown discrete probability distribution function is F (x) and the hypothesized distribution is H(x), the null hypothesis H0 is defined as Three test statistics used in the test are H0 : F (x) = H(x) f or all x. and D = supxHc(x) − Sn(x), D− = supx(Hc(x) − Sn(x)) D+ = supx(Sn(x) − Hc(x)), (19) (20) (21) (22) where Sn(x) and Hc(x) are the cumulative distribution functions (CDF) of the observed data and of the hypothesized distribution (model), respectively. The observed values of the test statistics D, D− and D+ are defined as d, d− and d+, respectively. The goal of the KS test is to calculate the probability of observing at least the value d for the test statistics D, which can be stated as P (D ≥ d), given that the null hypothesis is true. This is achieved by first calculating P (D+ ≥ d) and P (D− ≥ d), and then obtaining P (D ≥ d) as P (D ≥ d) = P (D+ ≥ d+) + P (D− ≥ d−). (23) 30 The details of obtaining P (D+ ≥ d) and P (D ≥ d−) are omitted here for brevity and can be found in (Conover, 1972). Once P (D ≥ d) is calculated using (23), the null hypothesis is rejected if P (D ≥ d) ≤ 0.05. Since this test provides meaningful results for distributions with non-zero entries, action probabilities that are lower than 0.01 are set to 0.01 with normalization, for both the real data and the driver model. Data validation is conducted individually for each driver: For the driver of interest, first, the action probability distributions for each visited state are computed. Second, these dis- tributions are compared with derived driver policies using the proposed modeling framework via KS test. Specifically, the distributions from the data are compared with level-1, level-2 and level-3 policies. Finally, the percentage of the states that can be successfully modeled are reported. This procedure is repeated for every driver whose traffic data is available at Colyar and Halkias (2007). The states that are visited less than a certain threshold number, nlimit, during actual driving by the drivers and during training of the policies are not taken into account. The results are reported for different values of nlimit. The algorithm used for this validation procedure is provided in Algorithm 4, where nstate is the number of visited states by the driver, nV driver is the number of times the driver of interest visited the state being evaluated, nV model is the number of times the state is visited during the training of the driver model, ncomp is the number of states that are used in the comparison and nsuccess is the number of states for which the null hypothesis is not rejected. Algorithm 4 Procedure of Comparison between one driver-one policy - Kolmogorov Smirnov 1: for i = 1 to nstate do 2: 3: 4: if nV driver ≥ nlimit and nV model ≥ nlimit then ncomp+ = 1 Set pi to the probability mass function given by the driver model for the state being evaluated. Set ki to the probability mass function calculated from the driver data for the state being evaluated. Set Hc to the cumulative distribution function obtained from pi. Set Sn to the cumulative distribution function obtained from ki. Test the null hypothesis using KS test. if Null hypothesis is not rejected then 6: 7: 8: 9: 10: 11: end if 12: 13: end for 14: Set the percentage of the successfully modeled states to nsuccess/ncomp. nsuccess+ = 1 5: end if Data validations using Algorithm 4 are conducted for nlimit values of 0, 3 and 5, for each individual driver and the results are reported below. 31 6.5.1. Validation with nlimit = 1 Figure 17 shows the percentage of successfully modeled states for each driver, using level-1, level-2 and level-3 policies as the driver models. Each vertical thin line represents an individual driver and the x-axis shows the driver labels. It is seen that there are more than two thousand drivers in the real traffic data. The y-axis shows the percentage of successfully modeled states. The colors blue, red and yellow represent the successfully modeled states by level-1, level-2 and level-3 policies, respectively. Figure 18 also shows the successfully modeled states, but this time using a uniform distribution (UD) model for the drivers. Finally, Figure 19 shows the difference between the level-k models (combined) and the UD model, in terms of modeling percentages. It is seen that the level-k models cumulatively perform better than the UD model. It is noted that although the level-k models perform better, the percentage of states that are modeled using the UD model are high. The main reason for this is the small nlimit, which is 1 in this case. For the state that is visited only 1 time by the actual driver, the KS test does not reject the hypothesis that the action distribution over this state, obtained from the data, is sampled from a UD, since the sample size is not large enough to arrive at a conclusion. Figure 17: Percentages of successfully modeled states for each driver, using level-k models, when nlimit = 1. 32 Figure 18: Percentages of successfully modeled states for each driver, using the uniform distribution model, when nlimit = 1 Figure 19: Difference in successfully modeled state percentages, for each driver, using level-k (combined) and UD models, when nlimit = 1. Figure 20 shows the number of drivers, on the y-axis, and the percentage of the success- fully modeled states by the level-k models (top) and the UD model (bottom). For example, it shown that around 80% of the total visited states of 300 drivers are successfully modeled by the level-k models, while only a handful of drivers' states are successfully modeled up to 33 60% by the same models. The more the distribution of bars on these figures are grouped on the right, the better, since it shows that successfully modeled state percentages are higher. Figure 20: Distribution of modeled percentages for combined policies and dumb policy, when nlimit = 3. 6.5.2. Validation with nlimit = 3 Figure 21 and 22 show the percentages of the successfully modeled states by the level- k models and the UD model, respectively. As Figure 23 demonstrates, with an increased threshold (nlimit = 3) the better performance of level-k models, compared to the UD model, becomes more prominent . This is due to the increased power of the KS test with the elimination of rarely visited states by the drivers. 34 Figure 21: Percentages of successfully modeled states for each driver, using level-k models, when nlimit = 3. Figure 22: Percentages of successfully modeled states for each driver, using the uniform distribution model, when nlimit = 3. 35 Figure 23: Difference in successfully modeled state percentages, for each driver, using level-k (combined) and UD models, when nlimit = 3. Figure 24 also demonstrates the increased performance difference between the level-k and the UD models, in favor of the level-k, by showing the distribution of the number of drivers over successfully modeled state percentages. As more of the rarely visited states are removed from the comparison, the KS test is able to reject the null hypothesis more frequently for the UD models. Figure 24: Distribution of modeled percentages for combined policies and dumb policy, when nlimit = 3. 36 6.5.3. Validation with nlimit = 5 When even more of the rarely visited states are removed from the test by increasing the threshold further to nlimit = 5, the same trend in increased performance difference between the level-k models and the UD model continues, as seen in Figures 25, 26, 27 and 28. Figure 25: Percentages of successfully modeled states for each driver, using level-k models, when nlimit = 5. Figure 26: Percentages of successfully modeled states for each driver, using the uniform distribution model, when nlimit = 5. 37 Figure 27: Difference in successfully modeled state percentages, for each driver, using level-k (combined) and UD models, when nlimit = 5. Figure 28: Distribution of modeled percentages for combined policies and dumb policy, when nlimit = 5. To summarize, KS test results demonstrate that with varying levels of success, the ex- ploited game theoretical modeling framework provides driver models whose predictive power can be validated with real traffic data. Since it is hard to find similar driver models in the literature, with probability distributions over actions, the results are compared with a uniform distribution model. For all three nlimit values, level-k policies (combined) performed better than the UD model. 38 7. Computational Complexity In both of the application areas, hybrid airspace modeling and road traffic modeling, dis- cussed in the previous sections, the exploited game theoretic framework employed Jaakkola reinforcement learning method explained in Section 3.2.3. In this section, a computational cost analysis is provided for this method. Specifically, two questions are answered: 1) How do the action and observation space sizes affect the computational complexity? 2) How do the complexities of the physical motion models affect the computational complexity? In the analysis, the dimensions of the state and action spaces are taken as S and A, respectively. It is assumed that a) every state is visited K times during one sweep, and b) the value functions are updated after each visit. For each state-action pair, (si, ai), the functions given below are calculated: 1 − χt(si, ai) Kt(si, ai) γtβt−1(si, ai) + χt(si, ai) Kt(si, ai) γtβt−1(si) + χt(si) Kt(si) Qt−1(si, ai) + βt(si, ai)(Rt − R) Vt−1(si) + βt(si)(Rt − R) (cid:18) (cid:18) (cid:18) (cid:18) (cid:19) (cid:19) (cid:19) (cid:19) 1 − χt(si) Kt(ai) 1 − χt(si, ai) Kt(si, ai) 1 − χt(si) Kt(si) βt(si, ai) = βt(si) = Qt(si, ai) = Vt(si) = f or each action ak (cid:54)= ai f or each state sj (cid:54)= si and action al βt(si, ak) = γtβt−1(si, ak) Qt(si, ak) = Qt−1(si, ak) + βt(si, ak)(Rt − R) βt(sj, al) = γtβt−1(sj, al) βt(sj) = γtβt−1(sj) Qt(sj, al) = Qt−1(sj, al) + βt(sj, al)(Rt − R) Vt(sj) = Vt−1(sj) + βt(sj)(Rt − R) f or each state sx and action ay π(aysx) = (1 − )π(aysx) + π1(aysx). (24) Therefore, for each state visit, ((24 + (A− 1)∗ (4)) + (S − 1)∗ (A)∗ (8) + S ∗ A∗ 4) operations are required. Visiting all of the states, K times each, the total number of operations become, K ∗ S ∗ ((24 + (A − 1) ∗ (4)) + (S − 1) ∗ (A) ∗ (8) + S ∗ A ∗ 4), which can be expressed more compactly as R = caS2A + cbSA + ccS, (25) where R is the number of required operations, and ca, cb and cc are constants. Therefore, the number of total operations can be given as O(AS2). 39 Using more complex vehicle dynamics, for example increasing the number of differential equations of the vehicle dynamics by c, will result in a computational cost that is c times of the initial cost. Since this a constant effect, the total number of operations can still be expressed by O(AS2). 8. Ongoing and Future work In this section, we explain the current and future work about the game theoretical mod- eling method explained in this paper. Part of these studies are already formulated but not included in this article for a concise and clear exposition. Below, we briefly mention a few that have the potential to improve the existing work in a meaningful manner. 8.1. 3D hybrid airspace Unmanned aircraft systems (UAS) integration into National Airspace System (NAS) studies presented in this article use a 2-dimensional (2D) geometry for aircraft motion. Although it is demonstrated that the proposed framework can be used to provide significant qualitative analysis power in UAS integration scenarios, the study is still limited and need to be extended to 3D airspace. Preliminary studies are conducted in this direction, details of which can be found in Musavi et al. (2018). One important distinction in this study is the need for an approximate reinforcement learning algorithm to handle the dramatically increased state space due to the 3D geometry. In the 2D case, the observation space consists of 9 variables. 6 of these variables can take 5 different values, while the remaining 3 variables can take 3 different values. Therefore, the size of the observation space is 56 × 33 = 421875. This means that 421875 rows are required in the Q-table to represent each state. To store the values required during training, 16 columns are required. These columns are: state id, state value - V, state visit count, state beta, action 1 probability, action 1 Q value, action 1 count, action 1 beta, action 2 probability, action 2 Q value, action 2 count, action 2 beta, action 3 probability, action 3 Q value, action 3 count and action 3 beta. Hence, 421875 × 16 = 6750000 values are stored in the Q-table as double. Since each double requires 8 bytes, 54 MB memory is required to store the Q table. This is not a significant amount of memory, which can be handled by any modern computer without any problem. However, when the geometry changes from 2D to 3D, the memory requirement becomes infeasible, even if we keep the action space the same. Adding 6 more observation states with 5 possible values for each, the dimension of the observation space becomes 512 × 33 = 6591796875, which translates into a requirement of 800GB of memory to store the Q table. This calculation shows the necessity to use an approximate reinforcement learning method that eliminates the need for storing a Q table. The Neural Fitted Q-learning method, explained in Section 3.2.2 is currently being tested for this task. 8.2. Large scale cyber-security scenarios One ongoing study is creating a model of a large scale cyber-attack scenario, where multiple attackers try to hack into a cyber-physical system and several defenders try to 40 keep the system safe. Reliable predictions of attacker-defender dynamics is valuable since they help design systems resilient to cyber-attacks. A two-person model of a cyber-attack scenario of a smart grid system is already conducted by Backhaus et al. (2013). For a larger scenario, similar to the 3D airspace case, problems of increased state space should be solved together with integrating fast optimization algorithms to optimize the system design. Furthermore, reward function design for multiple attackers and defenders is a challenge especially if coordination within the attackers or defenders is envisioned. 8.3. Data validation Although data validation studies are presented in earlier sections, they are still at their initial stages due to several reasons. First, a lot more data is required for a reliable validation. For example, in UAS integration studies, validation is conducted using a data-validated model of manned aircraft encounters. We hope to obtain UAS and manned aircraft encounter data in the near future as the technology advances. Furthermore, in the traffic scenario, we used US101 data for validation but more road data is expected to be collected to ensure that the proposed model has the capability to model a large variation of highway configurations. In addition, as we use more data, we plan to fit the model parameters to certain amount of data and then validate with independent traffic data. It is noted that parameter fitting to data is not straightforward in the proposed method since reinforcement learning is involved at various reasoning levels. Second, new statistical goodness of fit methods need to be implemented to validate the model's power of prediction. To the best of our knowledge, no goodness of fit methods are implemented for either the UAS integration scenarios or road traffic scenarios where multiple actions are involved. In our ongoing work we are using Chi-square goodness of fit test and Kolmogorov goodness of fit test to validate the method. 9. Open problems and research opportunities As mentioned in Section 8.1, one of the limitations of the level-k thinking solution concept is that an agent's assumption about other agents' levels does not change during the game, and one solution to this may be the dynamic level-k approach. However, this is only a partial solution since the level types still remain unchanged. For example, if Agent A, after watching Agent B for a few time steps, decides that his or her assumption that Agent B is a level-0 player is wrong, then Agent A needs to update his or her assumption to another level. However, the set of levels he or she can choose from are fixed: Agent A can modify his assumption and assume that Agent B is a level-1 player (instead of level-0), therefore the best response to this is producing the actions of a level-2 player. Agent-A can only change his or her assumption to level-k, where k=1,2..., n, where all levels are already trained and determined. A better, but more computationally expensive approach would be the following: After watching Agent B for a few time steps, Agent A can update his or her assumption by using, for example, a Bayesian update and come up a with a policy that is not in the pre-trained set of levels. After this update, Agent A runs a reinforcement learning algorithm online to determine the best response to Agent B's newly updated policy. To achieve this, we need to find new software and hardware solutions to handle the computational demand. 41 Another open problem from a control engineering point of view is the problem of stability. Stability in RL is already being studied by the control community as an open problem (Bu¸soniu et al., 2018). When used in collaboration with game theory, specifically level-k thinking, the problem becomes even harder to solve, and thus presents a rewarding research direction. 10. Summary In this article, we reviewed a modeling approach where reinforcement learning and game theory work in tandem to predict cyber-physical human system (CPHS) behavior. Starting from the basic building blocks, we explained the method in detail and then presented two cases where models are created for unmanned aircraft systems (UAS) integration into Na- tional Airspace (NAS) and highway traffic scenarios. In both cases, validation studies were discussed using different methods, including using real world data. Finally, we presented ongoing and future works, together with related open problems, which can serve as fruitful research directions. Acknowledgements This effort was sponsored by Turkish Academy of Sciences under the Young Scientist Award Programme. References References Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G.S., Davis, A., Dean, J., Devin, M., Ghemawat, S., Goodfellow, I., Harp, A., Irving, G., Isard, M., Jia, Y., Jozefowicz, R., Kaiser, L., Kudlur, M., Levenberg, J., Man´e, D., Monga, R., Moore, S., Murray, D., Olah, C., Schuster, M., Shlens, J., Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., Vi´egas, F., Vinyals, O., Warden, P., Wattenberg, M., Wicke, M., Yu, Y., and Zheng, X. (2015). TensorFlow: Large- scale machine learning on heterogeneous systems. Available: https://www.tensorflow.org/ [retrieved 30 September 2019]. Albaba, M., Yildiz, Y., Li, N., Kolmanovsky, I., and Girard, A. (2019). Stochastic driver modeling and validation with traffic data. In Proc. Amer. Control Conf. Philadelphia, PA. Backhaus, S., Bent, R., Bono, J., Lee, R., Tracey, B., Wolpert, D., Xie, D., and Yildiz, Y. (2013). Cyber-physical security: A game theory model of humans interacting over control systems. IEEE Transactions on Smart Grid, 4(4), 2320 -- 2327. Billingsley, T.B. (2006). Safety analysis of TCAS on Global Hawk using airspace encounter models. Ph.D. thesis, Massachusetts Institute of Technology. 42 Bu¸soniu, L., de Bruin, T., Toli´c, D., Kober, J., and Palunko, I. (2018). Reinforcement learning for control: Performance, stability, and deep approximators. Annual Reviews in Control. Camerer, C.F. (2011). Behavioral game theory: Experiments in strategic interaction. Prince- ton University Press. Carvalho, A., Lefevre, S., Schildbach, G., Kong, J., and Borrelli, F. (2015). Automated driving: The role of forecasts and uncertainty-a control perspective. European Journal of Control, 24, 14 -- 32. Chen, M., Bansal, S., Tanabe, K., and Tomlin, C.J. (2017a). Provably safe and robust drone routing via sequential path planning: A case study in san francisco and the bay area. arXiv preprint arXiv:1705.04585. Chen, M., Hu, Q., Fisac, J.F., Akametalu, K., Mackin, C., and Tomlin, C.J. (2017b). Reachability-based safety and goal satisfaction of unmanned aerial platoons on air high- ways. Journal of Guidance, Control, and Dynamics, 40(6), 1360 -- 1373. Chen, M., Hu, Q., Mackin, C., Fisac, J.F., and Tomlin, C.J. (2015). Safe platooning of unmanned aerial vehicles via reachability. In 2015 54th IEEE Conference on Decision and Control (CDC), 4695 -- 4701. IEEE. Chen, M., Shih, J.C., and Tomlin, C.J. (2016). Multi-vehicle collision avoidance via hamilton- jacobi reachability and mixed integer programming. In 2016 IEEE 55th Conference on Decision and Control (CDC), 1695 -- 1700. IEEE. Colyar, J. J. and Halkias, Techni- cal Report FHWA-HRT-07-030, Federal Highway Administration. Available: https://www.fhwa.dot.gov/publications/research/operations/07030/index.cfm [retrieved 9 February 2019]. (2007). Us highway 101 dataset. Conover, W.J. (1972). A kolmogorov goodness-of-fit test for discontinuous distributions. Journal of the American Statistical Association, 67(339), 591 -- 596. Costa-Gomes, M.A., Crawford, V.P., and Iriberri, N. (2009). Comparing models of strategic thinking in Van Huyck, Battalio, and Beil's coordination games. Journal of the European Economic Association, 7(2-3), 365 -- 376. Crawford, V.P. (2008). Modeling behavior in novel strategic situations via level-k thinking. In North American Economic Science Association Meetings. Dalamagkidis, K., P., V.K., and A., P.L. (2008). On unmanned aircraft systems issues, challenges and operational restrictions preventing integration into the national airspace system. Progress in Aerospace Sciences, 44(7), 503 -- 519. 43 DeGarmo, M.T. (2004). Issues concerning integration of unmanned aerial vehicles in civil airspace. Technical report, MITRE Corporation, Center for Advanced Aviation System Development. Available: https://www.mitre.org/sites/default/files/pdf/04 1232.pdf [re- trieved 9 February 2019]. Dextreit, C. and Kolmanovsky, I.V. (2014). Game theory controller for hybrid electric vehicles. IEEE Transactions on Control Systems Technology, 22(2), 652 -- 663. Ding, J., Tomlin, C.J., Hook, L.R., and Fuller, J. (2016). Initial designs for an automatic forced landing system for safer inclusion of small unmanned air vehicles into the national airspace. In 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 1 -- 12. IEEE. Fasano, G., Accardo, D., Moccia, A., Carbone, C., Ciniglio, U., Corraro, F., and Luongo, S. (2008). Multi-sensor-based fully autonomous non-cooperative collision avoidance system for unmanned air vehicles. Journal of aerospace computing, information, and communi- cation, 5(10), 338 -- 360. Florent, M., Schultz, R.R., and Wang, Z. (2010). Unmanned aircraft systems sense and avoid flight testing utilizing ads-b transceiver. In Proceedings of Infotech@ Aerospace. Fudenberg, D. and Tirole, J. (1991). Game theory, 1991. Cambridge, Massachusetts, 393(12), 80. Gabel, T., Lutz, C., and Riedmiller, M. (2011). Improved neural fitted q iteration applied to a novel computer gaming and learning benchmark. In Adaptive Dynamic Programming And Reinforcement Learning (ADPRL), 2011 IEEE Symposium on, 279 -- 286. IEEE. Hess, R.A. and Modjtahedzadeh, A. (1990). A control theoretic model of driver steering behavior. IEEE Control Systems Magazine, 10(5), 3 -- 8. Hidas, P. (2002). Modelling lane changing and merging in microscopic traffic simulation. Transportation Research Part C: Emerging Technologies, 10(5), 351 -- 371. Jaakkola, T., Satinder, P.S., and Jordan., I. (1994). Reinforcement learning algorithm for partially observable markov decision problems. Advances in Neural Information Processing Systems 7: Proceedings of the 1994 Conference. Kacem, T., Wijesekera, D., and Costa, P. (2018). Ads-bsec: A holistic framework to secure ads-b. IEEE Transactions on Intelligent Vehicles, 3(4), 511 -- 521. Kochenderfer, M., Espindle, L., Kuchar, J., and Griffith, J.D. (2008). Correlated encounter model for cooperative aircraft in the national airspace system version 1.0. Project Report ATC-344, Lincoln Laboratory. 44 Kuchar, J.K., Andrews, J., Drumm, A., Hall, T., Heinz, V., Thompson, S., and Welch, J. (2004). A safety analysis process for the traffic alert and collision avoidance system (tcas) and see-and-avoid systems on remotely piloted vehicles. In Proceedings of AIAA 3rd Unmanned Unlimited Technical Conference, Workshop and Exhibit. Kuchar, J. and Drumm, A.C. (2007). The traffic alert and collision avoidance system. Lincoln Laboratory Journal, 16(2), 277. Kumar, P., Perrollaz, M., Lefevre, S., and Laugier, C. (2013). Learning-based approach for online lane change intention prediction. In IEEE Intelligent Vehicles Symposium, 797 -- 802. Lamnabhi-Lagarrigue, F., Annaswamy, A., Engell, S., Isaksson, A., Khargonekar, P., Murray, R.M., Nijmeijer, H., Samad, T., Tilbury, D., and den Hof, P.V. (2017). Systems & control for the future of humanity, research agenda: Current and future roles, impact and grand challenges. Annual Reviews in Control, 43, 1 -- 64. Law, A.M. (2008). How to build valid and credible simulation models. In Simulation Con- ference, 2008. WSC 2008. Winter, 39 -- 47. IEEE. Lee, R. and Wolpert, D. (2011). Chapter: Game theoretic modeling of pilot behavior during mid-air encounters. in Decision making with multiple imperfect decision makers. Intelli- gent Systems Reference Library Series. Springer. Lee, R., Wolpert, D.H., Bono, J., Backhaus, S., Bent, R., and Tracey, B. (2013). Counter- factual reinforcement learning: How to model decision-makers that anticipate the future. In Decision Making and Imperfection, 101 -- 128. Springer. Lefevre, S., Carvalho, A., and Borrelli, F. (2015). Autonomous car following: A learning- based approach. In IEEE Intelligent Vehicles Symposium, 920 -- 926. Lefevre, S., Gao, Y., Vasquez, D., Tseng, E., Bajcsy, R., and Borrelli, F. (2014). Lane keeping assistance with learning-based driver model and model predictive control. In In Proceedings of the 12th international symposium on advanced vehicle control. Li, N., Oyler, D., Zhang, M., Yildiz, Y., Girard, A., and Kolmanovsky, I. (2016). Hierarchical reasoning game theory based approach for evaluation and testing of autonomous vehicle control systems. In Proc. Conference on Decision and Control, 727 -- 733. Li, N., Oyler, D.W., Zhang, M., Yildiz, Y., Kolmanovsky, I., and Girard, A.R. (2018). Game theoretic modeling of driver and vehicle interactions for verification and validation of autonomous vehicle control systems. IEEE Transactions on control systems technology, 26(5), 1782 -- 1797. Maki, D., Parry, C., Noth, K., Molinario, M., and Miraflor, R. (2012). Dynamic protection zone alerting and pilot maneuver logic for ground based sense and avoid of unmanned aircraft systems. In Proceedings of Infotech@ Aerospace. 45 European RPAS Steering Group (2013). Roadmap for the integration of civil rpas into the european aviation system. Technical report, European Commission. Available: http://ec.europa.eu/enterprise/sectors/aerospace/files/rpas-roadmap en.pdf [retrieved 9 February 2019]. FAA (2013). Integration of civil unmanned aircraft systems (uas) in the national airspace system (nas) roadmap. Technical report, U.S. Department of Transportation. Avail- able: http://www.faa.gov/about/initiatives/uas/media/uas roadmap 2013.pdf [retrieved 9 February 2019]. MITRE Corp. (2014). Systems Engineering Guide: Verification and Validation of Simulation Models. Melnyk, R. (2019). A demonstration of reliability and certification standards for unmanned aircraft system control links. In AIAA Scitech 2019 Forum, 1785. Mujumdar, A. and Padhi, R. (2011). Reactive collision avoidance of using nonlinear geo- metric and differential geometric guidance. Journal of guidance, control, and dynamics, 34(1), 303 -- 311. Murphy, R. and Shields, J. (2012). The role of autonomy in dod systems. Task force report, U.S. Department of Defense, Defense Science Board, Washington, D.C., USA. Musavi, N., Onural, D., Gunes, K., and Yildiz, Y. (2016). Unmanned aircraft systems airspace integration: A game theoretical framework for concept evaluations. Journal of Guidance, Control, and Dynamics, 40(1), 96 -- 109. Musavi, N., Manzoor, A., and Yildiz, Y. (2018). A 3d game theoretical framework for the evaluation of unmanned aircraft systems airspace integration concepts. arXiv preprint arXiv:1802.07218. Nancy, A. (2016). Pilots handbook of aeronautical knowledge. Washington: US Department of Transportation, Federal Aviation Administration, Flight Standards Service. Oyler, D., Yildiz, Y., Girard, A., and Kolmanovsky, I. (2016). A game theoretical model of traffic with multiple interacting drivers for use in autonomous vehicle development. In Proc. Amer. Control Conf. Boston, MA. Paszke, A., Gross, S., Chintala, S., Chanan, G., Yang, E., DeVito, Z., Lin, Z., Desmaison, In NIPS A., Antiga, L., and Lerer, A. (2017). Automatic differentiation in PyTorch. Autodiff Workshop. Perez-Batlle, M., Pastor, E., Royo, P., Prats, X., and Barrado, C. (2012). A taxonomy of uas separation maneuvers and their automated execution. In Proceedings of the 2nd International Conference on Application and Theory of Automation in Command and Control Systems, 1 -- 11. 46 Planning, J. et al. (2007). Concept of operations for the next generation air transportation system. Technical report, Citeseer. Pritchett, A.R. (2010). The system safety perspective. In Human Factors in Aviation (Second Edition), 65 -- 94. Elsevier. Riedmiller, M. (2005). Neural fitted q iteration -- first experiences with a data efficient neural reinforcement learning method. In European Conference on Machine Learning, 317 -- 328. Springer. Riedmiller, M. and Braun, H. (1993). A direct adaptive method for faster backpropagation learning: The rprop algorithm. In Proceedings of the IEEE international conference on neural networks, volume 1993, 586 -- 591. San Francisco. Riedmiller, M., Montemerlo, M., and Dahlkamp, H. (2007). Learning to drive a real car in 20 minutes. In Frontiers in the Convergence of Bioscience and Information Technologies, 2007. FBIT 2007, 645 -- 650. IEEE. Salvucci, D., Boer, E., and Liu., A. (2001). Toward an integrated model of driver behavior in cognitive architecture. Transportation Research Record: Journal of the Transportation Research Board, 1779, 9 -- 16. Salvucci, D.D. and Gray, R. (2004). A two-point visual control model of steering. Perception, 33(10), 1233 -- 1248. Sharp, R.S., Casanova, D., and Symonds, P. (2000). A mathematical model for driver steering control, with design, tuning and performance results. Vehicle System Dynamics, 33(5), 289 -- 326. Sheridan, T.B., Corker, K.M., and Nadler, E.D. (2006). Final report and recommendations for research on human-automation interaction in the next generation air transportation system. Technical Report (DOT-VNTSC-NASA- 06-05), U.S. Department of Transporta- tion, Research and Innovative Technology Administration, Cambridge, MA, USA. Shia, V., Gao, Y., Vasudevan, R., Campbell, K.D., Lin, T., Borrelli, F., and Bajcsy, R. (2014). Semiautonomous vehicular control using driver modeling. IEEE Transactions on Intelligent Transportation Systems, 15(6), 2696 -- 2709. Stahl, D. and Wilson, P. (1995). On players' models of other players: Theory and experi- mental evidence. Games and Economic Behavior, 10(1), 218 -- 254. Sutton, R.S. and Barto, A.G. (1998). Reinforcement learning: An introduction. MIT press, Cambridge. Sutton, R.S. and Barto, A.G. (2018). Reinforcement learning: An introduction. MIT press. 47 Treiber, M., Hennecke, A., and Helbing, D. (2000). Congested traffic states in empirical observations and microscopic simulations. Physical Review E, 62(2), 1805 -- 1824. Ungoren, A.Y. and Peng, H. (2005). An adaptive lateral preview driver model. Vehicle System Dynamics, 43(4), 245 -- 259. Vasudevan, R., Shia, V., Gao, Y., Cervera-Navarro, R., Bajcsy, R., and Borrelli, F. (2012). In Proc. Amer. Control Safe semi-autonomous control with enhanced driver modeling. Conf., 2896 -- 2903. Wakitani, S., Yamauchi, Y., Kinoshita, T., Yamamoto, T., Miyakoshi, M., Harada, S., and Yano, Y. (2018). Design of a vehicle driver model based on database-driven control approach. In 2018 IEEE Conference on Control Technology and Applications (CCTA), 840 -- 845. IEEE. Watkins, C.J.C.H. (1989). Learning from delayed rewards. Ph.D. thesis, King's College, Cambridge. Wiering, M. and van Otterlo, M. (eds.) (2012). Reinforcement Learning, State-of-the-art. Springer. Wing, D., Prevot, T., Morey, S., Lewis, T., Martin, L., Johnson, S., Cabrall, C., Como, S., Homola, J., Sheth-Chandra, M., Mercer, J., Morey, S., and Va, H. (2013). Pilot and controller evaluations of separation function allocation in air traffic management. In 10th USA/Europe Air Traffic Management Research and Development Seminar. Yildiz, Y., Agogino, A., and Brat, G. (2013). Predicting pilot behavior in medium scale scenarios using game theory and reinforcement learning. In AIAA Modeling and Simulation Technologies (MST) Conference, 4908. Yildiz, Y., Agogino, A., and Brat, G. (2014). Predicting pilot behavior in medium-scale scenarios using game theory and reinforcement learning. Journal of Guidance, Control, and Dynamics, 37(4), 1335 -- 1343. Yildiz, Y., Lee, R., and Brat, G. (2012). Using game theoretic models to predict pilot behavior in nextgen merging and landing scenario. In Proc. AIAA Modeling and Simulation Technologies Conference, AIAA 2012-4487. Minneapolis, Minnesota. Yoo, J.H. and Langari, R. (2012). Stackelberg game based model of highway driving. In Proc. ASME Dynamic Systems and Control Conference joint with JSME Motion and Vibration Conference. Fort Lauderdale, Florida. Yoo, J.H. and Langari, R. (2013). A stackelberg game theoretic driver model for merging. In Proc. ASME Dynamic Systems and Control Conference. Palo Alto, California. 48
1508.02677
1
1508
2015-08-11T18:24:58
Call Graph Profiling for Multi Agent Systems
[ "cs.MA", "cs.SE" ]
The design, implementation and testing of Multi Agent Systems is typically a very complex task. While a number of specialist agent programming languages and toolkits have been created to aid in the development of such systems, the provision of associated development tools still lags behind those available for other programming paradigms. This includes tools such as debuggers and profilers to help analyse system behaviour, performance and efficiency. AgentSpotter is a profiling tool designed specifically to operate on the concepts of agent-oriented programming. This paper extends previous work on AgentSpotter by discussing its Call Graph View, which presents system performance information, with reference to the communication between the agents in the system. This is aimed at aiding developers in examining the effect that agent communication has on the processing requirements of the system.
cs.MA
cs
Call Graph Profiling for Multi Agent Systems Dinh Doan Van Bien, David Lillis and Rem W. Collier School of Computer Science and Informatics [email protected], {david.lillis, rem.collier}@ucd.ie University College Dublin Abstract. The design, implementation and testing of Multi Agent Sys- tems is typically a very complex task. While a number of specialist agent programming languages and toolkits have been created to aid in the de- velopment of such systems, the provision of associated development tools still lags behind those available for other programming paradigms. This includes tools such as debuggers and profilers to help analyse system be- haviour, performance and efficiency. AgentSpotter is a profiling tool de- signed specifically to operate on the concepts of agent-oriented program- ming. This paper extends previous work on AgentSpotter by discussing its Call Graph View, which presents system performance information, with reference to the communication between the agents in the system. This is aimed at aiding developers in examining the effect that agent communication has on the processing requirements of the system. 1 Introduction By its nature, a Multi Agent System (MAS) is a complex system consisting of loosely-coupled autonomous software entities that are required to communicate with one another in order to achieve individual or system objectives. To facili- tate the development of such systems, a number of agent-oriented programming languages and MAS toolkits have been developed by a variety of researchers [1]. However, the availability of ancillary tools to aid with debugging and profiling is limited, particularly when compared with the available tools for other program- ming paradigms and languages. Profiling is a performance analysis technique that is based on the notion that in a program, only a few places, called bottlenecks or hot spots, can account for the majority of the execution time of a program. Hence, by fixing only these sections of the code, the performance of a program can be substantially improved. Profiling was introduced almost 40 years ago by Donald E. Knuth in his empirical study of FORTRAN programs [2], and has since been successfully adapted to a variety of different languages, platforms and software architectures, including large distributed systems. AgentSpotter is a profiling tool designed specifically for MASs. Its aim is to map traditional concepts of profiling to those of agent oriented software engi- neering so as to facilitate the compilation of profiling data that is specifically relevant to MAS programming. This data can then be presented in an intuitive, 5 1 0 2 g u A 1 1 ] A M . s c [ 1 v 7 7 6 2 0 . 8 0 5 1 : v i X r a visual fashion in order to aid multi agent developers in improving the perfor- mance of their systems. Previous work outlined the AgentSpotter architecture and its Space-Time Diagram view, which was aimed at identifying events in a system that impact performance [3]. This paper continues this work by introducing AgentSpotter's Call Graph View, which attempts to contextualise performance information by linking it to causal events, such as message passing. Section 2 provides a brief discussion of some related tools that have been de- veloped for debugging and profiling MASs. In Section 3, we give a brief overview of the AgentSpotter agent profiling application. Following this, in Section 4 we introduce the concept of a call graph, and analyse how the traditional concept of a call graph can be applied to a MAS. Section 5 presents the concrete imple- mentation of an agent call graph within the AgentSpotter profiling tool, followed by a discussion of the proposed approach in Section 7. Finally, we conclude and outline ideas for future work in Section 8. 2 Related Work The work presented in this paper draws from two principal research areas. Firstly, in order to provide a profiling tool for MASs, it is necessary to examine the con- cepts and features of existing profiling tools for other programming paradigms, such as object-oriented programming. It is also necessary to explore the available programming tools aimed at aiding the debugging and profiling of MASs. Initially proposed by Knuth, the key motivating factor behind profiling tools is his observation that "less than 4% of a program accounts for more than half of its running time" [2]. By identifying and improving code that represents a per- formance bottleneck, software developers can greatly improve the overall per- formance of their programs. An important motivator for the use of specialist profilers to identify these bottlenecks is the frequent tendency of developers' mental maps of their programming not to match the reality of how their pro- grams behave. Thus, a profiler may identify areas of concern that a programmer may not have considered. In the context of more traditional, non-MAS, programming, developers gen- erally have access to long-established and widely-accepted profiling tools such as gprof [4] or performance analysis APIs such as the Java Virtual Machine Tool Interface (JVMTI) [5] or ATOM [6]. However, those developing MASs do not tend to have access to such well-established tools. One MAS framework that does provide the ability to glean data about sys- tem performance is Cougaar [7]. This provides access to data on historical per- formance data, event detection, monitoring of ACL messages and a number of other services. The LS/TS agent platform provides an administrator tool that records some high-level system monitoring information [8]. The main limitation of these systems is the lack of post-processing of the raw performance data in order to produce meaningful synthetic indicators like a profiler would do. Besides performance analysis, most agent frameworks provide a debugging tool similar to the Agent Factory Debugger [9], which provides information about the mental state and communication from the viewpoint of individual agents. A different type of debugging tool is the Agent Viewer that is provided in the Brahms toolkit [10], which displays agent timelines so as to understand when agents' actions are taken. As the work in this paper also requires the monitoring of inter-agent com- munication (see Section 4), it is also important to acknowledge the availability of existing communication analysis tools for MAS platforms. A number of such tools have been developed for a variety of agent frameworks and toolkits to aid developers in understanding the interaction between agents in their systems. An early example of such a toolkit is Zeus [11], which contains a "society tool" that visualises the interaction between agents, so as to help in understanding the topology of the social contacts within the MAS. This type of tool also aids in debugging MASs, since developers can ensure that the expected communication and collaboration between agents is indeed taking place. In the JADE agent development framework, a Sniffer Agent is a FIPA- compliant agent that monitors messages created with an Agent Communication Language (ACL) passed between agents and presents these in a simple graphical interface [12]. A more sophisticated tool, called ACLAnalyser, provides more de- tailed information on agent communication [13]. Again, the principal aim of this is to aid in debugging errors in MASs that relate to coordination or cooperation. 3 AgentSpotter AgentSpotter is a profiling tool designed specifically for gathering and displaying profiling information on MASs [3]. Figure 1 illustrates the abstract architecture of the system, designed to maximise compatibility with any type of agent plat- form. The AgentSpotter Service runs within the Run-Time Environment of an Agent Platform, gathering data about the agents themselves (actions performed, messages exchanged), along with system data such as CPU and memory usage. This is the only platform-specific portion of the system that must be ported in order to allow AgentSpotter to be run on different agent platforms. The data gathered is logged into a Snapshot File, which allows it to be accessed and anal- ysed offline, once the system has finished running. AgentSpotter Station is a visual application that provides a number of visual- isations on various aspects of system performance, in order to help programmers to identify performance bottlenecks in their code. The outputs utilised in this paper are gleaned from running a concrete imple- mentation of the AgentSpotter service within the Agent Factory framework [14]. Agent Factory is a modular and extensible framework that provides comprehen- sive support for the development and deployment of agent-oriented applications. A more detailed description of this implementation and the data gathered by AgentSpotter can be found in [3]. Fig. 1. AgentSpotter Architecture Previously, it was shown how AgentSpotter was used to map traditional profiling concepts on to agent-oriented concepts. This focused on two types of visualisation: -- Flat Profile: provides data on such things as agent activity, messages and reasoning/action duration in a tabular form. -- Space-Time Diagram: provides a navigable visualisation representing the data from the flat profile in a more intuitive manner. The focus of this paper is on an agent-oriented call graph. Whereas a space- time diagram can aid in identifying the timing and extent of actions executed by agents, a call-graph is traditionally intended to also indicate the reasons why particular actions were undertaken at particular times. 4 Call Graph Concept 4.1 Traditional Call Graph The concept of a call graph was introduced in 1982 in the "gprof" profiling tool [4]. This is an improvement on the popular "prof" UNIX profiling tool. In additional to summarising the time spent in different functions, it also recursively presents all the call stacks annotated with the time spent in the various functions that are called. Another name for the call graph is "hierarchical profile", which conveys the idea that gprof provides information to aid in understanding the impact of one function in relation to all the functions that have called it. Although the textual output of gprof is very dense and requires some practice to understand, the user interfaces of modern profiler have made call graphs more tractable by presenting them as tree view controls that can be interactively explored. Figure 2 shows an example of a typical call graph. This relates to a fictional C language program that is designed to remove duplicate lines from a text file. In this tree view, the root node is the main function, which represents 100% of the total execution time of the program (including the execution time of Run-Time EnvironmentPro(cid:127)led ApplicationAgentSpotter ServicePro(cid:127)lerSystem MonitorsAGENT PLATFORMAGENTSPOTTER STATION (visualisation application)Snapshot File (.aspot)Session Summary TablesSpace-Time DiagramCall Graph Tree ViewSessionsAgentsEventsMessagesmessagesactivityeventseventsdatadataqueriesQUERY ENGINESession summary queryAgent activity queryMessages sent/received queryCall graph querySystem activity query Fig. 2. Call Graph Tree View of a fictional C program that removes duplicate lines from a file its child nodes). Each node represents a function within the program, with the child nodes representing functions that are called within the parent function. The percentages represent the cumulative proportion of the program's execution time that is attributable to a node and its children. In the example, the main function calls process file, which is then represented as a sub-tree with leaves representing its own calls to the bubble sort, load file and remove duplicates functions. The key benefit of the call graph tree view is the extended context it gives to performance information. For instance, this simple example reveals that the program spends 90% of its time processing a file. The tree shows that one of the top-level function process file's callees, the bubble sort operation, accounts for 80% of its caller time. A flat profile would have shown the time for these functions separately without explicitly showing the hierarchical link between them. 4.2 Agent-Oriented Call Graph Model When constructing a flat profile for a MAS, it was necessary to map a number of concepts relating to traditional programming to equivalent concepts in the do- main of agent-oriented programming [3]. A similar mapping must be performed in order to allow for the development of an agent-oriented call graph. The central measure used in the traditional call graph is the function execu- tion time. Each node represents a function, which can take the action of calling other functions as part of its execution. The consequence of this action is that some amount of time is spent executing the child function. Thus we can say that the impact of calling a function is that this additional processing time has been incurred. In many MASs, agents tend to perform actions as a reaction to the receipt of ACL messages from other agents in the system. Thus in the same way the impact of a functional call in a traditional system is the execution time of that function, within a MAS, the impact of a message can be related to the addi- tional processing that must be undertaken in order to react to the information contained therein, formulate a response or perform a requested task. Because of this mapping, we introduce, as a first simplified approach, the agent message impact measure to be used as an equivalent to the function processing time used in traditional profiling. It is important to acknowledge that not all MASs are reactive in nature and other events (such as those arising from an agent's envi- ronment) that are not represented by this measure. Further discussion can be found in Section 7. The quantification of such a measure is a difficult task, given the data typi- cally available from MASs. One potential measurement for TMα,B, the impact of a message Mα sent from an agent A to an agent B and received at time stamp α is to use the total amount of computation time used by the agent B until agent B receives a message MΩ from another agent X at time stamp Ω ≥ α. Let b be the duration of an activity by agent B at time stamp t where α ≤ t ≤ Ω. The impact of message Mα on agent B, TMα,B, is then given by the recurrent equation: Ω(cid:88) TMα,B = bt (1) t=α Fig. 3. Agent Message Impact Concept Diagram In Figure 3 we have tried to summarise this concept in a graphical form. The diagram clearly shows that the three activity stars that lie between α and Ω Agent AAgent BAgent X{message Mα at time αtimemessage MΩ at time Ωimpact of MαLegend:Message eventAgent activityAgent life line{impact of MΩαΩβ make up the total impact of Mα on agent B. Note that the outgoing message at time stamp β does not break the computation sequence. It is now easy to determine the total impact Tx,y of all the messages sent by a given agent x to another agent y. Let M be the total number of messages sent, 1 ≤ m ≤ M a single message impact identifier, αm the reception time stamp of message m from x to y, and Ωm, where αm ≤ Ωm, the next reception time stamp message coming right after m from any other source. The total impact Tx,y is then given by the equation: Tx,y = bt (2) By applying the equations recursively, we can compute the total impact Tx of an agent x on N other agents numbered 1 ≤ a ≤ N as follows: M(cid:88) Ωm(cid:88) m=1 t=αm N(cid:88) Ma(cid:88) Ωm(cid:88) a=1 m=1 t=αm K(cid:88) Nk(cid:88) Ma(cid:88) Ωm(cid:88) k=1 a=1 m=1 t=αm Tx = bt (3) Finally, the total impact TS of all the K agents numbered 1 ≤ k ≤ K of a session S is given by the equation: TS = bt (4) It must be noted that the total activity time AS of the session S is given by the equation: AS = TS + K(cid:88) αk0−1(cid:88) bt (5) k=1 t=αS where αS is the first recorded time stamp in session S and αk0 the time stamp of the very first message received by agent k. To put it differently, the total impact for each agent can be computed only after it has received its first message. This proposed method of calculating agent message impact is imperfect, and superior metrics are likely to be developed in the future. However, it does pro- vide useful information for the debugging and development of MASs. Both the drawbacks and benefits of this approach are outlined in more detail in Section 7. 5 Call Graph Visualisation Specification The conceptual model we have presented deals with the session level, the emitter agent level, the receiver agent level and the message level. The graphical trans- lation of the model, outlined In Figure 4, should be a tree view representing the levels we have previously enumerated plus an additional level for the FIPA ACL message content. A message content is defined as a performative plus an expression e.g. "request:doSomeThing(123)". This additional level should give developers necessary contextual information for the messages. It is important to note that this fixed-depth call graph tree represents a divergence from tradi- tional call graphs, whose depth is dictated by the depth of the deepest function call stack. Fig. 4. Call Graph Tree View levels The session at the root of the tree should add up to 100% of all emitter agents' impact as defined by Equation 4. Then at each level, each node should recursively total the impact of its child nodes down to the message leaf nodes. These leaf nodes simply report their impact as defined by Equation 1. More precisely, at each level, for each node, the following values should be displayed: -- Label: informative text associated with the node. The structure of the label depends on the level as follows: • session: "capture date, time - duration"; • emitter agent: "from: agent id"; • sender agent: "to: agent id"; • FIPA ACL: "performative: contents"; • message: "sent: time stamp rec: time stamp". -- Total impact time: sum of impact times of all the current node's children. -- % parent time: percentage of the current node total impact time divided by the node's parent total impact time. -- % session time: percentage of the current node total impact time divided by the session total impact time. Ideally, developers should be able to order the intermediary tree levels differ- ently so as to produce different call graph interpretations. For example, moving the FIPA level right above the emitter agent level would list for each FIPA ACL entry their total impact for all the emitter/receiver pairs. 5.1 User Interface Despite having a fixed depth, a call graph tree view could potentially be very wide at the leaf level for sessions that produce thousands of messages. Therefore, to help developers navigate easily through the tree, AgentSpotter Station offers an advanced tree navigation user interface that expands only that part of the tree that is currently explored so as to reduce the visual clutter. The currently explored part of the tree is highlighted in a different colour to give the developer some visual feedback. Moreover, to speed up the retrieval of information on the system, a search fea- ture allows developers to enter a keyword (e.g. an agent name or a performative). Doing so has the effect of highlighting in a special colour all the visible nodes that contain the specified keyword, significantly improving the visual retrieval speed of a node. Finally, developers can zoom and pan around the tree view to locate items even more quickly. 5.2 Implementation Fig. 5. Call Graph Tree View Screen Shot A sample screen shot of the visualisation of the call graph can be seen in Figure 5. In this figure, the element numbered 1 on the screen shot is the tree root, i.e. the session level which represents 100% of the cumulative recorded activity time. The tree root is highlighted in blue because it is the current tree selection in this specific example. As such, it determines the branch that is expanded, as stated in Section 5.1, so as to reduce the visual clutter. In order to provide a sufficient level of detail, all the children and grandchildren of a selected node are visible. Consequently, when the tree root is selected, only the first two subsequent levels are expanded, that is the emitter agent level and the receiver agent level. Hence, selecting an emitter agent node should make the FIPA ACL message level visible, and so on. As an illustration, the call graph numbered 3 shown in Figure 5 screen shot, has an agent receiver node selected; as a result, this branch is fully expanded down to the message impact level. The element numbered 2 is a text area used to enter a search keyword. The number of nodes matching the keyword is displayed and all the matching nodes that are visible are highlighted in pink. For instance, the element numbered 3 is one of the nine nodes containing the "explorer" keyword and so is highlighted in the screenshot. In a large expanded tree, this highlighting greatly adds to the visual effect and consequently to the navigability of the tree. The bottom-most highlighted node in the tree represents a message sent from the "botagent3" agent to the agent named "explorer". Clicking on this node would cause the subtree rooted at that node to be expanded so as to examine the content and timing of that message. The visualisation is completely interactive and can be controlled using the mouse or the keyboard. Possible interactions include panning, scrolling, expand tree branches, zooming in and out. One other important feature is the ability to alter the hierarchy of the nodes. Whereas the recursive nature of function calls means that these are inherently inflexible in the tree hierarchy they create, the nature of message-passing is a different situation. The hierarchy above places the sender of each message in a higher position in the hierarchy than the recipient. This means that the cumu- lative performance data for the higher-level nodes represents the overall impact of all messages sent by a particular agent to other agents. However, this may not encapsulate the information that a developer requires at a particular point in time. Changing the hierarchy to place the recipient agent above the sender changes the focus of the cumulative performance data. In this case, the figures represent the contribution to overall running time of a particular agent, based on the message that it receives from any and all sources. This may potentially identify entire individual agents as bottlenecks. This may be because the sys- tem's load is imbalanced, meaning that one agent may bear an inequitable share of the processing burden. Alternatively, in a distributed MAS, an agent may simply reside on a machine with inferior hardware resources. By exploiting the flexible nature of this hierarchy, users of the call graph tree view can alter the data being presented to better fit their needs. 6 Evaluation To demonstrate the effectiveness of the call graph as a profiling tool, a sim- ple benchmark application was developed. This consists of two types of agents. Overseer agents request worker agents to perform small, medium or large tasks. If a worker agent has recently been overloaded, it may refuse to execute the Fig. 6. Benchmark Call Graph Tree View for master1 and master2 required task. Occasionally, overseer agents will delegate the assignment of tasks to a worker agent, in which case the worker agent becomes an overseer agent for a brief period. A flat profile and space-time diagram for this benchmark system is contained in [3]. Figure 6 shows a portion of the call graph tree view for a run of this application. Here, the names of overseer agents begin with "master", whereas the names of worker agents begin with "agent". The benchmark application profile (displayed in Figure 6 reveals that over- seer agents master1 and master2 do not have the same impact on performance. Intuitively, one would expect each overseer agent to have an equal impact. How- ever, in reality, we can see that the impact of messages sent by the "master2" agent accounts for only 20.4% of the overall session running time. Studying the call graph in more details helps in explaining this imbalance, by studying the effects of the messages with the content "pleaseDoThing(20)" that were sent by both master1 and master2 to agent001. These are emphasised in Figure 6 by means of the red rectangles. In each case, the parameter passed as part of the a "pleaseDoThing" request is related to the amount of work that the agent is being requested to perform. The call graph shows that some requests from master2 have a 0.0 impact which in practice means they were ignored (no actions took place as a result of receiving those messages). In other words, when master1 sends a request to an agent, and immediately afterwards that master2 sends the same request to the agent, the overloaded agent simply refuses to execute the request. These "please- DoThing(20)" messages sent by master1 are reasonably consistent in terms of their impact, are never refused and account for a total of 8.8% of the total ses- sion running time. In contrast, only a single such request sent by master2 was honoured by agent001. This action accounted for a mere 0.5% of the session running time. It is important to note that the greater impact of master1's messages does not necessarily constitute a bottleneck, merely an imbalance in the system. This type of analysis would motivate the use of the space-time diagram to examine the timing of the messages in question, so as to further find why messages from master2 are more likely to be ignored by the worker agent. A bottleneck would be identified by comparing the impact of different mes- sages being sent (rather than the same message being sent by different agents). For instance, it is notable that the session impact percentages for "pleaseDoTh- ing(1)" messages sent by master1 to agent001 are far lower than for "please- DoThing(20)". In this simple benchmark application, this is an unsurprising result, as the increased workload is explained by the messages themselves, with the latter message requesting more processing to be undertaken by the former. However, figures such as these would indicate a bottleneck if the results are un- expected (i.e. where high-impact messages are not intended to trigger high-cost actions on the part of the message recipients) and so would motivate a closer examination of the longer-running actions to increase efficiency. It may be possible to make such a deduction from viewing the underlying agent code itself, however the use of the call graph makes this far more easily apparent without the need for detailed examination of the code. This also means that testers that are not necessarily familiar with the code (or even perhaps testers who do not understand the programming language used) can identify bottlenecks and behavioural anomalies for developers to address. 7 Discussion The proposed metric for measuring the agent message impact outlined in Sec- tion 4.2 has a number of drawbacks. It operates on the naive assumption that the actions of an agent are directly related to the messages received by it. The impact of a message on an agent is thus taken as the sum of the execution times of all actions undertaken by the agent between the receipt of that message and the receipt of the next message. This means that the proposed metric may not be appropriate to certain types of MAS, where agent action is not intended to occur as a result of communication with other agents. The principal drawback with such an approach is that there is no provable causal link between the receipt of messages and the execution of actions. Agents may decide to act for reasons other than the receipt of ACL messages. For instance, a perceptor may have detected changes in the environment that may require some reaction. Also, when actions are executed as a direct consequence of the receipt of an ACL communication, there is no guarantee that all of the relevant actions have been performed prior to the receipt of the next message. Thus the agent message impact arising from the receipt of a single message may not be particularly informative. Ideally, the best method of measuring the impact of the receipt of an ACL message would be to track the internal reasoning process of the agent, so as to identify those actions that are performed as a direct result of the receipt of a message and take only these into account when calculating the message impact. This is, however, a particularly difficult task, as the reasoning used by agents is extremely platform-dependent and would require a substantial amount of work to be performed in order to port AgentSpotter to other agent platforms and frameworks. This contravenes one of the fundamental aims of AgentSpotter, which is intended to be as platform-agnostic as is practicable. A further difficulty arises when considering the fact that the receipt of mes- sages is not the only event that may cause an agent to undertake some pro- cessing. An agent may also perceive events occurring in its environment, which may prompt some action being taken. Again, the mechanism by which agents perceive such events will vary between agent platforms. Furthermore, toolkits such as CArtAgO [15] or SoSAA [16], which can be used for environment ab- straction, will raise events in different ways, thus adding to the complexity and framework-dependence of the task. In contrast, FIPA-compliant ACL messages will be standardised across toolkits and platforms. Even if we are to settle for a framework-specific profiling system, the task of identifying direct causal links between events is also non-trivial. Whereas some agents may contain straightforward agent code that reacts to the receipt of a message or an environmental percept by always invoking a particular action, this is unlikely to always be the case. Events may instead lead to a refinement of an agent's goals, or even more subtly, an alteration of its current belief state, which in turn may result in goal refinements. Goals may be adopted based on the entire belief set, making it difficult to ascertain for certain whether the belief triggered by the message was a cause of the change in the agent's goals or a merely coincidental occurrence. Even when goals have been adopted, a plan selection algorithm is typically used to decide upon the best path to take towards satisfying those goals. Again, this is a potentially difficult process to trace reliably. Although the proposed measure does have drawbacks and is somewhat sim- plistic, it is also important to highlight the benefits of such a measure. Whereas a high impact measurement for a single message may not be indicative of a major system bottleneck (and may indeed be merely coincidental), consistently high impact measures for similar types of messages are far more likely to be a result of a causal link between the receipt of the message and the processing that follows. Thus by providing an approximation of the communication dynamics within a MAS, valuable insights may be gained. It is this type of analysis that makes the call graph a useful tool in identifying situations that result in a high processing load and thus aid in helping developers concentrate on the appropriate portions of the code base to improve system efficiency. 8 Conclusions and Future Work We have proposed a new visualisation, the call graph tree view, in order to pro- vide detailed information about the performance impact of agents interactions. After discussing the concept of call graph in a traditional programming context, we have then mapped it into an agent-oriented concept based on the idea that when an agent sends an ACL message to another, its impact on the amount of processing the recipient perform can be measured and used to identify sys- tem bottlenecks, load imbalances and efficiency issues. Although the proposed measure is not optimal, it does provide users with data that is appropriate and useful in the context of a profiler application. We have then extended this notion to a tree model with multiple levels: session, message emitter, message receiver, message. Finally, we have described the advanced user interface that allows de- velopers and testers to interact with this model in the form of a zoomable and searchable tree view. For further development of the call graph view of the AgentSpotter applica- tion, there are two principal areas for improvement. Firstly, as we have acknowl- edged in Section 7, the current measure for gauging the processing impact of a message being passed between agents is not an ideal one. We intend to inves- tigate other possible measures that will include a stronger causal link between the receipt of a message and the resulting processing activity. In doing so, the other AgentSpotter views (flat profile and space-time diagram) will be utilised to ensure that any proposed measures reflect the reality of the system's execution as closely as possible. The second significant area of future work is in the area of agent conversation protocols. The work presented in this paper considers each ACL message to be entirely independent of all other messages. The reality of agent communication is somewhat different. In the agent architecture presented as the benchmark ap- plication in Section 6, some overseer agents request that worker agents perform certain tasks. In our simple application, this is done by means of a single message containing the work request being sent to the worker. In reality, a more complex conversation would be used. The initial request for a task to be performed may be answered with an acceptance or rejection of the task being assigned, followed perhaps by the communication of the result of the task. Clearly, an agent accept- ing and performing a task will consume more processing resources than when it is rejected. However, in the existing model, both scenarios will be grouped together, under the initial message requesting action. Such behaviour may mask inefficiencies in the processing code by including the low-cost rejection actions in its session percentages. By introducing an additional conversation level into the tree, these situations can be separated, meaning that actions will be grouped according to entire agent transactions rather than single messages. References 1. Bordini, R., Braubach, L., Dastani, M., Seghrouchni, A., Gomez-Sanz, J., Leite, J., O'Hare, G., Pokahr, A., Ricci, A.: A survey of programming languages and platforms for multi-agent systems. Informatica 30(1) (2006) 33 -- 44 2. Knuth, D.E.: An empirical study of FORTRAN programs. j-SPE 1(2) (April/June 1971) 105 -- 133 3. Doan Van Bien, D., Lillis, D., Collier, R.: Space-time diagram generation for profiling multi agent systems. In: Proceedings of PROMAS'09, Budapest, Hungary (May 11-12th 2009) 4. Graham, S.L., Kessler, P.B., Mckusick, M.K.: Gprof: A call graph execution pro- filer. SIGPLAN Not. 17(6) (1982) 120 -- 126 5. Sun Microsystems, Inc.: JVM Tool Interface (JVMTI), Version 1.0. Web pages at http://java.sun.com/j2se/1.5.0/docs/guide/jvmti/ (accessed August 4th, 2008) (2004) 6. Srivastava, A., Eustace, A.: Atom: a system for building customized program analysis tools. In: PLDI '94: Proceedings of the ACM SIGPLAN 1994 conference on Programming language design and implementation, New York, NY, USA, ACM (1994) 196 -- 205 7. Helsinger, A., Thome, M., Wright, T., Technol, B., Cambridge, M.: Cougaar: a scalable, distributed multi-agent architecture. In: Systems, Man and Cybernetics, 2004 IEEE International Conference on. Volume 2. (2004) 8. Rimassa, G., Calisti, M., Kernland, M.E.: Living Systems R(cid:13)Technology Suite. Whitestein Series in Software Agent Technologies and Autonomic Computing. In: Software Agent-Based Applications, Platforms and Development Kits. Birkhauser Basel (2005) 73 -- 93 9. Collier, R.: Debugging Agents in Agent Factory. Lecture Notes in Computer Science 4411 (2007) 229 10. Seah, C., Sierhuis, M., Clancey, W., Cognition, M.: Multi-agent modeling and simulation approach for design and analysis of MER mission operations. In: Pro- ceedings of 2005 International conference on human-computer interface advances for modeling and simulation (SIMCHI'05). (2005) 73 -- 78 11. Nwana, H., Ndumu, D., Lee, L.: ZEUS: An advanced tool-kit for engineering distributed multi-agent systems. Applied AI 13(1) (1998) 2 12. Bellifemine, F., Caire, G., Greenwood, D., Corporation, E.: Developing multi-agent systems with JADE. Springer (2007) 13. Botıa, J., Hernansaez, J., Skarmeta, F.: Towards an Approach for Debugging MAS Through the Analysis of ACL Messages . Computer Systems Science and Engineering 20 (2005) 14. Collier, R., O'Hare, G., Lowen, T., Rooney, C.: Beyond Prototyping in the Factory of Agents. Multi-Agent Systems and Application III: 3rd International Central and Eastern European Conference on Multi-Agent Systems, Ceemas 2003, Prague, Czech Republic, June 16-18, 2003: Proceedings (2003) 15. Ricci, A., Viroli, M., Omicini, A.: CArtAgO: A framework for prototyping artifact- based environments in MAS. Lecture Notes in Computer Science 4389 (2007) 67 16. Dragone, M., Lillis, D., Collier, R.W., O'Hare, G.M.P.: SoSAA: A Framework for Integrating Agents & Components. In: Proceedings of the 24th Annual Symposium on Applied Computing (ACM SAC 2009), Special Track on Agent-Oriented Pro- gramming, Systems, Languages, and Applications, Honolulu, Hawaii, USA (March 2009)
1807.06613
3
1807
2019-06-06T10:27:01
Deep Reinforcement Learning for Swarm Systems
[ "cs.MA", "cs.AI", "cs.LG", "eess.SY", "stat.ML" ]
Recently, deep reinforcement learning (RL) methods have been applied successfully to multi-agent scenarios. Typically, these methods rely on a concatenation of agent states to represent the information content required for decentralized decision making. However, concatenation scales poorly to swarm systems with a large number of homogeneous agents as it does not exploit the fundamental properties inherent to these systems: (i) the agents in the swarm are interchangeable and (ii) the exact number of agents in the swarm is irrelevant. Therefore, we propose a new state representation for deep multi-agent RL based on mean embeddings of distributions. We treat the agents as samples of a distribution and use the empirical mean embedding as input for a decentralized policy. We define different feature spaces of the mean embedding using histograms, radial basis functions and a neural network learned end-to-end. We evaluate the representation on two well known problems from the swarm literature (rendezvous and pursuit evasion), in a globally and locally observable setup. For the local setup we furthermore introduce simple communication protocols. Of all approaches, the mean embedding representation using neural network features enables the richest information exchange between neighboring agents facilitating the development of more complex collective strategies.
cs.MA
cs
Journal of Machine Learning Research 20 (2019) 1-31 Submitted 7/18; Revised 1/19; Published 2/19 Deep Reinforcement Learning for Swarm Systems Maximilian Hüttenrauch L-CAS University of Lincoln LN6 7TS Lincoln, UK Adrian Šošić Bioinspired Communication Systems Technische Universität Darmstadt 64283 Darmstadt, Germany Gerhard Neumann L-CAS University of Lincoln LN6 7TS Lincoln, UK Editor: George Konidaris [email protected] [email protected] [email protected] Abstract Recently, deep reinforcement learning (RL) methods have been applied successfully to multi-agent scenarios. Typically, the observation vector for decentralized decision making is represented by a concatenation of the (local) information an agent gathers about other agents. However, concatenation scales poorly to swarm systems with a large number of homogeneous agents as it does not exploit the fundamental properties inherent to these systems: (i) the agents in the swarm are interchangeable and (ii) the exact number of agents in the swarm is irrelevant. Therefore, we propose a new state representation for deep multi-agent RL based on mean embeddings of distributions, where we treat the agents as samples and use the empirical mean embedding as input for a decentralized policy. We define different feature spaces of the mean embedding using histograms, radial basis functions and neural networks trained end-to-end. We evaluate the representation on two well-known problems from the swarm literature -- rendezvous and pursuit evasion -- in a globally and locally observable setup. For the local setup we furthermore introduce simple communication protocols. Of all approaches, the mean embedding representation using neural network features enables the richest information exchange between neighboring agents, facilitating the development of complex collective strategies. Keywords: deep reinforcement learning, swarm systems, mean embeddings, neural net- works, multi-agent systems 1. Introduction In swarm systems, many identical agents interact with each other to achieve a common goal. Typically, each agent in a swarm has limited capabilities in terms of sensing and manipulation so that the considered tasks need to be solved collectively by multiple agents. A promising application where intelligent swarm systems take a prominent role is swarm robotics (Bayındır, 2016). Robot swarms are formed by a large number of cheap and easy c(cid:13)2019 Maximilian Hüttenrauch and Adrian Šošić and Gerhard Neumann. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/. Attribution requirements are provided at http://jmlr.org/papers/v20/18-476.html. Hüttenrauch, Šošić and Neumann to manufacture robots that can be useful in a variety of situations and tasks, such as search and rescue missions or exploration scenarios. A swarm of robots is inherently redundant towards loss of individual robots since usually none of the robots plays a specific role in the execution of the task. Because of this property, swarm-based missions are often favorable over single-robot missions (or, let alone, human missions) in hazardous environments. Be- havior of natural swarms, such as foraging, formation control, collective manipulation, or the localization of a common 'food' source can be adapted to aid in these missions (Bayındır, 2016). Another field of application is routing in wireless sensor networks (Saleem et al., 2011) since each sensor in the network can be treated as an agent in a swarm. A common method to obtain control strategies for swarm systems is to apply opti- mization-based approaches using a model of the agents or a graph abstraction of the swarm (Lin et al., 2004; Jadbabaie et al., 2003). Optimization-based approaches allow to compute optimal control policies for tasks that can be well modeled, such as rendezvous or consensus problems (Lin et al., 2007) and formation control (Ranjbar-Sahraei et al., 2012), or to learn pursuit strategies to capture an evader (Zhou et al., 2016). Yet, these approaches typically use simplified models of the agents / the task and often rely on unrealistic assumptions, such as operating in a connected graph (Dimarogonas and Kyriakopoulos, 2007) or having full observability of the system state (Zhou et al., 2016). Rule-based approaches use heuristics inspired by natural swarm systems, such as ants or bees (Handl and Meyer, 2007). Yet, while the resulting heuristics are often simple and can lead to complex swarm behavior, the obtained rules are difficult to adapt, even if the underlying task changes only slightly. Recently, deep reinforcement learning (RL) strategies have become popular to solve multi-agent coordination problems. In RL, tasks are specified indirectly through a cost function, which is typically easier than defining a model of the task directly or a finding a heuristic for the controller. Having defined a cost function, the RL algorithm aims to find a policy that minimizes the expected cost. Applying deep reinforcement learning within the swarm setting, however, is challenging due to the large number of agents that need to be considered. Compared to single-agent learning, where the agent is confronted only with observations about its own state, each agent in a swarm can make observations of several other agents populating the environment and thus needs to process an entire set of information that is potentially varying in size. Accordingly, two main challenges can be identified in the swarm setting: 1. High state and observation dimensionality, caused by large system sizes. 2. Changing size of the available information set, either due to addition or removal of agents, or because the number of observed neighbors changes over time. Most current multi-agent deep reinforcement learning methods either concatenate the in- formation received from different agents (Lowe et al., 2017) or encode it in a multi-channel image, where the image channels contain different features based on a local view of an agent (Sunehag et al., 2017; Zheng et al., 2017). However, both types of methods bare major draw- backs. Since neural network policies assume a fixed input dimensionality, a concatenation of observations is unsuitable in the case changing agent numbers. Furthermore, a concate- nation disregards the inherent permutation invariance of identical agents in a swarm system and scales poorly to large system sizes. Top-down image based representations alleviate the 2 Deep Reinforcement Learning for Swarm Systems issue of permutation invariance, however, the information obtained from neighboring agents is of mostly spatial nature. While additional information can be captured by adding more image channels, the dimensionality of the representation increases linearly with each feature. Furthermore, the discretization into pixels has limited accuracy due to quantization errors. In this paper, we exploit the homogeneity of swarm systems and treat the state infor- mation perceived from neighboring agents as samples of a random variable. Based on this model, we then use mean feature embeddings (MFE) (Smola et al., 2007) to encode the current distribution of the agents. Each agent gets a local view of this distribution, where the information obtained from the neighbors is encoded in the mean embedding. Due to the sample-based view of the collected state information, we achieve a permutation invari- ant representation that is furthermore invariant to the number of agents in the swarm / the number of perceived neighbors. Mean feature embeddings have so far been used mainly for kernel-based feature repre- sentations (Gretton et al., 2012), but they can be also applied to histograms or radial basis function (RBF) networks. The resulting models are closely related to the "invariant model" formulated by Zaheer et al. (2017). However, compared to the summation approach de- scribed in their paper, the averaging of feature activations proposed in our approach yields the desired invariance with respect to the observed agent number mentioned above. To the best of our knowledge, we are the first to use mean embeddings inside a deep reinforcement learning framework for swarm systems where both the feature space of the mean embedding as well as the policy are learned end-to-end. We test our state representation on various rendezvous and pursuit evasion problems using Trust Region Policy Optimization (TRPO) (Schulman et al., 2015) as the underlying deep RL algorithm. In the rendezvous problem, the agents need to find a collective strategy that allows them to meet at some arbitrary location. In the pursuit evasion domain, a group of agents collectively tries to capture one or multiple evaders. Policies are learned in a centralized-learning / decentralized-execution fashion fashion, meaning that during learning data from all agents is collected centrally and used to optimize the parameters as if there was only one agent. Nonetheless, each agent only has access to its own perception of the global system state to generate actions from the policy function. We compare our representation to several deep RL baselines as well as to optimization-based solutions, if available. Herein, we perform our experiments both in settings with global ob- servability (i.e., all agents are neighbors) and in settings with local observability (i.e., agents are only locally connected). In the latter setting, we also evaluate different communication protocols (Hüttenrauch et al., 2018) that allow the agents to transmit additional informa- tion about their local graph structure. For example, an agent might transmit the number of neighbors within its current neighborhood. Previously, such additional information could not be encoded efficiently due to the poor scalability of the histogram-based approaches. Our results show that agents using our representation can learn faster and obtain poli- cies of higher quality, suggesting that the representation as mean embedding is an efficient encoding of the global state configuration for swarm-based systems. Moreover, mean em- beddings are simple to implement inside existing neural network architectures and can be 3 Hüttenrauch, Šošić and Neumann applied to any deep RL algorithm, which makes the approach applicable in a wide variety of scenarios. The source code to reproduce our results can be found online.1 2. Related Work The main contribution of this work lies in the development of a compact representation of state information in swarm systems, which can easily be used within deep multi-agent reinforcement learning (MARL) settings that contain homogeneous agent groups. In fact, our work is mostly orthogonal to other research in the field of MARL and the presented ideas can be incorporated into most existing approaches. To provide an overview, we begin with a brief survey of algorithms used in (deep) MARL, we revisit the basics of mean embedding theory, and we summarize some classic approaches to swarm control for the rendezvous and pursuit evasion task. 2.1 Deep RL Recently, there has been increasing interest in deep reinforcement learning for swarms and multi-agent systems in general. For example, Zheng et al. (2017) provide a many-agent reinforcement learning platform based on a multi-channel image state representation, which uses Deep Q-Networks (DQN) (Mnih et al., 2015) to learn decentralized control strategies in large grid worlds with discrete actions. Gupta et al. (2017) show a comparison of centralized, concurrent and parameter sharing approaches to cooperative deep MARL, using TRPO (Schulman et al., 2015), DDPG (Lillicrap et al., 2015) and DQN. They evaluate each method on three tasks, one of which is a pursuit task in a grid world using bitmap-like images as state representation. A variant of DDPG for multiple agents in Markov games using a centralized action-value function is provided by Lowe et al. (2017). The authors evaluate the method on tasks like cooperative communication, navigation and others. The downside of a centralized action-value function is that the input space grows linearly with the number of agents, and hence, their approach scales poorly to large system sizes. A more scalable approach is presented by Yang et al. (2018). Employing mean field theory, the interactions within the population of agents are approximated by the interaction of a single agent with the average effect from the overall population, which has the effect that the action-value function input space stays constant. Experiments are conducted on a Gaussian squeeze problem, an Ising model, and a mixed cooperative-competitive battle game. Yet, the paper does not address the state representation problem for swarm systems. Omidshafiei et al. (2017) investigate hysteretic Q-learning (Matignon et al., 2007) and distillation (Rusu et al., 2015). They use deep recurrent Q-networks (Hausknecht and Stone, 2015) to solve single and multi-task Dec-POMDP problems. Following this work, Palmer et al. (2017) add leniency (Panait et al., 2006) to the hysteretic approach to prevent "relative overgeneralization" of agents. The approach is evaluated on a coordinated multi-agent object transportation problem in a grid world with stochastic rewards. Sunehag et al. (2017) tackle the "lazy agent" problem in cooperative MARL with a single team reward by training each agent with a learned additive decomposition of a value function based on the team reward. Experiments show an increase in performance on cooperative 1. https://github.com/LCAS/deep_rl_for_swarms 4 Deep Reinforcement Learning for Swarm Systems two-player games in a grid world. Rashid et al. (2018) further develop the idea with the insight that a full factorization of the value function is not necessary. Instead, they introduce a monotonicity constraint on the relationship between the global value function and each local value function. Results are presented on the StarCraft micro management domain. Finally, Grover et al. (2018) show a framework to model agent behavior as a represen- tation learning problem. They learn an encoder-decoder embedding of agent policies via imitation learning based on interactions and evaluate it on a cooperative particle world (Mordatch and Abbeel, 2018) and a competitive two-agent robo sumo environment (Al- Shedivat et al., 2018). The design of the policy function in the approach of Mordatch and Abbeel (2018) is similar to ours but the model uses a softmax pooling layer. However, instead of applying (model-free) reinforcement learning to optimize the parameters of the policy function, they build an end-to-end differentiable model of all agent and environment state dynamics and calculate the gradient of the return with respect to the parameters via backpropagation. An application related to our approach can be found in the work by Gebhardt et al. (2018), where the authors use mean embeddings to learn a centralized controller for ob- ject manipulation with robot swarms. Here, the key idea is to directly embed the swarm configuration into a reproducing kernel Hilbert space, whereas our approach is based on embedding the agent's local view. Furthermore, using kernel-based feature spaces for the mean embedding scales poorly in the number of samples and in the dimensionality of the embedded information. 2.2 Optimization-Based Approaches for Swarm Systems To provide a concise summary of the most relevant related work, we concentrate on opti- mization-based approaches that derive decentralized control strategies for the rendezvous and pursuit evasion problem considered in this paper. Ji and Egerstedt (2007) derive a control mechanism preserving the connectedness of a group of agents with limited commu- nication abilities for the rendezvous and formation control problem. The method focuses on high-level control with single integrator linear state manipulation and provides no rules for agents that are not part of the agent graph. Similarly, Gennaro and Jadbabaie (2006) present a decentralized algorithm to maximize the connectivity (characterized by an expo- nential model) of a multi-agent system. The algorithm is based on the minimization of the second smallest eigenvalue of the Laplacian of the proximity graph. An approach providing a decentralized control strategy for the rendezvous problem for nonholonomic agents can be found in the work by Dimarogonas and Kyriakopoulos (2007). Using tools from nons- mooth Lyapunov theory and graph theory, the stability of the overall system is examined. A control strategy for the pursuit evasion problem with multiple pursuers and single evader that we investigate in more detail later in this paper was proposed Zhou et al. (2016). The authors derive decentralized control policies for the pursuers and the evader based on the minimization of Voronoi partitions. Again, the control mechanism is for high-level linear state manipulation. Furthermore, the method assumes visibility of the evader at all times. A survey on pursuit evasion in mobile robotics in general is provided by Chung et al. (2011). 5 Hüttenrauch, Šošić and Neumann 2.3 Analytic Approaches Another line of work concerned with the curse of dimensionality can be found in the area of multi-player reach-avoid games. Chen et al. (2017), for example, look at pairwise interactions between agents. This way, they are able to use the Hamilton-Jacobian-Isaacs approach to solve a partial differential equation in the joint state space of the players. Similar work can be found in (Chen et al., 2014a,b; Zhou et al., 2012). 3. Background In this section, we give a short overview of Trust Region Policy Optimization and mean embeddings of distributions. 3.1 Trust Region Policy Optimization Trust Region Policy Optimization is an algorithm to optimize control policies in single-agent reinforcement learning problems (Schulman et al., 2015). These problems are formulated as Markov decision processes (MDPs), which can be compactly written as a tuple (cid:104)S,A, P, R(cid:105). In an MDP, an agent chooses an action a ∈ A according to some policy π(a s) based on its current state s ∈ S and progresses to state s(cid:48) ∈ S according to the transition dynamics P , i.e., s(cid:48) ∼ P (s(cid:48) s, a). After each step, the agent receives a reward r = R(s, a), provided by the reward function R, which judges the quality of its decision. The goal of the agent is to find a policy that maximizes the cumulative reward achieved over a certain period of time. In TRPO, the policy is parametrized by a parameter vector θ containing the weights and biases of a neural network. In the following, we denote this parametrized policy as πθ. The reinforcement learning objective is expressed as finding a new policy that maximizes the Aπold(s, a) , where Aπold(s, a) = Qπold(s, a)− V πold(s). Herein, the state-action value function Qπold(s, a) is typically estimated via trajectory rollouts, while for the value function V πold(s) linear or neural network baselines are used that are fitted to the Monte-Carlo returns, resulting in an estimate A(s, a) for the advantage function. The objective is to be maximized subject to a fixed constraint on the Kullback-Leibler (KL) divergence of the policy before and after the parameter update, which ensures that the updates to the policy parameters θ are bounded, in order to avoid divergence of the learning process. The overall optimization problem is summarized as expected advantage function of the current policy πold, i.e., J TRPO = E(cid:104) πθ (cid:105) πθold (cid:21) (cid:20) πθ E θ maximize subject to E[DKL(πθoldπθ)] ≤ δ. A(s, a) πθold The problem is approximately solved using conjugate gradient optimization, after linearizing the objective and quadratizing the constraint. 3.2 Mean Embeddings Our work is inspired by the idea of embedding distributions into reproducing kernel Hilbert spaces (Smola et al., 2007) from where we borrow the concept of mean embeddings. A probability distribution P (X) can be represented as an element in a reproducing kernel 6 Deep Reinforcement Learning for Swarm Systems Hilbert space by its expected feature map (i.e., the mean embedding), µX = EX [φ(X)], where φ(x) is a (possibly infinite dimensional) feature mapping. Given a set of observations {x1, . . . , xm}, drawn i.i.d. from P (X), the empirical estimate of the expected feature map is given by m(cid:88) i=1 µX = 1 m φ(xi). Using characteristic kernel functions k(x, x(cid:48)) = (cid:104)φ(x), φ(x(cid:48))(cid:105), such as Gaussian RBF or Laplace kernels, mean embeddings can be used, for example, in two-sample tests (Gretton et al., 2012) and independence tests (Gretton et al., 2008). A characteristic kernel is required to uniquely identify a distribution based on its mean embedding. However, this assumption can be relaxed to using finite feature spaces if the objective is merely to extract relevant information from a distribution such as, in our case, the information needed for the policy of the agents. 4. Deep Reinforcement Learning for Swarms The reinforcement learning algorithm presented in the last section has been originally de- signed for single-agent learning. In order to apply this algorithm to the swarm setup, we switch to a different problem domain and show the implications on the learning algorithm. Policies in this context are then optimized in a centralized -- learning / decentralized -- execution fashion. 4.1 Problem Domain The problem domain for our swarm system is best described as a swarm MDP environment (Šošić et al., 2017). The swarm MDP can be regarded as a special case of a decentralized partially observable Markov decision process (Dec-POMDP) (Bernstein et al., 2002) and is constructed in two steps. First, an agent prototype is defined as a tuple A = (cid:104)S,O,A, π(cid:105), determining the local properties of an agent in the system. Herein, S denotes the set of the agent's local states, O is the set of possible local observations, A is the set of actions available to the agent, and π : O × A → [0, 1] is the agent's stochastic control policy. Based on this definition, the swarm MDP is constructed as (cid:104)N, A, P, O, R(cid:105), where N is the number of agents in the system and A is the aforementioned agent prototype. The coupling of the agents is specified through a global state transition model P : S N×S N×AN → [0,∞) and an observation model O : S N ×{1, . . . , N} → O, which determines the local observation oi ∈ O for agent i at a given swarm state s ∈ S N, i.e., oi = O(s, i). Finally, R : S N × AN → R is the global reward function, which encodes the cooperative task for the swarm by providing an instantaneous reward feedback R(s, a) according to the current swarm state s and the corresponding joint action assignment a ∈ AN of the agents. The specific state dynamics and observation models considered in this paper are described in Section 5. The model encodes two important properties of swarm networks: First, all agents in the system are assumed to be identical, and accordingly, they are all assigned the same 7 Hüttenrauch, Šošić and Neumann decentralized policy π. This is an immediate consequence of the two-step construction of the model, which implies that all agents share the same internal architecture. Second, the agents are only partially informed about the global system state, as prescribed by the observation model O. Note that both the transition model and the observation model are assumed to be invariant to permutations of the agents in order to ensure the homogeneity of the system. For details, see (Šošić et al., 2017). 4.2 Local Observation Models The local observation oi introduced in the last section is a combination of observations oi loc an agent makes about local properties (like the agent's current velocity or its distance to a wall) and observations Oi of other agents. In order to describe the observation model used for the agents, we use an interaction graph representation of the swarm. This graph is given by nodes V = {v1, v2, . . . , vN} corresponding to the agents in the swarm and an edge set E ⊂ V × V , which we assume contains unordered pairs of the form {vi, vj} indicating that agents i and j are neighbors. The interaction graph is denoted as G = (V, E). If both the set of nodes and the set of edges are not changing, we call G a static interaction graph; if either of the set undergoes changes, we instead refer to G as a dynamic interaction graph. The set of neighbors of agent i in the graph G is given by NG(i) = {j {vi, vj} ∈ E}. information agent i receives from all neighbors is given by the set Oi =(cid:8)oi,j j ∈ NG(i)(cid:9). Within this neighborhood, agent i can sense local information about other agents, for exam- ple distance or bearing to each neighbor. We denote the information agent i receives from agent j as oi,j = f (si, sj), which is a function of the local states of agent i and agent j. The observation oi,j is available for agent i only if j ∈ NG(i). Hence, the complete state As the observations of other agents are summarized in form of sets {Oi}, we require an efficient encoding that can be used as input to a neural network policy. In particular, it must meet the following two properties: • The encoding needs to be invariant to the indexing of the agents, respecting the unorderedness of the elements in the observation set. Only by exploiting the system's inherent homogeneity we can escape the curse of dimensionality. • The encoding must be applicable to varying set sizes because the local graph structure might change dynamically. Even if each agent can observe the entire system at all times, the encoding should be applicable for different swarm sizes. 4.3 Local Communication Models In addition to perceiving local state information of neighboring agents, the agents can also communicate information about the interaction graph G (Hüttenrauch et al., 2018). For example, agent j can transmit the number of perceived neighbors to agent i. Furthermore, the agents can also perform more complex operations on their local neighborhood graph. For example, they could compute the shortest distance to a target point (such as an evader) that is perceived by at least one agent within their local sub-graph. Hence, by using local 8 Deep Reinforcement Learning for Swarm Systems communication protocols, observation oi,j can contain information about both, the local states si and sj as well as the graph G, i.e., oi,j = f (si, sj,G). 4.4 Mean Embeddings as State Representations for Swarms In the simplest case, the local observation oi,j that agent i receives of agent j is composed of the distance and the bearing angle of agent i to agent j. However, oi,j can also contain more complex information, such as relative velocities or orientations. A straightforward way to represent the information set Oi is to concatenate the local quantities {oi,j}j into a single observation vector. However, as mentioned before, this representation has various drawbacks as it ignores the permutation invariance inherent to a homogeneous agent network. Further- more, it grows linearly with the number of agents in the swarm and is, therefore, limited to a fixed number of neighbors when used in combination with neural network policies. To resolve these issues, we treat the elements in the information set Oi as samples from a distribution that characterizes the current swarm configuration, i.e., oi,j ∼ pi(· s). We can now use an empirical encoding of this distribution in order to achieve permutation invariance of the elements of Oi as well as flexibility to the size of Oi. As highlighted in Section 3.2, a simple way is to use a mean feature embedding, i.e., (cid:88) oi,j∈Oi µOi = 1 Oi φ(oi,j), where φ defines the feature space of the mean embedding. The input dimensionality to the policy is given by the dimensionality of the feature space of the mean embedding and, hence, it does not depend on the size of the information set Oi any more. This allows us to use the embedding µOi as input to a neural network used in deep RL. In the following sections, we describe different feature spaces that can be used for the mean embedding. Figure 1 illustrates the resulting policy architectures with further details given in Appendix F. 4.4.1 Neural Network Feature Embeddings In line with the deep RL paradigm, we propose to use a neural network as feature map- ping φNN whose parameters are determined by the reinforcement learning algorithm. Using a neural network to define the feature space allows us to handle high dimensional obser- vations, which is not feasible with traditional approaches such as histograms (Hüttenrauch et al., 2018). In our experiments, a rather shallow architecture with one layer of RELU units already performed very well, but deeper architectures could be used for more complex applications. To the best of our knowledge, we present the first approach for using neural networks to define the feature space of a mean embedding. 4.4.2 Histograms An alternative feature space are provided by histograms, which can be related to image- like representations. In this approach, we discretize the space of certain features, such as the distance and bearing to other agents, into a fixed number of bins. This way, we can collect information about neighboring agents in the form of a fixed-size multi-dimensional histogram. Herein, the histogram bins define a feature mapping φHIST using a one-hot- coding for each observed agent. A detailed description of this approach can be found in 9 Hüttenrauch, Šošić and Neumann (b) RBF and histogram em- bedding policy (c) policy net- work for concate- nation (a) neural network embedding policy network Figure 1: Illustration of (a) the neural network mean embedding policy, (b) the network ar- chitecture used for the RBF and histogram representation, and (c) for the simple concatenation of observations. The numbers inside the boxes denote the dimen- sionalities of the hidden layers. The color coding in (a) highlights which layers share the same weights. The plus sign denotes the mean of the feature activations. our previous work (Hüttenrauch et al., 2018). While the approach works well in discrete environments where each cell is only occupied by a single agent, the representation can lead to blurring effects between agents in the continuous case. Moreover, the histogram approach does not scale well with the dimensionality of the feature space. 4.4.3 Radial Basis Functions A specific problem of the histogram approach is the hard assignment of agents into bins, which results in abrupt changes in the observation space when a neighboring agent moves from one bin to another. A more fine-grained representation can be achieved by using RBF networks with a fixed number of basis functions evenly distributed over the observation space. The resulting feature mapping φRBF is then defined by the activations of each basis function and can be seen as a "soft-assigned" histogram. However, both representations (histogram and RBF) suffer from the curse of dimensionality, as the number of required basis functions typically increases exponentially with the number of dimensions of the observation vector. 4.5 Other Representation Techniques Inspired by the work of Mordatch and Abbeel (2018), we also investigate a policy function that uses a softmax pooling layer instead of the mean embedding. The elements of the pooling layer ψ = [ψ1, . . . , ψK] are given by (cid:80) ψk = oi,j∈Oi exp(cid:0)αφk(oi,j)(cid:1) φk(oi,j) (cid:80) oi,j∈Oi exp (αφk(oi,j)) 10 neuralnetworkembedding64oi,164oi,2φNNOi64oi,N...64actionoiloc64φRBF/φHIST64actionoiloc64concat(Oi)64actionoiloc Deep Reinforcement Learning for Swarm Systems for each feature dimension of φ = [φ1, . . . , φK] with a temperature parameter α. Note that the representation becomes identical to our mean embedding for α = 0, while setting α (cid:29) 1 results in max-pooling and α (cid:28) −1 corresponds to min-pooling. In our experiments, we choose α = 1 as a trade-off between a mean embedding and max-pooling and additionally study the performance of max-pooling over each individual feature dimension. 4.6 Adaption of TRPO to the Homogeneous Swarm Setup Gupta et al. (2017) present a parameter-sharing variant of TRPO that can be used in a multi- agent setup. During the learning phase, the algorithm collects experiences made by all agents and uses these experiences to optimize one policy with a single set of parameters θ. Since, in the swarm setup, we assume homogeneous agents that are potentially indistinguishable to each other, we omit the agent index introduced by Gupta et al. (2017). The optimization problem is expressed using advantage values based on all agents' observations. During execution, however, each agent has only access to its own perception. Hence, the terminology of centralized -- learning / decentralized -- execution is chosen. During the trajectory roll-outs, we use a sub-sampling strategy to achieve a trade-off between the number of samples and the variability in advantage values seen by the learning algorithm. Our implementation is based on the OpenAI baselines version of TRPO with 10 MPI workers, where each worker samples 2048 time steps, resulting in 2048N samples. Subsequently, we randomly choose the data of 8 agents, yielding 2048 × 10 × 8 = 163840 samples per TRPO iteration. The chosen number of samples worked well throughout our experiments and was not extensively tuned. 5. Experimental Results Our experiments are designed to study the use of mean embeddings in a cooperative swarm setting. The three main aspects are: 1. How do the different mean embeddings (neural networks, histograms and RBF repre- sentation) compare when provided with the same state information content? 2. How does the mean embedding using neural networks perform when provided with additional state information while keeping the dimensionality of the feature space constant? 3. How does the mean embedding of neural network features compare against other pool- ing techniques? of K trajectories are sampled, each yielding a return of Gk = (cid:80)T In this section, we first introduce the swarm model used for our experiments and present the results of different evaluations afterwards. During a policy update, a fixed number t=1 r(t). The results are k=1 Gk. Videos demonstrating (cid:80)K presented in terms of the average return, denoted as ¯G = 1 K the agents' behavior in the different tasks can be found online.2 2. http://computational-learning.net/deep_rl_for_swarms 11 Hüttenrauch, Šošić and Neumann 5.1 Swarm Models Our agents are modeled as unicycles (a commonly used agent model in mobile robotics; see, for example, Egerstedt and Hu, 2001), where the control parameters either manipulate the linear and angular velocities v and ω (single integrator dynamics) or the corresponding accelerations v and ω (double integrator dynamics). In the single integrator case, the state of an agent is defined by its location x = (x, y) and orientation φ. In case of double integrator dynamics, the agent is additionally characterized by its current velocities. The exact state definition and kinematic models can be found in Appendix A. Note that these agent models are more complex than what is typically considered in optimization-based approaches, which mostly assume single integrator dynamics directly on x. Depending on the task, we either opt for a closed state space where the limits act as walls, or a periodic toroidal state space where agents exceeding the boundaries reappear on the opposite side of the space. Either way, the state is bounded by xmax = ymax = 100. We study two different observation scenarios for the agents, i.e., global observability and local observability. In the case of global observability, all agents are neighbors, i.e. NG(i) = {j ∈ {1, . . . , N} i (cid:54)= j}, (cid:112) which corresponds to a fully connected static interaction graph. For the local observabil- ity case, we use ∆-disk proximity graphs, where edges are formed if the distance di,j = (xi − xj)2 + (yi − yj)2 between agents i and j is less than a pre-defined cut-off distance dc for communication, resulting in a dynamic interaction graph. The neighborhood set of the graph is then defined as NG(i) = {j ∈ {1, . . . , N} i (cid:54)= j, di,j ≤ dc}. For a detailed description of all observational features available to the agents in the tasks, see Appendices B and C. 5.2 Rendezvous In the rendezvous problem, the goal is to minimize the distances between all agents. The reason why we choose this experiment is because a simple optimization-based baseline con- troller can be defined by the consensus protocol, xi = − (cid:88) j∈N (i) (xi − xj), where xi = (xi, yi) denotes the location of agent i. To make the solution compatible to the double integrator agent model, we make use of a PD-controller (see Appendix A for details). The reward function for the problem can be found in Appendix E.1. We evaluate different observation vectors oi,j which are fed into the policy. To compare the histogram and RBF embedding with the proposed neural network approach, we restrict the basic observation model (see below) to a set of two features: the distance di,j between two agents and the corresponding bearing φi,j. This restriction allows for a comparison to the optimization-based consensus protocol, which is based on displacements (an equivalent formulation of distance and bearing). To show that the neural network embeddings can 12 Deep Reinforcement Learning for Swarm Systems Figure 2: Illustration of two neighboring agents facing the direction of their velocity vectors νi and νj, along with the observed quantities, shown with respect to agent i. The observed quantities are the bearing φi,j to agent j, agent j's relative orientation θi,j to agent i, their distance di,j and a relative velocity vector ∆νi,j = νi− νj. In this trivial example, agent i's observed neighborhood size as well as the neighborhood size communicated by agent j are N (i) = N (j) = 1. be used with more informative observations, we further introduce an extended set and a communication (comm) set. These sets may include relative orientations θi,j or relative velocities ∆νi,j (depending on the agent dynamics), as well as the own neighborhood size and those of the neighbors. An illustration of these quantities can be found in Figure 2. 5.2.1 Global Observability First, we study the rendezvous problem with 20 agents in the global observability setting with double integrator dynamics to illustrate the algorithm's ability to handle complex dynamics. To this end, we compare the performances of policies using histogram, RBF and neural network embeddings on the basic set, as well as neural network embeddings on the extended set. The observations oi,j in the basic set comprise the distance di,j and bearing φi,j. In the extended set, which is processed only via neural network embeddings, we additionally add neighboring agents' relative orientations θi,j and velocities ∆νi,j. The local properties oi loc consist of a shortest distance and orientation to the closest boundary, i.e., di wall. The sets are summarized as follows: wall and φi Basic : Extended : oi,j = {di,j, φi,j} oi,j = {di,j, φi,j, θi,j, ∆νi,j} loc = {di oi loc = {di oi wall, φi wall, φi wall} wall}. The results are shown in Figure 3a. On first sight, they reveal that all shown methods even- tually find a successful strategy, with the histogram approach showing worst performance. Upon a closer look, it can be seen that the best solutions are found with the neural network embedding, in which case the learning algorithm also converges faster, demonstrating that this form of embedding serves as a suitable representation for deep RL. However, there are two important things to note: • The differences between the approaches seem to be small due to the wide range of obtained reward values, but the NN+ method brings in fact a significant performance 13 agentiagentj∆νi,jdi,jνiνjφi,jθi,j Hüttenrauch, Šošić and Neumann (a) 20 agents with global observability (b) 20 agents with local observability Figure 3: Learning curves for the rendezvous task with different observation models. The curves show the median of the average return ¯G based on the top five trials on a log scale. Legend: NN++: neural network mean embedding of comm set, NN+: neural network mean embedding of extended set, NN: neural network embedding of basic set, RBF: radial basis function embedding of basic set, HIST: histogram embedding of basic set, CONCAT+: simple concatenation of extended set. gain. Compared to the NN and RBF embedding, the performance of the learned NN+ policy is ∼10% better in terms of the average return of an episode (Figure 3a) and almost twice as good (∼4 × 10−2 versus ∼8 × 10−2) in terms of the mean distance between agents at the steady state solution after around 200 time steps (Figure 5a). Furthermore, the NN+ embedding reaches the mean distance achieved by the NN and RBF embeddings roughly 20 to 30 time steps earlier, which corresponds to an improvement of ∼25%. • Although the performance gain of NN+ can be partly explained by the use of the extended feature set, experiments with the same feature set using the histogram / RBF approach did not succeed to find solutions to the rendezvous problem; hence, the corresponding results are omitted. The reason is that the dimensionality of the input space scales exponentially for the histogram / RBF approach while only linearly for the neural network embedding, which results in a more compact feature representation that keeps the learning problem tractable. Together, these two observations suggest that the neural network embedding provides a suitable learning architecture for deep RL, whereas the histogram / RBF approach is only suited for low-dimensional spaces. Figure 4 shows a visualization of a policy using the neural network mean embedding of the extended set. After random initialization, the agents' locations quickly converge to a single point. Figure 5 shows performance evaluations of the best policies found with each of the mean embedding approaches. We plot the evolution of the mean distance between all agents over 1000 episodes with equal starting conditions. We also include the performance of the PD-controller defined in Appendix A. It can be seen in Figures 5a and 5c that the policies using the neural network embeddings decrease the mean distance most quickly and also find 14 0100200300400500-500-100-50-10TRPOiterationsaveragereturn¯GNN+NNRBFHISTCONCAT+0100200300400500-1000-500-100-50TRPOiterationsaveragereturn¯GNN++NN+RBF Deep Reinforcement Learning for Swarm Systems (a) snapshots (b) full episode Figure 4: Visualization of a learned policy for the pursuit evasion task. The policy is learned and executed by 10 agents using a neural network mean embedding of the extended set. Pursuers are illustrated in blue, the evader is highlighted in red. Visualization of a learned policy for the rendezvous task. The policy is learned and executed by 20 agents using a neural network mean embedding of the extended set. the best steady-state solutions among all learning approaches. While the optimization-based solution (PD) eventually drives the mean distance to zero, a small error remains for the learning-based approaches. However, the learned policies are faster in reducing the distance and therefore show a better average reward. Although the optimization-based policy is guaranteed to find an optimal stationary solution, the approach is build for simpler dynamics and hence performs suboptimally in the considered scenario. Note, that the controller gains for this approach have been tuned manually to maximize performance. In order to show the generalization abilities of the embeddings, we finally evaluate the obtained policies (except for the concatenation) with 100 agents. The results are displayed in Figure 5b. Again, the neural network embedding of the extended set is quickest in reducing the inter-agent distances, resulting in the best overall performance. 5.2.2 Local Observability The local observability case is studied with 20 agents and a communication cut-off distance of dc = 40. Due to the increased difficulty of the task, we resort to single integrator dynamics for this experiment. Again, we evaluate the basic and the extended set, which in this case contains the single integrator state information. Accordingly, we remove the relative velocities from the information sets. Moreover, we employ a local communication strategy that transmits the number of observed neighbors as additional information. Note that this information can be used by the agents to estimate in which direction the center of mass of the swarm is located. 15 t=0t=30t=50t=90 Hüttenrauch, Šošić and Neumann While the received neighborhood sizes {N (j)}j∈N (i) are treated as part of agent i's local observation of the swarm, the own perceived neighborhood size N (i) is considered as part of the local features oi loc. The observation models for the local observability case are thus summarized as: Basic : Extended : Comm : oi,j = {di,j, φi,j} oi,j = {di,j, φi,j, θi,j} oi,j = {di,j, φi,j, θi,j, N (j)} loc = {di oi loc = {di oi loc = {di oi wall, φi wall, φi wall, φi wall} wall} wall, N (i)}. For the experiment, we limit our comparison to RBF embeddings (which showed best performance among all non-neural-network solutions) of the basic set and neural network embeddings of the extended set and the comm set. The results are illustrated in Figure 3b, which shows that the neural network embeddings lead to a quicker learning progress. Fur- thermore, by introducing the comm model, a higher return is achieved. Compared to the global observability case, however, the learning process exhibits an increased variance caused by the information loss in the reward signal (see Appendix E). Figure 5c illustrates the performances of the learned policies. Again, the neural network embedding is quicker in reducing the inter-agent distances and converges to better steady- state solutions. In order to test the efficacy of the communication protocol, we further evaluate the learned policies with 10 agents. The results are displayed in Figure 5d. As expected, the performance decreases due to the lower chance of agents seeing each other but we still notice a benefit caused by the communication. 5.3 Pursuit Evasion with a Single Evader Our implementation of the pursuit evasion scenario is based on the work by Zhou et al. (2016), from which we adopt the evader strategy. The strategy is based on Voronoi regions, which the pursuers try to minimize and the evader tries to maximize. While the original paper considers a closed world, we change the world type from closed to periodic, thereby making it impossible to trap the evader in a corner. In order to encourage a higher level of coordination between the agents, we set the evader's maximum velocity to twice the pursuers' maximum velocity. An episode ends once the evader is caught, i.e., if the distance of the closest pursuer is below a certain threshold. In all our experiments, the evader policy is fixed and not part of the learning process. The reward function for the problem is based on the shortest distance of the closest pursuer and can be found in Appendix E.2. 5.3.1 Global Observability Again, we study the global observability case with ten agents. Since the pursuit of an evader is a more challenging task already, we reduce the movement complexity to single integrator dynamics. The basic and extended set are equal to those in the rendezvous experiment with single integrator dynamics, with additional information about the evader in the local properties oi loc. In here, we add the distance di,e and bearing φi,e of agent i to the evader e. Accordingly, the observation sets are given as: Basic : Extended : oi,j = {di,j, φi,j} oi,j = {di,j, φi,j, θi,j} 16 loc = {di oi loc = {di oi wall, φi wall, φi wall, di,e, φi,e} wall, di,e, φi,e}. Deep Reinforcement Learning for Swarm Systems (a) 20 agents (global observability) (b) 100 agents (global observability) (c) 20 agents (local observability) (d) 10 agents (local observability) Figure 5: Comparison of the mean distance between agents in the rendezvous experiment achieved by the best learned policies and the consensus protocol. In (a) and (b), the policy is learned with 20 agents and executed by 20 and 100 agents, respectively. In (c) and (d), the policy is learned with 20 agents and executed by 20 and 10 agents. Results are averaged over 1000 episodes with identical starting conditions. The results in Figure 6a reveal that successful strategies can be obtained with all meth- ods. However, this time, a clear advantage can be seen for the policies using neural network mean embeddings of the extended set, both in terms of behavior quality and in the number of samples necessary to find the solution. Figure 7 illustrates the strategy that such a policy exerts. After random initialization, the agents first spread in a way that leaves no possibility for the evader to increase its Voronoi region, thereby keeping the evader almost on the same spot. Once this configuration is reached, they surround the evader in a circular pattern and start to reduce the distance until one pursuer successfully reaches the distance threshold. To investigate the performance of the best mean embedding policies (learned with 10 agents), we estimate the corresponding probabilities that the evader is caught within a cer- tain time frame. For the sake of completeness, we also include the method proposed by Zhou 17 010020030040050010−210−1100101102tmeandistanceNN+NNRBFHISTCONCAT+Consensus010020030040050010−210−1100101102tmeandistanceNN+NNRBFHISTConsensus02004006008001,00010−1100101102tmeandistanceNN++NN+RBF02004006008001,00010−1100101102tmeandistanceNN++NN+RBF Hüttenrauch, Šošić and Neumann (a) 10 agents with global observability (b) 20 agents with local observability Figure 6: Learning curves for the pursuit evasion task with different observation models. The curves show the median of the average return ¯G based on the top five trials on a log scale. Legend: NN++: neural network mean embedding of comm set, NN+: neural network mean embedding of extended set, RBF: radial basis function embedding of basic set, HIST: histogram embedding of basic set, CONCAT+: concatenation of extended set. (a) snapshots (b) full episode Figure 7: Visualization of a learned policy for the pursuit evasion task. The policy is learned and executed by 10 agents using a neural network mean embedding of the extended set. Pursuers are illustrated in blue, the evader is highlighted in red. 18 0100200300400500-100-50-10TRPOiterationsaveragereturn¯GNN+NNRBFHISTCONCAT+02004006008001,000-1000-500-100-50TRPOiterationsaveragereturn¯GNN++NN+RBFt=0t=100t=110t=121 Deep Reinforcement Learning for Swarm Systems et al. (2016), which was originally not designed for a setup with a faster evader, though. The results are plotted in Figure 8 as the fraction of episodes ending at the respective time instant, averaged over 1000 episodes. The plot in Figure 8b reveals that the evader may be caught using all presented methods if the policies are executed for long time periods. As already indicated by the learning curves, using a neural network mean embedding represen- tation yields the quickest capture among all methods. The additional information in the extended set further increases performance. Next, we examine the generalization abilities of the learned policies, this time on scenarios with 5, 20 and 50 agents (Figures 8a,c,d). Increasing the amount of agents leads to a quicker capture for all methods; however, the best performance is still shown by the agents executing a neural network policy based on embeddings of the extended set. Interestingly, when using fewer agents than in the original setup (Figure 8a), all methods struggle to capture the evader. After inspection of the behavior, we found that the strategy of establishing a circle around the evader causes too large gaps between the agents through which the evader can escape. 5.3.2 Local Observability The local observability case is studied with 20 agents and a communication cut-off distance of dc = 40. Additionally, we introduce an observation radius do = 20 within which the pursuers can observe the distance and bearing to the evader. We reuse the basic and extended set from last section and modify the comm set to include the shortest path information of other agents in the neighborhood of agent i to the evader. This way, each agent i can compute a shortest path to the evader over a graph of connected agents, such that the path P = (v1, v2, . . . , vM ) minimizes the sum di,e m=1 dm,m+1 where v1 represents agent i and vM is the evader. The observation sets are given as: min =(cid:80)M−1 Basic : Extended : Comm : oi,j = {di,j, φi,j} oi,j = {di,j, φi,j, θi,j} oi,j = {di,j, φi,j, θi,j, dj,e min} loc = {di oi loc = {di oi loc = {di oi wall, φi wall, φi wall, φi wall, di,e, φi,e} wall, di,e, φi,e} wall, di,e, φi,e, di,e min}. Note that in this case the distance and bearing to an evader are only available if di,e ≤ do. Furthermore, the correct shortest path is only available if an agent and the evader are in the same sub-graph, otherwise, a pre-defined value is fed into the policy. Again, we limit the comparison for the local observability case to the more promising methods of neural network and RBF mean embeddings. The results in Figure 6b show that the performance gain of the neural network mean embeddings is even more noticeable than in the global observability case, with a clear advantage in the presence of the local commu- nication protocols. The inspection of the termination probabilities in Figure 9 confirms that the neural network mean embedding results in a significantly improved policy. 5.4 Pursuit Evasion with Multiple Evaders Lastly, we study a pursuit evasion scenario with multiple evaders, i.e., we assume that agent i receives observation samples {oi,e} from several evaders, which are processed using a second mean embedding to account for the variable set size. Where in the previous experiment 19 Hüttenrauch, Šošić and Neumann (a) 5 agents (b) 10 agents (c) 20 agents (d) 50 agents Figure 8: Performance comparison of the best learned policies and the optimization ap- proach minimizing Voronoi regions in the pursuit evasion task with global ob- servability. The curves show the probability that the evader is caught after t time steps. All policies are learned with 10 agents but executed with different agent numbers, as indicated below each subfigure. Results are averaged over 1000 episodes with identical starting conditions. the agents had precise information about the evader in terms of distance and bearing, they now have to extract this information from the respective embedding. An additional level of difficulty results from the fact that the reward function no longer provides any guidance in terms of the distances to the evaders since it only counts the number of evaders caught in each time step (see Appendix E.3 for details). We study a scenario with 50 pursuers and 5 evaders using the global observability setup in Section 5.3.1, except that we respawn caught evaders to a new random location instead of terminating the episode. The observation sets, containing the same type of information but arranged according to the inputs of the neural networks, are designed as follows: wall} wall}. oi,j = {di,j, φi,j} oi,j = {di,j, φi,j, θi,j} oi,e = {di,e, φi,e} oi,e = {di,e, φi,e} Basic : Extended : loc = {di oi loc = {di oi wall, φi wall, φi 20 02004006008001,0000.00.20.40.60.81.0tp(evadercaught)NN+NNRBFHISTVoronoi01002003000.00.20.40.60.81.0tp(evadercaught)NN+NNRBFHISTVoronoiConcat0501001500.00.20.40.60.81.0tp(evadercaught)NN+NNRBFHISTVoronoi0204060801001200.00.20.40.60.81.0tp(evadercaught)NN+NNRBFHISTVoronoi Deep Reinforcement Learning for Swarm Systems Figure 9: Performance comparison of the best policies in the pursuit evasion task with local observability. The curves show the probability that the evader is caught after t time steps. All policies are learned and executed by 20 agents. Results are averaged over 1000 episodes with identical starting conditions. Figure 10a shows the learning curves for policies with neural network and RBF mean embeddings and for the concatenation approach. The return directly relates to the number of evaders caught during an episode. Again, the neural network mean embedding performs significantly better than the RBF embedding. The curves clearly indicate the positive influ- ence of the additional information present in the extended set. With this amount of agents, the dimensionality of the concatenation has increased to a point where learning is no longer feasible. 5.5 Evaluation of Pooling Functions Figure 11 shows learning curves of policies based on mean embeddings, softmax pooling, and max-pooling (as described in Section 4.5) of features of the extended set for the rendezvous and pursuit evasion task with global observability. In the rendezvous task (Figure 11a), all pooling techniques eventually manage to find a good solution. Policies using neural network mean embedding, however, on average converge more quickly while policies using max-pooling show slightly worse performance. Given its reduced computational complexity compared to the softmax-pooling, the mean embedding provides the most effective approach among all proposed architectures. When examining the results of the pursuit evasion task (Figure 11b), we find that the algorithm produces two distinct solutions. A sub-optimal one, which is only able to circle the evader but is unable to catch it (a catch is realized if the distance of the closest pursuer to the evader is below a certain threshold), and a solution which additionally catches the evader after a short period of time. Therefore, we not only report the performance of the top 5 trials out of 16, but also provide the number of times the algorithm was able to discover the better of the two solution (Table 1). Once that the algorithm finds a good solution, the mean embedding and softmax solutions perform comparably well but the max-pooling approach shows a significantly worse performance. More importantly, however, the algorithm was 21 01002003004000.00.20.40.60.81.0tp(evadercaught)NN++NN+RBF Hüttenrauch, Šošić and Neumann (a) Evaluation of different observation models and embedding techniques. (b) Comparison of the proposed mean embedding policy to policies with statis- tics of the observations as input. Figure 10: Learning curves for 50 agent pursuit evasion with 5 evaders. The curves show the median of the average return ¯G based on the top five trials. Legend: NN+ 2x: two neural network mean embeddings of the extended set, RBF 2x: two radial basis function mean embeddings of the basic set, concat: simple concatenation of extended set. MSSK+, MSS+, MS+ and M+: Combinations of mean, standard deviation, skew and kurtosis of the features in the extended set. (a) Rendezvous with 20 agents and global observability. (b) Pursuit evasion with 10 pursuers and global observability. Figure 11: Learning curves of different embedding and pooling architectures based on the extended set. The curves show the median of the average return ¯G based on the top five trials on a log scale. Legend: MEAN: neural network mean embedding, SM: softmax feature pooling, MAX: max feature pooling. able to find the good solution more often using the mean embedding than using the other pooling approaches. 22 010020030040050002040TRPOiterationsaveragereturn¯GNN+2xRBF2xconcat010020030040050002040TRPOiterationsaveragereturn¯GNN+MSSK+MSS+MS+M+050100150200250-100-50TRPOiterationsaveragereturn¯GMEANSMMAX0100200300400500-100-50-10TRPOiterationsaveragereturn¯GMEANSMMAX Deep Reinforcement Learning for Swarm Systems mean 10/16 sm max 6/16 4/16 Table 1: Number of times the algorithm discovered policies that led to a successful catch. 5.6 Comparison to Moment-Based Representations Finally, we compare the mean embedding of neural network features to a representation using statistics of the input. Figure 10b shows an evaluation on the pursuit evasion task with 50 agents and 5 evaders. Here, we use combinations of the empirical mean, standard deviation, skew and kurtosis of each feature of the extended set as the input to a policy function. The plot reveals that neural network mean embeddings can capture more relevant information about the characteristics of the distribution of agents than simple statistics of the elements in the extended set. Similar results were obtained for the other tasks although the differences in performance were less pronounced. 5.7 Computational Complexity Unlike in classical optimization-based control, where the controller is derived from an as- sumed dynamics model, model-free reinforcement learning methods like TRPO find their control policies through interaction with the environment, without requiring explicit knowl- edge of the underlying system dynamics. While this comes at the cost of an additional exploration phase, learning-based approaches typically offer an increased flexibility in that the same control architecture can adapt to different tasks and environments, without being affected by potential model mismatches. More importantly, considering the final learned policy from a computational perspective, the synthesis of the control signal involves no additional conceptual steps compared to an optimization-based approach. While a typical experiment with 20 agents in our setup takes between four and six hours of training on a machine with ten cores (sampling trajectories in parallel), a forward pass through the trained neural network to compute the instantaneous control signal takes only about 1 ms, which enables an execution in real time. Furthermore, all control strategies learned through our framework are decentralized, which allows an arbitrary system size scaling in a real swarm network, where the required computations are naturally distributed over all agents. When learning new policies, the memory requirements scale O(N (N − 1)) with the number of agents (assuming global observability) since we need to store the local views of all agents. However, decentralized execution after the policy is learned scales linearly in N per agent. An incremental online computation of the mean can be chosen if memory restrictions exist (Finch, 2009). For comparison, the complexity of calculating Voronoi regions for the pursuit evasion policy scales O(N log N ) with the number of agents (Aurenhammer, 1991). Concerning the system sizes considered in our experiments, the resulting computation time of both policy types is in the same order of magnitude during task execution. 23 Hüttenrauch, Šošić and Neumann 6. Conclusion In this paper, we proposed the use of mean feature embeddings as state representations to overcome two major problems in deep reinforcement learning for swarms: the high and possibly changing dimensionality of information perceived by each agent. We introduced three different approaches to realize such embeddings -- two manually designed approaches based on histograms / radial basis functions and an end-to-end learned neural network fea- ture representation. We evaluated the approaches on different variations of the rendezvous and pursuit evasion problem and compared their performances to that of a naive feature concatenation method and classical approaches found in the literature. Our evaluation re- vealed that learning embeddings end-to-end using neural network features scales well with increasing agent numbers, leads to better performing policies, and often results in faster con- vergence compared to all other approaches. As expected, the naive concatenation approach fails for larger system sizes. Acknowledgments The research leading to these results has received funding from EPSRC under grant agree- ment EP/R02572X/1 (National Center for Nuclear Robotics). Calculations for this research were conducted on the Lichtenberg high performance computer of the TU Darmstadt. Appendix A. Agent Kinematics In the single integrator case, the state of an agent is given by si = [xi, yi, φi] ∈ S = {[x, y, φ] ∈ R3 : 0 ≤ x ≤ xmax, 0 ≤ y ≤ ymax, 0 ≤ φ < 2π}, and the linear velocity v and angular velocity ω can be directly controlled by the agent. The kinematic model is given by x = v cos φ y = v sin φ φ = ω. In the double integrator case, the state is given by si = [xi, yi, φi, vi, ωi] ∈ S = {[x, y, φ, v, ω] ∈ R5 : 0 ≤ x ≤ xmax, 0 ≤ y ≤ ymax, 0 ≤ φ < 2π,v ≤ vmax,ω ≤ ωmax} and the agent can only indirectly change its velocity by acceleration. With the control inputs av and aω, the model is then given by v = av ω = aω x = v cos φ y = v sin φ φ = ω. For the experiments, we use finite differences to model the system in discrete time. 24 Deep Reinforcement Learning for Swarm Systems Appendix B. Observation Model Irrespective of the task, an agent i can sense the following properties about other agents j ∈ N (i) within its neighborhood: di,j φi,j = arctan( yj − yi xj − xi ) − φi yi − yj xi − xj ) − φj θi,j = arctan( ∆vi,j = vi(cid:2)cos φi, sin φi(cid:3) − vj(cid:2)cos φj, sin φj(cid:3) distance to neighboring agents bearing to neighboring agents relative orientation relative velocity Furthermore, each agent has access to the following local properties: wall = min(xi − xmin, yi − ymin, xmax − xi, ymax − yi) di wall = ϕi φi vi, ωi wall − φi distance to closest wall orientation to closest wall own velocity where ϕi wall denotes the absolute bearing of agent i to the closest wall segment. Appendix C. Task Specific Communication Protocols In the rendezvous task, agent i additionally can sense information about neighborhood sizes: N (i) N (j) : j ∈ N (i) own neighborhood size neighborhood size of neighbor j In pursuit evasion, we additionally have one or multiple evaders with states se = [xe, ye] ∈ {[x, y] ∈ R2 : 0 ≤ x ≤ xmax, 0 ≤ y ≤ ymax}. Agents can sense the distance and bearing to an evader, given that the evader is within an observation distance do: (cid:113) di,e = (xi − xe)2 + (yi − ye)2 if di,e ≤ do φi,e = arctan( ye − yi xe − xi ) − φi if di,e ≤ do distance to evader bearing to evader (cid:80)M−1 Furthermore, we assume that each agent i can compute a shortest path to the evader over a graph of connected agents, such that the path P = (v1, v2 . . . , vM ) minimizes the sum m=1 dm,m+1 where v1 is agent i and vM is the evader. Appendix D. Controller for Double Integrator Dynamics We use a simple PD-controller to transform the consensus protocol with high-level direct state manipulation to the unicycle model with double integrator dynamics. It is given by 25 Hüttenrauch, Šošić and Neumann av = K1(vd − v) aω = K2(φd − φ) + D2(ωd − ω) vd = (cid:107) x(cid:107) y x ) φd = arctan( ωd = 0, where the parameters K1, K2 and D2 are tuned manually to give good performance on the problem. Appendix E. Reward Functions E.1 Rendezvous The reward function is defined in terms of the inter-agent distances {di,j} as R(s, a) = α min(di,j, dc) + β(cid:107)a(cid:107), N(cid:88) N(cid:88) i=1 j=i+1 α = −(cid:16) N (N−1) where in the global observability case we set the cut-off distance dc = max(xmax, ymax) to the maximum possible inter-agent distance in the respective environment. The factor serves as a reward normalization factor and β = −1 × 10−3 controls (cid:17)−1 dc 2 how strongly high action outputs of the policy are penalized. E.2 Pursuit Evasion For the case of a single evader, the pursuit evasion objective may be expressed in terms of the distance to the closest pursuer. More specifically, the reward function is given as R(s, a) = − 1 do min(dmin, do), where dmin = min(d1,e, . . . , dN,e). For the global observability case, we set do to the maxi- mum possible distance of di,e . E.3 Pursuit Evasion with Multiple Evaders In the case of multiple evaders, we use a sparser reward function that counts how many evaders are caught per time step, with no additional guidance of inter-agent distances. An evader e is assumed to be caught if the closest pursuer's distance dmin,e = min(d1,e, . . . , dN,e) is closer than a threshold distance dt = 3. The reward function is given by R(s, a) = 1[0,dt](dmin,e), E(cid:88) e=1 26 Deep Reinforcement Learning for Swarm Systems (a) Activation functions evaluation. (b) Layer size evaluation. Figure 12: Learning curves for 20 agent rendezvous with (a) different activation functions for the mean embedding and (b) different layer numbers and sizes using a RELU activation function. The curves show the median of the average return ¯G based on the top five trials. where E is the number of evaders and 1[a,b](x) = is the indicator function. Appendix F. Policy Architectures (cid:40) 1 if x ∈ [a, b] 0 else This section briefly summarizes the chosen policy architectures. Illustrations can be found in Figure 1. F.1 Neural Network Embedding Policy We evaluated different layer sizes and activation functions on the rendezvous problem and show the results in Figure 12. In all other experiments, the neural network mean feature embedding for agent i, given by φNN(Oi) = 1 Oi φ(oi,j), (cid:88) oi,j∈Oi is realized as the empirical mean of the outputs of a single layer feed-forward neural network, φ(oi,j) = h(W oi,j + b), with 64 neurons and a RELU non-linearity h. 27 0100200300400500−18−16−14−12TRPOiterationsaveragereturn¯Grelutanhlinear0100200300400−18−16−14−12TRPOiterationsaveragereturn¯G[32][64][128][32,32][64,64] Hüttenrauch, Šošić and Neumann F.2 Histogram Embedding Policy The histogram embedding is achieved with a two-dimensional histogram over the distance and bearing space to other agents. We use eight evenly spaced bins for each feature, resulting in a 64 dimensional feature vector. F.3 RBF Embedding Policy The RBF embedding is given by a vector φRBF(Oi) =(cid:2)ψ1(Oi), . . . , ψM 2(Oi)(cid:3) of M 2 contri- butions from M = 8 radial basis functions whose center points are evenly distributed in the distance and bearing space. With oi,j = [di,j, φi,j], µm = [µd,m, µφ,m], and σ = [σd, σφ] its components are given by (cid:88) oi,j∈Oi ψm(Oi) = ρm(oi,j), where we choose (cid:34) (cid:32) − 1 2 ρm(oi,j) = exp (di,j − µd,m)2 σ2 d + (φi,j − µφ,m)2 σ2 φ (cid:35)(cid:33) . The policy network structure used for both, the histogram and the RBF representations, is illustrated in Figure 1b. F.4 Concatenation Policy For the concatenation method, we first concatenate agent i's neighborhood observations contained in the set Oi and process them with one hidden layer of 64 neurons and a RELU non-linearity. The resulting feature vector is then concatenated with the local properties oi loc and fed into a second layer of same size. Finally, the output of the second layer is mapped to the action. The corresponding policy network structure can be seen in Figure 1c. References Maruan Al-Shedivat, Trapit Bansal, Yura Burda, Ilya Sutskever, Igor Mordatch, and Pieter Abbeel. Continuous adaptation via meta-learning in nonstationary and competitive envi- ronments. In International Conference on Learning Representations, 2018. Franz Aurenhammer. Voronoi diagrams -- a survey of a fundamental geometric data struc- ture. ACM Computing Surveys (CSUR), 23(3):345 -- 405, 1991. Levent Bayındır. A review of swarm robotics tasks. Neurocomputing, 172:292 -- 321, 2016. Daniel S. Bernstein, Robert Givan, Neil Immerman, and Shlomo Zilberstein. The com- plexity of decentralized control of Markov decision processes. Mathematics of Operations Research, 27(4):819 -- 840, 2002. Mo Chen, Zhengyuan Zhou, and Claire J Tomlin. Multiplayer reach-avoid games via low dimensional solutions and maximum matching. In American Control Conference (ACC), pages 1444 -- 1449, 2014a. 28 Deep Reinforcement Learning for Swarm Systems Mo Chen, Zhengyuan Zhou, and Claire J Tomlin. A path defense approach to the multiplayer In IEEE 53rd Annual Conference on Decision and Control (CDC), reach-avoid game. pages 2420 -- 2426, 2014b. Mo Chen, Zhengyuan Zhou, and Claire J Tomlin. Multiplayer reach-avoid games via pairwise outcomes. IEEE Transactions on Automatic Control, 62(3):1451 -- 1457, 2017. Timothy H. Chung, Geoffrey A. Hollinger, and Volkan Isler. Search and pursuit-evasion in mobile robotics. Autonomous Robots, 31(4):299, 2011. D. V. Dimarogonas and K. J. Kyriakopoulos. On the rendezvous problem for multiple nonholonomic agents. IEEE Transactions on Automatic Control, 52(5):916 -- 922, 2007. M. Egerstedt and Xiaoming Hu. Formation constrained multi-agent control. IEEE Trans- actions on Robotics and Automation, 17(6):947 -- 951, 2001. Tony Finch. Incremental calculation of weighted mean and variance. University of Cam- bridge, 4:11 -- 5, 2009. G. H. W. Gebhardt, K. Daun, M. Schnaubelt, and G. Neumann. Learning robust policies for object manipulation with robot swarms. In IEEE International Conference on Robotics and Automation, 2018. M. C. De Gennaro and A. Jadbabaie. Decentralized control of connectivity for multi-agent systems. In IEEE Conference on Decision and Control, pages 3628 -- 3633, 2006. Arthur Gretton, Kenji Fukumizu, Choon H Teo, Le Song, Bernhard Schölkopf, and Alex J In Advances in Neural Information Smola. A kernel statistical test of independence. Processing Systems, pages 585 -- 592, 2008. Arthur Gretton, Karsten M. Borgwardt, Malte J. Rasch, Bernhard Schölkopf, and Alexander Smola. A kernel two-sample test. Journal of Machine Learning Research, 13(Mar):723 -- 773, 2012. Aditya Grover, Maruan Al-Shedivat, Jayesh K Gupta, Yura Burda, and Harrison Edwards. Learning policy representations in multiagent systems. arXiv:1806.06464, 2018. Jayesh K. Gupta, Maxim Egorov, and Mykel Kochenderfer. Cooperative multi-agent control using deep reinforcement learning. In International Conference on Autonomous Agents and Multiagent Systems, pages 66 -- 83, 2017. Julia Handl and Bernd Meyer. Ant-based and swarm-based clustering. Swarm Intelligence, 1(2):95 -- 113, 2007. Matthew Hausknecht and Peter Stone. Deep recurrent Q-learning for partially observable MDPs. In AAAI Fall Symposium Series, 2015. Maximilian Hüttenrauch, Adrian Šošić, and Gerhard Neumann. Local communication pro- tocols for learning complex swarm behaviors with deep reinforcement learning. In Inter- national Conference on Swarm Intelligence, 2018. 29 Hüttenrauch, Šošić and Neumann A. Jadbabaie, Jie Lin, and A. S. Morse. Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Transactions on Automatic Control, 48(6):988 -- 1001, 2003. M. Ji and M. Egerstedt. Distributed coordination control of multiagent systems while pre- serving connectedness. IEEE Transactions on Robotics, 23(4):693 -- 703, 2007. Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa, David Silver, and Daan Wierstra. Continuous control with deep reinforcement learning. arXiv:1509.02971, 2015. J. Lin, A. Morse, and B. Anderson. The multi-agent rendezvous problem. Part 2: The asynchronous case. SIAM Journal on Control and Optimization, 46(6):2120 -- 2147, 2007. Zhiyun Lin, M. Broucke, and B. Francis. Local control strategies for groups of mobile autonomous agents. IEEE Transactions on Automatic Control, 49(4):622 -- 629, 2004. Ryan Lowe, YI WU, Aviv Tamar, Jean Harb, OpenAI Pieter Abbeel, and Igor Mordatch. Multi-agent actor-critic for mixed cooperative-competitive environments. In Advances in Neural Information Processing Systems, pages 6379 -- 6390, 2017. L. Matignon, G. J. Laurent, and N. L. Fort-Piat. Hysteretic Q-learning: An algorithm for decentralized reinforcement learning in cooperative multi-agent teams. In IEEE/RSJ International Conference on Intelligent Robots and Systems, pages 64 -- 69, 2007. Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A. Rusu, Joel Veness, Marc G. Bellemare, Alex Graves, Martin Riedmiller, Andreas K. Fidjeland, Georg Ostrovski, Stig Petersen, Charles Beattie, Amir Sadik, Ioannis Antonoglou, Helen King, Dharshan Ku- maran, Daan Wierstra, Shane Legg, and Demis Hassabis. Human-level control through deep reinforcement learning. Nature, 518:529 -- 533, 2015. Igor Mordatch and Pieter Abbeel. Emergence of grounded compositional language in multi- agent populations. In AAAI Conference on Artificial Intelligence, 2018. Shayegan Omidshafiei, Jason Pazis, Christopher Amato, Jonathan P. How, and John Vian. Deep decentralized multi-task multi-agent reinforcement learning under partial observ- ability. In International Conference on Machine Learning, pages 2681 -- 2690, 2017. Gregory Palmer, Karl Tuyls, Daan Bloembergen, and Rahul Savani. Lenient multi-agent deep reinforcement learning. arXiv:1707.04402, 2017. Liviu Panait, Keith Sullivan, and Sean Luke. Lenient learners in cooperative multiagent sys- tems. In International Joint Conference on Autonomous Agents and Multiagent Systems, pages 801 -- 803, 2006. B. Ranjbar-Sahraei, F. Shabaninia, A. Nemati, and S. D. Stan. A novel robust decentralized adaptive fuzzy control for swarm formation of multiagent systems. IEEE Transactions on Industrial Electronics, 59(8):3124 -- 3134, 2012. 30 Deep Reinforcement Learning for Swarm Systems Tabish Rashid, Mikayel Samvelyan, Christian Schroeder de Witt, Gregory Farquhar, Jakob Foerster, and Shimon Whiteson. QMIX: Monotonic value function factorisation for deep multi-agent reinforcement learning. arXiv:1803.11485, 2018. Andrei A Rusu, Sergio Gomez Colmenarejo, Caglar Gulcehre, Guillaume Desjardins, James Kirkpatrick, Razvan Pascanu, Volodymyr Mnih, Koray Kavukcuoglu, and Raia Hadsell. Policy distillation. arXiv:1511.06295, 2015. Muhammad Saleem, Gianni A Di Caro, and Muddassar Farooq. Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions. Information Sciences, 181(20):4597 -- 4624, 2011. John Schulman, Sergey Levine, Pieter Abbeel, Michael Jordan, and Philipp Moritz. Trust region policy optimization. In International Conference on Machine Learning, pages 1889 -- 1897, 2015. Alex Smola, Arthur Gretton, Le Song, and Bernhard Schölkopf. A Hilbert space embedding In International Conference on Algorithmic Learning Theory, pages for distributions. 13 -- 31, 2007. Adrian Šošić, Wasiur R KhudaBukhsh, Abdelhak M Zoubir, and Heinz Koeppl. Inverse reinforcement learning in swarm systems. In International Conference on Autonomous Agents and Multiagent Systems, pages 1413 -- 1421, 2017. Peter Sunehag, Guy Lever, Audrunas Gruslys, Wojciech Marian Czarnecki, Vinicius Zam- baldi, Max Jaderberg, Marc Lanctot, Nicolas Sonnerat, Joel Z Leibo, Karl Tuyls, and Thore Graepel. Value-decomposition networks for cooperative multi-agent learning. arXiv:1706.05296, 2017. Yaodong Yang, Rui Luo, Minne Li, Ming Zhou, Weinan Zhang, and Jun Wang. Mean field multi-agent reinforcement learning. arXiv:1802.05438, 2018. Manzil Zaheer, Satwik Kottur, Siamak Ravanbakhsh, Barnabas Poczos, Ruslan R Salakhut- dinov, and Alexander J Smola. Deep sets. In Advances in Neural Information Processing Systems, pages 3391 -- 3401, 2017. Lianmin Zheng, Jiacheng Yang, Han Cai, Weinan Zhang, Jun Wang, and Yong Yu. MA- gent: A many-agent reinforcement learning platform for artificial collective intelligence. arXiv:1712.00600, 2017. Zhengyuan Zhou, Ryo Takei, Haomiao Huang, and Claire J Tomlin. A general, open-loop In IEEE 51st Annual Conference on Decision and formulation for reach-avoid games. Control (CDC), pages 6501 -- 6506, 2012. Zhengyuan Zhou, Wei Zhang, Jerry Ding, Haomiao Huang, Dušan M Stipanović, and Claire J Tomlin. Cooperative pursuit with Voronoi partitions. Automatica, 72:64 -- 72, 2016. 31
1707.06492
1
1707
2017-07-20T13:11:16
Effects of Network Structure on the Performance of a Modeled Traffic Network under Drivers' Bounded Rationality
[ "cs.MA", "nlin.AO" ]
We propose a minority route choice game to investigate the effect of the network structure on traffic network performance under the assumption of drivers' bounded rationality. We investigate ring-and-hub topologies to capture the nature of traffic networks in cities, and employ a minority game-based inductive learning process to model the characteristic behavior under the route choice scenario. Through numerical experiments, we find that topological changes in traffic networks induce a phase transition from an uncongested phase to a congested phase. Understanding this phase transition is helpful in planning new traffic networks.
cs.MA
cs
Effects of Network Structure on the Performance of a Modeled Traffic Network under Drivers' Bounded Rationality Toru Fujinoa, Yu Chena aGraduate School of Frontier Sciences, University of Tokyo, 5-1-5, Kashiwanoha, Kashiwa, Chiba 277-8561, Japan Abstract We propose a minority route choice game to investigate the effect of the network structure on traffic network performance under the assumption of drivers' bounded rationality. We investigate ring-and-hub topologies to cap- ture the nature of traffic networks in cities, and employ a minority game- based inductive learning process to model the characteristic behavior under the route choice scenario. Through numerical experiments, we find that topological changes in traffic networks induce a phase transition from an un- congested phase to a congested phase. Understanding this phase transition is helpful in planning new traffic networks. Keywords: Agent-based simulation, Traffic networks, Route-choice problems, Bounded rationality 1. Introduction There are various types of traffic networks, e.g., road traffic networks, railway networks, and aviation networks. These underlying infrastructures support numerous social and economic activities. Hence, understanding the complex behavior and performance of traffic systems based on such networks has attracted considerable attention across a wide range of disciplines, in- cluding traffic engineering [1, 2, 3], economics [4], physics [5], and computer science [6]. Email addresses: [email protected] (Toru Fujino), [email protected] (Yu Chen) Preprint submitted to Physica A May 25, 2021 The main difficulty in analyzing traffic network performance lies in devi- ations from the user equilibrium (UE), in which drivers in traffic networks are assumed to be completely rational and have perfect information about their route choice behavior. In real situations, the above two assumptions of UE are invalid. It is known from the Selten's study [4] that UE can not be reached even in an idealized system, where drivers have the same origin and destination pair and only two routes to choose from. Laboratory exper- iments in their study demonstrate that the number of drivers on each route fluctuates until the end of the experiment, even though the mean number of drivers on each route becomes close to the equilibrium. Agent-based models (ABMs) provide a good framework for dealing with the bounded rationality of drivers on abstract networks. In ABMs, drivers are represented by agents with limited intelligence. A number of studies have considered such a framework. Nakayama et al. [1] built a driver model with cognition and learning under the route-choice scenario, and they found that the network flow does not necessarily converge to UE, but may reach the deluded equilibrium, which can be derived from the drivers' false perception of the environment. Gourley et al. [7] used a Minority Game (MG) to for- mulate the agents' route choice behavior between a shortcut with variable congestion costs and a detour with a constant cost. One factor that has a nontrivial influence on the traffic network perfor- mance is the variation in traffic network structures. In the real world, there are numerous types of structured road networks, which makes it more difficult for drivers to select an optimal route among the alternatives. Many studies from this viewpoint have focused on the UE solution [8, 9, 10, 11, 12, 13]. These influential aspects of traffic network analysis, however, have not been combined in a unified framework, and so these analyses have not been comprehensive. Although previous studies on ABMs have incorporated the simple aspects of the drivers bounded rationality, another important aspect of bounded rationality, such as preference heterogeneity, has not yet been considered, and variations in network structures have not been investigated. In the previous researches on UE, the effects of network structures have been examined comprehensively, but these studies have not dealt with the drivers' bounded rationality. In this paper, we aim to overcome the deficiencies in existing approaches by building a new ABM. To deal with drivers bounded rationality and pref- erence heterogeneity, we borrow the strategy of MG and Market directed resource allocation game (MDRAG) [14]. To simulate variations in network 2 structures, we employ Gourleys ring-and-hub topology [7]. In addition, we explore the optimal network structure under these conditions for implication to plan new traffic networks. 2. Model 2.1. Overview of the simulation model The complexity of the route choice problem can be understood by the following scenario similarly explained by Gourley [7]. When you are the only traveler on a road traffic network, it is not difficult to determine the quickest route to get to your destination. However, in most cases, a large number of travelers must simultaneously choose a route along a common network to reach their respective destinations. This condition makes the traffic situation complicated. If too many travelers select the same shorter (or quicker) route, the route tends to become extremely congested. In such cases, making a detour may be a better choice. At the system level, if the travelers were perfectly rational and had perfect information, it would be possible to attain the UE state, wherein no driver could reduce the transportation cost by switching to a different route. However, as drivers are boundedly rational in reality, i.e., traffic information is incomplete and their capacity to evaluate routes is limited, it is impossible for them to make perfect decisions. In addition, each driver has a different preference for choosing his or her route, and this heterogeneity leads to complicated situations. Therefore, UE can rarely be attained in real situations. To tackle this complexity and achieve the research objectives, we con- struct a new agent-based model, based on the Gourley's model [7], with the extension of consideration of network topological changes. Additionally, we introduce preference heterogeneity [14] to Gourley's model in an attempt to capture the route choice behavior more realistically. Thus, the proposed model consists of two parts, a network model, and an agent's decision-making model. 2.2. Ring-and-hub network topology To express the route choice scenario which I described above, we employ a ring-and-hub network shown in Fig. 1. This network consists of N peripheral nodes, which are mutually connected by their nearest neighbors, and a central hub node, which is connected to only λ ≤ N peripheral nodes. Each node is assigned exactly one agent, so there are N agents on the network. Each 3 agent departs from her origin node and later arrives at her destination node, which is randomly assigned at the begining of the simulation. There are two possible routes by which each agent can reach their destination (indicated by blue and red lines in Fig. 1). One is an outside route that does not pass through the central hub, whereas the other is an inside route that passes through the central hub. The outside route can be considered as a detour, and the inside route is a shortcut. Fig. 1: Ring-and-hub network. The outside route is depicted by the blue line, and the inside route is depicted by the red line. In this modeled traffic network, the transportation costs for the outside and inside routes of agent n = 1, . . . , N at each time step t = 1, . . . , T are represented by C (n) out (t) is simply the number of links along the shortest peripheral path connecting the origin and the destination. C (n) in (t) depends on the number of agents in the central hub. The cost function is given as follows: in (t), respectively. C (n) out (t) and C (n) C (n) out (t) = d(O,D), C (n) in (t) = (cid:40) d(O,Hin) + α · d(Hin,Hout) + d(Hout,D) d(O,Hin) + β · d(Hin,Hout) + d(Hout,D) if Nin (t) ≤ L if Nin (t) > L. (1) (2) Here, α is a noncongestion coefficient and β is a congestion coefficient; L is the central hub capacity, which represents the limited number of agents who 4 ODHinHoutCnoutODHinHoutCnin can be handled by the hub without congestion, and Nin (t) is the number of central hub users at time step t. d(·,·) is the length of the shortest path on the peripheral path between nodes. O and D are the origin and desti- nation nodes, respectively. Hin and Hout are the interchange nodes that the agent can use to pass through the hub node along the inside route. In this experiment, we set α and β to 1 2, respectively. Thus, hub users may reach their destination at a lower cost under noncongestion, or at a higher cost under congestion. An example is illustrated in Fig. 1. In this example case, C (n) in (t) will be 11.5 if the hub node is not congested and 24.5 if the hub node is congested. There may be several possible in- side routes in this example, but the agents only consider the least-cost inside route among the candidates. out (t) will be 18; C (n) 2 and 3 To express various network structures parametrically, we vary the number of links connected to the hub node, λ, while the symmetry of the network remains unchanged, as illustrated in Fig. 2. Note that it is impractical to consider all topological combinations of ring-and-hub networks. In addition, considering that traffic networks are artificially designed, it is not unreason- able to consider only symmetric cases. Fig. 2: Hub links are symmetrically added to the existing network one at a time 2.3. Minority route-choice game model This route choice game on the ring-and-hub network can be interpreted as a situation whereby a traveler considers whether to use a freeway to reach the destination or not. The hub node corresponds to the freeway, and the peripheral nodes correspond to some sites with or without an entrance of the freeway. If the driver's origin is far from the entrance to the freeway, using a local road would be more efficient, as there would be a high cost associated 5 λ=2λ=3λ=4λ=N with reaching a nearby interchange. If the driver's origin is close to an interchange, he/she would use the freeway in order to get to the destination earlier. In this case, however, the driver must also consider the possibility of traffic congestion on the freeway. In this experiment, agents follow the Minority route choice game (MRCG), which is an inductive reasoning rule to select the routes to reach their re- spective destinations. This inductive reasoning rule has a common structure with strategies in the MG case [15, 16], because route-choice problems are very similar to the choice of minority [17, 7]. MRCG agents can choose from S strategies. Each strategy s suggests an action s(µ) according to the past hub states in the form of an M -bit history string µ. At each time step t, the hub state h (t) is recorded as either 0 (uncongested) or 1 (congested). Hence, the total number of possible history strings is P = 2M , and there are 2P possible strategies. A binary number representing an action is assigned to each history string corresponding to an agent's choice of the outside route (0) or the inside route (1). The probability of assigning each action is de- termined by an integer parameter K = 0, . . . , P [14], which represents the tendency of the strategy to have an action 0, where action 0 is employed with probability K P . If K is small, the strategy is likely to suggest action 0 persistently, and vice versa. 2 = 2M−1, where each In a homogeneous version of MRCG, we set K = P strategy has an equal likelihood of action 0 or 1 for each history string. In the heterogeneous version of MRCG, we select an integer K uniformly from 0, . . . , P for each strategy. An example for M = 3, K = 4 is listed in Table. 1. P and action 1 is employed with probability P−K Among the S strategies, each agent n selects the strategy with the best score. At each time step t, the score of each strategy Us (t) is updated based on whether the strategy achieves a lower-cost route or not. If a strategy results in a lower cost, its score is increased. If a strategy leads to a higher cost, its score is decreased. Note that this update is performed regardless of whether or not the strategy is executed at that time step. The update equation is as follows: (cid:16) (cid:17) Us (t + 1) = Us (t) + sign where sign is the sign function. out (t) − C (n) C (n) in (t) (2s (µ) − 1) (3) The entire structure of the simulation model is illustrated in Fig. 3. 6 History string Action 000 001 010 011 100 101 110 111 0 1 1 1 0 1 1 0 Table 1: An example of the homogeneous MRCG strategy for M = 3, K = 4. In the action column, 1 denotes the inside route and 0 denotes the outside route. For instance, given the history string 010, this strategy suggests action 1, denoting the inside route, whereas the history string 111 leads to action 0. 2.4. Evaluation of the network performance To assess the performance of the modeled traffic network, we employ the following basic measures. Average cost The average cost is calculated by averaging costs over all agents and time steps: T(cid:88) N(cid:88) t=1 n=1 (cid:104)C(cid:105) = 1 T N C (n) (t) , (4) where C (n)(t) is the cost of agent n at time step t. Depending on the route chosen by the agent, C (n)(t) can be either C (n) out(t) or C (n) in (t). Congestion ratio The congestion ratio is the ratio of the congested state to the uncongested state: h (t) . (5) (cid:88) t=1 r = 1 T Average number of hub users The average number of hub users is the 7 Fig. 3: Simulation model outline average number of hub users over all time steps: Nin (t) . (6) T(cid:88) t=1 Nin = 1 T (cid:118)(cid:117)(cid:117)(cid:116) 1 T T(cid:88) t=1 Standard deviation of Nin (t) The standard deviation of Nin (t) is cal- culated over all time steps: σNin = (Nin − Nin (t))2. (7) Number of potential hub users Potential hub users are those agents who incur lower costs by taking the inside route in the uncongested state 8 Network modelAgent modelupdates scoresselects strategytakes actioncalculates cost𝑁"#≤𝐿non-congestioncongestionTrueFalseupdates hub stateupdates historytakes actioncalculates costupdates history・・・AgentAgentEnd of time stepStart of time stepupdates scoresselects strategy than by taking the outside route; i.e., C (n) under noncongestion. The number of potential hub users is defined as: in (th (t) = 0) < C (n) out (th (t) = 0) (cid:17) in (th (t) = 0) (8) (cid:16) N(cid:88) n=1 Np = H out (th (t) = 0) − C (n) C (n) where H (·) is the Heaviside step function: (cid:40) H (x) = 0 if x ≤ 0 1 if x > 0. (9) (10) (11) (12) Specifically, potential agents have incentive to use the central hub since they can reduce the cost by using it. 3. Network structure vs network performance 3.1. Solution of Nash equilibrium To assess the effects of agents' bounded rationality, our simulation results are compared with the Nash Equilibrium (NE) solutions, as NE is easier to derive in this model than UE. Under NE, each agent selects the optimal route, which implies that no agent can reduce the travel cost by switching route. Therefore, if Np ≤ L, all potential agents would use the hub, and if Np > L, the hub will contain exactly L potential agents. Note that the hub will never be congested under NE. Multiple solutions for NE can be derived, but for the comparison with the simulation results, we only derive the NE solution with the best allocation (the lowest cost) and that with the worst allocation (the highest cost). out (th (t) = 0) When the hub node is uncongested, the difference between C (n) and C (n) in (th (t) = 0) is: l(n) = C (n) out (th (t) = 0) − C (n) in (th (t) = 0) . For all agents, the differences in cost form the array (l(1), l(2),··· , l(n),··· , l(N )), which can be sorted in ascending order as follows: (l(1(cid:48)), l(2(cid:48)),··· , l(n(cid:48)),··· , l(N(cid:48))). 9 In this array, entries 1(cid:48) to N(cid:48) p + 1 to N(cid:48) are non-potential agents. Therefore, the average cost for the NE with the best allocation, (cid:104)C(cid:105)N E , and that for the NE with the worst allocation, (cid:104)C(cid:105)N E p are potential agents, and entries N(cid:48) b w , are: (cid:33) in (th (t) = 0) + C (n(cid:48)) out (th (t) = 0) C (n(cid:48)) (13) n(cid:48)≤min{Np,L} (cid:32) (cid:88) (cid:32) (cid:88) n(cid:48)≤Np−L (cid:104)C(cid:105)N E b = 1 N (cid:104)C(cid:105)N E w = 1 N min{Np,L}<n(cid:48) (cid:88) (cid:88) (cid:88) Np<n(cid:48) out (th (t) = 0) + C (n(cid:48)) + in (th (t) = 0) C (n(cid:48)) (cid:33) Np−L<n(cid:48)≤Np out (th (t) = 0) C (n(cid:48)) (14) Note that the first term in Eq. (14) disappears when Np ≤ L. 3.2. Baseline results of MRCG Fig. 4: Average cost for homogeneous agents Fig. 5: Congestion ratio for homogeneous agents For the baseline case, we set the network scale to N = 100 and the hub capacity to L = 80. The number of hub links was varied from 2 to N , and the memory length was set to M = 2, 4, 8. We fixed S = 8 because M is the dominant parameter in MG and it would be less meaningful to change S 10 102030405060708090100λ051015202530354045›CfiHomo-MRCG (S = 8, M = 2)Homo-MRCG (S = 8, M = 4)Homo-MRCG (S = 8, M = 8)RandomNash equil. (best)Nash equil. (worst)102030405060708090100λ0.00.10.20.30.40.50.6rHomo-MRCG (S = 8, M = 2)Homo-MRCG (S = 8, M = 4)Homo-MRCG (S = 8, M = 8) Fig. 6: Number of hub users for homogeneous agents Fig. 7: Standard deviation of the number of hub users for homogeneous agents and M simultaneously. Here, K is fixed to 2M−1 to represent homogeneous strategies. In each set of parameters, we computed the average results over 1000 simulations. Each simulation was carried out for 1000 time-steps, and the first half of the simulation is for reaching the stable state, and the second half of the simulation is for getting the statistical results. To evaluate the adaptivity of MG agents, we conducted simulations with random agents, i.e., routes were chosen at random. From Fig. 4, we can see that the simulation results behave similarly to the NE solutions in the range 2 ≤ λ ≤ 9. In this range, agents can adapt themselves to the environment, and the performance is much better than in the case of random agents. For λ ≥ 10, however, the homogeneous MRCG agents deviate from the NE solution. This deviation is caused by growth in the congestion ratio at this point, as can be seen in Fig. 5. This congestion can not be seen under the assumption of the Nash equilibrium. In the range of λ ≤ 9, it is found that since the number of potential agents (purple dots in Fig. 6), who can reduce their cost by using the central hub, is less than the hub capacity, the network does not suffer from congestion. As more hub links are added to the network, Np increases, and then Nin (t) increases as well. This leads to the hub congestion. We can regard this change as a phase transition from the uncongested phase to the congested phase. It is important to investigate how different values of M influence the network performances. In the congested phase, Fig. 4 indicates that, as the memory length increases, the average cost decreases and becomes close to 11 102030405060708090100λ020406080100NinHomo-MRCG (S = 8, M = 2)Homo-MRCG (S = 8, M = 4)Homo-MRCG (S = 8, M = 8)NpoL102030405060708090100λ051015202530σNinHomo-MRCG (S = 8, M = 2)Homo-MRCG (S = 8, M = 4)Homo-MRCG (S = 8, M = 8)Random the worst case of Nash equilibrium. In addition, r decreases, enhancing the network performance. The network stability should also be investigated in terms of the standard deviation of the number of hub users. From Fig. 7, we can see the minimum of σNin at λ = 4 in the uncongested phase. After this critical point, the value of σNin increases as more hub links are added to the network for M = 2 agents until λ = N . In contrast, for large memory agents, σNin reaches the nearly stable state at λ = 15. In the uncongested phase, the stability of homogeneous MRCG agents is better than that of random agents, and those with shorter memory lengths lend better stability to the system. In this region, it can be inferred that the agents are divided into two groups, one comprising hub users and one comprising non-hub users, and σNin is better than that of random agents thanks to this division. In the congested phase, however, the stability becomes worse than in the random agents. The increase in memory length positively affects stability, especially in the range λ ≥ 70. Overall, in terms of stability, networks with fewer hub links perform better than those with a large number of hub links. Fig. 8: Congestion ratio for different scale networks We also conducted numerical experiments for different network scales, with N = 20, 40, 60, 80, S = 8, M = 2, and L N = 0.8. For the different networks, we can also observe a phase transition in Fig. 8. Thus, this phase transition can be considered a fundamental property of agents with bounded rationality. 12 0.10.20.30.40.50.60.70.80.91.0λN0.000.020.040.060.080.10rHomo-MRCG (N = 20)Homo-MRCG (N = 40)Homo-MRCG (N = 60)Homo-MRCG (N = 80)Homo-MRCG (N = 100) Fig. 9: Average cost for heterogeneous agents Fig. 10: Congestion ratio for heterogeneous agents 3.3. Effects of preference heterogeneity on the network performance Next, we investigated the effect of preference heterogeneity on network performance. To this effect, we introduced preference heterogeneity into the agents strategies. The value of K, which determines the action distribution 2 = 2M−1 in the homogeneous case, but for of strategies, was set to K = P the heterogeneous version of MRCG, we set K by selecting integer values uniformly from 0, . . . , P . The other parameter settings for the simulations were the same as for homogeneous MRCG. Similarly to the homogeneous MRCG case, we can observe a phase tran- sition occurring at around λ = 9 in Fig. 9. In the uncongested phase, we can see the identical behavior of (cid:104)C(cid:105) as discussed in 3.2, giving a good match with the NE solution. In the congested phase, the average cost becomes higher than in the homogeneous case. The cost is also higher than in the case of random agents. This phenomenon is because r is high even for the large memory capacity (see Fig. 10), unlike the cases of homogeneous MRCG. In contrast to the cases of homogeneous MRCG, Nin approaches to the hub capacity as the memory length increases seen in Fig. 11. Regarding network stability, we can also see the minimum of σNin in the uncongested phase. As M increases, the stability of the network is enhanced, as shown in Fig. 12. In the congested phase, similar to the homogeneous MRCG scenario, the increase in M acts to reduce the value of σN in. Unlike the homogeneous MRCG, however, σNin for M = 8 agents is always below that for random agents. 13 102030405060708090100λ051015202530354045›CfiHetero-MRCG (S = 8, M = 2)Hetero-MRCG (S = 8, M = 4)Hetero-MRCG (S = 8, M = 8)RandomNash equil. (best)Nash equil. (worst)102030405060708090100λ0.00.10.20.30.40.50.6rHetero-MRCG (S = 8, M = 2)Hetero-MRCG (S = 8, M = 4)Hetero-MRCG (S = 8, M = 8) Fig. 11: Number of hub users for heteroge- neous agents Fig. 12: Standard deviation of the number of hub users for heterogeneous agents 3.4. Implications of results for traffic network planning Fig. 13: Optimal number of hub links In reality, there are numerous road networks that accommodate different numbers of drivers without congestion, as they have different road capacities. To construct well-designed networks, it is important to know the optimal network structure according to the different hub-node capacities. For this purpose, we conducted a numerical experiment by changing the hub capacity ratio L N = 0.2 because the simulation result for this case does not exhibit any phase transition. We set N = 100, S = 8, M = 2 for this experiment. N from 0.3 to 0.9. We omit the results for L 14 102030405060708090100λ020406080100NinHetero-MRCG (S = 8, M = 2)Hetero-MRCG (S = 8, M = 4)Hetero-MRCG (S = 8, M = 8)NpoL102030405060708090100λ051015202530σNinHetero-MRCG (S = 8, M = 2)Hetero-MRCG (S = 8, M = 4)Hetero-MRCG (S = 8, M = 8)Random0.30.40.50.60.70.80.9LN0.02.55.07.510.012.515.017.520.0CoptimalHomo-MRCGHetero-MRCG Fig. 13 shows the optimal value of λ, the number of hub links that min- imizes (cid:104)C(cid:105), for different hub capacities. We can see that the optimal λ increases nonlinearly as the hub capacity is augmented. However, the opti- mal λ value remains small compared to the network scale (N = 100), even for a large hub capacity, L N = 0.9, the optimal value of λ is less than or equal to 15. This suggests that traffic networks with ring-and-hub structures should have less than or equal to 15% hub links. N = 0.9. For example, when L 4. Conclusion In this study, we built an ABM to investigate the effects of network structures on network performance under the assumption that drivers were operating under the bounded rationality. Through numerical experiments, we found that networks undergo a critical phase transition from the uncon- gested phase to the congested phase, corresponding to the particular number of hub links. The network performance is maximized around this transition point. While the system becomes similar to the NE case in the uncongested phase, the performance of the network in the congested phase declines and is worse than its corresponding NE performance. In addition, we examined how agents' preference heterogeneity affects network performance. We found that agents' preference heterogeneity enhances the system stability in terms of hub usage for large memory agents, but increases the transportation cost. Moreover, we conducted simulations to examine the performances under the different hub node capacities. The simulation results demonstrate that the optimal value of λ increases nonlinearly, but remains much smaller than the whole network size N . Overall, our results show the importance of considering the bounded ra- tionality and preference heterogeneity of drivers in the modeling and research of traffic network problems, and partially answer the question of how to build a well-structured traffic network in reality. Concretely, our simulation results imply that traffic networks with much access to a freeway may easily reach a state of congestion. In contrast, limiting access to freeways could mitigate traffic congestion and enable the Nash equilibrium to be reached. The simulation model in this study, employing a ring-and-hub topology, focuses on a specific situation, and only symmetric network topologies have been considered. In future works, we would like to generalize this research topic to obtain a universal perspective and apply the proposed analyses to 15 practical problems. In addition, a validation of the proposed model should be conducted. References [1] S. Nakayama, R. Kitamura, S. Fujii, Drivers' learning and network be- havior: Dynamic analysis of the driver-network system as a complex system, Transportation Reserach Record 1676 (1999) 30 -- 36. [2] S. Nakayama, , R. Kitamura, Route choice model with inductive learn- ing, Transportation Research Record 1725 (2000) 63 -- 70. [3] S. Nakayama, R. Kitamura, S. Fujii, Drivers' route choice rules and network behavior: Do drivers become rational and homogeneous through learning?, Transportation Research Record 1752 (2001) 62 -- 68. [4] R. Selten, T. Chmura, T. Pitz, S. Kube, M. Schreckenberg, Commuters route choice behavior, Games and Economic Behavior 58 (2007) 394 -- 406. [5] T. Ezaki, R. Nishi, K. Nishinari, Taming macroscopic jamming in trans- portation networks, Journal of Statistical Mechanics: Theory and Ex- periment 2015 (6) (2015) P06013. [6] T. Roughgarden, Selfish Routing and the Price of Anarchy, MIT Press, 2005. [7] S. Gourley, N. F. Johnson, Effects of decision-making on the transport costs across complex networks, Physica A 363 (2006) 82 -- 88. [8] J. Wu, Z. Gao, H. Sun, H. Huang, Congestion in different topologies of traffic networks, Europhysics Letters 74 (3) (2006) 560 -- 566. [9] W. Jian-Jun, G. Zi-You, S. Hui-jun, Optimal traffic networks topology: A complex networks perspective, Physica A 387 (2008) 1025 -- 1032. [10] H. Youn, M. T. Gastner, H. Jeong, Price of anarchy in transportation networks: Efficiency and optimality control, Physical Review Letters 101 (2008) 128701. [11] Z. Xiao-Mei, G. Zi-You, Topological effects on the performance of trans- portation networks, Chinese Physics Letters 24 (1) (2007) 283 -- 286. 16 [12] J.-F. Zheng, Z.-H. Zhu, H.-M. Du, Z.-Y. Gao, Congestion and efficiency in complex traffic networks, International Journal of Modern Physics C 24 (10) (2013) 1350072. [13] Z.-H. Zhu, J.-F. Zheng, Z.-Y. Gao, H.-M. Du, Properties of volume- capacity ratio in congested complex networks, Physica A 400 (2014) 200 -- 206. [14] W. Wang, Y. Chen, J. Huang, Heterogeneous preferences, decision- making capacity, and phase transitions in a complex adaptive system, Proceeding of the National Academy of Science 106 (21) (2009) 8423 -- 8428. [15] W. B. Arthur, Inductive reasoning and bounded rationality, American Economic Review (Papers and Proceedings) 84 (2) (1994) 406 -- 411. [16] D. Challet, Y.-C. Zhang, Emergence of cooperation and organization in an evolutionary gaem, Physica A 246 (1997) 407 -- 418. [17] T. Chmura, T. Pitz, Successful strategies in repeated minority games, Physica A 363 (2006) 477 -- 480. 17
1804.06011
1
1804
2018-04-17T01:42:44
God Save the Queen
[ "cs.MA" ]
Queen Daniela of Sardinia is asleep at the center of a round room at the top of the tower in her castle. She is accompanied by her faithful servant, Eva. Suddenly, they are awakened by cries of "Fire". The room is pitch black and they are disoriented. There is exactly one exit from the room somewhere along its boundary. They must find it as quickly as possible in order to save the life of the queen. It is known that with two people searching while moving at maximum speed 1 anywhere in the room, the room can be evacuated (i.e., with both people exiting) in $1 + \frac{2\pi}{3} + \sqrt{3} \approx 4.8264$ time units and this is optimal~[Czyzowicz et al., DISC'14], assuming that the first person to find the exit can directly guide the other person to the exit using her voice. Somewhat surprisingly, in this paper we show that if the goal is to save the queen (possibly leaving Eva behind to die in the fire) there is a slightly better strategy. We prove that this "priority" version of evacuation can be solved in time at most $4.81854$. Furthermore, we show that any strategy for saving the queen requires time at least $3 + \pi/6 + \sqrt{3}/2 \approx 4.3896$ in the worst case. If one or both of the queen's other servants (Biddy and/or Lili) are with her, we show that the time bounds can be improved to $3.8327$ for two servants, and $3.3738$ for three servants. Finally we show lower bounds for these cases of $3.6307$ (two servants) and $3.2017$ (three servants). The case of $n\geq 4$ is the subject of an independent study by Queen Daniela's Royal Scientific Team.
cs.MA
cs
God Save the Queen ∗ Konstantinos Georgiou† ¶ Danny Krizanc∗∗ Jurek Czyzowicz∗ ¶ Evangelos Kranakis§ ¶ Ryan Killick§ (cid:107) Lata Narayanan††¶ Jaroslav Opatrny†† Sunil Shende‡‡ April 18, 2018 Abstract Queen Daniela of Sardinia is asleep at the center of a round room at the top of the tower in her castle. She is accompanied by her faithful servant, Eva. Suddenly, they are awakened by cries of "Fire". The room is pitch black and they are disoriented. There is exactly one exit from the room somewhere along its boundary. They must find it as quickly as possible in order to save the life of the queen. It is known that with two people searching while moving at maximum speed 1 anywhere in the room, the room can be evacuated (i.e., 3 ≈ 4.8264 time units and this is with both people exiting) in 1 + 2π optimal [10], assuming that the first person to find the exit can directly guide the other person to the exit using her voice. Somewhat surprisingly, in this paper we show that if the goal is to save the queen (possibly leaving Eva behind to die in the fire) there is a slightly better strategy. We prove that 3 + √ Toronto, ON, of Mathematics, Ryerson University, of Computer Science, [email protected] ryankillick,[email protected] ¶Research supported in part by NSERC of Canada. (cid:107)Research supported in part by the Ontario Graduate Scholarship (OGS) Program. ∗Universite du Qubec en Outaouais, Gatineau, Qu´ebec, Canada, [email protected] †Dept. Canada, §School Canada, ∗∗Department of Mathematics & Comp. Sci., Wesleyan University, Middletown, CT, USA, [email protected] ††Department of Comp. Sci. ‡‡Department USA, ∗This is the full version of the paper with the same title which will appear in the proceedings of the 9th International Conference on Fun with Algorithms, (FUN'18), June 13–15, 2018, La Maddalena, Maddalena Islands, Italy. Computer [email protected] and Software Eng., Concordia University, Montreal, Qu´ebec, Canada, lata,[email protected] Carleton University, Ottawa ON, of Science, Rutgers University, Camden, 1 √ this "priority" version of evacuation can be solved in time at most 4.81854. Furthermore, we show that any strategy for saving the queen requires time at 3/2 ≈ 4.3896 in the worst case. If one or both of the queen's least 3+π/6+ other servants (Biddy and/or Lili) are with her, we show that the time bounds can be improved to 3.8327 for two servants, and 3.3738 for three servants. Finally we show lower bounds for these cases of 3.6307 (two servants) and 3.2017 (three servants). The case of n ≥ 4 is the subject of an independent study by Queen Daniela's Royal Scientific Team [12]. 1 Introduction In traditional search, a group of searchers (modeled as mobile autonomous agents or robots) may collaboratively search for an exit (or target) placed within a given search domain [1, 2, 17]. Although the searchers may have differing capabilities (communication, perception, mobility, memory) search algorithms, previously em- ployed, generally make no distinction between them as they usually play identical roles throughout the execution of the search algorithm and with respect to the ter- mination time (with the exception of faulty robots, which also do not contribute to searching). In this work we are motivated by real-life safeguarding-type situations where a number of agents have the exclusive role to facilitate the execution of the task by a distinguished entity. More particularly, we introduce and study Priority Evacuation, a new form of search , under the wireless communication model, in which the search time of the algorithm is measured by the time it takes a special searcher, called the queen, to reach the exit. The remaining searchers in the group, called servants, are participating in the search but are not required to exit. 1.1 Problem Definition of Priority Evacuation (PEn) A target (exit) is hidden in an unknown location on the unit circle. The exit can be located by any of the n + 1 robots (searchers) that walks over it (n = 1, 2, 3). Robots share the same coordinate system, start from the center of the circle, and have maximum speed 1. Among them there is a distinguished robot, called the queen, and the remaining n robots are referred to as servants. All servants are known to the queen by their identities. Robots may run asymmetric algorithms, and can communicate their findings wirelessly and instantaneously (each message is composed by an identity and a location). Only the queen is required to be able to receive messages. Feasible solutions to this problem are evacuation algorithms, i.e. robots' movements (trajectories) that guarantee the finding of the hidden exit. The cost of an evacuation algorithm is the evacuation time of the queen, i.e., the worst case total time until the queen reaches the exit. None of the n servants needs 2 to evacuate. 1.2 Related work Related to our work is linear search which refers to search in an infinite line. There have been several interesting studies attempting to optimize the search time which were initiated with the influential works of Bellman [7] and Beck [6]. A long list of results followed for numerous variants of the problem, citing which is outside the scope of this work. For a comprehensive study of seminal search-type problems see [2, 3]. The problem of searching in the plane by one or more searchers, has been con- sidered by [4, 5]. The unit disk model considered in our present paper is a form of two-dimensional search that was initiated in the work of [10]. In this paper the authors obtained evacuation algorithms in the wireless and face-to-face communi- cation models both for a small number of robots as well optimal asymptotic results for a large number of robots. Additional evacuation algorithms in the face-to-face communication model were subsequently analyzed for two robots in [13] and later in [8]. Other variations of the problem include the case of more than one exit, see [9] and [16], triangular and square domains in [14], robots with different moving speeds [15], and evacuation in the presence of crash or byzantine faulty robots [11]. Notably, all relevant previous work in search-type problems considered the objective of minimizing the time it takes either by the first or the last agent to reach the hidden target. In contrast, this paper considers an evacuation (search- type) problem where the completion time is defined with respect to a distinguished mobile agent, the queen, while the remaining n servants are not required to evac- uate. Our current focus is to design efficient algorithms for n = 1, 2, 3 servants, as well as give strong lower bounds. Notably, the algorithms we propose signifi- cantly improve upon evacuation costs induced by naive trajectories, and in fact the trajectories we propose are non-trivial. Our main contribution concerns priority evacuation for each of the cases of n = 1, 2, 3 servants, all of which require spe- cial treatment. Moreover, all our algorithms are characterized by the fact that the queen does contribute effectively to the search of the hidden item. In sharp con- trast, the independent and concurrent work of [12] studies the same problem for n ≥ 4 servants where the queen never contributes to the search. More importantly, the proposed algorithms of [12] admit a unified description and analysis that does not intersect with the current work. 3 1.3 Our Results & Paper Organization Section 2 introduces necessary notation and terminology and discusses preliminar- ies. Section 3 is devoted to upper bounds for PEn for n = 1, 2, 3 servants (see Subsections 3.1, 3.2, and 3.3, respectively). All our upper bounds are achieved by fixing optimal parameters for families of parameterized algorithms. In Section 4 we derive lower bounds for PEn, n = 1, 2, 3. An interesting corollary of our pos- itive results is that priority evacuation with n = 1, 2, 3 servants (i.e. with n + 1 searchers) can be performed strictly faster than ordinary evacuation with n + 1 robots where all robots have to evacuate. Indeed, an argument found in [10] can be adjusted to show that the evacuation problem with n + 1 robots cannot be solved faster than 1 + 4π 3. Surprisingly, when one needs to evacuate only one designated robot, the task can provably (due to our upper bounds) be executed faster. All our results, together with the comparison to the lower bounds of [10], are summarized in Table 1. We conclude the paper in Section 5 with a discussion of open problems. 3(n+1) + √ Table 1: Upper bounds (UB) and lower bounds (LB) for priority evacuation. # of Servants UB for PEn n = 1 n = 2 n = 3 4.8185 (Theorem 3.1) 3.8327 (Theorem 3.3) 3.3738 (Theorem 3.7) LB for PEn 4.3896 (Theorem 4.1) 3.6307 (Theorem 4.6) 3.2017 (Theorem 4.10) LB for Ordinary Evacuation 4.826445 (see [10]) 4.128314 (see [10]) 3.779248 (see [10]) 2 Notation and Preliminaries We use n to denote the number of servants, and we set [n] = {1, . . . , n}. Queen and servant i will be denoted by Q and Si, respectively, where i ∈ [n]. We assume that all robots start from the origin O = (0, 0) of a unit circle in R2. As usual, points in A ∈ R2 will be treated, when it is convenient, as vectors from O to A, and kAk will denote the euclidean norm of that vector. 2.1 Problem Reformulation & Solutions' Description Robots' trajectories will be defined by parametric functions F(t) = (f(t), g(t)), where f, g : R 7→ R are continuous and piecewise differentiable. In particular, 4 search algorithms for all robots will be given by trajectories Sn :=nQ(t),{Si(t)}i∈[n] o , where Q(t),Si(t) will denote the position of Q and Si, respectively, at time t ≥ 0. Definition 2.1 (Feasible Trajectories). We say that trajectories Sn are feasible for PEn if: (a) Q(0) = Si(0) = O, for all i ∈ [n], (b) Q(t),{Si(t)}i∈[n] induce speed-1 trajectories for Q,{Si}i∈[n] respectively, and (c) there is some time t0 ≥ 1, such that each point of the unit circle is visited (searched) by at least one robot in the time window [0, t0]. We refer to the smallest such t0 as the search time of the circle. Note that feasible trajectories do indeed correspond to robots' movements for PEn in which, eventually the entire circle is searched, and hence the search time is bounded. We will describe all our search/evacuation algorithms as feasible trajec- tories, and we will assume that once the target is reported, Q will go directly to the location of the exit. For feasible trajectories Sn with search time t0, and for any trajectory F(t) (either of the queen or of a servant), we denote by I(F) the subinterval of [0, t0] that contains all x ∈ [0, t0] such that kF(x)k = 1 (i.e. the robot is on the the circle) and no other robot has been to F(x) before. Since robots start from the origin, it is immediate that I(F) ⊆ [1, t0]. With this notation in mind, note that the exit can be discovered by some robot F, say at time x, only if x ∈ I(F). In this case, the finding is instantaneously reported, so Q goes directly to the exit, moving along the corresponding line segment between her current position Q(x) and the reported position of the exit F(x). Hence, the total time that Q needs to evacuate equals x + kQ(x) − F(x)k . Therefore, the evacuation time of feasible trajectories Sn to PEn is given by ex- pression maxF∈Sn sup x∈I(F) {x + kQ(x) − F(x)k} . Notice that for "non-degenerate" search algorithms for which the last point on the circle is not searched by Q alone, the previous maximum can be simply computed over the servants, i.e the evacuation cost will be max i∈[n] sup x∈I(Si) {x + kQ(x) − Si(x)k} . (1) 5 In other words, we can restate PEn as the problem of determining feasible trajec- tories Sn so as to minimize (1). 2.2 Useful Trajectories' Components Feasible trajectories induce, by definition, robots that are moving at (maximum) speed 1. The speed restriction will be ensured by the next condition. Lemma 2.2. An object following trajectory F(t) = (f(t), g(t)) has unit speed if and only if (cid:0)f0(t)(cid:1)2 +(cid:0)g0(t)(cid:1)2 = 1, ∀t ≥ 0. Proof: For any t ≥ 0, the velocity of F is given by F0(t) = (df(t)/dt, dg(t)/dt), and its speed is calculated as kF0(t)k. Robots' trajectories will be composed by piecewise smooth parametric func- tions. In order to describe them, we introduce some further notation. For any θ ∈ R, we introduce abbreviation Cθ for point {cos (θ) , sin (θ)}. Next we introduce parametric equations for moving along the perimeter of a unit circle (Lemma 2.3), and along a line segment (Lemma 2.4). Lemma 2.3. Let b ∈ [0, 2π) and σ ∈ {−1, 1}. The trajectory of an object moving at speed 1 on the perimeter of a unit circle with initial location Cb is given by the parametric equation C(b, σt) := (cos (σt + b) , sin (σt + b)). If σ = 1 the movement is counter-clockwise (ccw), and clockwise (cw) otherwise. Proof: Clearly, C(b, 0) = Cb. Also, it is easy to see that kC(b, t)k = 1, i.e. the (cid:18) d object is moving on the perimeter of the unit circle. Lastly, (cid:18) d (cid:19)2 (cid:19)2 cos (σt + b) + sin (σt + b) = σ2 (− sin (σt + b))2+σ2 (cos (σt + b))2 = 1, dt dt so the claim follows by Lemma 2.2. Lemma 2.4. Consider distinct points A = (a1, a2), B = (b1, b2) in R2. The trajectory of a speed 1 object moving along the line passing through A, B and with initial position A is given by the parametric equation (cid:18) b1 − a1 kA − Bk t + a1, (cid:19) . b2 − a2 kA − Bk t + a2 L(A, B, t) := 6 Proof: It is immediate that the parametric equation corresponds to a line. Also, it is easy to see that L(A, B, 0) = A and L(A, B,kA − Bk) = B, i.e. the object starts from A, and eventually visits B. As for the object's speed, we calculate (cid:19)2 (cid:18) b1 − a1 kA − Bk (cid:18) b2 − a2 kA − Bk (cid:19)2 = 1 + = (cid:18) d dt (cid:18) b1 − a1 kA − Bk t + a1 (cid:19)(cid:19)2 (cid:18) d dt (cid:18) b2 − a2 kA − Bk t + a2 + (cid:19)(cid:19)2 so, by Lemma 2.2, the speed is indeed 1. Robots trajectories will be described in phases. In each phase, robot, say F, will be moving between two explicit points, and the corresponding trajectory F(t) will be implied by the previous description, using most of the times Lemma 2.3 and Lemma 2.4. We will summarize the details in tables of the following format. Robot F # Description Trajectory Duration 0 1 ... F(t) F(t) t0 t1 ... Phase 0 will usually correspond to the deployment of F from the origin to some point of the circle. Also, for each phase we will summarize it's duration. With that in mind, trajectory F(t) during phase i, with duration ti, will be valid for all t ≥ 0 with t − (t0 + t1 + . . . ti−1) ≤ ti. jectories. For any ρ ∈ [0, 1] and θ ∈ [0, 2π), we introduce notation Lastly, the following abbreviation will be useful for the exposition of the tra- K(θ, ρ) := (1 − ρ)Cπ−θ + ρC−θ. In other words, K(θ, ρ) is a convex combination of antipodal points Cπ−θ, C−θ of the unit circle, i.e. it lies on the diameter of the unit circle passing through these two points. Moreover, it is easy to see that kCπ−θ − K(θ, ρ)k = 2ρ, and hence kK(θ, ρ) − C−θk = 2 − 2ρ. As it will be handy later, we also introduce abbreviation AK(θ, ρ) := kCπ − K(θ, ρ)k . The choice of the abbreviation is clear, if the reader denotes Cπ = (−1, 0) by A. 7 Figure 1: An illustration of trajectories S(t),Q(t), and their critical angles at some fixed time τ, with S(τ) = S,Q(τ) = Q,S0(τ) = u,Q0(τ) = v. 2.3 Critical Angles The following definition introduces a key concept. In what follows, abstract tra- jectories will be assumed to be continuous and differentiable, which in particular implies that corresponding velocities are continuous. Definition 2.5 (Critical Angle). Let S(t) ∈ R2 denote the trajectory of a speed-1 object, where t ≥ 0. For some point Q ∈ R2, we define the (S, Q)-critical angle −−−−→S(τ)Q, at time t = τ to be the angle between the velocity vector S0(τ) and vector i.e. the vector from S(τ) to Q. We make the following critical observation, see also Figure 1. Theorem 2.6. Consider trajectories S(t),Q(t) of two speed-1 objects S,Q, where t ≥ 0. Let also φ, θ denote the (S,Q(t))-critical angle and the (Q,S(t))-critical angle at time t, respectively. Then t + kQ(t) − S(t)k is strictly increasing if cos (φ) + cos (θ) < 1, strictly decreasing if cos (φ) + cos (θ) > 1, and constant otherwise. Theorem 2.6 is an immediate corollary of the following lemma. Lemma 2.7. Consider trajectories S(t),Q(t) and their critical angles π, θ, as in the statement of Theorem 2.6. Then kQ(t) − S(t)k = cos (φ) + cos (θ) . d dt Proof: For any fixed t, let d denote D(t), and S, Q denote points S(t),Q(t), re- spectively. Denote also by u, v the velocities of S,Q at time t, respectively, i.e. u = S0(t), v = Q0(t). See also Figure 1. 8 𝑆𝑆(𝑡𝑡)𝑄𝑄(𝑡𝑡)𝑆𝑆𝑄𝑄𝑢𝑢𝑣𝑣𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑆𝑆𝑆𝑆𝑢𝑢𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑆𝑆𝑆𝑆𝑣𝑣ϕ𝜃𝜃 With that notation, observe that (cid:13)(cid:13)(cid:13)−→ (cid:13)(cid:13)(cid:13) = d. Since kuk = kvk = 1, we see that SQ projSQu = cos (φ) d −→ SQ and projSQv = cos (θ) d −→ QS. Now consider two imaginary objects S,Q, with corresponding velocities S0(t) = projSQu and Q0(t) = projSQv. It is immediate that kQ(t) − S(t)k = In particular, projSQu − projSQv is the projection of the relative velocities of S,Q on the line segment connecting S(t),Q(t). As such, the distance between S,Q changes at a rate determined by velocity (cid:13)(cid:13)(cid:13)Q(t) − S(t) (cid:13)(cid:13)(cid:13). projSQu − projSQv = cos (φ) + cos (θ) (cid:13)(cid:13)(cid:13)projSQu − projSQv (cid:13)(cid:13)(cid:13) = cos (φ) + cos (θ). Moreover, projSQu, projSQv where are antiparallel iff and only if cos (φ) , cos (θ) > 0, in which case the two objects come closer to each other. d −→ SQ, 3 Upper Bounds 3.1 Evacuation Algorithm for PE1 This subsection is devoted in proving the following. Theorem 3.1. Consider the real function f(x) = x+sin (x), and denote by α0 > 0 the solution to equation f(f(α − sin (α))) = sin (α) , with α0 ≈ 1.14193. Then PE1 can be solved in time 1 + π − α0 + 2 sin (α0) ≈ 4.81854. The value of α0 is well defined in the statement of Theorem 3.1. Indeed, by letting g(x) = f(f(x − sin (x))) − sin (x), we observe that g is continuous, while g(1) ≈ −0.213934 and g(π/2) ≈ 1.00729, hence there exists α0 ∈ (1, π/2) with g(α0) = 0. In order to prove Theorem 3.1, and given parameters α, β, we introduce the family of trajectories SEARCH1(α, β), see also Figure 2. 9 Figure 2: Algorithm SEARCH1(α, β) depicted for the optimal parameters of the algorithm. In all subsequent figures, as well as here, the orange points on the perimeter of the disc correspond to the worst adversarial placements of the trea- sure, which due to our optimality conditions induce the same evacuation cost. The orange points in Q's trajectories correspond to the Q's positioning when the trea- sures are reported, in the worst cost induced cases. The green dashed line depict Q's trajectory after Q abandons her trajectory and moves toward the reported exit following a straight line. Algorithm SEARCH1(α, β) # Description Robot Q 0 Move to point Cπ 1 2 Move to point C−α+β, 3 0 Move to point Cπ 1 S1 Search circle cw till point Cβ−α Search circle ccw till point C−α Search circle cw till point C−α Trajectory L(O, Cπ, t) C(π, t − 1) L(C−α, C−α+β, t − (1 + π − α)) C(β − α, 1 + π − α + 2 sin (β/2) − t) L(O, Cπ, t) C(π,−t + 1) Duration 1 π − α 2 sin (β/2) β 1 π + α − β Partitioning the circle clockwise, we see that the arc with endpoints Cπ, Cπ+α−β is searched by S1, while the remaining of the circle is searched by Q. Therefore, robots' tra- jectories in SEARCH1(α, β) are feasible, and it is also easy to see that they are continuous as well. The search time equals 1 + π + max{α − β, 2 sin (β/2) + β − α}, as well as I(Q) = [1, 1+π−α]∪[1+π−α+2 sin (β/2) , 1+π−α+2 sin (β/2)+β], I(S1) = [1, 1+π+α−β]. An illustration of the above trajectories for certain values of α, β can be seen in Figure 2. First we make some observations pertaining to the monotonicity of the evacuation cost. Lemma 3.2. Assuming that α > π/3 and that cos (α)+cos (α − β/2) > 1, the evacuation cost of SEARCH1(α, β) is monotonically increasing if the exit is found by S1 during Q's phase 1 and monotonically decreasing if the exit is found by S1 during Q's phase 2. 10 𝜋𝜋−𝛼𝛼𝛽𝛽𝐶𝐶−𝛼𝛼𝐶𝐶−𝛼𝛼+𝛽𝛽𝐶𝐶𝛼𝛼SEARCH1𝛼𝛼,𝛽𝛽𝒬𝒬𝑡𝑡𝒮𝒮1𝑡𝑡 Proof: Suppose that the exit is found by S1 during Q's phase 1, i.e. at time x after robots start searching for the first time, where 0 ≤ x ≤ π − α. It is easy to see that the critical angles between Q,S1 are both equal to π − x. But then 2 cos (π − x) ≥ 2 cos (α) > 2 cos (π/3) = 1. Hence, by Theorem 2.6, the evacuation cost is decreasing in this case. Now suppose that the exit is found by S1 during Q's phase 2, i.e. at time x after Q starts moving along the chord with endpoints C−α, C−α+β, where 0 ≤ x ≤ 2 sin (β/2). If φx, θx denote the S1,Q critical angles, then it is easy to see that φ0 = cos (α) and that θ0 = α − β/2. Since cos (φ0) + cos (θ0) > 1, Theorem 2.6 implies that the evacuation cost is initially decreasing in this phase. For the remaining of Q's phase 2, it is easy to see that both φx, θx are decreasing in x, hence cos (φx) + cos (θx) is increasing in x, hence, the evacuation cost will remain decreasing in this phase. Now we can prove Theorem 3.1 by fixing certain values for parameters α, β of SEARCH1(α, β). In particular, we set α0 as in the statement of Theorem 3.1, and β0 = 2f(α0 − sin (α0)) ≈ 0.925793. The trajectories of the robots, for the exact same values of the parameters, can be seen in Figure 2. Proof: [Proof of Theorem 3.1] Let f, α0 be as in the statement of Theorem, and set β0 = 2f(α0 − sin (α0)) ≈ 0.925793. We argue that the worst evacuation time of SEARCH1(α0, β0) is 1 + π − α0 + 2 sin (α0). Note that for the given values of the parameters, we have that α0 > π/3, that α0 − sin (β0/2) ≤ β0, and that cos (α0) + cos (α0 − β0/2) > 1. First we observe that if the exit if found by Q, then the worst case evacuation time E0(α0, β0) is incurred when the exit is found just before Q stops searching, that is E0(α0, β0) = 1 + π − α0 + 2 sin (β0/2) + β0. Next we examine some cases as to when the exit is found by S1. If the exit is found by S1 during the 1st phase of Q, then the evacuation time is, due to Lemma 3.2, given as {x + kQ(x) − S1(x)k} = 1 + π − α0 + 2 sin (α0) . E1(α0, β0) = sup 1≤x≤1+π−α0 Recall that cos (α0) + cos (α0 − β0/2) > 1, and so, again by Lemma 3.2 we may omit the case that the exit is found by S1 while Q is at phase 2. The end of Q's phase 2 happens at time τ := 1 + π − α0 + 2 sin (β0/2), when have that Q(τ) = C−α+β, and S1(τ) = Cα−2 sin(β0/2), and both robots are intending to search ccw. Condition α0 − sin (β0/2) ≤ β0 says that S1 will finish searching prior to Q, and this happens when S1 reaches point C−α+β. During this phase, the distance between Q,S1 stays invariant and equal to 2α0 − β0 − 2 sin (β0/2). We conclude that the cost in this case would be E2(α0, β0) = 1 + π + α0 − β0 + 2 sin (α0 − β0/2 − sin (β0/2)) . Then, we argue that that the choice of α0, β0 guarantees that E0(α0, β0) = E1(α0, β0) = E2(α0, β0), as wanted. Indeed, E0(α0, β0) = E1(α0, β0) implies that sin (β0/2) + β0/2 = sin (α0). But then, we can rewrite E2(α0, β0) as E2(α0, β0) = 1 + π + α0 − β0 + 2 sin (α0 − sin (α0)) . 11 Equating the last expression with E1(α0, β0) implies that β0/2 = α0 − sin (α0) + sin (α0 − sin (α0)) = f(α0 − sin (α0)). Substituting twice β0/2 in the already derived condition sin (β0/2) + β0/2 = sin (α0) implies that f(f(α − sin (α0))) = sin (α0) . Figure 2 depicts the worst placements of the exit, along with the trajectories of the queen (in dashed green lines) after the exit is reported. It should be stressed that Q's Phases 2,3 are essential for achieving the promised bound. Indeed, had we chosen α = β = 0, the worst case evacuation time would have been {1 + x + 2 sin (x)} . sup 1≤x≤1+π {x + kQ(x) − S1(x)k} = sup 0≤x≤π The maximum is attained at x0 = 2π/3 (and indeed, both critical angles in this case are 3 ≈ 4.82645. The π/3 and in particular 2 cos (π/3) = 1), inducing cost 1 + 2π/3 + latter is the cost of the evacuation algorithm for two robots without priority of [10]. √ 3.2 Evacuation Algorithm for PE2 In this subsection we prove the following theorem. Theorem 3.3. PE2 can be solved in time 3.8327. Given parameters α, ρ, we introduce the family of trajectories SEARCH2(α, ρ), see also Figure 3. Figure 3: Algorithm SEARCH2(α, β) depicted for the optimal parameters of the algorithm. 12 𝐶𝐶𝜋𝜋−𝛼𝛼𝐶𝐶−𝛼𝛼/2𝐾𝐾𝛼𝛼/2,𝜌𝜌𝛼𝛼𝛼𝛼/2SEARCH2𝛼𝛼,𝛽𝛽𝒬𝒬𝑡𝑡𝒮𝒮1𝑡𝑡𝒮𝒮2𝑡𝑡 Search the circle ccw till point Cπ Algorithm SEARCH2(α, ρ) # Description Robot Q 0 Move to point Cπ−α 1 2 Move to point K(α/2, ρ) 3 Move to point C−α/2 0 Move to point Cπ−α 1 0 Move to point Cπ 1 S1 S2 Search the circle cw till point C−α/2 Search the circle cw till point C−α/2 1 α Duration Trajectory L(O, Cπ−α, t) C(π − α, t − 1) L(Cπ, K(α/2, ρ), t − (1 + α)) AK(α/2, ρ) L(K(α/2, ρ), C−α/2) L(O, Cπ−α) C(π − α,−t + 1) L(O, Cπ) C(π, t − 1) 2 − 2ρ π − α/2 π − α/2 1 1 Notice that, by definition of SEARCH2(α, ρ), robots' trajectories are continuous and feasible, meaning that the entire circle is eventually searched. Indeed, partitioning the circle clockwise, we see that: the arc with endpoints Cπ, Cπ−α is searched by Q, the arc with endpoints Cπ−α, C−α/2 is searched by S1, and the arc with endpoints C−α/2, Cπ is searched by S2. It is immediate from the description of the trajectories that the search time is 1 + π − α/2. Moreover I(Q) = [1, 1 + α], I(S1) = I(S2) = [1, 1 + π − α/2]. An illustration of the above trajectories for certain values of α, ρ can be seen in Figure 3. Now we make some observations, in order to calculate the worst case evacuation time. Lemma 3.4. Suppose that π − α/2 ≥ α + AK(α/2, ρ) + 2 − 2ρ. Then kQ(x) − S1(t)k is continuous and differentiable in the time intervals I1, I2, I3 of Q's phases 1,2,3, respec- tively. Moreover, the worst case evacuation time of SEARCH2(α, ρ) can be computed as  max 1 + α + 2 sin (α) , supt∈I2 {t + kQ(t) − S1(t)k} supt∈I3 {t + kQ(t) − S1(t)k} 1 + π − α/2  where I2 = [1+ α, 1+ α+ AK(α/2, ρ)], I3 = [1+ α+ AK(α/2, ρ), 3−2ρ+ α+ AK(α/2, ρ)]. Proof: Note that the line passing through O and C−α/2, call it , has the property that each point of it, including K(α/2, ρ) is equidistant from S1,S2. Moreover, in the time window [1 + α, 1 + α + AK(α/2, ρ)] that only S1,S2 are searching, Q stays below line . At time 1 + α + AK(α/2, ρ), Q is, by construction, equidistant from S1,S2, a property that is preserved for the remaining of the execution of the algorithm. As a result, the evacuation time of SEARCH2(α, ρ) is given by sup1≤t≤1+π−α/2{t + kQ(t) − S1(t)k}. Now note that condition π−α/2 ≥ α+AK(α/2, ρ)+2−2ρ guarantees that Q reaches point C−α/2 no later than S1. Moreover, in each time interval I1, I2, I3, Q's trajectory is differentiable (and so is S1's trajectory). 13 Now Theorem 3.3 can be proven by fixing parameters α, ρ for SEARCH2(α, ρ), in particular, α = 0.6361, ρ = 0.7944. Notably, the performance of SEARCH2(α, ρ) is provably improvable (slightly) using a technique we will describe in the next section. Proof: [Proof of Theorem 3.3] We choose α = 0.6361, ρ = 0.7944. The trajectories of Figure 3 correspond exactly to those values. The time that Q needs to reach C−α/2 equals 1 + α + AK(α/2, ρ) + 2 − 2ρ = 3.6174, while the time that S1,S2 reach the same point is 1 + π − α/2 = 3.82354. Hence, Lemma 3.4 applies. The worst case evacuation time during phase 1 is 1 + a + 2 sin (α) = 2.82423. The worst case evacuation time after Q reaches C−α/2, equals 1+ π− α/2 = 3.82354. Hence, it remains to compute the maxima of t + kQ(t) − S1(t)k in the two intervals I2, I3, which can be done numerically using the trajectories of SEARCH2(α, ρ), since expression is dif- ferentiable in each of the intervals. To that end, when t ∈ I2 = [1.6361, 3.2062] we have that Q(t) = (0.9931t − 2.62481, 0.191866 − 0.11727t) S1(t) = (cos (3.50549 − t) , sin (3.50549 − t)) , so that t + kQ(t) − S1(t)k becomes t+ When t ∈ I3 = [3.2062, 3.6174] we have that (− sin (3.50549 − t) − 0.11727t + 0.191866)2 + (− cos (3.50549 − t) + 0.9931t − 2.62481)2 q q Q(t) = (0.949847t − 2.48613, 0.818501 − 0.312715t) while S1's trajectory equation remains unchanged, so that t + kQ(t) − S1(t)k becomes t+ (− sin (3.50549 − t) − 0.312715t + 0.818501)2 + (− cos (3.50549 − t) + 0.949847t − 2.48613)2 In particular, it follows that sup t∈I2 {t + kQ(t) − S1(t)k} ≈ sup t∈I3 {t + kQ(t) − S1(t)k} ≈ 3.8327 with corresponding maximizers (with approximate values) τ2 = 3.10066 and τ3 = 3.32114, respectively. Figure 3 also depicts the locations of the optimizers, i.e the worst case lo- cations on the circle for the exit to be found, along with the corresponding evacuation trajectory in dashed green colour. 3.3 Evacuation Algorithm for PE3 3.3.1 A Simple Algorithm In this section we prove the following preliminary theorem (to be improved in Section 3.3.2). Theorem 3.5. PE3 can be solved in time 3.37882. 14 Figure 4: Algorithm SEARCH3(α, β, ρ) depicted for the optimal parameters of the algorithm. Given parameters α, β, ρ, we introduce the family of trajectories SEARCH3(α, β, ρ), corresponding to robots Q,S1,S2,S3, see also Figure 4. Algorithm SEARCH3(α, β, ρ) Robot Q S1 S2 S3 Search the circle ccw till point Cπ 2 , ρ) # Description 0 Move to point Cπ−α 1 2 Move to point K( α+β 3 Move to point C− α+β 0 Move to point Cπ−α−β 1 0 Move to point Cπ 1 0 Move to point Cπ−α−β 1 2 2 2 Search the circle cw till point C− α+β Search the circle ccw till point C− α+β Search the circle ccw till point C−α Duration 1 α 2 , ρ), t − (1 + α)) AK( α+β 2 , ρ) 2 − 2ρ ) Trajectory L(O, Cπ−α, t) C(π − α, t − 1) L(Cπ, K( α+β L(K( α+β 2 , ρ), C− α+β L(O, Cπ−α−β) C(π − α − β,−t + 1) L(O, Cπ) C(π, t − 1) L(O, Cπ−α−β) C(π − α − β,−t + 1) 2 1 π − α+β 2 π − α+β 2 1 1 β As before, it is immediate that, in SEARCH3(α, β, ρ), robots' trajectories are contin- uous and feasible, meaning that the entire circle is eventually searched. In particular, the arc with endpoints Cπ, Cπ−α is searched by Q, the arc with endpoints Cπ−α−β, C− α+β is searched by S1, the arc with endpoints C−π, C− α+β is searched by S2, and the arc with endpoints Cπ−α, Cπ−α−β is searched by S3. Also, the search time is 1 + π − α+β 2 , and 2 2 I(Q) = [1, 1 + α], I(S1) = I(S2) = [1, 1 + π − α + β 2 ], I(S3) = [1, 1 + β]. An illustration of the above trajectories for certain values of α, β, ρ can be seen in Figure 4. 15 𝐶𝐶𝜋𝜋−𝛼𝛼𝐶𝐶−𝛼𝛼−𝛽𝛽/2𝐾𝐾𝛼𝛼+𝛽𝛽2,𝜌𝜌𝛼𝛼(𝛼𝛼+𝛽𝛽)/2𝐶𝐶𝜋𝜋−𝛼𝛼−𝛽𝛽𝛽𝛽SEARCH3𝛼𝛼,𝛽𝛽,𝜌𝜌𝒬𝒬𝑡𝑡𝒮𝒮1𝑡𝑡𝒮𝒮2𝑡𝑡𝒮𝒮3𝑡𝑡   Before we prove Theorem 3.5, we need to make some observation, in order to calculate the worst case evacuation time. 2 ≥ α + Lemma 3.6. Suppose that α ≤ β, α + AK( α+β 2 , ρ) + 2 − 2ρ. Then the following functions are continuous and differentiable AK( α+β in each associated time intervals: kQ(x) − S3(t)k in I1 = {t ≥ 0 : α ≤ t − 1 ≤ β}, 2 , ρ)} and in I3 = {t ≥ kQ(x) − S1(t)k in I2 = {t ≥ 0 : 2 , ρ) ≤ 2 − 2ρ}. Moreover, the worst case evacuation time of 0 : SEARCH3(α, β, ρ) can be computed as 2 , ρ) ≥ β, and π − α+β t − 1 − α ≤ AK( α+β t − 1 − α − AK( α+β max supt∈I1 {t + kQ(t) − S3(t)k} supt∈I2 {t + kQ(t) − S1(t)k} supt∈I3 {t + kQ(t) − S1(t)k} 1 + π − α+β 2 Proof: Conditions α ≤ β and α + AK( α+β than S3, and that when S3 stops searching Q is still in her phase 2, respectively. 2 , ρ) ≥ β mean that Q stops searching no later The line passing through O and C−(α+β)/2, call it , has the property that each point 2 , ρ) is equidistant from S1,S2. Moreover, while S1,S2 are search- of it, including K( α+β 2 , ρ), Q is, by construction, ing, Q never goes above line . At time 1 + α + AK( α+β equidistant from S1,S2, a property that is preserved for the remaining of the execution of the algorithm. As a result, S2 can be ignored in the performance analysis, and when it comes to the case that S1 finds the exit, the evacuation cost is given by the supremum of t + kQ(t) − S1(t)k in the time interval I2 or in the interval I3. Note that in both intervals, the evacuation cost is continuous and differentiable, by construction. If the exit is reported by S3 then the evacuation cost is t + kQ(t) − S3(t)k for t ∈ [1, 1 + β]. However, it is easy to see that the cost is strictly increasing for all t ∈ [1, 1 + α] (in fact it is linear). Since the evacuation cost is also continuous, we may restrict the analysis in interval I1. 2 , ρ) + 2 − 2ρ implies that S1,S2 reach point C−(α+β)/2 no earlier than Q. Hence Q waits at C−(α+β)/2 till the search of the circle is over, which can be easily seen to induce the worse evacuation time after Q reaches C−(α+β)/2. Lastly, observe that π − α+β 2 ≥ α + AK( α+β Next, we prove Theorem 3.5 by fixing parameters α, β, ρ for SEARCH3(α, β, ρ). Proof: [Proof of Theorem 3.5] We choose α = 0.26738, β = 1.2949, ρ = 0.70685. The trajectories of Figure 4 correspond exactly to those values. The time that Q needs to reach 2 , ρ) + 2− 2ρ = 3.17984, while the time that S1,S2 reach equals 1 + α + AK( α+β C− α+β 2 the same point is 1 + π − α+β 2 = 3.36045. Hence, Lemma 3.6 applies. From the above, it is immediate that the worst evacuation time after Q reaches C−(α+β)/2 equals 1 + π − α+β 2 = 3.36045. Hence, it remains to compute the maxima of t + kQ(t) − S3(t)k in interval I1, and of t + kQ(t) − S1(t)k in intervals I2, I3. To that end, when t ∈ I1 = [1.26738, 2.2949] we have that Q(t) = (−2.23643 + 0.97558t, 0.278372 − 0.219643t) S3(t) = (cos(t + 0.579313), sin(t + 0.579313)) , 16 so that t + kQ(t) − S3(t)k becomes t+p(−0.219643t − sin(t + 0.579313) + 0.278372)2 + (0.97558t − cos(t + 0.579313) − 2.23643)2 in which case {t + kQ(t) − S3(t)k} = 1 + β + kQ(1 + β) − S3(1 + β)k ≈ 3.37882 sup t∈I1 When t ∈ I2 = [1.26738, 2.59354], Q's trajectory is the same as in I1 and S1(t) = (cos(2.57931 − t), sin(2.57931 − t)) , so that t + kQ(t) − S1(t)k becomes t+p(− sin(2.57931 − t) − 0.219643t + 0.278372)2 + (− cos(2.57931 − t) + 0.97558t − 2.23643)2. When t ∈ I3 = [2.59354, 3.17984], S1's trajectory is the same as in I2 and Q(t) = (−1.54793 + 0.710111t, 1.5348 − 0.704089t) , so that t + kQ(t) − S1(t)k becomes t+p(sin(2.57931 − t) + 0.704089t − 1.5348)2 + (cos(2.57931 − t) − 0.710111t + 1.54793)2. Numerically sup t∈I2 sup t∈I3 {t + kQ(t) − S1(t)k} = τ2 + kQ(τ2) − S1(τ2)k ≈ 3.37882 {t + kQ(t) − S1(t)k} = τ3 + kQ(τ3) − S1(τ3)k ≈ 3.37882 where τ2 ≈ 2.34029 and τ3 ≈ 2.84758. 3.3.2 Improved Search Algorithm In this section we improve the upper bound of Theorem 3.5 by 0.00495 additive term. Theorem 3.7. PE3 can be solved in time 3.37387. The main idea can be described, at a high level, as a cost preservation technique. By the analysis of Algorithm SEARCH3(α, β, ρ) for the value of parameters of α, β, ρ as in the proof of Theorem 3.5, we know that there are is a critical time window [τ2, τ3] so that the total evacuation time is the same if the exit is found by S1 either at time τ2 or τ3, and strictly less for time moments strictly in-between. In fact, during time [τ2, 1 + α + AK( α+β 2 , ρ)] Q is executing phase 2, and in the time window [1 + α + AK( α+β 2 , ρ), τ3] Q is executing phase 3 of SEARCH3(α, β, ρ). From the above, it is immediate that we can lower Q's speed in the time window [τ2, τ3] so that the evacuation time remains unchanged no matter when S1 finds the exit in 17 the same time interval (notably, S3 has finished searching prior to τ2 and kQ(t) − S1k ≥ kQ(t) − S2k). But this also implies that we must be able to maintain the evacuation time even if we preserve speed 1 for Q, that will in turn allow us to twist parameters α, β, ρ, hopefully improving the worst case evacuation time. We show this improvement is possible by using the following technical observation Theorem 3.8. Consider point Q = (q1, q2) ∈ R2. Let S(t) be the trajectory of an object S moving at speed 1, where t ≥ 0, and denote by φ the (S, Q)-critical angle at time t = 0. Assuming that cos (φ) ≥ 0, then there is some τ > 0, and a trajectory Q(t) = (f(t), g(t)) of a speed-1 object, where t ≥ 0, so that t + kQ(t) − S(t)k remains constant, for all t ∈ [0, τ]. Moreover, Q(t) can be determined by solving the system of differential equations (f0(t))2 + (g0(t))2 = 1 t + kQ(t) − S(t)k = kS(0) − Qk (f(0), g(0)) = (q1, q2). (2) (3) (4) Proof: An object with trajectory (f(t), g(t)) satisfying (2) and (4) has speed 1 (by Lemma 2.2), and starts from point Q = (q1, q2). We need to examine whether we can choose f, g so as to satisfy (3). By Lemma 2.7, such a trajectory Q(t) exists exactly when we can guarantee that cos (φ) + cos (θ) = 1 over time t. When t = 0 we are given that cos (φ) > 0, hence there exists θ satisfying cos (φ) + cos (θ) = 1. This uniquely determines the velocity of Q at t = 0. By continuity of the velocities, there must exist a τ > 0 such that cos (φ)+cos (θ) = 1 admits a solution for θ also as φ changes over time t ∈ [0, τ], in which time window the cosine of the (S,Q(t))-critical angle at time t remains non-negative. increasing at t = τ, i.e. that S does not move away from point Q. Note that condition cos (φ) ≥ 0 of Theorem 3.8 translates to that kS(t) − Qk is not Now fix parameters α, β, ρ together with the trajectories of S1,S2,S3 as in the descrip- tion of Algorithm SEARCH3(α, β, ρ). The description of our new algorithm N-SEARCH3(α, β, ρ) will be complete once we fix a new trajectory for Q. Naming specific values for parameters α, β, ρ will eventually prove Theorem 3.7. In order to do so, we introduce some further notation and conditions, denoted below by (Conditions i-iv), that we later make sure are satisfied. Consider Q's trajectory as in SEARCH3(α, β, ρ). Let τ0 denote a local maximum of t + kQ(t) − S1(t)k as it reads for t ≥ 0 with t − 1 − α ≤ AK( α+β expression is differentiable by Lemma 3.6), i.e. 2 , ρ) (recall that in this time window, τ0 − 1 − α ≤ AK( α + β 2 Set Q = Q(τ0), and assume that , ρ) (Condition i) "The cosine of the (S, Q)-critical angle at time τ0 is non-negative." (Condition ii) 18 Then obtain from Theorem 3.8 trajectory (f(t), g(t)) that has the property that it preserves τ0 + kQ(τ0) − S1(τ0)k in the time window [τ0, τ0]. Assume also that "There is time τ1 ≤ τ0 such that point K1 := (f(τ1), g(τ1)) is equidistant from S1(τ1),S2(τ1)," (Condition iii) for the first time after time τ0, such that τ1 ≤ 1 + π − α + β 2 . (Condition iv) Then consider the following modification of SEARCH3(α, β, ρ), where the trajectories of S1,S2,S3 remain unchanged, see also Figure 5. Figure 5: Algorithm SEARCH3(α, β, ρ) depicted for the optimal parameters of the algorithm. Algorithm N-SEARCH3(α, β, ρ) Robot Q # Description 0 Move to point Cπ−α 1 2 Move toward point K( α+β 3 4 Move to point C− α+β Search the circle ccw till point Cπ 2 , ρ) Preserve τ0 + kQ(τ0) − S1(τ0)k 2 Trajectory L(O, Cπ−α, t) C(π − α, t − 1) L(Cπ, K( α+β (f(t), g(t)) L(K1, C− α+β ) 2 2 , ρ), t − (1 + α)) Duration 1 α τ0 − 1 − α τ1 − τ0 (cid:13)(cid:13)(cid:13)K1 − C− α+β 2 (cid:13)(cid:13)(cid:13) Note that in phase 2, Q is not reaching (necessarily) point K rather it moves toward it 2 . Trajectories of S1,S2,S3 are for a certain duration. The search time is still 1 + π − α+β continuous as before, and I(S1) = I(S2) = [1, 1 + π − α + β 2 as well as I(Q) = [1, 1 + α]. ], I(S3) = [1, 1 + β], 19 𝐶𝐶𝜋𝜋−𝛼𝛼𝐶𝐶−𝛼𝛼−𝛽𝛽/2𝐾𝐾𝛼𝛼+𝛽𝛽2,𝜌𝜌𝛼𝛼(𝛼𝛼+𝛽𝛽)/2𝐶𝐶𝜋𝜋−𝛼𝛼−𝛽𝛽𝛽𝛽N-SEARCH3𝛼𝛼,𝛽𝛽,𝜌𝜌𝒬𝒬𝑡𝑡𝒮𝒮1𝑡𝑡𝒮𝒮2𝑡𝑡𝒮𝒮3𝑡𝑡 Condition i makes sure that while Q is at phase 2, and before it reaches K( α+β 2 , ρ), there is a time moment τ0 when the rate of change of t + kQ(t) − S1(t)k is 0. Together with condition ii, this implies that Theorem 3.8 applies. In fact, for the corresponding critical angles φ, θ between S1,Q at time τ0, we have that cos (φ) + cos (θ) = 1 by con- struction. Hence trajectory (f(t), g(t)) of phase 3 is well defined, and indeed, Q jumps from phase 2 to phase 3 while Q is still moving toward point K. Notably, Q's trajectory is even differentiable at t = τ0 (but not necessarily at t = τ1). Then, Condition iii says that Q eventually will enter phase 4, and that this will happen before S1,S2 finish the explo- ration of the circle. Overall, we conclude that in N-SEARCH3(α, ρ), robots' trajectories are continuous and feasible. An illustration of the above trajectories for certain values of α, β, ρ can be seen in Figure 5. Now we make some observations, in order to calculate the worst case evacuation time. Lemma 3.9. Suppose that α ≤ β, 1 + β ≤ τ0, and 1 + π − α+β as well as Conditions i-iv are satisfied. Then the following functions are continuous and differentiable in each associated time intervals: kQ(x) − S3(t)k in I1 = {t ≥ 0 : α ≤ t − 1 ≤ β}, kQ(x) − S1(t)k in I2 = {t ≥ 0 : 1 + α ≤ t ≤ τ0 and in . Moreover, the worst case evacuation time of t ≥ 0 : t − τ1 ≤(cid:13)(cid:13)(cid:13)K1 − C− α+β I3 =n 2 ≥ τ1 + (cid:13)(cid:13)(cid:13)o 2 N-SEARCH3(α, β, ρ) can be computed as (cid:13)(cid:13)(cid:13)K1 − C− α+β 2 (cid:13)(cid:13)(cid:13)  max supt∈I1 {t + kQ(t) − S3(t)k} supt∈I2 {t + kQ(t) − S1(t)k} supt∈I3 {t + kQ(t) − S1(t)k} 1 + π − α+β 2  Proof: Conditions α ≤ β and 1 + β ≤ τ0 mean that Q stops searching no later than S3, and that when Q enters phase 3 after S3 is done searching, respectively. The line passing through O and C−(α+β)/2, call it , has the property that each point of 2 , ρ) is equidistant from S1,S2. Moreover, while S1,S2 are searching, it, including K( α+β Q never goes above line . Also, while Q is executing phase 3, Q remains equidistant from S1,S2 and this is preserved for the remainder of the execution of the algorithm. As a result, S2 can be ignored in the performance analysis, and when it comes to the case that S1 finds the exit, the evacuation cost is given by the supremum of t + kQ(t) − S1(t)k in the time interval I2 or in the interval I3. Note that in both intervals, the evacuation cost is continuous and differentiable, by construction. If the exit is reported by S3 then the evacuation cost is t + kQ(t) − S3(t)k for t ∈ [1, 1 + β]. However, it is easy to see that the cost is strictly increasing for all t ∈ [1, 1 + α] (in fact it is linear). Since the evacuation cost is also continuous, we may restrict the analysis in interval I1. (cid:13)(cid:13)(cid:13)K1 − C− α+β (cid:13)(cid:13)(cid:13) implies that S1,S2 reach point C−(α+β)/2 no earlier than Q. Hence Q waits at C−(α+β)/2 till the search of the circle is over, which can be easily seen to induce the worse evacuation time after Q reaches C−(α+β)/2. 2 Lastly, observe that 1 + π − α+β 2 ≥ τ1 + Next we prove Theorem 3.7 by fixing parameters α, β, ρ for N-SEARCH3(α, β, ρ). 20 The time that Q needs to reach C− α+β 2 equals 1 + τ1 + Proof: [Proof of Theorem 3.7] We choose α = 0.27764, β = 1.29839, ρ = 0.68648. The trajectories of Figure 4 correspond exactly to those values. For these values we see that 2 , ρ) = 1.29041, while τ0− α−1 = 1.04877. Hence the transition between phase AK( α+β 1 and phase 2 of Q is well defined. (cid:13)(cid:13)(cid:13)K1 − C− α+β 2 (cid:13)(cid:13)(cid:13) = 3.18073, while the time that S1,S2 reach the same point is 1 + π − α+β 2 = 3.35358. Therefore we may attempt to solve numerically the differential equation of Theorem 3.8. It turns out that for the resulting trajectory (f(t), g(t), and for τ1 = 2.89288, point (f(τ1), g(τ1) is equidistant from S1,S2. Moreover, Q enters phase 4 at time τ1 = 2.89288, prior to 1 + π − α+β From the above, it is immediate that the worst evacuation time after Q reaches C−(α+β)/2 equals 1 + π − α+β 2 = 3.35358. Hence, it remains to compute the maxima of t + kQ(t) − S3(t)k in interval I1, and of t + kQ(t) − S1(t)k in intervals I2, I3. 2 . Hence, Conditions i-iv are all met, as well as Lemma 3.9 applies. To that end, when t ∈ I1 = [1.27764, 2.29839] we have that Q(t) = (0.978782t − 2.25053, 0.261795 − 0.204905t) S3(t) = (cos(t + 0.565563), sin(t + 0.565563)) , so that t + kQ(t) − S3(t)k becomes t+p(−0.204905t − sin(t + 0.565563) + 0.261795)2 + (0.978782t − cos(t + 0.565563) − 2.25053)2 in which case {t + kQ(t) − S3(t)k} = 1 + β + kQ(1 + β) − S3(1 + β)k ≈ 3.37387 sup t∈I1 When t ∈ I2 = [1.27764, 2.32641], Q's trajectory is the same as in I1 and S1(t) = (cos(2.56556 − t), sin(2.56556 − t)) , so that t + kQ(t) − S1(t)k becomes t+p(− sin(2.56556 − t) − 0.204905t + 0.261795)2 + (− cos(2.56556 − t) + 0.978782t − 2.25053)2. When t ∈ I3 = [2.89288, 3.18073], S1's trajectory is the same as in I2 and Q(t) = (0.705254t − 1.53797, 1.54604 − 0.708955t0.706399t − 1.53762, 1.5407 − 0.707814t) , so that t + kQ(t) − S1(t)k becomes t+p(− sin(2.56556 − t) − 0.708955t + 1.54604)2 + (− cos(2.56556 − t) + 0.705254t − 1.53797)2. Numerically sup t∈I2 {t + kQ(t) − S1(t)k} = τ0 + kQ(τ0) − S1(τ0)k = τ1 + kQ(τ1) − S1(τ1)k {t + kQ(t) − S1(t)k} ≈ 3.37387. = sup t∈I3 The reader may also consult Figure 5. 21 Figure 6: (Left) The queen must be in region R at time f(s3). Here s3 = E and q3 = F . 4 Lower Bounds In this section we derive lower bounds for evacuation. In Section 4.1 we treat the case of n = 1 (see Theorem 4.1) and in Section 4.2 we treat the case of n = 2 and 3 (see Theorem 4.3). 4.1 Lower Bound for PE1 We will derive the lower bound using an adversarial argument placing the exit at an un- known vertex of a regular hexagon. 3/2 ≈ 4.3896 Theorem 4.1. The worst-case evacuation time for PE1 is at least 3+π/6+ Proof: At time 1 + π/6, at most π/3 of the perimeter of the circle can have been explored by the queen and servant. Thus, there is a regular hexagon, none of whose vertices have been explored. If the exit is at one of these vertices, by Theorem 4.2, it takes 2 + 3/2 for the queen to evacuate. The total time is 1 + π/6 + 2 + 3/2. √ √ √ Next we proceed to provide a lower bound on a unit-side hexagon. Label the vertices of the hexagon V as A, . . . , F as shown in Figure 6. Fix an evacuation algorithm A. For any vertex v of the hexagon, we call f(v) the time of first visit of the vertex v by either the servant or the queen, according to algorithm A. We call q(v) the time that the queen gets to the vertex v. Clearly, q(v) ≥ f(v), and if the queen arrives at the vertex no later than the servant, q(v) = f(v). Theorem 4.2. For any algorithm A, the evacuation time for the queen when the exit is at one of the vertices of the hexagon is maxv∈V {q(v)} ≥ 2 + Proof: Suppose there is an algorithm in which the queen can always evacuate in time 3/2. Consider the trajectories of the servant and the queen. If either the queen < 2 + 3/2. √ √ 22 BCDEFA2+p32−f(s3)R √ √ 3/2 − f(s3) ≤ √ or the servant are the first to visit 4 vertices, then for the fourth such vertex v, we have f(v) ≥ 3, a contradiction. Therefore, the queen is the first to visit three vertices, and the servant is the first to visit three vertices. We denote the three vertices visited first by the servant as s1, s2, s3 (in the order they are visited) and the three vertices visited first by the queen as q1, q2, q3, and note that they are all distinct. Notice that neither s3 nor q3 can be visited before time 2, that is, f(s3), f(q3) ≥ 2. If f(q3) ≤ f(s3), then we place the exit at s3, and the queen needs time at least 1 to get to s3, which implies that T ≥ q(s3) ≥ f(q3) + 1 ≥ 3, a contradiction. We conclude that at time f(s3), the queen is yet to visit q3. Since the exit can be at either s3 or q3, at time 3/2 from both s3 and q3. f(s3), the queen must be at distance < 2 + Assume without loss of generality that s3 = E (see Figure 6). Since A, B, D are all 3 from E, we conclude that q3 is either C or F . Assume without at distance at least loss of generality that q3 = F . Let R denote the lens-shaped region that is at distance 3/2 − f(s3) from both E and F . Recall that at time f(s3), the queen must be < 2 + √ inside the region R. Notice that if f(s3) ≥ 1.5 + 3/2, the region R is empty, yielding a √ contradiction. So it must be that 2 ≤ f(s3) < 1.5 + Clearly s2 6= F since q3 = F . If s2 6= C, then f(s3) ≥ √ We now work backwards to deduce the trajectories of the servant and the queen. 3/2, a contradiction. Therefore, s2 = C. By the same reasoning, s1 = A. Therefore, the queen is the first to visit D and B. If q1 = D and q2 = B, we place the exit at E; since f(q2) ≥ 1 and dist(B, E) = 2, we have T ≥ q(E) ≥ 3, a contradiction. Thus, q2 = D and q1 = B. Consider the location of the queen at time 1. If she is at distance ≥ 1 + 3/2 from C at time 1, then if the exit is at C, q(C) ≥ 2 + 3/2. So at time 1, the queen must be at 3/2 from C and consequently she is at distance ≥ 1−√ distance < 1 + 3/2 from vertex D. Therefore f(q2) = f(D) ≥ 2 − √ 3/2. Also, f(D) < 1.5 since if the queen reaches √ 3/2 > f(s3). D at or after time 1.5, she cannot reach the region R before time 1.5 + So f(D) ≤ f(s3). If the exit is at E = s3, the queen cannot reach the exit before time √ f(D) + dist(D, E) ≥ 2 − √ 3, concluding the proof by contradiction. 3 + 1 > 1.5 + 3/2 + 3 = 2 + √ √ √ √ √ 3/2. √ We remark that the above bound is optimal, and is achieved by the algorithm depicted in Figure 7. 4.2 Lower Bounds for PE2 and PE3 - Proof Outline In the case of n = 2 and n = 3 the proof is rather technical. Next we present a high level outline as to why the lower bounds hold. Theorem 4.3. The worst-case evacuation time for PE2 is at least 3.6307 and for PE3 at least 3.2017. Throughout this section we will use T to refer to the evacuation time of an arbitrary algorithm and use U to refer to the unit circle which must be evacuated. The main thrust of the proof relies on a simple idea – the queen should aid in the exploration of U. This is immediately evident for the particular case of n = 2 since, if the queen does not explore, it will take time at least 1 + π for the servants to search all of 23 Figure 7: Blue trajectory: servant and red trajectory: queen. At point H, if the queen hears of an exit at E, she goes there, otherwise she goes to F . U and we already have an upper bound smaller than this (Theorem 3.3). Thus, a general overview of the proof is as follows: we show that in order to evacuate in time T the queen must explore some minimum length of the perimeter of U. We will then demonstrate that the queen is not able to explore this minimum amount in any algorithm with evacuation time smaller than what is given in Theorem 4.3. To be concrete, consider the case of n = 2 and assume that we have an algorithm with evacuation time T < 1 + π. Then, in order for the robots to have explored all of U in time T , the queen must explore a subset of the perimeter of total length at least 2(1 + π − T ). Intuitively, this minimum length of perimeter will increase in size as T decreases. Now consider that it is not possible for the queen to always remain on the perimeter (indeed, in each of the algorithms presented, the queen leaves the perimeter). To see why this is consider that, in any algorithm with evacuation time T , it must be the case that all unexplored points of U are located a distance no more than T − t from the queen at all times t ≤ T . If the queen is on the perimeter at any time t satisfying T − t ≤ 2, then, there will be some arc θ(t,T ) ⊂ U (see Lemma 4.4) such that all points of θ(t,T ) are at a distance at least T − t from the queen. Thus, if the queen is to be on the perimeter at the time t we can conclude that all of the arc θ(t,T ) must have already been discovered. However, we will find (see Lemma 4.5) that θ(t,T ) will often grow at a rate much larger than the robots can collectively explore and at some point the queen will have to leave the perimeter. In fact, there will be an interval of time during which it is not possible for the queen to be exploring and this in turn implies that there is a maximum amount of perimeter that can be explored by the queen. Intuitively, the maximum length of perimeter that can be explored by the queen will decrease as T decreases. The lower bound will result by balancing the minimum amount of perimeter the queen needs to search and the maximum amount of perimeter that the queen is able to search. The above argument will need a slight modification in the case of n = 3. In this case we will show that there is some critical time t∗ before which the queen must have explored 24 some minimum amount of perimeter. Again, the lower bound follows by balancing the maximum amount of perimeter the queen can explore by the time t∗ and the minimum amount of perimeter the queen needs to explore before the time t∗. 4.3 Lower Bounds for PE2 and PE3 - Proof Details In this section we present the complete details of the proofs for the lower bounds in the cases n = 2 and n = 3. Throughout this section we will use T to refer to the evacuation time of an arbitrary algorithm and use U to refer to the unit circle which must be evacuated. The idea of the proofs are to bound the amount of perimeter the queen can search for a given evacuation time T and then show that the queen must search a minimum amount of the perimeter in order to achieve the evacuation time T . The lower bounds result by balancing the minimum amount of perimeter the queen must search with the maximum amount of perimeter the queen can search. We begin with two lemmas which will be used for both the n = 2 and n = 3 bounds. Their necessity will become apparent shortly. Lemma 4.4. Consider any r < 2 and a point P ∈ U. Define the circle DP as the disk centered on P with radius r. Then the subset of the perimeter of U which is not contained (cid:1). in DP has length θ = 4 cos−1(cid:0) r to this figure, one can easily observe that r = 2 sin(cid:0) π θ we find that θ = 4 cos−1(cid:0) r (cid:1). 2 2 Proof: Without loss of generality assume that the point P is located at (−1, 0). Since r < 2 the disks U and DP will intersect at two boundary points A and B between which the distance along the perimeter of U is θ. This situation is depicted in Figure 8. Referring (cid:1) = 2 cos(cid:0) θ (cid:1). Rearranging for 2 − θ 4 4 Figure 8: Setup for the proof of Lemma 4.4. The boundary of the disk DP is indicated in blue. The arc of U which is excluded from DP is highlighted in red and has length θ. 25 Lemma 4.5. Consider the function θ(t,T ) = 4 cos−1(cid:0)T −t (cid:1) with T > 0. Then dθ dt > 3 for t satisfying T − 2 < t < T − 2 2 dt > 2 √ 5. 3 for all t satisfying T − 2 < t < T and dθ Furthermore, dθ Proof: The rate of change of θ(t,T ) with t is given by dT < −2 for all T − 2 < t < T . 4p4 − (T − t)2 . dθ dt = From this relation it is simple to confirm that dθ for T − 2 < t < T − 2 3 function θ(t,T ) that dθ dT < −2 for all T − 2 < t < T . √ dr > 3 5. It should also be obvious by the symmetry of T and t in the dt > 2 for T −2 < t < T and that dθ(r) 4.3.1 Lower bound for n = 2 We begin with the main result of the section. Theorem 4.6. For n = 2 and any algorithm the queen cannot be evacuated in time less than T2 which is the solution to the equations τ = T2 − 2 cos (cid:19) (cid:18) τ − 1 2 (cid:18)2t∗ + τ 2(T2 + 1) − 3 4 4 (cid:19) . t∗ = 1 T2 = t∗ + 2 cos Solving these equations numerically gives τ ≈ 1.7815, t∗ ≈ 2.3154, and T2 ≈ 3.6307. We will see that the queen cannot be located on the perimeter of the circle during the interval of time (τ, t∗) and thus τ − 1 represents the maximum amount of perimeter that can be explored by the queen before the time t∗. The time t∗ is chosen such that for all T < T2 a solution to the equations in Theorem 4.6 do not exist, and, as such, τ − 1 will represent the maximum length of the perimeter that can be explored by the queen. In the following lemma we show that the queen must explore a length of the perimeter greater than τ − 1 in order to evacuate in time less than T2. Lemma 4.7. For n = 2 and any evacuation algorithm with T < 1 + π, the queen must explore a subset of the perimeter of length y ≥ 2(1 + π − T ). In particular, if T < T2, we need y > 2(1 + π − T2) ≈ 1.0217. Proof: take time 1 + 2π−y 2 circle in time T and therefore 1 + 2π−y T < T2 ≈ 3.6307 we need y > 1.0217. If the queen explores a subset of the perimeter of length y then the robots will to explore the circle. The robots need to at least explore the entire 2 ≤ T , or, equivalently, y ≥ 2(1 + π − T2). For We will now show that the maximum length of perimeter the queen can explore is less than τ − 1 if T < T2. This will be the goal of the next two lemmas. 26 dα > 0. to T gives us 2(t − 1) + 1 dT ≥ 1 satisfying 0 < α ≤ t and t satisfying 1 < t ≤ T . Then dt then dt Lemma 4.8. Consider the equation T = t + 2 cos(cid:0) 1 Proof: Implicitly differentiating the equation T = t+2 cos(cid:0) 1 4 α(cid:1) . Implicitly differentiating the equation T = t + 2 cos(cid:0) 1 4 α(cid:1) 4 α(cid:1) . 1 − sin(cid:0) 1 sin(cid:0) 1 1 − sin(cid:0) 1 Since the sine function ranges from −1 to 1 we can easily see that dt 2(t − 1) + 1 2(t − 1) + 1 = 1 2 · dt dT = α gives us dt dα 1 We can esily see that the denominator of dt provided that the numerator is positive. This clearly occurs for 1 t < 1 + 2π − α 2 . 2(t − 1) + 1 2(t − 1) + 1 dα will never be negative and thus dt 2(t − 1) + 1 dα > 0 4 α < π or 2 , and, if 0 < t < 1+2π− α 2 α(cid:1) with T > 0, α 4 α(cid:1) with respect 2 2(t − 1) + 1 dT ≥ 1 2. 4 α(cid:1) with respect to Lemma 4.9. Define τ as in Theorem 4.6. Then, for n = 2 and any evacuation algorithm with T < T2, the queen cannot explore a subset of the perimeter with length y > τ − 1. Proof: We start with an observation: if the queen is to evacuate in time T , then, at any time t < T , all points of U that are a distance greater than T − t from the queen must be explored by a robot. If the queen is located on the perimeter at the time t > T − 2 then by Lemma 4.4 there is an arc of length θ(t,T ) = 4 cos−1 (cid:18)T − t (cid:19) 2 all points of which lie a distance greater than T − t from the queen (as an abuse of notation we will refer to the arc with length θ(t,T ) as θ(t,T )). Thus, in order for the queen to be on the perimeter at the time t, the arc θ(t,T ) must be explored. As we have 3 robots in total the maximum length of θ(t,T ) that can be explored at any time t is 3(t− 1). However, we claim that the queen cannot have explored any of θ(t,T ) if the time t satisfies t < 1 2(T +1). Indeed, observe that the endpoints of θ(t,T ) lie a distance T − t away from the queen (by definition) and the queen – who took a unit of time to reach the perimeter – could have explored a point on the perimeter at most a distance t − 1 from her current position. Thus, 2(T + 1), the queen cannot have explored any if t − 1 < T − t, or, alternatively, t < 1 of the arc θ(t,T ). We must therefore have θ(t,T ) ≤ 2(t − 1) for times t that satisfy t < 1 3 > 3 and thus we can assume that T > 3. We make the following claim: if T < T2 then the smallest time t0 > 0 solving 2(T + 1). We note that, if this is the θ(t0,T ) = 2(t0 − 1) satisfies dθ case, the queen will have to leave the perimeter at the time t0 (since she has not explored any of the arc θ(t,T ) and, immediately after the time t0, θ(t,T ) will be too large to have been explored by the servants alone). 2(T + 1). We note that there is a trivial lower bound of 1 + 2π > 2 and t0 < 1 (cid:12)(cid:12)t=t0 dt 27 dt 2 (cid:19) 2(t0 − 1) to get We first show that t0 < 1 2(T + 1). To this end we rearrange the equation θ(t0) = t0 = T − 2 cos (cid:18) t0 − 1 (cid:12)(cid:12)t=τ ≈ 5.2511 > 2 and τ < 1 which is the definition of τ in Theorem 4.6 (in the case that T = T2). One can easily confirm that in the case of T = T2 we have dθ 2(T + 1). Now observe that θ(t,T ) is a decreasing function of T and this implies that for T < T2 we have θ(τ,T ) > θ(τ,T2). We can therefore conclude that the time t0 must occur earlier 2(T + 1). Since than the time τ. We note that τ < 2 and, since T ≥ 3, we have τ < 1 2(T + 1). t0 < τ we can conclude that t0 < 1 The second part of the claim follows directly from Lemma 4.5 where we show that dt > 2 for all t satisfying T − 2 < t < T . As the queen must leave the perimeter at the time t0 < τ, by Lemma 4.7, we can say that the queen must be able to return to the perimeter and explore before the algorithm terminates. Thus, consider the smallest time t1 > t0 at which the queen may return to the perimeter. In order for the queen to be on the perimeter we will still need the arc θ(t,T ) to be completely explored. However, in this case it may be possible that t1 ≥ 1 2(T +1) and as such the queen could have explored at most a length t0−1 of θ(t,T ) at the time t1. We can therefore conclude that t1 will satisfy θ(t1) = 2(t1 − 1) + y with y = 0 if t1 < 1 2(T + 1), and y ≤ t0 − 1 if t1 ≥ 1 2(T + 1). Writing the equation θ(t1) = 2(t1 − 1) + y in full and rearranging we find that dθ t1 = T − 2 cos (cid:19) (cid:18)1 2(t1 − 1) + 1 4 y 2(T + 1) separately. 2(T + 1) and t1 ≥ 1 . We will now consider the cases t1 < 1 2(T + 1) Case 1: t1 < 1 In this case t1 can be observed to satisfy the same equation as t0. We claim that this is dt > 2 and the arc θ(t,T ) will not possible if t1 > t0. Indeed, by Lemma 4.5 we have dθ always grow at a rate larger than the servants alone can explore. Thus, a solution to the equation θ(t1) = 2(t1 − 1) with t1 > t0 does not exist. This implies that the queen can explore a maximum subset of the perimeter of total length t0−1 < τ −1 if t1 < 1 2(T +1). 2(T + 1) Case 2: t1 ≥ 1 In this case t1 satisfies (cid:18)1 2(t1 − 1) + 1 4 y (cid:19) . t1 = T − 2 cos dy > 0 (see Lemma 4.8) we will show that, even when Although it can be confirmed that dt1 (cid:19) 2(T +1). Thus we assume t1 is as large as possible (i.e. y = t0 −1), we cannot have t1 ≥ 1 that t1 satisfies 4(t0 − 1) (cid:18)1 2(t1 − 1) + 1 t1 = T − 2 cos . 28 Now write t1 = t1(T ) as a function of T and note that, by Lemma 4.8, we have dt1 2. Using this we can say that t1(T2) − t1(T ) > 1 1 have t1(T2) = 1 T ). Rearranging this inequality gives us t1(T ) < 1 assumption that t1 ≥ 1 the proof. dT > 2(T2 − T ). By definition of T2 we 2(T2 − 2(T + 1) which contradicts with our 2(T + 1). This concludes 2(T + 1) and we must conclude that t1 < 1 2(T2 + 1) and we can therefore write 1 2(T2 + 1) − t1(T ) > 1 At this point the proof of Theorem 4.6 is rather trivial. Proof: (Theorem 4.6) Assume that we have an algorithm with evacuation time T < T2. Then, by Lemma 4.7, the queen must explore a subset of the perimeter of length at least y > 1.0217. However, by Lemma 4.9, the queen can only explore a subset of the perimeter of length y < τ − 1 ≈ 0.7815 if T < T2. It is therefore not possible for the queen to evacuate in time less than T2. 4.3.2 Lower bound for n = 3 The main result of this section is given below: Theorem 4.10. For n = 3 and any algorithm the queen cannot be evacuated in time less than T3 which is the solution to the equations (cid:19) (cid:18)3 4(τ − 1) (cid:18)−2 (cid:19) − (τ − 1) 3 cos−1 (cid:18)3(t∗ − 1) + (τ − 1) (cid:19) 3 3 2 τ = T3 − 2 cos t∗ = 1 + 2 T3 = t∗ + sin Solving these equations numerically gives τ ≈ 1.2319, t∗ ≈ 2.4564, and T3 ≈ 3.2017. As before, τ represents the beginning of an interval of time during which the queen cannot be located on the perimeter. In this case, however, t∗ is not the first time at which it is possible for the queen to return to the perimeter. Instead it represents a particularly critical time of any algorithm with n = 3 at which the evacuation time is maximized (although it will happen that t∗ occurs before the queen can return to the perimeter). We will show that the queen must explore a subset of the perimeter with total length more than τ − 1 before the time t∗ in order to evacuate in time less than T2. We begin with a lemma that was first introduced in [10]: Lemma 4.11. Consider a perimeter of a disk whose subset of total length u+ > 0 has not been explored for some  > 0 and π ≥ u > 0. Then there exist two unexplored boundary points between which the distance along the perimeter is at least u. This next lemma is used to determine the critical time t∗. 29 2 (cid:17) n ≤ t ≤ 1 + 2π−y n , it takes time at least T = t + sin(cid:16) n(t−1)+y Lemma 4.12. Consider an evacuation algorithm with n servants and assume that at the time t the queen has explored a total subset of the perimeter of length y. Then, for x and y satisfying 1 + π−y to evacuate the queen. Proof: Consider an algorithm with evacuation time T and with n servants. Then, at the time t, the total length of perimeter that the robots have explored is at most n(t− 1) + y ≥ π (since each robot may search at a maximum speed of one, the queen has explored a subset of length y, and the robots need at least a unit of time to reach the perimeter). Thus, by Lemma 4.11, there exists two unexplored boundary points between which the distance along the perimeter is at least 2π − n(t − 1) − y −  for any  > 0. The chord and an adversary may place the exit at either endpoint of this chord. The queen will therefore take at least more time to evacuate and the total evacuation time will be at . As this is true for any  > 0 taking the limit  → 0 we connecting these points has length at least 2 sin(cid:16) sin(cid:16) least t + sin(cid:16) obtain T ≥ t + sin(cid:16) (cid:17) = t + sin(cid:16) n(t−1)+y 2 π − n(t−1)+y 2 π − n(t−1)+y π − n(t−1)+y π − n(t−1)+y −  2 −  2 (cid:17) . (cid:17) (cid:17) (cid:17) 2 −  2 2 2 In the next two lemmas we show that in order to evacuate in time T < T2 the queen must explore a length of the perimeter greater than τ − 1 and then demonstrate that this is not possible. Lemma 4.13. Define τ and t∗ as in Theorem 4.10. Then, for n = 3 and any evacuation algorithm with T < T3, the queen must explore a subset of U with total length y > τ − 1 before the time t∗. Proof: Consider an algorithm with evacuation time T < T3. We make the assumption that the queen has only explored a subset of total length y < τ − 1 at the time t∗ and show that this leads to a contradiction. for all y satisfying 0 ≤ y ≤ τ − 1 Observe that t∗ satisfies 1 + π−y 3 ≤ t∗ ≤ 1 + 2π−y 3 and thus, by Lemma 4.12, we can write (cid:18)3(t∗ − 1) + y (cid:18)3(t∗ − 1) + y 2 (cid:19) (cid:19) . . 2 30 T ≥ t∗ + sin Since T < T3 we also have Since T3 = t∗ + sin(cid:16) 3(t∗−1)+(τ−1) (cid:17) T3 > t∗ + sin 2 (cid:18)3(t∗ − 1) + (τ − 1) (cid:19) we further have > sin sin (cid:18)3(t∗ − 1) + y (cid:19) . 2 2 3 we know that sin(cid:16) 3(t∗−1)+y 2 Finally, since t∗ ≥ 1 + π−y argument and thus we get (cid:17) is a decreasing function of its 3(t∗ − 1) + (τ − 1) 2 3(t∗ − 1) + y 2 < which implies that y > τ − 1 which contradicts with our assumption that y < τ − 1. all of the arc θ(t,T ) = 4 cos−1(cid:0)T −t (cid:1) must be explored. Since we have 4 robots in total, Lemma 4.14. Define τ and t∗ as in Theorem 4.10. Then, for n = 3 and any evacuation algorithm with T < T3, the queen cannot explore a subset of the perimeter with length y > τ − 1 before the time t∗. Proof: As was the case for n = 2, if the queen is to be on the perimeter at the time t then the maximum length of arc that can be explored at any time t is 4(t − 1). However, we can again say that the queen cannot search any of the arc θ(t) if t ≤ 1 2(T + 1). We must therefore have θ(t,T ) ≤ 3(t − 1) for times t that satisfy t < 1 2(T + 1). Assume first that T ≥ 3. We make the following claim: if 3 ≤ T < T3 then the smallest time t0 > 0 solving θ(t0,T ) = 3(t0−1) satisfies dθ 2(T +1). If this is the case the queen will have to leave the perimeter at the time t0. 2(T + 1). Let us rearrange the equation θ(t0,T ) = 3(t0 − 1) to get We first demonstrate that t0 < 1 > 3 and t0 < 1 (cid:12)(cid:12)t=t0 dt 2 2 3 31 t0 = T − 2 cos (cid:18)3 (cid:19) 4(t0 − 1) (cid:12)(cid:12)t=τ > 3 and τ < 1 dt √ which is the definition of τ in Theorem 4.10 (in the case that T = T3). One can easily confirm that in the case of T = T3, both dθ 2(T + 1). Now observe that θ(t,T ) is a decreasing function of T and this implies that for T < T3 we have θ(τ,T ) > θ(τ,T3). The time t0 must therefore occur earlier than the time τ. We note that τ < 2 and, since we are assuming that T ≥ 3, we have τ < 1 2(T + 1). Since t0 < τ we can finally conclude that t0 < 1 The second part of the claim follows from Lemma 4.5 if we can show that t0 < T − √ 5. We note that T ≥ 3 and thus T − 2 5 ≥ 1.5093. Since τ ≈ 1.2319 and t0 < τ we 2 3 3 can clearly see that t0 < T − 2 3 If T < 3 then it should be obvious that the queen cannot even be at the perimeter at the time t = 1. Thus, in this case, we take t0 = 1. 2(T + 1). √ Since the queen must leave the perimeter at the time t0 < τ, by Lemma 4.13, we know that the queen must be able to return to the perimeter and explore before the time t∗. We claim that this is not possible. Indeed, observe that the queen cannot return to the perimeter until the earliest time t > t0 at which θ(t) = 3(t−1)+y (where we have set y < τ−1 as the length of the arc θ(t) explored by the queen). Thus, in order for the queen to have returned to the perimeter before the time t∗ we must have θ(t∗) ≤ 3(t − 1) + y. However, since (cid:1) > 4 cos−1(cid:0)T3−t∗ T < T3 we have θ(t∗) = 4 cos−1(cid:0)T −t∗ (cid:17) = sin(cid:0)cos−1(cid:0)−2 sin(cid:16) 3(t∗−1)+(τ−1) (cid:1)(cid:1) = (cid:1). We note that T3 − t∗ = (cid:17) ≈ q 5 9 and thus θ(t∗) > 4 cos−1(cid:16)√ 4.7556. Since τ ≈ 1.2319, and t∗ ≈ 2.4564 we have 3(t∗−1)+ y ≤ 3(t∗−1)+(τ −1) ≈ 5 6 5. 2 2 4.6010. We can therefore see that it is not the case that θ(t∗) ≤ 3(t − 1) + y and thus the queen cannot have returned to the perimeter before the time t∗. We can finally conclude that the queen can only explore a subset of the perimeter of length t0 − 1 < τ − 1 before the time t∗. At this point the proof of Theorem 4.10 is trivial. Proof: (Theorem 4.10) Assume we have an algorithm with evacuation time T < T3. Then, by Lemma 4.13, the queen must explore a subset of the perimeter of length at least τ − 1 by the time t∗. However, by Lemma 4.14, the queen can only explore a subset of the perimeter of length y < τ − 1 if T < T3. We must therefore conclude that it is not possible for the queen to evacuate in time less than T3. 5 Conclusion We considered an evacuation problem concerning priority searching on the perimeter of a unit disk where only one robot (the queen) needs to find the exit. In addition to the queen, there are n ≤ 3 other robots (servants) aiding the queen by contributing to the exploration of the disk but which do not need to evacuate. We proposed evacuation algorithms and studied non-trivial tradeoffs on the queen evacuation time depending on the number n of servants. In addition to analyzing tradeoffs and improving the bounds obtained for the wireless communication model, an interesting open problem would be to investigate other models with limited communication range, e.g., face-to-face. References [1] R. Ahlswede and I. Wegener. Search problems. Wiley-Interscience, 1987. [2] S. Alpern and S. Gal. The theory of search games and rendezvous, volume 55. Kluwer Academic Publishers, 2002. [3] Steve Alpern, Robbert Fokkink, Leszek Gasieniec, Roy Lindelauf, and V.S. Subrah- manian, editors. Ten Open Problems in Rendezvous Search, pages 223–230. Springer NY, New York, NY, 2013. [4] R. Baeza Yates, J. Culberson, and G. Rawlins. Searching in the plane. Information and Computation, 106(2):234–252, 1993. [5] R. Baeza-Yates and R. Schott. Parallel searching in the plane. Computational Geom- etry, 5(3):143–154, 1995. [6] A. Beck. On the linear search problem. 1964. Israel J. of Mathematics, 2(4):221–228, [7] R. Bellman. An optimal search. SIAM Review, 5(3):274–274, 1963. 32 [8] S. Brandt, F. Laufenberg, Y. Lv, D. Stolz, and R. Wattenhofer. Collaboration without communication: Evacuating two robots from a disk. In Proceedings of Algorithms and Complexity - 10th International Conference, CIAC 2017, Athens, Greece, May 24-26, 2017, pages 104–115, 2017. [9] J. Czyzowicz, S. Dobrev, K. Georgiou, E. Kranakis, and F. MacQuarrie. Evacuating two robots from multiple unknown exits in a circle. Theor. Comput. Sci., 709:20–30, 2018. [10] J. Czyzowicz, L. Gasieniec, T. Gorry, E. Kranakis, R. Martin, and D. Pajak. Evacu- ating robots from an unknown exit located on the perimeter of a disc. In Proceedings DISC, Austin, Texas, pages 122–136. Springer, 2014. [11] J. Czyzowicz, K. Georgiou, M. Godon, E. Kranakis, D. Krizanc, W. Rytter, and M. Wlodarczyk. Evacuation from a disc in the presence of a faulty robot. In Pro- ceedings SIROCCO 2017, 19-22 June 2017, Porquerolles, France, pages 158–173, 2018. [12] J. Czyzowicz, K. Georgiou, R. Killick, E. Kranakis, D. Krizanc, L. Narayanan, J. Opatrny, and S. Shende. Priority evacuation from a disk using mobile robots, 2018, Submitted. [13] J. Czyzowicz, K. Georgiou, E. Kranakis, L. Narayanan, J. Opatrny, and B. Vogten- huber. Evacuating robots from a disk using face-to-face communication (extended abstract). In Proceedings of Algorithms and Complexity, CIAC 2015, Paris, France, May 20-22, 2015, pages 140–152, 2015. [14] J. Czyzowicz, E. Kranakis, D. Krizanc, L. Narayanan, J. Opatrny, and S. Shende. Wireless autonomous robot evacuation from equilateral triangles and squares. In Pro- ceedings of Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW, Athens, Greece, June 29 - July 1, 2015, pages 181–194, 2015. [15] I. Lamprou, R. Martin, and S. Schewe. Fast two-robot disk evacuation with wireless communication. In Proceedings DISC, Paris, France, pages 1–15, 2016. [16] D. Pattanayak, H. Ramesh, P.S. Mandal, and S. Schmid. Evacuating two robots from two unknown exits on the perimeter of a disk with wireless communication. In Proceedings of the 19th International Conference on Distributed Computing and Networking, ICDCN 2018, Varanasi, India, January 4-7, 2018, pages 20:1–20:4, 2018. [17] L. Stone. Theory of optimal search. Academic Press New York, 1975. 33
1801.00216
4
1801
2019-12-08T11:20:20
Emotion-Based Crowd Simulation Model Based on Physical Strength Consumption for Emergency Scenarios
[ "cs.MA" ]
Increasing attention is being given to the modeling and simulation of traffic flow and crowd movement, two phenomena that both deal with interactions between pedestrians and cars in many situations. In particular, crowd simulation is important for understanding mobility and transportation patterns. In this paper, we propose an emotion-based crowd simulation model integrating physical strength consumption. Inspired by the theory of "the devoted actor," the movements of each individual in our model are determined by modeling the influence of physical strength consumption and the emotion of panic. In particular, human physical strength consumption is computed using a physics-based numerical method. Inspired by the James-Lange theory, panic levels are estimated by means of an enhanced emotional contagion model that leverages the inherent relationship between physical strength consumption and panic. To the best of our knowledge, our model is the first method integrating physical strength consumption into an emotion-based crowd simulation model by exploiting the relationship between physical strength consumption and emotion. We highlight the performance on different scenarios and compare the resulting behaviors with real-world video sequences. Our approach can reliably predict changes in physical strength consumption and panic levels of individuals in an emergency situation.
cs.MA
cs
JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 1 Emotion-Based Crowd Simulation Model Based on Physical Strength Consumption for Emergency Scenarios Mingliang Xu, Chaochao Li, Pei Lv, Wei Chen, Zhigang Deng, Bing Zhou and Dinesh Manocha Abstract -- Increasing attention is being given to the modeling and simulation of traffic flow and crowd movement, two phenomena that both deal with interactions between pedestrians and cars in many situations. In particular, crowd simulation is important for understanding mobility and transportation patterns. In this paper, we propose an emotion-based crowd simulation model integrating physical strength consumption. Inspired by the theory of "the devoted actor," the movements of each individual in our model are determined by modeling the influence of physical strength consumption and the emotion of panic. In particular, human physical strength consumption is computed using a physics-based numerical method. Inspired by the James-Lange theory, panic levels are estimated by means of an enhanced emotional contagion model that leverages the inherent relationship between physical strength consumption and panic. To the best of our knowledge, our model is the first method integrating physical strength consumption into an emotion-based crowd simulation model by exploiting the relationship between physical strength consumption and emotion. We highlight the performance on different scenarios and compare the resulting behaviors with real-world video sequences. Our approach can reliably predict changes in physical strength consumption and panic levels of individuals in an emergency situation. Index Terms -- Pedestrian traffic simulation, crowd simulation, emotional contagion, James-Lange theory ! 1 INTRODUCTION E FFICIENT and accurate crowd simulation is useful for intelligent transportation systems since it can help im- prove emergency planning and prevent congestion in transit hubs such as train stations and airports [1]. One can also an- alyze human mobility through the trajectories obtained by crowd simulation models to get more knowledge of pedes- trian mobility behaviors in both qualitative and quantitative ways. Because of various complex factors, it is challenging to model realistic crowd behaviors in emergency scenarios. At a broad level, crowd behavior in emergencies is governed by panic and physical strength consumption [2]. The main purpose of crowd simulation algorithms is to model the movements (in terms of speed and direction) of individuals in a crowd [3]. We basically deal with two aspects of human motivations: physiological and psycho- logical factors. Physical strength consumption and emotion [4] are two representative physiological and psychological factors, respectively. Both have a great influence on individ- ual movements. These two factors influence each other and 310058. • Mingliang Xu, Chaochao Li, Pei Lv, and Bing Zhou are with Center for Interdisciplinary Information Science Research, Zhengzhou University, 450000. • Wei Chen is with State Key Lab of CAD&CG, Zhejiang University, • Zhigang Deng is with Department of Computer Science, University of • Dinesh Manocha is with Department of Computer Science and Electrical & Computer Engineering, University of Maryland, College Park, MD, USA. E-mail: {iexumingliang, ielvpei, iebzhou} @zzu.edu.cn; [email protected]; [email protected]; [email protected]; [email protected] Houston, Houston, TX, 77204-3010. evolve dynamically. It is important to describe the inher- ent relationship between these two factors, which is more obvious in emergency or evacuation situations [5]. Many approaches incorporate emotions of individuals in crowd simulations, making it one of the most commonly used psychological factors [6]. Panic can prevent an individual from taking proper actions in emergency situations [4]. Re- searchers have observed that external dangers can directly cause changes in panic levels in an individual, thereby further determining his or her movements [7]. We mainly focus on the emotion of panic in emergency situations. Most of the previous studies don't consider the effect of physical strength consumption on panic [8]. Physical strength is a person's or animal's ability to exert force on physical objects using muscles [9]. Physical strength consumption is defined as the energy expenditure [10] of a human, which directly affects that human's moving speed [11]. However, it is difficult to describe the inherent relationship between phys- ical strength consumption and panic and to then combine these factors to determine the movement of each individual [5]. Therefore, an emotion-based crowd simulation model integrating physical strength consumption is challenging due to the following reasons: (1) It is difficult to model the physical strength con- sumption of an individual in a crowd accurately [12]. This task involves considering many factors that are needed to quantify the influence of physical strength consumption on crowd movement [13]. (2) Accurately modeling an individual's panic level in a crowd is difficult because of its constant and dynamic changes [14]. Various factors such as physical strength con- sumption and individual movement affect panic levels. Inspired by the theory of "the devoted actor" [2], which JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 2 2.1 Simple crowd simulation models In this subsection, we summarize representative crowd simulation models that do not consider psychological or physiological factors [1], [15], [16], [17]. In the real world, many environmental factors influence an individual's movement, i.e. scene layout, moving pedes- trians, and stationary groups [18], [19], [20]. During the evacuation of a crowd, the behavioral choice of an individ- ual is highly dependent on the moving directions of nearby individuals, the hazard location, and obstacles [21]. Mous- said et al. [22] propose a cognitive science approach based on behavioral heuristics. Guided by visual information, pedestrians apply two simple cognitive procedures to adapt their moving directions and speed. Zhou et al. [23] propose a fuzzy logic approach to model and simulate pedestrian dynamic behaviors, which are based on human experiences and human knowledge, and perceptual information ob- tained from interactions with the surrounding environment. Zhou et al. [24] focus on the role of leaders who can guide the movements of passengers during the evacuation. Cassol et al. [25] focus on global path planning with the main goal of identifying the best evacuation routes for a specific population when leaving a certain building. To realize better behavioral choices, most approaches calculate the position of each individual at the next time step to obtain a conflict- free moving path in a global scenario [26]. However, these approaches are not applicable to highly complex scenes with dense crowds. Other approaches use local obstacle avoidance methods. Namely, once the movement state of an individual is determined, the movement states of other individuals are updated by using local collision avoidance techniques [27]. In practice, these approaches face many difficulties in terms of accurately controlling the individual movements. Researchers in this field are increasingly focusing on in- tegrating global path planning and local obstacle avoid- ance [28], [29]. Weiss et al. [30] model collision avoidance constraints both in terms of short and long-term ranges to deal with sparse and dense crowds. In [31], intergroup- and intragroup-level techniques are presented to perform coher- ent and collision-free navigation using reciprocal collision avoidance. Mutual information about the dynamic crowd is used to guide agents' movements by combining both macroscopic and microscopic controls [32]. By constructing a visual tree, the shortest path without collisions is obtained in [33]. In addition, in [34], [35], [36], and [37], path planning and navigation algorithms are described for crowd simula- tion in complex contexts. Furthermore, in [38], an effective long-range collision avoidance algorithm is proposed. In contrast to these works, our model enhances the tradi- tional social force model to avoid collisions with surround- ing individuals and obstacles by combining panic and phys- ical strength consumption calculations. Traditional crowd simulation models are not concerned with this approach. In our model, we mainly deal with moving directions and moving speeds, which are largely influenced by panic and physical strength consumption during a relatively short period of time. Fig. 1: The relationships among physical strength consump- tion, panic, and movement of individuals in a crowd. Phys- ical strength consumption is calculated according to the actual speed, mass, and moving time of individuals. The panic levels are determined by the location and physical strength consumption of the individual, and they further affect the individual's desired speed. Moreover, each indi- vidual's current panic level will affect his or her moving direction by changing the acceleration based on the inferred force. shows that an individual's physiological state has an effect on his or her psychological state, we propose the first (to the best of our knowledge) emotion-based crowd simulation model based on physical strength consumption (illustrated in Figure 1). The main contributions of our work include: • We introduce a physical strength consumption calcu- lation method based on how individuals work under the laws of physics and quantitively characterize their dynamic changes during the crowd movement. • We present a comprehensive emotion calculation method for physical strength consumption based on the James-Lange theory. Our new proposed model is used to derive the relationship between physical strength consumption and panic and examines how both of them govern the movement. The rest of this paper is organized as follows. Back- ground and related work are reviewed in Section 2. The definition of our proposed crowd simulation model is in- troduced in Section 3. Different benchmark scenarios and results are presented in Section 4. 2 RELATED WORK In this section, we provide a brief overview of prior work on crowd simulation. We divide the summaries based on whether the works involve physical, psychological, or phys- iological factors. JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 2.2 Crowd simulation with psychological factors The psychological state of an individual plays a vital role in his or her decision-making process [39], [40], [41]. Stress and panic are typical psychological factors and have a great influence on the movement of individuals in a crowd. In this subsection, we introduce representative works on them. In [14], authors focus on stress, which is defined as any change caused by interactions between the environment and individuals. Generally, stress is caused by a discrepancy be- tween environmental demands and the abilities of individ- uals. Stress can have positive effects on individual behavior. In emergency or evacuation situations, stress improves the performance of individuals [14]. It can be chronic and long- term [14]. However, stress and panic are inherently different. Panic is short-term and changeable [42] and usually leads to negative effects on individuals [43]. One of the most disastrous forms of collective human behavior is the kind of crowd stampede induced by panic, often leading to fatalities as people are crushed or trampled [7]. An individual's stress and panic are mirrored by others and they are disseminated within the crowd [6]. There are two separate lines of emotional contagion research: epidemiological-based and thermodynamics-based. The epidemiological SIR model [44] divides the individ- uals in a crowd into three categories: infected, susceptible, and recovered. At first this model is used to simulate the spread of rumor [45]. Then the epidemiological SIR model is used to describe emotion propagation. In [6], the epidemio- logical SIR model is combined with the OCEAN personality model [46]. The phenomenon of emotional contagion occurs more obviously in a panicked crowd. In [47], the cellular automata model is combined with the SIR model (CA-SIRS) to describe emotional contagion in an emergency situation. In [48], a qualitatively simulated approach is proposed to model emotional contagion process in a large-scale emer- gency evacuation siutation, which confirms that the effec- tiveness of rescue guidance is influenced by the leading emotion of the crowd. There is another kind of emotional contagion models based on thermodynamics [49]. Bosse et al. define emotional contagion within groups based on a multi-agent approach. They focuses mostly on emotions of groups rather than those of single individuals. Neto et al. [40] improve this model adapting it into BioCrowds and coping with emotional contagion within different groups of agents. Some researchers combine these two kinds of emotional contagion models to describe dynamic emotion propagation from the perspective of social psychology [50]. Because panic has a great influence on individual move- ment and often leads to serious consequences, we focus on panic in emergency situations. Inspired by the James-Lange theory in biological psychology, we improve the Durupinar model [6] by considering the influence of physical strength consumption on panic levels. In contrast to previous meth- ods considering only panic, we further demonstrate the relationship between physical strength consumption and panic. 2.3 Crowd simulation with physiological factors To complete a comprehensive analysis of crowd movement, we must consider not only psychological factors, but also 3 physiological factors of individuals as other important fac- tors in determining the crowd movement [11]. Physical strength is one of the most important physiolog- ical parameters that affects individual movement. Bruneau et al. [51] apply the principle of minimum energy (PME) on groups of different sizes and densities. In [10], [52], some physiological indicators (such as physical strength consumption and heart rate) are described. Furthermore, the relationship between physical strength consumption and heart rate is revealed, which is also a method for predicting physical strength consumption based on heart rate during moderate and vigorous exercise. Work in [11] shows that the relationship between physical strength consumption and speed is nonlinear. In [13], researchers investigate how the cumulative consumption of physical strength affects the evacuation time of individuals. Guy et al. [53] propose the principle of least effort (PLE) to compute the physical strength consumption required by various movements. Fur- thermore, Guy et al. [54] propose a less energy-consuming, conflict-free crowd movement method based on the criterion of minimal physical strength consumption [53]. These ap- proaches are focused on the relationship between physical strength and other physiological parameters (heart rate and oxygen uptake, for example) or individual movement. In [12], the authors choose four other basic physiological char- acteristics, including gender, age, health, and body shape, and map them to a navigation method. Inspired by prior approaches, we focus on physical strength consumption, which is a very important physio- logical factor. Physical strength consumption is central to research in human biology and biological anthropology [55] and is closely related to a variety of factors such as heart rate, oxygen consumption, etc. [52]. It directly affects the moving speed of an individual [13]. Other physiological factors (such as gender, age, health, and body shape) can influence movement through physical strength consump- tion. We analyze the relationship between physical strength consumption and panic. We also describe the effects of physical strength consumption on the physical movements of individuals. 3 OUR MODEL Our emotion-based crowd simulation model comprehen- sively considers physical strength consumption in emergen- cies to influence crowd movement. The flowchart of our model is presented in Figure 2. Strenuous movements are often observed in individuals in emergency or evacuation situations, and the relationship among them is more obvi- ous in such situations [56]. Therefore, we mainly focus on simulating crowd movements in such emergency situations. Our model consists of three important components: physical strength consumption, panic, and individual move- ment. Human physical strength consumption is computed with a physics-based method (Section 3.2). Panic levels are determined through an enhanced emotional contagion model that leverages the inherent relationship between physical strength consumption and panic (Section 3.3). Our model computes the movement of an individual by mod- eling the physical influence of strength consumption and panic (Section 3.4). JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 4 Fig. 2: The flowchart of our model. (a) Changes in the external environment can cause emotional fluctuations. For example, a hazard occurs and the red area represents the range of influence of the hazard. (b) The emotional changes of one individual are calculated according to the direct impact of the hazard and emotional contagion of his or her neighbors (Section 3.3). (c) The desired speed and direction of each individual are calculated based on an updated panic assessment (Section 3.4). (d) Using the limit of physical strength consumption, the actual speed is determined [11] (Section 3.4). (e) The calculation of physical strength consumption affected by the actual speed (Section 3.2). In contrast, the cumulative physical strength consumption also determines the actual maximal speed of the individual at the next timestep (Section 3.4). The current physical strength consumption reflects the emotional experience of an individual (Section 3.3). (f) The position of the individual is updated according to its actual speed. If the individual is panicked, we return to step (b); otherwise, the flowchart ends (Section 3.3). · di represents the distance of the individual at time t. F x i work done by the individual along the horizontal direction. F y is the pulling force of the individual along the vertical i is the rising direction. This force overcomes gravity. hi i · hi represents the height of the individual at time t, and F y work done by the individual along the vertical direction. is defined as According to the laws of physics, F x i follows: F x i = fi + i − vx (vx τ i−1)m 3.1 Symbols and notations For convenience, the important parameters and their de- scriptions used in our model are listed in Table 1. 3.2 Physical strength consumption calculation Physical strength consumption is one of the most commonly used physiological indicators and is closely related to indi- vidual movement. It is defined by the following equation: P (t) = Phor (t) + Pver (t) (1) where P (t) denotes the total physical strength consumption at time t and Phor (t), Pver (t) denote the physical strength consumption along the horizontal and the vertical direc- tions, respectively. They are defined as follows: t(cid:88) t(cid:88) i=1 Phor (t) = Pver (t) = · di F x i i · hi F y (2) (3) F x is the driving force of the individual along the horizontal i direction. This force overcomes friction. di is the moving i=1 A diagram of the physical strength consumption calculation is shown in Figure 3. The friction fi is defined in Equation 5, ki is defined in Equation 6, and ti is defined in Equation 7 according to [57], [58]. µ is the friction factor, which is related to the shoes and the ground. In our implementation, µ=0.58 is adopted, which is also recommended in [59]. vi is the current velocity magnitude, vmin is the minimal velocity magnitude, and vmax is the maximal velocity magnitude. fi = ti · µ · mg · ki (5) ki = 1.5 + 0.5 · ti = 0.6 − 0.2 · vi − vmin vmax − vmin vi − vmin vmax − vmin (4) (6) (7) JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 TABLE 1: The parameters used in our model. Notation Description P (t) Phor (t) Pver (t) F x F y E Eo Ep Eh o Ec o Vi (t) V s i (L, t) Physical strength consumption at time t Physical strength consumption along the horizontal direction at time t Physical strength consumption along the vertical direction at time t Driving force of individual along the horizontal direction Pulling force of individual along the vertical direc- tion Panic emotion Emotional cognitive component Emotional experience component The emotion affected by hazards Emotional contagion Moving direction of the individual i at time t Safety evacuation direction of the individual i at location L and at time t V round i vdesired i vactual i i i of the individual i con- of the individual i is lim- (t) Combined moving directions of individuals who are in the perceived range of the individual i at time t The desired speed vdesired siders only the emotion factor. The actual speed vactual ited by his own physical strength consumption. Maximum speed vp according to current physical strength consumption Maximum speed that the individual i can run Speed of the individual i in the normal case (emo- tion value is equal to zero) The radius of perceived range The number of individuals in a scene The radius of an individual vp vMAX i vNOR i PR Num Ra 5 Fig. 3: Schematic of the physical strength consumption cal- culation. vx i is the velocity component of an individual in the horizontal direction at time i, and the length of each time step is τ. The horizontal speed of the individual changes from vx i in time interval τ. i−1 to vx level of panic. The panic level E consists of two components. The first is the emotional cognitive component Eo, which relates to the hazard and encompasses emotional contagion. The second is the emotional experience component Ep, which is calculated using physical strength consumption and heart rate. Therefore, the final emotion value is defined as follows: E = w · Eo + (1 − w) · Ep (11) where w is a weighting parameter, and 0 < w < 1. 3.3.1 The emotional cognitive component In this section, we present the calculation method of Eo. Eo consists of three terms: effect from hazard Eh o , emotional contagion Ec o, and emotional attenuation Ed o . oEh Effect from hazard Eh oEh perceive a hazard, they may become panicked. Eh as follows [60]: o : When individuals are able to o is defined n−1(cid:88)  1√ 0 2π·rs Eh o (L, t) = Γs (L, t) s=0 − (L−Ls)2 2rs2 e if(cid:107) L − Ls(cid:107) < rs and t ∈ U otherwise (12) (13) where ki is the coefficient of the weight, ti is the time of the individual's foot touching the ground, ki ∝ vi, ti ∝−1 vi, fi ∝ ki, and fi ∝ ti. If one stands with both feet on a force plate, ti = ki = 1. The physical strength consumption in the horizontal direction is defined by: (cid:110)(cid:16) i )2 −(cid:0)vx i−1 (vx (cid:1)2(cid:17) t(cid:80) i=1 (cid:0)vx (cid:111) (cid:1) τ m + ti · µ · mg · ki i + vx i−1 2 · Phor (t) = 1 According to the laws of physics, F y i following equation: (8) is defined by the Γs (L, t) = F y i = mg + i − vy (vy τ i−1)m (9) i is the velocity component in the vertical direction where vy at time i. The physical strength consumption in the vertical direc- tion is defined by: 2 · Pver (t) = 1 (cid:110)(cid:16) i )2 −(cid:0)vy (vy i−1 (cid:1)2(cid:17) m +(cid:0)vy t(cid:80) i=1 (cid:111) (cid:1) mgτ i + vy i−1 (10) 3.3 Panic calculation considering physical strength consumption This section presents the calculation method for the panic level of an individual. E ∈ [0, 1] indicates the approximate where L is the location of an individual, Ls is the location of a hazard, rs is the radius of the influence range of the hazard, and U is the duration of the hazard. oEc oEc Effect from emotional contagion Ec o : There are two kinds of representative models of emotional contagion: the Neto model [40] and the Durupinar model [6]. They use fundamentally different mechanisms, but both can generate good results. However, the Neto model defines too many parameters for each pairwise interaction [61] and it is hard to compute these parameters automatically. Moreover, per- sonality is also a very important, long-term, stable psycho- logical factor and it is vital for simulating heterogeneous crowd behavior [6]. The Neto model simplifies the person- ality factor while the Durupinar model pays more attention JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 to that factor and is effective at capturing the differences between individuals. Personality is an important part of our model. We consider the effect of personality on panic. Ac- cording to the above analysis, the Durupinar model is more suitable. In the virtual scenario of Section 4.1, we implement a comparable experiment to verify our motivation. Next, we present the emotional contagion method in our model. During evacuation, individuals can be in one of two states: susceptible or infected. When the panic level of an individual exceeds a certain threshold T1, the individual will be infected. If the intensity of an individual's panic surpasses another threshold T2, then the individual can spread the panic to his or her neighbors. In a general case, T1 < T2. T1 and T2 are correlated with individual person- alities. Here we represent the personalities of individuals using the OCEAN personality model [6]. The personality of an individual is represented by a five-dimensional vector < O, C, E, A, N >. Each factor is randomly distributed with a Gaussian distribution N (0, 0.25) [6]. T1 ∝−1 N, T1 ∝ C [46]. T2 ∝−1 E [6], [46]. T1 and T2 are defined by the following: T1 = α · C − β · N + γ (14) where α = 0.1, β = 0.1, and γ = 0.15. T2 = δ − ξ · E (15) where δ = 0.35, and ξ = 0.1. These parameters are deter- mined according to the methods in [62], [63]. Within the perceived range, when a susceptible individ- ual i sees an expressive individual j (the panic value is higher than threshold T2), i gets exposed by receiving a random dose di from a specified probability distribution multiplied by the panic intensity of j. The dose values di are randomly distributed with a Gaussian distribution N (0.1, 0.01). We denote the panic value of individual j at time t(cid:48) as ej (t(cid:48)). The panic value of individual i due to emotional contagion is defined in Equation 16 [6]. t(cid:80) (cid:80) Ec i,o (L, t) = t(cid:48)=0 ∀jj∈Visibility(i)∧j is expressive di (t(cid:48)) ej (t(cid:48)) (16) oEd Effect from emotional attenuation Ed oEd o : Emotional at- tenuation is defined in Equation 17 [60]. o (L, t) = Eo (Lpre, t − 1) · η(t) Ed (17) where Ed o (L, t) is an emotion decay function and η(t) is the decay rate. η(t) is positively related to the individual personality factor N [6]. Inspired by [6], [13], it is defined as follows:  0 η (t) = eβ2 (t−t2)−eβ2(t−1−t2) where β2 = 0.1, η ∝ N, and α = 0.1. 1+eβ2 (t−t2) t < t1 + α · N t ≥ t1 (18) The change of the emotional cognitive component ∆Eo (L, t) is defined in Equation 19 [60]. The Eo is defined in Equation 20 [60]. ∆Eo (L, t) = Eh o (L, t) + Ec o (L, t) Eo (L, t) = Eo (Lpre, t − 1) + ∆Eo (L, t) o (L, t) − Ed (19) (20) 6 3.3.2 The emotional experience component In this section, we present the calculation method of Ep. Individual emotions undergo three stages: cognition, action, and experience. First, an event occurs, and the individual perceives the current scene (emotional cognitive stage). Sub- sequently, the individual acts in a way that corresponds with physiological changes (action stage). Finally, the individual has the emotional experience (experience stage) [5]. Under emergency situations, once a hazard occurs, the individuals around it immediately take different actions, requiring physical strength consumption. Physical strength consumption in one minute is chosen as the measure of physiological changes. The current heart rate is calculated using physical strength consumption. Then, the increment of the emotional experience value is calculated based on the heart rate increment. Thereafter, the current emotional ex- perience value Ep is obtained. The details of the calculation method are as follows. Equation 21 describes the relationship between physical strength consumption in a minute (KJ/min) and heart rate (beat/min) when individuals experience panic and attempt to escape from the hazard [52]. According to Equation 21, we can calculate the current heart rate (HR) based on physical strength consumption in a minute ((cid:52)P ). (cid:26)87.3306 + 1.5850∆P (t) − 0.3151weight − 0.3197age 45.6221 + 2.2361∆P (t) + 0.2824weight − 0.1655age gender = 1 gender = 0 (21) where gender=1 for males and 0 for females, age (year) ∈ [19,45], weight (kg) ∈ [47,116], ∆P (t) = P (t) − P (t − τ ), and τ = 60s . HR(t) = Furthermore, according to [64], heart rate (HR) and intensity of anxiety or fear (emotional experience) are pos- itively correlated. In [64], the heart rate per minute is recorded before and after an electric shock, and emotional experience is reported once per minute. (cid:52)Ep and (cid:52)HR are the increments of emotional experience and heart rate, respectively, compared with the values when individuals are not panicked. The (cid:52)HR is defined as follows: (cid:52)HR(t) = HR(t) − HR(0) (22) where HR(t) is the heart rate at time t and HR(0) is the heart rate when individuals are not panicked. relationship between (cid:52)HR and (cid:52)Ep. Using a linear curve fitting method, we can obtain the (cid:52) Ep(t) = 0.03669 · (cid:52)HR(t) − 0.0724 Ep is defined in Equation 24 and Ep (0) = 0. Ep (t) = Ep (t − 1) + ∆Ep (t) (23) (24) 3.4 Individual movement model Based on the results of physical strength consumption and panic, the movement of each individual can be determined accurately through moving direction and moving speed. 3.4.1 Moving direction When a hazard occurs, individuals who can perceive the hazard directly will be panicked and calculate their own safety evacuation directions V s (t) is the i (L, t) [60]. V round i JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 7 combined moving directions of individuals who are in the perceived range of the individual i. Γs (L, t) · → LsL if(cid:107) L − Ls(cid:107) < rs and t ∈ U n−1(cid:80) → s=0 V → V s i (L, t) = otherwise (cid:80) ∀jj∈Visibility(i)∧j is expressive Vj (t) (25) (26) V round i (t) = Finally, the moving direction Vi (t) of actual velocity of an individual who directly perceives the hazard is defined as follows: Vi (t) = E · V s i (L, t) + (1 − E) · V round i (t) (27) where E is the panic emotion value. The moving direction of an individual i is influenced by panic level, safety evacua- tion direction, and other neighboring panicked individuals. Individual i can perceive the hazard indirectly through the surrounding panicked individuals. The individual i moves in the direction of Vi (t), as shown in Equation 28. V old (t) is the moving direction of the individual i at the i last moment when he is not panicked. The more panicked the individual is, the more easily he moves with other neigh- boring panicked individuals. Nonetheless, if the individual i is not panicked, he or she still moves in his or her original direction. Vi (t) = (1 − E) · V old i (t) + E · V round i (t) (28) 3.4.2 Moving speed In a panic situation, the speed of an individual i is expressed by the following equation [7]: i = (1 − E) · vNOR i + E · vMAX vdesired i where vdesired is the speed considering only the emotion factor, and 0 ≤ E ≤ 1. The speed of an individual in the normal case (the panic value is equal to zero) is vNOR , and the maximal speed is vMAX . The more panicked an individual is, the faster his or her speed. (29) i i i However, an individual is limited by his or her own physical strength consumption. In some cases, the moving speed of an individual cannot reach the desired speed due to the maximum limit dictated by current physical strength consumption. The actual speed cannot exceed the maximal speed vp. = min(cid:0)vdesired , vp(cid:1) (30) vactual i i The dependence of the decay rate [13] and maximal speed on physical strength consumption is presented in Table 2. The actual speed can be calculated using Equation 31. = min(cid:0)(1 − E) · vNOR · ξ(cid:1) i + E · vMAX i , vMAX i (31) vactual i TABLE 2: Dependence of speed decay rate and maximal- limit speed on physical strength consumption. As the physi- cal strength consumption increases, the maximal-limit speed decreases. Physical strength consumption p (J) Decay rate ξ (%) Maximal-limit speed vp (m/s) 0.0000 -- 20154.0000 20154.0000 -- 40279.6713 40279.6713 -- 81121.0042 81121.0042 -- 166258.8920 166258.8920 -- 181569.6090 181569.6090 -- 196355.1760 100.0000 99.8500 89.4200 75.8000 69.8200 65.7200 vMAX i · 0.9985 · 0.8942 · 0.7580 · 0.6982 · 0.6572 vMAX i vMAX i vMAX i vMAX i vMAX i video begins with initial normal behavior and ends with se- quences of abnormal behavior. In addition, some real-world scenes (Figures 7, 9, and 10) are chosen from real emergency incidents to evaluate our model. The simulation results show that our proposed method can generate realistic group behaviors. It can also reliably predict the changes of physical strength consumption and panic levels of a crowd in an emergency. We also use our proposed model in different virtual scenarios, such as a subway station and a crosswalk. These scenes have dense crowds and the probability of hazard occurrence in these scenarios is high. We simulate the crowd movement in these scenarios after one hazard. We have implemented the proposed model using Visual C++ to simulate crowd movements in emergencies. The Unity3D game engine has been used to visualize our crowd simulation results. The computing platform corresponds a PC with a quadcore 2.50 GHz CPU,16 GB memory, and an Nvidia GeForce GTX 1080 Ti graphics card. The parameter values in different scenarios used in the simulation are listed in Table 3. The mass of each individual is set to 60kg on average and the radius to 0.3m (in Table 3) [66]. Each factor of the vector < O, C, E, A, N > is randomly distributed with a Gaussian distribution N (0, 0.25) [6]. In most scenes, the dose values di are randomly distributed with a Gaussian distribution N (0.1, 0.01) [6]. In the Neto model,  = 0.5, δ = 0.5, η = 0.5, and β = 1 [40]. The parameter values are obtained by comparing the simulations with real-world videos. A combination of genetic and greedy strategies are used to sample plausible parameters for our model, maximizing the match of the simulation algorithm to real data [63]. 4.1 Comparisons To validate our approach, we compare the simulation results obtained by different methods with real-world crowd evac- uation videos. The trend in the simulation results obtained by our model is that they are more similar to real-world videos than results from other approaches. 4 EXPERIMENTS Our proposed algorithm is used to simulate crowd move- ment in various scenarios and we demonstrate the benefits of it in these different scenarios. We evaluate our model on the public UMN dataset [65] (Figures 4). The dataset comprises the videos of 11 different scenarios of an es- cape event in 3 different indoor and outdoor scenes. Each 4.1.1 Comparisons with scenarios from public UMN dataset Comparisons between real scenes (chosen from the public UMN dataset [65]) and the corresponding simulation results are presented in Figure 4. We take two different real-world scenarios as examples, and detailed results can be seen in the supplementary video. Our model is compared with two JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 TABLE 3: List of parameter values used in our simulations di vNOR vMAX N(0.1,0.01) N(0.1,0.01) - N(0.1,0.01) N(0.1,0.01) - N(0.1,0.01) 2 2 2 2 2 2 2 0.8 0.8 0.8 0.8 0.8 0.8 0.8 size of scene 230*111 230*111 230*111 25.6*53.5 25.6*53.5 25.6*53.5 600*600 N(0.4,0.01) 2/2.5 0.8/1.2 600*600 N(0.1,0.01) [2,4.5] [0.8,1.2] 600*600  - - 0.5 - - 0.5 - - - δ - - 0.5 - - 0.5 - - - η - - 0.5 - - 0.5 - - - - [2,4.5] [0.8,1.2] 600*600 0.5 0.5 0.5 N(0.1,0.01) [2,4.5] [0.8,1.2] 600*600 - - - - [2,4.5] [0.8,1.2] 600*600 0.5 0.5 0.5 10 10 10 10 10 10 8 15 10 10 10 10 8 β - - 1 - - 1 - - - 1 - 1 Scenarios Grass Grass Grass Room Room Room phone explosion British Parliament building Virtual scenario Virtual scenario Virtual scenario Virtual Scenario Model Ours Durupinar Neto Ours Durupinar Neto Ours Num Ra T1 T2 PR 16 16 16 19 19 19 152 0.3 0.3 0.3 0.3 0.3 0.3 0.3 α 0.1 - - 0.1 - - 0.1 β 0.1 - - 0.1 - - 0.1 γ 0.15 - - C N N(0,0.25) N(0,0.25) - - - - δ 0.35 - - 0.15 N(0,0.25) N(0,0.25) 0.35 - - - - - - - - 0.15 N(0,0.25) N(0,0.25) 0.35 ξ 0.1 - - 0.1 - - 0.1 E N(0,0.25) - - N(0,0.25) - - N(0,0.25) Ours 37 0.3 0.1 0.1 0.15 N(0,0.25) N(0,0.25) 0.35 0.1 N(0,0.25) Ours Cube-Neto Durupinar Neto 300 300 300 300 0.3 0.3 0.3 0.3 0.1 0.1 0.15 N(0,0.25) N(0,0.25) 0.35 0.1 N(0,0.25) - - - - - - - - - - - - - - - - - - - - - - - - (a) (e) (b) (c) (d) (f) (g) (h) Fig. 4: Comparisons between real scenes and simulation results by different models: (a) and (e) are real-world videos, (b) and (f) are simulated by our model, (c) and (g) are simulated by the Durupinar model, (d) and (h) are simulated by the Neto model. Each row represents one scene. (a) The red ellipse is Individual No. 1 and the yellow one is Individual No. 2. Individual No. 1 gets closer to Individual No. 2. (b) As the speed is influenced by physical strength consumption, simulating the situation where Individual No. 1 gets closer to Individual No. 2 is easier using our model. In (g) and (h), the simulation trajectories of different individuals in the red circle by the Durupinar and Neto model are similar and individuals easily get together, which is different from the real-world video. other representative emotion models: the Durupinar model [6] and the Neto model [40]. We annotate the trajectories of all the individuals in the real-world video using the video annotation tool in [67] and assign initial movement states to these models. Therefore, we can predict the trajectories of these individuals and compare them with the actual ones. In the Grass scenario, Individual No. 1 moves faster than Individual No. 2, and Individual No. 1 moves closer to Individual No. 2 (Figure 4a). The simulation result obtained by our model in the Grass scenario is more realistic than those obtained by the Durupinar and Neto models because the speed is influenced by physical strength consumption in our model. If an individual has consumed more physical strength than other individuals, his moving speed decreases and other individuals move faster than he does. Thus, simulating the situation is easier when one individual gets closer to another individual. In the Room scenario, some individuals are marked with red circles in the simulation results obtained by the Durupinar and Neto models (Figures 4g and 4h). The mov- ing directions and moving speeds of these individuals are almost the same. The simulation result by our model con- JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 TABLE 4: Entropy metric and spatial distance for different simulation algorithms on scenarios of Grass and Room. A lower value implies higher similarity with respect to the real-world crowd videos. Scenario Model Entropy metric Spatial distance Grass Room Ours Durupinar Neto Ours Durupinar Neto 3.386800 3.429000 3.409700 5.393900 5.463200 5.493300 1.042990 1.105531 1.046776 1.481327 1.484492 1.527570 9 forms to the real-world video. This is because the emotion mechanism of our model changes the moving directions of individuals and drives them to move away from the hazard. Meanwhile, the physical strength consumption influences the individual's speed. We use the entropy metric [68] to evaluate the trajectories of different simulation algorithms on different scenarios. En- tropy metric is used to measure the similarity between real- world data and simulation results. A lower value of the en- tropy metric means a smaller error and better similarity with the real-world data. Its calculation method is described as follows. The real-world crowd state is denoted as (x1 . . . xt), which includes the positions of all the agents at different timesteps. (y1 . . . yt) is the corresponding calculation result of our model. M is the estimated error variance. (xk[j] − yk[j])(xk[j] − yk[j])T (32) t(cid:80) n(cid:80) t·n · M = 1 k=0 j=1 where t is the total number of timesteps and n is the number of agents in the scenario. The Entropy metric is given by: e(µ) = 1 2 n log((2πe)d det(M )) (33) where d is the dimension of the state of a single agent. In this paper, we mainly discuss the 2D locations of agents. So, d = 2 in this paper. For each scenario, a user study is performed. There are 39 participants (51.28% female, 66.67% in the age group of 20-30) in this study and participants are asked to compare the movement states in the original video clips with the movement states in the crowd simulation results (Figure 5). These similarity scores are computed from the user studies. A score of 1 indicates most dissimilar and a score of 5 indicates most similar movement. Higher values indicate greater similarity. We also calculate average spatial distance between the simulated results and the ground truth over all the timesteps and individuals. Tables 4 and Figure 5 show that the simulated moving trends of our model are closer to those in the real-world videos than the results of other models. A rational approach is to combine physical strength consumption and panic to determine the movement of each individual. 4.1.2 Comparisons with real-world emergency scenarios In this subsection, we compare the simulation results ob- tained by different methods with real-world videos, partic- ularly real emergency incidents. Fig. 5: Comparison of similarity scores for movement states (higher values indicate greater similarity). We compare the movement states in the original videos with those in crowd simulation results achieved by different algorithms. (a) (c) (e) (b) (d) (f) Fig. 6: Crowd simulation results generated by different models in the Square scenario at the 98th frame: (a) Real- world scenario, (b) Neto model, (c) Neto-PS model, (d) Du- rupinar model, (e) Durupinar-PS model, and (f) our model. The Durupinar and Neto models don't consider physical strength consumption. The mechanism of physical strength consumption in this paper is integrated into these two models, which are denoted as Durupinar-PS and Neto-PS. In the real-world Square scenario, we compare our simulation results with the Durupinar, Durupinar-PS, Neto, and Neto- PS models (Figure 6). We also compare our results in a real- world emergency scenario, which is related to terrorist at- tacks on Kenya's shopping mall (Figure 7). More details can be seen in the supplementary video. Figure 8 shows the av- erage speeds of all the individuals at different timesteps for JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 10 (a) (c) (e) (b) (d) (f) Fig. 7: Crowd simulation results by different models in the scenario of terrorist attacks on Kenya's shopping mall at the 214th frame: (a) Real-world scenario, (b) Neto model, (c) Neto-PS model, (d) Durupinar model, (e) Durupinar-PS model, and (f) our model. these different models. We find that the simulation results of the Durupinar-PS and Neto-PS are closer to the movements and behaviors in the real videos, than those of the original Durupinar and Neto models. These comparisons validate that our proposed mechanism of physical strength con- sumption (physical strength consumption calculation and the effect of physical strength consumption on emotion) can enhance the performance of existing crowd simulation models that are only based on emotion. Our model describes emotional changes in a comprehensive manner. Based on the James-Lange theory, we describe three stages individual emotions undergo (Section 3.3.2) and combine emotional contagion with the effect of physical strength consumption on panic. The comparisons with Durupinar-PS and Neto- PS models show that our model integrating emotion and physical strength consumption is better than other emotion- based crowd simulation models. One piece of real-world video including both crowd and vehicles is chosen to simulate by our method. In this real sce- nario, we compare our simulation result with the Durupinar, Durupinar-PS, Neto, and Neto-PS models. In this paper, we mainly focus on emotions of crowds, especially panic emo- tions in emergencies. In particular, the drivers can express their panic through vehicles. Moreover, in emergencies, the drivers may not follow the traffic rules. In emergency scenarios, some behaviors of vehicles, such as sudden ac- celeration, intuitively demonstrate the drivers' panic. These behaviors can also cause the surrounding pedestrians to be panicked and thus act indirectly as emotional contagions. In common cases, when pedestrians are walking in front of (a) (b) Fig. 8: The average speeds of all the individuals at differ- ent timesteps for these different models in (a) the Square scenario and (b) the scenario of terrorist attacks on Kenya's shopping mall. The average speeds of our model at different timesteps are closer to the real scene than those of other models. The average speeds of the Neto-PS and Durupinar- PS models at different timesteps are closer to the real-world scenarios, than those of the original Neto and Durupinar models. vehicles, vehicles will slow down, change direction, or stop to avoid pedestrians. Vehicles and surrounding pedestrians influence each other in such traffic. Based on above analysis, in our model we treat vehicles as one kind of special large- sized agents with full physical strength and high moving speed. The radius of the vehicles is set to 3. The compar- isons show that our simulation result conforms to the real- world video, and can enhance the performance of existing crowd simulations under the complex scenarios including both crowd and vehicles. More details can be seen in the supplementary video. Table 5 shows the values of entropy metric and spatial distance for the above three scenarios. Comparing with the Durupinar, Durupinar-PS, Neto, Neto-PS models, our model can generated more similar simulation results with real- world scenarios. We also take two real emergency incidents as exam- ples to verify our proposed crowd simulation method. Our crowd simulation results of the scene after the mobile phone explosion on the subway in the Shanghai Metro Line 8 are presented in Figures 10a and 10b. Crowd simulation by our JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 11 (a) (c) (e) (b) (d) (f) Fig. 9: Crowd simulation results by different models in the scenario including both crowd and vehicles at the 88th frame: (a) Real-world scenario, (b) Neto model, (c) Neto-PS model, (d) Durupinar model, (e) Durupinar-PS model, and (f) our model. TABLE 5: Entropy metric and spatial distance for different simulation algorithms on scenarios of Square, Crowd and vehicles, and Terrorist attacks on shopping mall. A lower value implies higher similarity with respect to the real- world data. Scenario Model Entropy metric Spatial distance Square Ours Durupinar Durupinar-PS Neto Neto-PS Ours Durupinar Crowd and vehicles Durupinar-PS Neto Neto-PS Ours Durupinar Durupinar-PS Neto Neto-PS Terrorist attacks on shopping mall 1.278777 3.292511 1.883470 3.415817 1.568437 3.740438 5.851273 5.785572 5.984731 5.768604 1.060493 5.782041 3.809553 5.783371 3.230872 0.210871 0.316492 0.238043 0.327066 0.220118 0.816685 2.402975 2.067541 2.346846 2.070267 0.225969 0.761416 0.405739 0.755286 0.382926 (a) (c) (b) (d) Fig. 10: Comparisons between real-world videos and sim- ulation results by our approach. (a) The mobile phone explosion incident on the subway in the Shanghai Metro Line 8; (c) the shooting incident at the British Parliament building on March 22, 2017; (b,d) our corresponding simu- lation results. At first, the individuals in the red circle aren't panicked. Because of emotional contagion, they are then influenced by the panicked crowd around them, become panicked, and run away from the hazards. TABLE 6: Entropy metric and spatial distance for different simulation algorithms on scenarios of Phone explosion and Shooting at British Parliament. Scenario Model Entropy metric Spatial distance Phone explosion Shooting at British Parliament Ours Durupinar Neto Ours Durupinar Neto 1.565650 4.826474 2.857793 0.842232 2.246331 1.626734 1.137298 1.523882 1.495380 0.749183 0.784255 0.771396 model of the shooting at the British Parliament building on March 22, 2017 is presented in Figures 10c and 10d. We show the spread of panic in both scenarios. The color of the cylinders represents the emotional intensity of the individuals. These two real-world videos have poor quality images. Even using manual methods, it is still difficult to track the positions of people in each frame accurately. Due to these objective limitations, we cannot measure the similarity between the simulated trajectories and the ground truth for these scenes in a direct way. Therefore, we use the dominant path and entropy metric to quantitively evaluate our simulation results. The dominant path is defined based on collectiveness of crowd movements and it can be treated as the movement trend of the crowd [69], [70]. We also calcu- late the spatial distance between the simulated trajectories and the ground truth for the scenarios. From Table 6 and Figure 11, we can see that both the overall moving trend and the process of emotional contagion are similar to what is found in the recorded real-world crowd video clips. 4.1.3 Comparisons in virtual scenarios In the virtual scenario, we compare our simulation results with those of the Durupinar [6], Neto [40], and Ours-Neto JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 12 in our simulation result are more variable than those shown in the Ours-Neto model. Therefore, the simulation result by our model is more suitable for emergency situations than other models. 4.2 Application of our model in various virtual scenar- ios Fig. 11: Comparison of similarity scores for movement states and the process of emotional contagion (higher values indicate greater similarity). A user study is performed and participants are asked to compare the movement states and processes of emotional contagion in the original videos with those in crowd simulation results achieved by different algorithms. (a) (c) (b) (d) Fig. 12: Crowd simulation results by different models in the virtual scenario at the 1000th frame: (a) Durupinar model, (b) Neto model, (c) Ours-Neto model, and (d) our model. models. The parameter values we used are described in Ta- ble 3. In Figure 12a (the simulation result by the Durupinar model), the speeds of individuals are variable and their locations are scattered. Because of different thresholds and personality mechanisms, the Durupinar model can simulate heterogeneous crowd behaviors. However, there are too many individuals who are not affected by the panicked crowd and this result is unreasonable. In Figure 12b, in- dividuals move much slower than the individuals in the simulation results by other models. The reason is that the emotion calculated by the Neto model is much smaller. Moreover, the individual movement is too regular, which is unsuitable for emergency situations. In Figure 12c (simula- tion result by our model with the same emotional contagion method as the Neto model) and Figure 12d (our simulation result), most of the individuals are affected by the hazard and run away from it. Because of physical strength con- sumption and personality factors, the speeds of individuals (a) (b) Fig. 13: Crowd simulation results at a subway station: (a) the higher level of the subway station, (b) the lower level of the subway station. After the hazard occurs, the emotional contagion in our model begins to work. Although the direct impact of the hazard is limited, the hazardous area grows through emotional contagion among individuals and the number of individuals who run away from the hazard increases. Our model can be applied in different virtual scenarios. Subway stations and crosswalks are crowded and the prob- ability of hazard occurrence in these scenarios is very high. We simulate a hazard occurring in these scenarios and three examples are shown. Figure 13(a) shows crowd simulation at the higher level of the subway station. Figure 13(b) shows crowd simulation at the lower level of the subway station. Figure 14 shows crowd simulation at a crosswalk. We show each step of the process: hazard occurring, individuals run- ning away from the hazard, emotional contagion spreading, and moving speed attenuating. More details can be seen in the supplementary video. Our simulation results provide information about decision-making to deal with emergency situations. The heat maps of panic in the virtual scene are presented in Figure 15. Although the direct impact of the hazard is limited, the panic area grows through the emotional con- tagion mechanism in our model. When individuals are far from the hazard, panic attenuates. As accidents may happen JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 13 panicked than those in the Durupinar model simulation re- sults. The intensity of the panic calculated by the Durupinar model is lower than that calculated by our model. The reason is that our model considers not only emotional con- tagion among individuals, but also the impact of physical strength consumption on panic levels. Our model represents a comprehensive description of individual panic levels and is more conducive to the spread of panic than the Durupinar model. Therefore, the simulation results by our model are more reasonable for emergency situations. 5 CONCLUSION AND LIMITATIONS In contrast to traditional emotion-based crowd simulation models, we integrate physical strength consumption into our model. We not only present a panic level calculation, but also delineate the effect of physical strength consumption on panic. Finally, both physical strength consumption and panic determine the movement of each individual. Our pro- posed model is verified by simulations, and it is compared with real-world videos and previous approaches. Results have shown that our proposed model can reliably generate realistic group behaviors. It can also predict the changes of physical strength consumption and panic of a crowd in an emergency situation. However, our model has several limitations. Although our model can generate realistic crowd movements, the panic levels and physical strength consumption of the crowd in an emergency scene cannot be obtained directly. Our model can only infer them during the simulation. Thus, the initial state of our model is difficult to determine and it is usually time consuming to do so. In the future, we plan to use the latest wearable equipment to collect these data and provide a new method that can quickly and accurately determine the initial state. Furthermore, at present, our model mainly focuses on emergency scenarios. In future work, we want to extend our model to a variety of general situations. We also plan to develop a coupled framework for crowd and traffic flow to generate realistic mixed traffic simulations and model the influence of these two flows on each other. REFERENCES [1] Y. Ma, T. Lin, Z. Cao, C. Li, F. Wang, and W. Chen, "Mobility viewer: An eulerian approach for studying urban crowd flow," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 9, pp. 2627 -- 2636, 2016. ´A. G´omez, L. L´opez-Rodr´ıguez, H. Sheikh, J. Ginges, L. Wilson, H. Waziri, A. V´azquez, R. Davis, and S. Atran, "The devoted ac- tor's will to fight and the spiritual dimension of human conflict," Nature Human Behaviour, vol. 1, pp. 673 -- 679, 2017. [2] [4] [3] M. Xu, Y. Wu, P. Lv, H. Jiang, M. Luo, and Y. Ye, "miSFM: On combination of mutual information and social force model towards simulating crowd evacuation," Neurocomputing, vol. 168, pp. 529 -- 537, 2015. J. Chun, H. Lee, Y. S. Park, W. Park, J. Park, S. H. Han, S. Choi, and G. J. Kim, "Real-time classification of fear/panic emotion based on physiological signals." in Proc. The Eighth Pan-Pacific Conference on Occupational Ergonomics, 2007, pp. 1 -- 9. J. W. Kalat, Biological Psychology (10th ed.). Cengage Learning, 2007. [6] F. Durupınar, U. G ud ukbay, A. Aman, and N. I. Badler, "Psy- chological parameters for crowd simulation: From audiences to mobs," IEEE Transactions on Visualization and Computer Graphics, vol. 22, no. 9, pp. 2145 -- 2159, 2016. [5] Fig. 14: Crowd simulation result at a crosswalk. At the lower left corner, a car explodes. Then individuals run away from the hazard. randomly in public places, we can take preventive action in advance and reduce loss by accurately predicting the panic area. (a) (c) (b) (d) Fig. 15: Panic heat maps of the virtual scene: (a) heat map at the 13th frame, (b) heat map at the 29th frame, (c) heat map at the 57th frame, (d) heat map at the 120th frame. The red area is more panicked than the green area in the heat map. The deeper the color, the more panicked the area. (a) (b) Fig. 16: The heat maps of panic at the 185th frame of the crosswalk scenario: (a) heat map of the crowd simulation generated by our model and (b) heat map of the crowd sim- ulation generated using the Durupinar model. The red area is more panicked than the green area in the heat map. The deeper the color, the more panicked the area. We highlight the same area of the two simulation results. The individuals in our model simulation result are more panicked than the individuals in the Durupinar model simulation results. The panic heat maps generated from crowd simulations in the crosswalk scenario by our model and those generated using the Durupinar model are presented in Figure 16. The individuals in the simulation results by our model are more JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 14 [7] D. Helbing, I. Farkas, and T. Vicsek, "Simulating dynamical fea- tures of escape panic," Nature, vol. 407, no. 6803, pp. 487 -- 490, 2000. [8] Y. Li, M. Christie, O. Siret, and R. Kulpa, "Cloning crowd mo- tions," in Proc. ACM SIGGRAPH/Eurographics Symp. Comput. Ani- mation, 2012, pp. 201 -- 210. J. M. Frederic P. Miller, Agnes F. Vandome, Physical Strength. Alphascript Publishing, 2011. [9] [10] W. R. Leonard, "Measuring human energy expenditure: What have we learned from the flex-heart rate method?" American Journal of Human Biology, vol. 15, no. 4, pp. 479 -- 489, 2003. [11] D. M. Buchner, E. B. Larson, E. H. Wagner, T. D. Koepsell, and B. J. De Lateur, "Evidence for a non-linear relationship between leg strength and gait speed," Age and Ageing, vol. 25, no. 5, pp. 386 -- 391, 1996. [12] L. Zheng, D. Qin, Y. Cheng, L. Wang, and L. Li, "Simulating heterogeneous crowds from a physiological perspective," Neuro- computing, vol. 172, no. C, pp. 180 -- 188, 2012. [13] J. Koo, B. I. Kim, and Y. S. Kim, "Estimating the effects of mental disorientation and physical fatigue in a semi-panic evacuation," Expert Systems with Applications, vol. 41, no. 5, pp. 2379 -- 2390, 2014. [14] S. Kim, S. J. Guy, D. Manocha, and M. C. Lin, "Interactive simulation of dynamic crowd behaviors using general adaptation syndrome theory," in Proc. Symp. Interactive 3D Graphics and Games, 2012, pp. 55 -- 62. [15] S. Kim, A. Bera, A. Best, R. Chabra, and D. Manocha, "Interactive and adaptive data-driven crowd simulation," in Proc. IEEE Virtual Reality Conf., Mar. 2016, pp. 29 -- 38. [16] H. L. Kang, M. G. Choi, Q. Hong, and J. Lee, "Group behavior from video:a data-driven approach to crowd simulation," in Proc. ACM SIGGRAPH/Eurographics Symp. Comput. Animation, 2007, pp. 109 -- 118. [17] I. Karamouzas, N. Sohre, R. Narain, and S. J. Guy, "Implicit crowds: optimization integrator for robust crowd simulation," ACM Transactions on Graphics, vol. 36, no. 4, pp. 1 -- 13, 2017. [18] S. Yi, H. Li, and X. Wang, "Pedestrian behavior modeling from stationary crowds with applications to intelligent surveillance," IEEE Transactions on Image Processing, vol. 25, no. 9, pp. 4354 -- 4368, 2016. [19] T. Feng, L. F. Yu, S. K. Yeung, K. K. Yin, and K. Zhou, "Crowd- driven mid-scale layout design," ACM Transactions on Graphics, vol. 35, no. 4, pp. 132 -- 145, 2016. [20] M. S. Kaiser, K. T. Lwin, M. Mahmud, D. Hajializadeh, T. Chaip- imonplin, A. Sarhan, and M. A. Hossain, "Advances in crowd analysis for urban applications through urban event detection," IEEE Transactions on Intelligent Transportation Systems, vol. PP, no. 99, pp. 1 -- 21, 2017. [21] N. M. Joseph, N. M. Joseph, N. M. Joseph, N. M. Joseph, N. M. Joseph, and N. M. Joseph, "Zootopia crowd pipeline," in Proc. ACM SIGGRAPH, 2016, pp. 59:1 -- 59:2. [22] M. Moussaid, D. Helbing, and G. Theraulaz, "How simple rules determine pedestrian behavior and crowd disasters," Proceedings of the National Academy of Sciences of the United States of America, vol. 108, pp. 6884 -- 8, 04 2011. [23] M. Zhou, H. Dong, F. Y. Wang, Q. Wang, and X. Yang, "Modeling and simulation of pedestrian dynamical behavior based on a fuzzy logic approach," Information Sciences, vol. 360, pp. 112 -- 130, 2016. [24] M. Zhou, H. Dong, Y. Zhao, P. A. Ioannou, and F. Y. Wang, "Opti- mization of crowd evacuation with leaders in urban rail transit stations," IEEE Transactions on Intelligent Transportation Systems, vol. PP, no. 99, pp. 1 -- 12, 2019. [25] V. J. Cassol, E. S. Testa, C. R. Jung, M. Usman, P. Faloutsos, G. Berseth, M. Kapadia, N. I. Badler, and S. R. Musse, "Evalu- ating and optimizing evacuation plans for crowd egress," IEEE Computer Graphics & Applications, vol. 37, no. 4, pp. 60 -- 71, 2017. [26] M. Zucker, J. Kuffner, and M. Branicky, "Multipartite RRTs for rapid replanning in dynamic environments," in Proc. IEEE Conf. Robotics and Automation, 2007, pp. 1603 -- 1609. [27] B. Kluge and E. Prassler, "Reflective navigation: Individual be- haviors and group behaviors," in Proc. IEEE Conf. Robotics and Automation, 2004, pp. 4172 -- 4177. [28] H. Wang, J. Ondrej, and C. OSullivan, "Trending paths: A new semantic-level metric for comparing simulated and real crowd data," IEEE Transactions on Visualization and Computer Graphics, vol. 23, no. 5, pp. 1454 -- 1464, 2017. [29] M. Zhou, H. Dong, D. Wen, X. Yao, and X. Sun, "Modeling of crowd evacuation with assailants via a fuzzy logic approach," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 9, pp. 2395 -- 2407, 2016. [30] T. Weiss, A. Litteneker, C. Jiang, and D. Terzopoulos, "Position- based multi-agent dynamics for real-time crowd simulation," in Proc. ACM SIGGRAPH/Eurographics Symp. Comput. Animation, 2017, pp. 27:1 -- 27:2. [31] L. He, J. Pan, S. Narang, and D. Manocha, "Dynamic group behaviors for interactive crowd simulation," in Proc. ACM SIG- GRAPH/Eurographics Symp. Comput. Animation, 2016, pp. 139 -- 147. [32] M. Xu, Y. Wu, Y. Ye, I. Farkas, H. Jiang, and Z. Deng, "Collective crowd formation transform with mutual informationcbased run- time feedback," Computer Graphics Forum, vol. 34, no. 1, pp. 60 -- 73, 2015. [33] F. Belkhouche, "Reactive path planning in a dynamic environ- ment," IEEE Transactions on Robotics, vol. 25, no. 4, pp. 902 -- 911, 2009. [34] S. Patil, J. Van Den Berg, S. Curtis, M. C. Lin, and D. Manocha, "Directing crowd simulations using navigation fields," IEEE Trans- actions on Visualization and Computer Graphics, vol. 17, no. 2, pp. 244 -- 254, 2011. [35] R. Kulpa, A. Olivierxs, J. Ondrej, and J. Pettr´e, "Imperceptible relaxation of collision avoidance constraints in virtual crowds," ACM Transactions on Graphics, vol. 30, no. 6, pp. 138:1 -- 138:10, 2011. J. Guy, M. C. Lin, and D. Manocha, "Interactive navigation of heterogeneous agents us- ing adaptive roadmaps," IEEE Transactions on Visualization and Computer Graphics, vol. 15, no. 1, pp. 34 -- 48, 2009. [36] R. Gayle, A. Sud, E. Andersen, S. [37] A. Sud, E. Andersen, S. Curtis, M. C. Lin, and D. Manocha, "Real-time path planning in dynamic virtual environments using multiagent navigation graphs," IEEE Transactions on Visualization and Computer Graphics, vol. 14, no. 3, pp. 526 -- 538, 2008. [38] A. Golas, R. Narain, S. Curtis, and M. C. Lin, "Hybrid long-range collision avoidance for crowd simulation," IEEE Transactions on Visualization and Computer Graphics, vol. 20, no. 7, pp. 1022 -- 1034, 2014. [39] M. Xu, Z. Pan, M. Zhang, P. Lv, P. Zhu, Y. Ye, and W. Song, "Character behavior planning and visual simulation in virtual 3d space," IEEE Multimedia, vol. 20, no. 1, pp. 49 -- 59, 2013. [40] A. B. F. Neto, C. Pelachaud, and S. R. Musse, "Giving emotional contagion ability to virtual agents in crowds," in Proc. Intelligent Virtual Agents, 2017, pp. 63 -- 72. [41] H. Jiang, Z. Deng, M. Xu, X. He, T. Mao, and Z. Wang, "An emotion evolution based model for collective behavior simulation," in Proc. Symp. Interactive 3D Graphics and Games, 2018, pp. 10:1 -- 10:6. [42] A. Ortony, G. L. Clore, and A. Collins, "The cognitive structure of emotions." Contemporary Sociology, vol. 18, no. 6, pp. 2147 -- 2153, 1988. [43] L. Berkowitz, "On the formation and regulation of anger and aggression: A cognitive-neoassociationistic analysis." American Psychologist, vol. 45, no. 4, p. 494, 1990. [44] W. O. Kermack and A. G. McKendrick, "Contributions to the mathematical theory of epidemics. III. further studies of the prob- lem of endemicity," Proc. the Royal Society of London. Series A, vol. 141, no. 843, pp. 94 -- 122, 1933. [45] L. Zhao, H. Cui, X. Qiu, X. Wang, and J. Wang, "SIR rumor spreading model in the new media age," Physica A: Statistical Mechanics and its Applications, vol. 392, no. 4, pp. 995 -- 1003, 2013. [46] F. Durupinar, N. Pelechano, J. Allbeck, U. Gudukbay, and N. I. Badler, "How the ocean personality model affects the perception of crowds," IEEE Computer Graphics and Applications, vol. 31, no. 3, pp. 22 -- 31, 2011. [47] L. Fu, W. Song, W. Lv, and S. Lo, "Simulation of emotional conta- gion using modified SIR model: a cellular automaton approach," Physica A: Statistical Mechanics and its Applications, vol. 405, pp. 380 -- 391, 2014. [48] J. H. Wang, S. M. Lo, J. H. Sun, Q. S. Wang, and H. L. Mu, "Qual- itative simulation of the panic spread in large-scale evacuation," Simulation, vol. 88, no. 12, pp. 1465 -- 1474, 2012. [49] T. Bosse, R. Duell, Z. A. Memon, J. Treur, and C. N. V. D. Wal, "A multi-agent model for mutual absorption of emotions," in Proc. 23th EuropeanConf. Mod. and Sim., 2009. [50] J. Tsai, E. Bowring, S. Marsella, and M. Tambe, "Empirical eval- uation of computational fear contagion models in crowd disper- sions," Autonomous Agents and Multi-agent Systems, vol. 27, no. 2, pp. 200 -- 217, 2013. [51] J. Bruneau, A.-H. Olivier, and J. Pettre, "Going through, going around: A study on individual avoidance of groups," IEEE Trans- JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 15 actions on Visualization and Computer Graphics, vol. 21, no. 4, pp. 520 -- 528, 2015. [52] L. Keytel, J. Goedecke, T. Noakes, H. Hiiloskorpi, R. Laukkanen, L. van der Merwe, and E. Lambert, "Prediction of energy expen- diture from heart rate monitoring during submaximal exercise," Journal of Sports Sciences, vol. 23, no. 3, pp. 289 -- 297, 2005. [53] S. J. Guy, J. Chhugani, S. Curtis, P. Dubey, M. Lin, and D. Manocha, "PLEdestrians: a least-effort approach to crowd simulation," in Proc. ACM SIGGRAPH/Eurographics Symp. Comput. Animation, 2010, pp. 119 -- 128. [54] S. J. Guy, J. Chhugani, C. Kim, N. Satish, M. Lin, D. Manocha, and P. Dubey, "Clearpath: highly parallel collision avoidance for multi- agent simulation," in Proc. ACM SIGGRAPH/Eurographics Symp. Comput. Animation, 2009, pp. 177 -- 187. [55] S. J. Ulijaszek, "Human energetics in biological anthropology," American Journal of Human Biology, vol. 8, no. 5, pp. 682 -- 683, 2010. [56] J. E. Almeida, R. J. Rossetti, F. Aguiar, and E. Oliveira, "Chapter 8 - crowd simulation applied to emergency and evacuation scenar- ios," in Advances in Artificial Transportation Systems and Simulation, R. J. Rossetti and R. Liu, Eds. Boston: Academic Press, 2015, pp. 149 -- 161. [57] J. Nilsson and A. Thorstensson, "Ground reaction forces at differ- ent speeds of human walking and running," Acta Physiologica, vol. 136, no. 2, pp. 217 -- 227, 1989. [58] R. Cross, "Standing, walking, running, and jumping on a force plate," American Journal of Physics, vol. 67, no. 4, pp. 304 -- 309, 1999. [59] J. M. Burnfield, Y. J. Tsai, and C. M. Powers, "Comparison of utilized coefficient of friction during different walking tasks in persons with and without a disability," Gait & Posture, vol. 22, no. 1, pp. 82 -- 88, 2005. [60] M. Xu, X. Xie, P. Lv, J. Niu, H. Wang, C. Li, R. Zhu, Z. Deng, and B. Zhou, "Crowd behavior simulation with emotional contagion in unexpected multi-hazard situations," IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp. 1 -- 15, 2019. [61] J. Tsai, E. Bowring, S. Marsella, and M. Tambe, "Empirical eval- uation of computational emotional contagion models," in Proc. Intelligent Virtual Agents, 2011, pp. 384 -- 397. [62] A. E. Basak, U. Gudukbay, and F. Durupinar, "Using real life incidents for realistic virtual crowds with data-driven emotion contagion," Computers & Graphics, vol. 72, 2018. [63] D. Wolinski, S. J. Guy, A. H. Olivier, M. Lin, and D. Manocha, "Parameter estimation and comparative evaluation of crowd sim- ulations," Computer Graphics Forum, vol. 33, no. 2, pp. 303 -- 312, 2014. [64] H. M. Petry and O. Desiderato, "Changes in heart rate, muscle ac- tivity, and anxiety level following shock threat," Psychophysiology, vol. 15, no. 5, pp. 398 -- 402, 1978. [65] R. Mehran, A. Oyama, and M. Shah, "Abnormal crowd behavior detection using social force model," in Proc. IEEE Conf. Comput. Vis. Pattern Recognit, 2009, pp. 935 -- 942. [66] M. Zhou, H. Dong, Y. Zhao, P. A. Ioannou, and F. Y. Wang, "Opti- mization of crowd evacuation with leaders in urban rail transit stations," IEEE Transactions on Intelligent Transportation Systems, vol. PP, no. 99, pp. 1 -- 12, 2019. [67] C. Vondrick, D. Patterson, and D. Ramanan, "Efficiently scaling up crowdsourced video annotation," Int. J. Comput. Vision, vol. 101, no. 1, pp. 184 -- 204, 2013. [68] S. J. Guy, J. V. D. Berg, W. Liu, R. Lau, M. C. Lin, and D. Manocha, "A statistical similarity measure for aggregate crowd dynamics," ACM Transactions on Graphics, vol. 31, no. 6, pp. 1 -- 11, 2012. [69] M. Xu, C. Li, P. Lv, N. Lin, R. Hou, and B. Zhou, "An efficient method of crowd aggregation computation in public areas," IEEE Transactions on Circuits & Systems for Video Technology, vol. PP, no. 99, pp. 1 -- 12, 2017. [70] C. Li, P. Lv, D. Manocha, H. Wang, Y. Li, B. Zhou, and M. Xu, "Acsee: Antagonistic crowd simulation model with emotional contagion and evolutionary game theory," IEEE Transactions on Affective Computing, pp. 1 -- 1, 2019. Mingliang Xu received the Ph.D. degree in com- puter science and technology from the State Key Laboratory of CAD&CG, Zhejiang Univer- sity, Hangzhou, China. He is a Full Professor with the School of Information Engineering, Zhengzhou University, Zhengzhou, China, where he is currently the Director of the Center for Interdisciplinary Infor- mation Science Research. He was with the De- partment of Information Science, National Natu- ral Science Foundation of China, Beijing, China, from 2015 to 2016. His current research interests include computer graphics, multimedia, and artificial intelligence. He has authored over 60 journal and conference papers in the above areas, including the ACM Transactions on Graphics, ACM Transactions on Intelligent Systems and Technology, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, IEEE TRANSACTIONS ON IMAGE PRO- CESSING, IEEE TRANSACTIONS ON CYBERNETICS, IEEE TRANS- ACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, ACM SIGGRAPH (Asia), ACM MM, and ICCV. Dr. Xu is the Vice General Secretary of ACM SIGAI China. Chaochao Li received the B.S. degree in com- puter science and technology and the mas- ter's degree in computer application technol- ogy from the School of Information Engineer- ing, Zhengzhou University, Zhengzhou, China, where he is currently pursuing the Ph.D. degree. His current research interests include computer graphics and computer vision. Pei Lv received the Ph.D. degree from the State Key Laboratory of CAD&CG, Zhejiang Univer- sity, Hangzhou, China, in 2013. He is currently an Associate Professor with the School of Information Engineering, Zhengzhou University, Zhengzhou, China. His current re- search interests include video analysis and crowd simulation. He has authored over 20 jour- nal and conference papers in the above ar- eas, including the IEEE TRANSACTIONS ON IMAGE PROCESSING, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, and ACM Multimedia. Wei Chen is a professor at the State Key Lab of CAD&CG, Zhejiang University. His research interests are visualization and visual analysis, and he has published more than 30 IEEE/ACM Transactions and IEEE VIS papers. He ac- tively served as guest or associate editors of IEEE Transactions on Visualization and Com- puter Graphics, IEEE Transactions on Intelligent Transportation Systems, and Journal of Visu- alization. For more information, please refer to http://www.cad.zju.edu.cn/home/chenwei/. 16 JOURNAL OF LATEX CLASS FILES, VOL. X, NO. X, OCTOBER 2018 Zhigang Deng is a Full Professor of Computer Science at University of Houston (UH). He is also the Director of Graduate Studies at UH's Com- puter Science Department and the Founding Di- rector of the UH Computer Graphics and Inter- active Media (CGIM) Lab. He earned a Ph.D. in Computer Science at the Integrated Media Sys- tem Center (NSF ERC) and the Department of Computer Science at the University of Southern California in 2006. He completed a B.S. degree in Mathematics from Xiamen University (China), and an M.S. in Computer Science from Peking University (China).His interests are in the broad areas of computer graphics, computer ani- mation, human computer interaction, virtual human modeling and ani- mation, and visual computing for biomedical/healthcare informatics. He is the recipient of ACM ICMI Ten Year Technical Impact Award, UH Teaching Excellence Award, Google Faculty Research Award, UHCS Faculty Academic Excellence Award, and NSFC Overseas and Hong Kong/Macau Young Scholars Collaborative Research Award. Besides being the CASA 2014 conference general co-chair and the SCA 2015 conference general co-chair, he currently serves as an Associate Editor of several journals including Computer Graphics Forum and Computer Animation and Virtual Worlds Journal. Bing Zhou received B.S. and M.S. degrees from Xi'an Jiaotong University, Xi'an, China, in 1986 and 1989, respectively, and a Ph.D. from Bei- hang University, Beijing, China, in 2003, all in computer science. He is currently a Professor with the School of Information Engineering, Zhengzhou University, Zhengzhou, China. His current research inter- ests include video processing and understand- ing, surveillance, computer vision, and multime- dia applications. Dinesh Manocha is the Paul Chrisman Iribe Chair in Computer Science & Electrical and Computer Engineering at the University of Mary- land College Park. He is also the Phi Delta Theta/Matthew Mason Distinguished Professor Emeritus of Computer Science at the Univer- sity of North Carolina - Chapel Hill. He has won many awards, including Alfred P. Sloan Re- search Fellow, the NSF Career Award, the ONR Young Investigator Award, and the Hettleman Prize for scholarly achievement. His research in- terests include multi-agent simulation, virtual environments, physically- based modeling, and robotics. His group has developed a number of packages for multi-agent simulation, crowd simulation, and physics- based simulation that have been used by hundreds of thousands of users and licensed to more than 60 commercial vendors. He has published more than 500 papers and supervised more than 35 PhD dissertations. He is an inventor of 9 patents, several of which have been licensed to industry. His work has been covered by the New York Times, NPR, Boston Globe, Washington Post, ZDNet, as well as DARPA Legacy Press Release. He is a Fellow of AAAI, AAAS, ACM, and IEEE and also received the Distinguished Alumni Award from IIT Delhi. He was a co-founder of Impulsonic, a developer of physics-based audio simulation technologies, which was acquired by Valve Inc. See http://www.cs.umd.edu/∼dm
0902.4098
1
0902
2009-02-24T09:35:26
Coordination in multiagent systems and Laplacian spectra of digraphs
[ "cs.MA", "cs.DM", "math.CO", "math.OC" ]
Constructing and studying distributed control systems requires the analysis of the Laplacian spectra and the forest structure of directed graphs. In this paper, we present some basic results of this analysis partially obtained by the present authors. We also discuss the application of these results to decentralized control and touch upon some problems of spectral graph theory.
cs.MA
cs
ISSN 0005-1179, Automation and Remote Control, 2009, Vol. 70, No. 3, p. 128. c(cid:13) Pleiades Publishing, Ltd., 2009. Original Russian Text c(cid:13) P.Yu. Chebotarev and R.P. Agaev, 2009, published in Avtomatika i Telemekhanika, 2009, No. 3, pp. 136 -- 151. DETERMINATE SYSTEMS Coordination in multiagent systems and Laplacian spectra of digraphs P. Yu. Chebotarev and R. P. Agaev Trapeznikov Institute of Control Sciences, Moscow, Russia Received July 21, 2008 Abstract -- Constructing and studying distributed control systems requires the analysis of the Laplacian spectra and the forest structure of directed graphs. In this paper, we present some basic results of this analysis partially obtained by the present authors. We also discuss the application of these results published earlier to decentralized control and touch upon some problems of spectral graph theory. PACS numbers: 87.19.lr, 02.10.Yn 1. INTRODUCTION In the cooperative control of distributed multiagent systems, the generation of control actions is decentralized. The actions result from negotiations between agents. As a metaphor, we can remember [1] that the musicians of "Persimfans"1, which existed in Moscow between 1922 and 1932, performed extremely complex musical compositions without a conductor. The string section formed a full circle (partly with their backs to the audience), while the wind section was situated inside of that circle. Every musician not only heard, but was also able to see the others. This way the magic chemistry among the performers, harmony and dynamic coordination between all the participants brought such a synchronization, that it became the substitute of the role of the conductor. Amazingly, one of the Persimfans' distinguishing features was their ability, according to the testimony of the extremely demanding and tough critics, to maintain a particularly subtle and profoundly individual approach to the interpretation of musical pieces, normally unthinkable without the help of the conductor. The theory of decentralized control has a long history. In addition to the works discussed in [1], one can remember the theory of statistical consensus by DeGroot [2], methods of step- by-step coordination of expert judgements, such as Delphi methodology developed at the RAND Corporation in the 1950s [3], works on distributed networked computations and distributed decision- making [4, 5] and, of course, modeling the collective behavior of animals (see, e. g., [6]). Starting from 2003 (approximately) we can observe an avalanche of publications on decentralized control connected with the application of spectral graph theory in this field. In this paper, we discuss continuous and discrete models of distributed coordination which can be considered as basic models of decentralized control. It is shown how the recent advantages in the algebraic graph theory (including some results published by the present authors before the "boom" imploded in 2003) can be applied in this area. 1 Abbreviation for Perviy Simfonicheskiy Ansambl' (First Symphony Ensemble). 128 MULTIAGENT SYSTEMS AND LAPLACIAN SPECTRA 2. A CONTINUOUS MODEL OF DISTRIBUTED CONSENSUS Consider the basic continuous distributed consensus algorithm: xi(t) = − nXj=1 aij(t) (xi(t) − xj(t)) , i = 1, . . . , n. 129 (1) Here, n is the number of agents, xi(t) is an information state (characteristic, parameter, etc.) of the ith agent, aij(t) ≥ 0 is the weight with which agent i takes into account the discrepancy in the information state with agent j. The information states can be, among others, positions (if the agents need to rendezvous in space), velocities (if they execute decentralized formation maneuvers), arrival times (if these must be synchronized), and so on. Decentralized control usually requires solving more complex problems than simply reaching a consensus. For example, if moving in formation is considered, then a typical task is moving along a prescribed course and in a prescribed and fixed configuration. During a violent maneuver the configuration can be altered, but after the maneuver it must be restored. Alteration and restoration of a prescribed geometric shape are also typical when a "flock" of moving physical objects encounters an obstacle or a hazard. It should be noted that reaching consensus is an important element of control strategy in all such cases. Actually, it is a key element, because it usually determines the stability of the system, its controllability, etc. That is why the analysis and synthesis of consensus algorithms, such as (1), is a necessary component of solving various problems of decentralized control. In this paper we focus on graph theoretic results underlying the analysis of distributed consensus algorithms. Let Γ(t) be the communication digraph associated with the consensus model (1). The vertices of Γ(t) are identified with the agents, and Γ(t) has an arc from vertex j to vertex i (denoted by (j, i) or j → i) if and only if aij(t) 6= 0. The presence of this arc in Γ(t) means that agent i coordinates its information state with that of j. The weight of the (j, i) arc is aij(t). In matrix form, model (1) can be written as where x(t) = (x1(t), . . . , xn(t))T and the matrix L(t) = [ℓij(t)]n×n is defined as follows: x(t) = −L(t)x(t), (2) (3) ℓij(t) = −aij(t), j 6= i, aik(t), j = i. Xk6=i L(t) is the Kirchhoff matrix of the communication digraph Γ(t). Sometimes, instead of Γ(t), the digraph Γ′(t) is considered such that j 6= i and aij(t) 6= 0 result in the presence of the i → j arc (instead of j → i in Γ(t)). With respect to Γ′(t), the matrix L(t) defined above is the Laplacian matrix. The classes of Kirchhoff matrices and Laplacian matrices coincide; they only differ in the way they are assigned to digraphs. We will call L(t) the Laplacian matrix of the algorithm (1). The process (1) is said to be convergent if for any initial conditions xi(0), i = 1, . . . , n, and every i, j = 1, . . . , n, it holds that xi(t) − xj(t) → 0 as t → ∞. The convergence properties of the algorithm (1) are determined by the spectral properties of the matrix L(t). 3. SIMPLE PROPERTIES OF THE LAPLACIAN MATRICES By definition, L(t) has zero row sums, consequently, it is singular and the vector 1 = [1, . . . , 1]T belongs to its kernel. Since the off-diagonal entries of L(t) are nonpositive, the diagonal entries AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 130 CHEBOTAREV AND AGAEV being nonnegative, and L(t) has a weakly dominant diagonal, by Gersgorin's, theorem the real parts of all nonzero eigenvalues of L(t) are strictly positive. That is why all nonzero eigenvalues of the matrix (−1)·L(t) in (2) have strictly negative real parts. The Laplacian matrix of an undirected graph is symmetric, positive semidefinite, and its spec- trum is real and nonnegative. Moreover, 0 is a simple eigenvalue of this matrix if and only if the corresponding graph is connected (see, e. g., [7]). If 0 = λ1 ≤ λ2 ≤ . . . ≤ λn are the Laplacian eigenvalues of an undirected graph, then λ2 is referred to as the algebraic connectivity of the graph. This concept was introduced by M. Fiedler, and it is widely used in both theoretical studies and applications. The Laplacian matrices of undirected graphs have been much studied. They date back to the famous matrix tree theorem by Kirchhoff; A.K. Kelmans pioneered their systematic investigation in the 1960s and 1970s; in the 1990s, the results of their study were presented in a series of reviews by R. Merris ([7] is one of them) and B. Mohar; then the monographs [8, 9] were published. The Laplacian matrices of directed graphs and relationships between their properties and the properties of the corresponding digraphs are still very poorly studied. To some extent, this is due to the fact that the mathematical problems which involve the complex spectra of digraph Laplacians are much more difficult than the corresponding problems regarding the real spectra of ordinary graphs. At the same time, the need for such studies is well recognized. Distributed control is one of the applications where this need is particularly urgent. 4. THE CONVERGENCE OF CONSENSUS ALGORITHMS Assume that the Laplacian matrix L(t) is kept constant: L(t) = L. It is not difficult to formulate a matrix-theoretic necessary and sufficient condition of convergence for the algorithm (2). As already mentioned, the vector 1 = [1, . . . , 1]T belongs to the kernel of L. If 0 is a simple eigenvalue of L, then x(t) → ¯x 1, where ¯x is a scalar, consequently, xi(t) − xj(t) → 0 as t → ∞ for all i, j = 1, . . . , n, and the coordination trajectories converge. As shown in [10, Theorem 4], the zero eigenvalue of L is always semisimple, i. e., its algebraic and geometric multiplicities coincide. Hence, if this eigenvalue is not simple, then the kernel of L is not one-dimensional, and the convergence is violated. Thus, the convergence analysis of algorithm (2) reduces to the determination of conditions under which 0 is a simple eigenvalue of L. 5. RANKS OF LAPLACIAN MATRICES AND A CONVERGENCE CRITERION FOR DISTRIBUTED CONSENSUS ALGORITHMS The rank of the digraph Laplacian was studied in [11]. Recall some graph theory notation. A digraph is called strongly connected (or strong) if it con- tains directed paths from every vertex into every other vertex. Every maximal (by inclusion) strong subgraph of a given digraph is called its strong component or bicomponent. A basis bicomponent of a digraph is a bicomponent such that the digraph does not have any arcs flowing into this bi- component from outside. It is easy to verify that every vertex of a digraph is reachable by a path from at least one basis bicomponent. If a basis bicomponent consists of a single vertex, we call it an undominated vertex of the digraph. A digraph is weakly connected if the graph obtained from it by replacing all arcs with undirected edges is connected. Weak components of a digraph are the maximal by inclusion weakly connected subgraphs of this digraph. A digraph is unilaterally connected if for any vertices i and j 6= i, it contains either a directed path from i into j or a directed path from j into i (or both). Unilateral components of a digraph are its maximal by inclusion uni- laterally connected subgraphs. It should be noted that the relation of unilateral connectivity need AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 MULTIAGENT SYSTEMS AND LAPLACIAN SPECTRA 131 not be transitive, so it does not induce a decomposition of the vertex set into equivalence classes. Therefore, as distinct from the strong and weak components, unilateral components can overlap. A subgraph of a digraph is spanning if the vertex sets of the graph and subgraph coincide. A diverging tree is a rooted directed tree containing directed paths from the root into all other vertices. A diverging forest is a rooted directed forest all of whose weak components are diverging trees. For an arbitrary digraph Γ, consider its spanning diverging forests. Such forests are also called out-forests of Γ. A spanning diverging forest F of Γ is a maximum out-forest if Γ has no out-forest with the number of arcs greater than in F . It is easily seen that every maximum out-forest has the minimum possible number of weak components (diverging trees); this number will be called the out-forest dimension of Γ and denoted by d. The number of arcs in any maximum out-forest is obviously n − d, where n is the number of vertices in Γ. The following results were obtained in [11]. Proposition 1. Let L be the Kirchhoff matrix of a digraph Γ. Then rank L = n − d, where n is the number of vertices in Γ and d is the out-forest dimension of Γ. Proposition 2. The out-forest dimension of a digraph is equal to its number of basis bicompo- nents. Proposition 3. The out-forest dimension of a strong digraph is unity. Proposition 4. The out-forest dimension of a digraph is no less than its number of weak com- ponents and does not exceed the number of its strong components and the number of its unilateral components. Zero is a simple eigenvalue of L if and only if rank L = n − 1. That is why the above propositions imply Corollary 1. Corollary 1. Let L be the Kirchhoff matrix of a digraph Γ. Then 0 is a simple eigenvalue of L if and only if Γ has a spanning diverging tree or, equivalently, Γ has only one basis bicomponent. By Propositions 1 and 3, the premise of Corollary 1 is satisfied, for instance, for any strong digraph. Later on, the first statement of Corollary 1 was obtained in [12 -- 16]. Corollary 1 provides a convergence criterion for the consensus algorithm (2). Theorem 1. The consensus algorithm (2) with a stable Laplacian matrix L(t) = L converges to a vector with equal components for any vector of initial conditions x(0) if and only if the cor- responding communication digraph Γ has a spanning diverging tree or, equivalently, has a unique basis bicomponent. A more general problem is describing the whole domain in the space of initial conditions be- longing to which guarantees the fulfillment of the xi(t) − xj(t) → 0, i, j = 1, . . . , n, condition, provided that convergence does not generally hold. This problem reduces to the analysis of the kernel of L. 6. THE KERNEL AND EIGENPROJECTION OF THE DIGRAPH LAPLACIAN The eigenprojection 2 corresponding to eigenvalue 0 or, for short, simply eigenprojection of a square matrix A is a projection (i. e., an idempotent matrix) Z such that R(Z) = N (Aν) and 2 It is also called principal idempotent. AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 132 CHEBOTAREV AND AGAEV N (Z) = R(Aν), where R(A) and N (A) are the range and the kernel (null space) of A, respectively, and ν = ind A is the index of A, i. e., the minimum k ∈ {0, 1, . . . } such that rank Ak+1 = rank Ak. In other words, the eigenprojection of A is the projection on N (Aν ) along R(Aν ). The eigenprojection is unique, as an idempotent matrix is uniquely determined by its range and kernel. A number of equivalent definitions of eigenprojection can be found in [17]. In [11] we considered the normalized matrix of maximum out-forests of a digraph denoted by ¯J (the definition of this matrix is given below in Section 8) and proved the following properties of ¯J. Proposition 5. Let L, d and ¯J be the Kirchhoff matrix, the out-forest dimension and the nor- ¯J 2 = ¯J; malized matrix of maximum out-forests of digraph Γ, respectively. Then rank ¯J = d; L ¯J = ¯JL = 0. By the second statement of Proposition 5, ¯J is a projection. By the third statement, R( ¯J) ⊆ N (L) and R(L) ⊆ N ( ¯J ). Using the relationship between the ranks of ¯J and L (rank ¯J = d and rank L = n − d by Proposition 1) and the semisimplicity of 0 as the eigenvalue of L, we obtain that the above inclusions can be replaced with equalities. Finally, the semisimplicity of 0 as the eigenvalue of L implies that ind L = 1. Thus, the following two propositions hold true. Proposition 6. Let L and ¯J be the Kirchhoff matrix and the normalized matrix of maximum out-forests of Γ, respectively. Then ¯J is the eigenprojection of L. Proposition 7. The linear spans of the columns and the rows of ¯J coincide with the kernel and the left null space of L, respectively. By virtue of Propositions 6 and 7, matrix ¯J is useful for the analysis of continuous distributed consensus algorithms. In Section 7, we will see that ¯J is also applicable to the study of iterative consensus algorithms. 7. ITERATIVE CONSENSUS ALGORITHMS Consider the finite-difference counterpart of the continuous consensus algorithm (1) with con- stant coefficients aij: xi(k + 1) = xi(k) − ε nXj=1 aij (xi(k) − xj(k)), i = 1, . . . , n, where k is the discrete time and ε > 0 is the step size. Rewrite algorithm (4) in matrix form: where x(k + 1) = P x(k), P = I − εL. (4) (5) (6) If the step size ε is small enough, then P is a row stochastic matrix. This follows from the fact that L has nonpositive off-diagonal entries and zero row sums. The corresponding condition of the "smallness" of ε is as follows [11]: 0 < ε ≤max i Xj6=i aij −1 . (7) AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 MULTIAGENT SYSTEMS AND LAPLACIAN SPECTRA 133 The matrix P = exp(−εL) corresponds to the continuous consensus algorithm (2), and (6) can be considered as the expansion of exp(−εL) to the linear term. Matrix (6) is sometimes called the Perron matrix with parameter ε of digraph Γ. From (5), for any natural m one has x(m) = P mx(0), (8) therefore, the properties of the process (5) are determined by the properties of the sequence {P, P 2, . . . , P m, . . . }. From the theory of Markov chains it is known that this sequence need not converge (the necessary and sufficient condition of its convergence is the aperiodicity of the chain), but the Ces`aro limit (also called the time average limit) P ∞ = lim m→∞ 1 m mXi=1 P i, (9) always exists and coincides with the limit of the sequence {P, P 2, . . . , P m, . . . } in case the latter converges. Otherwise, if the chain is periodic with period s, then where P (1), . . . , P (s) are the limits of its converging subsequences: P (i) = lim j→∞ P js+i. P ∞ = 1 s(cid:16)P (1) + . . . + P (s)(cid:17) It was shown in [18] that P ∞ is the eigenprojection of I − P . Hence, by (6), P ∞ is the eigenpro- jection of L as well. This fact along with the uniqueness of the eigenprojection and Proposition 6 imply Proposition 8. Proposition 8. Let a row stochastic matrix P be connected with the Kirchhoff matrix L of a digraph Γ by equation (6) with ε > 0. Then the matrix P ∞ defined by (9) coincides with the normalized matrix ¯J of maximum out-forests of Γ. Thus, the matrix P ∞, which determines the asymptotic behavior of the consensus algorithm (4), is equal to the normalized matrix of maximum out-forests of the communication digraph that corresponds to this algorithm. The matrix ¯J is thereby important for the analysis of iterative consensus processes. Indeed, according to (8), to know the average asymptotic state of the algorithm (4), it suffices to consider the product P ∞x(0) = ¯J x(0). To compute the matrix ¯J, one can use the algorithm proposed in [19, 20], which reduces to min{n − d − 1, 0} multiplications of matrices of order n. It should be remarked that Proposition 8 coincides with the Markov chain tree theorem first obtained by Wentzell and Freidlin [21] and rediscovered by Leighton and Rivest [22]. Consider the convergence of the consensus algorithm (4). Since the spectral radius of P is 1, the convergence is violated only if P has an eigenvector not proportional to 1 = [1, . . . , 1]T and corresponding to an eigenvalue of modulus 1. The subspace of invariant vectors of P coincides with the kernel of L, hence it is one-dimensional if and only if the premise of Theorem 1 holds. As for the complex eigenvalues of modulus 1, P can have them only if ε coincides with the right endpoint of the interval (7). Indeed, in the opposite case, the increase of ε up to the endpoint of the interval would have resulted in the appearance of an eigenvalue with the modulus greater than 1, in contradiction with the stochasticity of P (see also [23]). Consequently, the convergence of consensus algorithm (4) is guaranteed by the fulfillment of the premise of Theorem 1 together with the strict form of inequality (7). Otherwise, if ε coincides with the right endpoint of the interval (7) and the Markov chain determined by the matrix P = I − εL is periodic, then the convergence is violated. AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 134 CHEBOTAREV AND AGAEV 8. THE NORMALIZED MATRIX OF MAXIMUM OUT-FORESTS Can the entries of the matrix ¯J, which proves to be useful for the analysis of consensus algorithms, be interpreted in terms of the communication digraph Γ ? Such a connection is specified by the very definition of ¯J : every entry ¯Jij of ¯J is defined [11] as the ratio of the total weight3 of Γ's maximum out-forests that have vertex i belonging to a tree diverging from j to the total weight of all maximum out-forests in Γ. The following theorems [11] summarize the properties of ¯J. Theorem 2. Suppose that V (Γ) = {1, . . . , n} and E(Γ) are the vertex set and arc set of a digraph Γ, K is the vertex set of some basis bicomponent of Γ, K + is the set of vertices reachable by paths from K and unreachable from the other basis bicomponents of Γ, fK is the union of the vertex sets of all basis bicomponents, d is the out-forest dimension of Γ, ¯J is the normalized matrix of maximum out-forests of Γ, T is the set of spanning diverging trees in the restriction ΓK of Γ to K, Tj is the subset of T consisting of the trees that diverge from j, Γ−K is the spanning subgraph of Γ with the edge set E(Γ) \ E(ΓK ), PK→i is the set of maximum out-forests of Γ−K in which i is reachable from some vertex that belongs to K, ε(·) designates the weight of a set of subgraphs (equal to the sum of the weights of its elements), σn−d is the weight of the set of maximum out-forests of Γ. Then the following statements are true: ¯Jij = ¯Jjj = ε(Tj)/ε(T); of ¯J . 1. ¯J is a row stochastic matrix : ¯Jij ≥ 0, and ¯Jik = 1 i, j ∈ V (Γ); ¯Jjj = 1. In particular, if j is an undominated vertex, then ¯Jjj = 1; 3. Let j ∈ K. For any i ∈ V (Γ), ¯Jij = ε(Tj) ε(PK→i)/σn−d. Moreover, if i ∈ K +, then nPk=1 2. ¯Jij 6= 0 ⇔ (j ∈ fK and i is reachable from j in Γ); 4. Pj∈K 5. If j1, j2 ∈ K, then ¯J·j2 = (cid:0)ε(Tj2)/ε(Tj1 )(cid:1) ¯J·j1, where ¯J·j1 and ¯J·j2 are the j1 and j2 columns iji of maximum out-forests of the digraph ΓK coincides with 1. The normalized matrix ¯JK =h ¯J K Corollary 2 (from the statement 3 of Theorem 2). the principal submatrix of ¯J corresponding to the basis bicomponent K. 2. If i ∈ K + and j ∈ K +\K, then ¯J is preserved under the variations of the weight of (i, j). The following Theorem 3 is concerned with the comparison of the entries of ¯J. Theorem 3. In the notation of Theorem 2, let K(k) be a basis bicomponent of Γ that contains 1. ¯Jii ≥ ¯Jji; a vertex k ∈fK. For all i, j ∈ V (Γ) we have: 2. If ¯Jii > ¯Jji, then i ∈fK, j /∈ K +(i), therefore, Γ contain no paths from j into i; 3. If ¯Jii > ¯Jji > 0, then j /∈fK, consequently, j is not the root in any maximum out-forest of Γ; 4. If ¯Jij > 0, then ¯Jii = ¯Jji. As mentioned above, these properties are useful for the analysis of the consensus algorithms (2) and (5) as well as generalizations of these algorithms, in particular, when the convergence is not guaranteed by the structure of the communication digraph. Some of the foregoing results regarding the kernel of the digraph Laplacian were also obtained in [24]. 3 The weight of a digraph is the product of the weights of all its arcs. AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 MULTIAGENT SYSTEMS AND LAPLACIAN SPECTRA 135 9. OTHER PROBLEMS OF DECENTRALIZED CONTROL The distributed consensus algorithm (2) is the simplest algorithm of decentralized control. Yet this algorithm is a basic one, because the linear operator of agreement (−1)·L(t) it contains is an indispensable constituent of more complex algorithms as well. Therefore, the convergence properties of these more complex algorithms are in many respects determined by the spectral properties of the corresponding Laplacian matrices and by the forest structure of the related communication digraphs. In this section, we briefly survey some modifications of the consensus algorithm (2) and some other related problems of decentralized control. First of all, it should be noted that the model (2) does not generally imply that the commu- nication digraph Γ(t) is fixed. The rejection of this assumption makes the model more realistic. Indeed, in many applications the agents primarily communicate with the closest neighbors, but those can be acquired or lost during the motion. To preserve the relative simplicity of the model, some restrictions on the structure of the communication digraph are applied. Usually, either it is supposed to be piecewise constant and a set of possible switchings is specified or the weights aij(t) are defined with a permissible variation. Sometimes fluctuation of the weights is described by a probabilistic model. As a result, the analysis, in most cases, reduces to solving a series of prob- lems with stable communication digraphs and combining the partial solutions. In some cases, the analysis involves the study of infinite products of stochastic matrices taken from a specific set [25]. Besides that, the model becomes more realistic if it allows communication delays. These delays can be associated with either information transmission or with processing messages after receipt. In this case, the model of the form (1) contains terms such as xj(t − δij ), where δij is a delay typical of the pair of agents (i, j). If the delays are the same for all pairs of agents, then their presence does not essentially alter the properties of the coordination trajectories [26]. More general cases were considered in [27]. In many technical applications it is desirable to maximize the rate of convergence. An approach to solving such problems was developed in [28]. It is noteworthy that in case of undirected graphs, the problem of the best convergence is connected [29] with the maximization of the algebraic connectivity (the second smallest eigenvalue of the Laplacian matrix already mentioned in Section 3) of the communication graph. The algebraic connectivity itself can serve as a good measure of the convergence rate of the algorithm [30]. For the case of directed graphs, different generalizations of the algebraic connectivity were proposed, including the second smallest real part of the Laplacian eigenvalues [31], the second smallest modulus of the Laplacian eigenvalues, and the second smallest eigenvalue of the symmetric part (L+LT)/2 of the Laplacian matrix [23, 32]. However, in the general case of digraphs, the problem of optimizing the convergence rate is still insufficiently studied. Not even the problem of localizing the spectra of nonsymmetric Laplacian matrices (see Section 10) has been completely investigated. Let us turn to some extensions of the model (2) that have a more complex structure. For the analysis of synchronization in systems of nonlinear oscillators and for solving some other problems, the following class of models was considered: xi = f (xi) − γ nXj=1 aij(t) (xi − xj), i = 1, . . . , n, γ > 0. (10) It has been shown in [33] that in case of undirected communication graphs, the corresponding synchronization process is essentially determined by the algebraic connectivity of the graph. AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 136 CHEBOTAREV AND AGAEV The consensus algorithm for a double-integrator dynamics has the form: xi = − nXj=1 aij(t) ((xi − xj) + γ( xi − xj)) , i = 1, . . . , n, (11) where γ > 0 controls velocity matching. It was shown in [34] that Γ is of considerable importance here, however, for the algorithm to converge, as well as for the basic model (Theorem 1), the communication digraph must have a spanning diverging tree. More general differential models of the second order were used to describe the motion of the complexes (flocks, schools, troop, swarms, etc.) of physical objects. "Flocking" requires both maintaining the pattern formed by the objects' positions (up to translation and/or rotation) and formation maneuvering [31, 35]. In this case, the existence of a spanning diverging tree in the com- munication digraph is also a necessary condition of the effective control for many typical problems. 10. LOCALIZING THE SPECTRA OF NONSYMMETRIC LAPLACIAN MATRICES For the analysis of models generalizing simple consensus models (1) or (4) it is necessary to know the whole Laplacian spectrum of the communication digraph rather then the sole multiplicity of its zero eigenvalue. Another important but rather difficult problem is recovering connections between the Laplacian spectrum of a digraph and the topological properties of the same digraph, including the "degree of cyclicity" and many others. The problem of localizing the spectra of Laplacian matrices was partially solved in [10]. Let us consider some results of this paper. A real square matrix of order n will be called a standardized Laplacian matrix if (1) its row sums are equal to 0 and (2) its off-diagonal elements are nonpositive and do not exceed 1/n in absolute value. This standardization enables one to consider results on the spectra of Laplacian matrices the class Gb of weighted digraphs with positive arc weights not exceeding b > 0 is considered and L(Γ) is the Laplacian matrix of a weighted digraph Γ ∈ Gb on n vertices, then the standardized with various n in the same framework. Standardized Laplacian matrices will be denoted by eL. If Laplacian matrix associated with Γ in this class is, by definition, eL(Γ) = (nb)−1L(Γ). Let J ∈ Rn×n be the matrix with all entries 1/n; K = I − J. Then K is the standardized Laplacian matrix of the complete digraph with all arc weights b in the class Gb. Define the matrices and P = eL + J eLc = K −eL. (12) (13) By (12) and (13), P is a stochastic matrix, eLc being the standardized Laplacian matrix of the complementary weighted digraph Γc in which (b − εij) is the weight of arc (i, j), j 6= i, provided that εij is the weight of this arc in Γ. If εij = b, then Γc has no (i, j) arc and vice versa: if Γ has no (i, j) arc, then the weight of (i, j) in Γc is b. It follows from (12), (13) and the definition of K that Consider the results [10] connecting the spectra of eL, P and eLc. AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 P = I −eLc. (14) 2009 x =(cid:18)I − J 1 − λ(cid:19) v fP (λ) = λ − 1 λ (λ) = (−1)n−1 λ feL(λ), 1 − λ feLc feL(1 − λ). (15) (16) (17) MULTIAGENT SYSTEMS AND LAPLACIAN SPECTRA 137 respectively. Then for λ /∈ {0, 1}, the following statements are equivalent:4 Theorem 4. Let eL be a standardized Laplacian matrix; let P and eLc be defined by (12) and (13), (a) λ ∈ speL; (b) λ ∈ sp P ; (c) 1 − λ ∈ speLc, and these eigenvalues have the same geometric multiplicity. Furthermore, v is an eigenvector of eL corresponding to λ /∈ {0, 1} if and only if the vector 5 is an eigenvector of P corresponding to λ and an eigenvector of eLc corresponding to 1 − λ. Theorem 5. Let feL(λ), fP (λ) and feLc (λ) be the characteristic polynomials of eL, P and eLc, respectively. Then for all λ 6∈ {0, 1}, Theorem 6. For any standardized Laplacian matrix eL and the corresponding stochastic matrix P defined by (12), eL and P are semiconvergent. For completeness, the following theorem contains some results mentioned above. Theorem 7. Suppose that d and dc are the in-forest dimensions of the digraph whose standard- and these eigenvalues are semisimple; ized Laplacian matrix is eL and the complementary digraph, respectively; mA(λ) is the algebraic multiplicity of λ ∈ sp A; VA(λ) is the eigenspace of A corresponding to λ. Then meL(1) = dc − 1; (ii) mP (0) = d − 1, mP (1) = dc; (0) = dc, (i) meL(0) = d, (iii) meLc (iv) if v ∈ VeL(0) and Kv 6= 0, then Kv ∈ VP (0) = VeLc (0) and Kx 6= 0, then Kx ∈ VeL(1). Let eΛn be the class of standardized Laplacian matrices of order n. We now turn to the problem of localizing the spectra of the matrices eL ∈ eΛn. The following results were obtained in [10]. (1) = d − 1, meLc if x ∈ VP (1) = VeLc Theorem 8. All eigenvalues of standardized Laplacian matrices of order n belong to the meet of : • two closed disks, one centered at 1/n, the other centered at 1 − 1/n, each having radius 1 − 1/n, • two closed smaller angles, one bounded with the two half-lines drawn from 1 through e−2πi/n and e2πi/n, the other bounded with the half-lines drawn from 0 through e−(π2−πn)i and e(π2−πn)i, and (1); • the band ℑ(z) ≤ 1 2n cot π 2n . Remark. Using the theorem by Dmitriev and Dynkin [36] on the spectra of stochastic matrices, it n if and only if Γ is a Hamiltonian n sin 2π n . can be shown that speL contains an eigenvalue with argument π cycle on n vertices. In this case, such an eigenvalue λ is unique, λ ≤ 2 n , and ℑ(λ) ≤ 1 n sin π 2 − π 4 spA is the spectrum of A. 5 For simplicity, we sometimes write A/α instead of (1/α)A, where A is a matrix and α 6= 0 is a complex number. AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 138 CHEBOTAREV AND AGAEV ℑ(λ) ✻ π n 1 2n cot π 2n 1 n sin 2π n 0 1 n 0.5 n−1 n 1 ℜ(λ) ✲ Fig. 1. The domain which, according to Theorem 8, contains the spectrum of each standardized Laplacian matrix of order n (hatched); in this figure, n = 7. The components of any corresponding eigenvector are the vertices of a regular polygon. Similarly, speL contains an eigenvalue that belongs to the segment [1, e2πi/n] if and only if the complementary digraph Γc is a Hamiltonian cycle on n vertices. As above, such an eigenvalue λ′ is unique and ℑ(λ′) ≤ 1 n sin 2π n . This remark and Theorem 8 are illustrated by Fig. 1. Let λk(n) = n−1(cid:16)k − e−2πi/n − . . . − e−2kπi/n(cid:17) = n−1 k − sin kπ n sin π n e−(k+1)πi/n! , k = 1, . . . , n − 1; (18) by S(n) we denote the closed convex polygon with vertices λ0(n) = 0, λ1(n), . . . , λn−2(n), λn−1(n) = 1, λn−2(n), . . . , λ1(n). (19) Theorem 9. Every point of the polygon S(n) is an eigenvalue of some standardized Laplacian matrix eL ∈ eΛn. Let h(n) = sup{ℑ(λ) : λ is an eigenvalue of some eL ∈ eΛn}. By Theorem 8, for all n = 2, 3, . . . it holds that h(n) ≤ 1 2n cot π 2n . Theorem 10. If n is odd, then h(n) = 1 2n cot π , 1 2n moreover, h(n) = ℑ(cid:16)λ(n−1)/2(n)(cid:17) , where λ(n−1)/2(n) is defined by (18). AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 MULTIAGENT SYSTEMS AND LAPLACIAN SPECTRA 139 Proposition 9. If n > 2 is even, then max 0≤k≤2n−1 ℑ(λk(n)) = ℑ(λn/2(n)) = 1 n cot π n < 1 2n cot π 2n . Corollary (from Theorems 8 and 9 and Proposition 9). lim n→∞ h(n) = 1/π. The following conjecture is yet unproved. Conjecture. All eigenvalues of standardized Laplacian matrices of order n belong to the poly- gon S(n) whose vertices are defined by (19). Note that the vertices λk(n) and λk(n) of the polygon S(n) belong to the spectrum of the (kI − C − C 2 − . . . − C k), where C = [cuv] is the matrix of standardized Laplacian matrix eLk(n) = a cyclic permutation of order n with entries cuv =( 1, v − u ∈ {1, n − 1}, standardized Laplacian matrices are eLk(n) belong to the class of balances digraphs, which are relevant to the synthesis of multiagent control protocols (see, e. g., [23]). In balanced digraphs, the total weight of arcs converging to any vertex is equal to the total weight of arcs diverging from it. Besides that, for these digraphs, the total weight of converging arcs is the same for all vertices, i. e., they are regular. The digraphs whose 1 n 0, otherwise. standardized Laplacian matrix where S = [sij] is the standardized Laplacian matrix of a digraph obtained from the digraph with (I −C n/2) by decreasing the weights of some arcs. It turns out that If n is even and k < n/2, then of special interest are the matrices of the form eLk(n) + S, the maximum imaginary part of the eigenvalues of eLk(n) + S does not exceed such a part for eLk(n), and the spectrum of eLk(n) + S is invariant under any change of nonzero sij and sji that preserves sij + sji. In other words, the spectra of the standardized Laplacian matrices eLk(n) + S depend on the total weights of opposite "diagonal" arcs of the digraph rather than on their individual weights. 1 n Theorem 11. The boundary of the polygon S(n) with vertices (19) converges, as n → ∞, to the curve made up by the parts of two cycloids whose parametric equations are: z(τ ) = x(τ ) + i y(τ ) and z(τ ) = x(τ ) − i y(τ ), where τ ∈ [0, 2π] and x(τ ) = (2π)−1(τ − sin τ ), y(τ ) = (2π)−1(1 − cos τ ). Fig. 2 shows the polygons S(n) at n = 4 and n = 5 as well as the limit curve whose equation is given by Theorem 11. As mentioned above, the results on localizing the spectra of Laplacian matrices given in this section are necessary for the analysis and synthesis of control algorithms that contain reaching consensus as one of their elements (see, e. g., [31]). 11. CONCLUSION Recently, decentralized control of multiagent systems has become one of the most popular and rapidly evolving branches of control theory. Dozens of research groups have published many hun- dreds of papers and since these groups are working concurrently and are studying similar mod- els, their results substantially overlap. To get familiar with this trend, the recent surveys and AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 140 CHEBOTAREV AND AGAEV ✻ℑ(λ) 1/π n = 4 0 0.5 ✲ℜ(λ) 1 n = 5 Fig. 2. The polygon of the spectra of standardized digraph Laplacians at n = 4 and n = 5 and the limit oval specified by Theorem 11. monographs [23, 32, 37, 38] can be recommended. The methods of algebraic graph theory play an increasingly important part in the studies of the last decade dealing with multiagent systems. More specifically, the subject of these investigations is the relationship between the topological properties of digraphs that represent information interchange among agents and the spectral properties of the corresponding Laplacian matrices. At the same time, the Laplacian theory of directed graphs6 is still insufficiently developed; the need for new strong results in this field is very acute. One more thesis accepted by most researchers is that for a new stage of its development, this discipline re- quires more experimental studies7 and more practical applications of the theoretical results. These will reveal to what extent the proposed algorithms are robust to perturbations and discrepancies between theory and real behavior. REFERENCES 1. Varshavsky, V. and Pospelov, D. Puppets without Strings, Moscow: Mir Publishers, 1988. 2. DeGroot, M.H., Reaching a Consensus, J. Amer. Statist. Associat., 1974, vol. 69, no. 345, pp. 118 -- 121. 3. Dalkey, N.C. and Helmer, O., An Experimental Application of the Delphi Method to the Use of Experts, Management Sci., 1963, vol. 9, pp. 458 -- 467. 4. Borkar V., and Varaiya, P., Asymptotic Agreement in Distributed Estimation, IEEE Trans. Automat. Control., 1982, vol. 27, pp. 650 -- 655. 5. Tsitsiklis, J.N. and Athens, M., Convergence and Asymptotic Agreement in Distributed Decision Prob- lems, IEEE Trans. Automat. Control., 1984, vol. 29, pp. 690 -- 696. 6. Reynolds, C.W., Flocks, Herds, and Schools: A Distributed Behavioral Model, Comput. Graphics., 1987, vol. 21, no. 4, pp. 25 -- 34. 7. Merris, R., Laplacian Matrices of Graphs: A survey, Linear Algebra Appl., 1994, vol. 197 -- 198, pp. 143 -- 176. 8. Chung, F.R.K., Spectral Graph Theory, Providence, RI: Amer. Math. Soc., 1997. 9. Godsil, C. and Royle, G., Algebraic Graph Theory, New York: Springer-Verlag, 2001. 10. Agaev, R. and Chebotarev, P., On the Spectra of Nonsymmetric Laplacian Matrices, Linear Algebra Appl., 2005, vol. 399, pp. 157 -- 168. 1 6 In [31] this area was called an "unexpected new mathematical territory." 7 They are still scarce; see, e. g., [39, 40]. AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 MULTIAGENT SYSTEMS AND LAPLACIAN SPECTRA 141 11. Agaev, R.P. and Chebotarev, P.Yu. The Matrix of Maximum Out Forests of a Digraph and Its Appli- cations, Automat. Remote Control, 2000, vol. 61, no. 9, part 1, pp. 1424 -- 1450. 12. Jadbabaie, A., Lin, J., and Morse, A.S., Coordination of Groups of Mobile Autonomous Agents Using Nearest Neighbor Rules, IEEE Trans. Automat. Control, 2003, vol. 48, no. 6, pp. 988 -- 1001. 13. Ren, W., Beard, R.W., and McLain, T.W., Coordination Variables and Consensus Building in Multiple Vehicle Systems, in Cooperative Control: A Post-Workshop Volume 2003, Block Island Workshop on Cooperative Control., Kumar, V., Leonard, N.E., and Morse, A.S., Ed., New York: Springer-Verlag, 2005, pp. 171 -- 188. 14. Caughman, J.S., Lafferriere, G., Veerman, J.J.P, and Williams, A., Decentralized Control of Vehicle Formations, Syst. Control Lett., 2005, vol. 54, no. 9, pp. 899 -- 910. 15. Lin, Z., Francis, B., and Maggiore, M., Necessary and Sufficient Graphical Conditions for Formation Control of Unicycles, IEEE Trans. Automat. Control, 2005, vol. 50, no. 1, pp. 121 -- 127. 16. Moreau, L., Stability of Multiagent Systems with Time-Dependent Communication Links, IEEE Trans. Automat. Control, 2005, vol. 50, no. 2, pp. 169 -- 182. 17. Agaev, R.P. and Chebotarev, P.Yu., On Determining the Eigenprojection and Components of a Matrix, Automat. Remote Control, 2002, vol. 63, no. 10, pp. 1537 -- 1545. 18. Rothblum, U.G., Computation of the Eigenprojection of a Nonnegative Matrix at Its Spectral Radius, Math. Program. Study, 1976, vol. 6, pp. 188 -- 201. 19. Agaev, R.P. and Chebotarev, P.Yu., Spanning Forests of a Digraph and Their Applications, Automat. Remote Control, 2001, vol. 62, no. 3, pp. 443 -- 466. 20. Chebotarev, P. and Agaev, R., Forest Matrices Around the Laplacian Matrix, Linear Algebra Appl., 2002, vol. 356, pp. 253 -- 274. 21. Wentzell, A.D. and Freidlin, M.I., On Small Random Perturbations of Dynamical Systems, Russian Mathematical Surveys, 1970, vol. 25, no. 1, pp. 1 -- 55. 22. Leighton, T. and Rivest, R.L., The Markov Chain Tree Theorem, Computer Science Techn. Rep. MIT/LCS/TM -- 249, Laboratory of Computer Science, MIT, Cambridge, Mass., 1983. 23. Olfati-Saber, R., Fax, J.A., and Murray, R.M., Consensus and Cooperation in Networked Multi-Agent Systems, Proc. IEEE, 2007, vol. 95, no. 1, pp. 215 -- 233. 24. Caughman, J.S. and Veerman, J.J.P., Kernels of Directed Graph Laplacians, Electron. J. Combinat., 2006, vol. 13, no. 1 -- R39. 25. Ren, W., Beard, R.W., and Kingston, D.B., Multi-Agent Kalman Consensus With Relative Uncertainty, in Proc. Amer. Control Conf., Portland, OR, 2005, pp. 1865 -- 1870. 26. Moreau, L., Stability of Continuous-Time Distributed Consensus Algorithms, in Proc. IEEE Conf. De- cision Control, Paradise Island, Bahamas, 2004, pp. 3998 -- 4003. 27. Fang, L., and Antsaklis, P.J., On Communication Requirements for Multiagent Consensus Seeking, in Networked Embedded Sensing and Control, Lecture Notes in Control Inform. Sci., vol. 331, Antsaklis, P.J. and Tabuada, P., Ed., Berlin: Springer-Verlag, 2006, pp. 53 -- 67. 28. Xiao, L. and Boyd, S., Fast Linear Iterations for Distributed Averaging, Syst. Control Lett., 2004, vol. 53, pp. 65 -- 78. 29. Kim, Y. and Mesbahi, M., On Maximizing the Second Smallest Eigenvalue of a State-Dependent Graph Laplacian, IEEE Trans. Automat. Control, 2006, vol. 51, pp. 116 -- 120. 30. Olfati-Saber, R. and Murray, R.M., Consensus Problems in Networks of Agents with Switching Topology and Time-Delays, IEEE Trans. Automat. Control, 2004, vol. 49, pp. 1520 -- 1533. 31. Veerman, J.J.P., Lafferriere, G., Caughman, J.S., and Williams, Flocks and Formations, J. Statist. Physics, 2005, vol. 121, no. 5 -- 6, pp. 901 -- 936. 32. Wu, C.W., Synchronization in Complex Networks of Nonlinear Dynamical Systems, World Scientific, 2007. 33. Preciado, V.M. and Verghese, G.C., Synchronization in Generalized Erdos-R´enyi Networks of Nonlinear Oscillators, in Proc. IEEE Conf. Decision Control, Eur. Control Conf., Seville, Spain, 2005, pp. 4628 -- 4633. AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009 142 CHEBOTAREV AND AGAEV 34. Ren, W. and Atkins, E., Second-Order Consensus Protocols in Multiple Vehicle Systems with Local Interactions, in Proc. AIAA Guidance, Navigation, Control Conf., San Francisco, CA, 2005. Paper AIAA -- 2005 -- 6238. 35. Lawton, J.R., Beard, R.W., and Young, B., A Decentralized Approach to Formation Maneuvers, IEEE Trans. Robot. Automat., 2003, vol. 19, no. 6, pp. 933 -- 941. 36. Dmitriev, N. and Dynkin, E., Characteristic Roots of Stochastic Matrices, Izv. Akad. Nauk SSSR (Bull. Acad. Sci. USSR), Mat., 1946, vol. 10, pp. 167 -- 184. Translated in Eleven Papers Translated from the Russian, Bernik, V.I., Ed., Amer. Math. Soc., 1988. 37. Ren, W., Beard, R.W., and Atkins, E.M., Information Consensus in Multivehicle Cooperative Control, IEEE Control Syst. Magazin, 2007, vol. 27, no. 2, pp. 71 -- 82. 38. Ren, W. and Beard, R.W., Distributed Consensus in Multi-Vehicle Cooperative Control, London: Springer-Verlag, 2008. 39. Regmi, A., Sandoval, R., Byrne, R., et al., Experimental Implementation of Flocking Algorithms in Wheeled Mobile Robots, in Proc. Amer. Control Conf., Portland, OR, 2005, pp. 4917 -- 4922. 40. Marshall, J.A., Fung, T., Broucke, M.E., et al., Experiments in Multirobot Coordination, Robot. Au- tonom. Syst., 2006, vol. 54, no. 3, pp. 265 -- 275. This paper was recommended for publication by B.T. Polyak, a member of the Editorial Board AUTOMATION AND REMOTE CONTROL Vol. 70 No. 3 2009
1911.12716
2
1911
2019-12-20T13:26:56
HS-CAI: A Hybrid DCOP Algorithm via Combining Search with Context-based Inference
[ "cs.MA" ]
Search and inference are two main strategies for optimally solving Distributed Constraint Optimization Problems (DCOPs). Recently, several algorithms were proposed to combine their advantages. Unfortunately, such algorithms only use an approximated inference as a one-shot preprocessing phase to construct the initial lower bounds which lead to inefficient pruning under the limited memory budget. On the other hand, iterative inference algorithms (e.g., MB-DPOP) perform a context-based complete inference for all possible contexts but suffer from tremendous traffic overheads. In this paper, $(i)$ hybridizing search with context-based inference, we propose a complete algorithm for DCOPs, named {HS-CAI} where the inference utilizes the contexts derived from the search process to establish tight lower bounds while the search uses such bounds for efficient pruning and thereby reduces contexts for the inference. Furthermore, $(ii)$ we introduce a context evaluation mechanism to select the context patterns for the inference to further reduce the overheads incurred by iterative inferences. Finally, $(iii)$ we prove the correctness of our algorithm and the experimental results demonstrate its superiority over the state-of-the-art.
cs.MA
cs
HS-CAI: A Hybrid DCOP Algorithm via Combining Search with Context-based Inference Dingding Chen,1 Yanchen Deng,2 Ziyu Chen,1,∗ Wenxing Zhang,1 Zhongshi He1 1College of Computer Science, Chongqing University, Chongqing, China 2School of Computer Science and Engineering, Nanyang Technological University, Singapore {dingding,chenziyu,zshe}@cqu.edu.cn, [email protected], [email protected] 9 1 0 2 c e D 0 2 ] A M . s c [ 2 v 6 1 7 2 1 . 1 1 9 1 : v i X r a Abstract Search and inference are two main strategies for opti- mally solving Distributed Constraint Optimization Problems (DCOPs). Recently, several algorithms were proposed to combine their advantages. Unfortunately, such algorithms only use an approximated inference as a one-shot preprocess- ing phase to construct the initial lower bounds which lead to inefficient pruning under the limited memory budget. On the other hand, iterative inference algorithms (e.g., MB-DPOP) perform a context-based complete inference for all possible contexts but suffer from tremendous traffic overheads. In this paper, (i) hybridizing search with context-based inference, we propose a complete algorithm for DCOPs, named HS- CAI where the inference utilizes the contexts derived from the search process to establish tight lower bounds while the search uses such bounds for efficient pruning and thereby reduces contexts for the inference. Furthermore, (ii) we in- troduce a context evaluation mechanism to select the context patterns for the inference to further reduce the overheads in- curred by iterative inferences. Finally, (iii) we prove the cor- rectness of our algorithm and the experimental results demon- strate its superiority over the state-of-the-art. Introduction Distributed Constraint Optimization Problems (DCOPs) (Hirayama and Yokoo 1997; Fioretto, Pontelli, and Yeoh 2018) are an elegant model for representing Multi-Agent Systems (MAS) where agents coordinate with each other to optimize a global objective. Due to their ability to capture essential MAS aspects, DCOPs can formalize various appli- cations in the real world such as sensor network (Farinelli, Rogers, and Jennings 2014), task scheduling (Maheswaran et al. 2004; Fioretto, Yeoh, and Pontelli 2017), smart grid (Fioretto et al. 2017) and so on. Incomplete algorithms for DCOPs (Zhang et al. 2005; Maheswaran, Pearce, and Tambe 2006; Farinelli et al. 2008; Ottens, Dimitrakakis, and Faltings 2017) aim to rapidly find solutions at the cost of sacrificing optimality. On the contrary, complete algorithms guarantee the optimal solu- tion and can be generally classified into inference-based and search-based algorithms. DPOP (Petcu and Faltings ∗Corresponding author. 2005b) and Action GDL (Vinyals, Rodriguez-Aguilar, and Cerquides 2009) are typical inference-based complete al- gorithms which employ a dynamic programming paradigm to solve DCOPs. However, they require a linear number of messages of exponential size with respect to the induced width. Accordingly, ODPOP (Petcu and Faltings 2006) and MB-DPOP (Petcu and Faltings 2007) were proposed to trade the message number for smaller memory consumption by propagating the dimension-limited utilities with the corre- sponding contexts iteratively. That is, they iteratively per- form a context-based inference to solve DCOPs optimally when the memory budget is limited. Search-based complete algorithms like SBB (Hirayama and Yokoo 1997), AFB (Gershman, Meisels, and Zivan 2009), PT-FB (Litov and Meisels 2017), ADOPT (Modi et al. 2005) and its variants (Yeoh, Felner, and Koenig 2010; Gutierrez, Meseguer, and Yeoh 2011) perform distributed backtrack searches to exhaust the search space. They have a linear size of messages but an exponential number of mes- sages. Furthermore, these algorithms only use local knowl- edge to update the lower bounds, which exerts a trivial ef- fect on pruning and makes them infeasible for solving large- scale problems. Then, PT-ISABB (Deng et al. 2019), DJAO (Kim and Lesser 2014) and ADPOT-BDP (Atlas, Warner, and Decker 2008) came out to attempt to hybridize search with inference, where an approximated inference is used to construct the initial lower bounds for the search pro- cess. More specifically, PT-ISABB and ADOPT-BDP use ADPOP (Petcu and Faltings 2005a) to establish the lower bounds, while DJAO employs a function filtering technique (Brito and Meseguer 2010) to get them. Here, ADPOP is an approximate version of DPOP by dropping the exceeding dimensions to ensure that each message size is below the memory limit. However, given the limited memory budget, the lower bounds obtained in a one-shot preprocessing phase are still inefficient for pruning since such bounds cannot be tightened by considering the running contexts. That is, the existing hybrid algorithms use only a context-free approxi- mated inference as a one-shot phase to construct the initial lower bounds. In this paper, we investigate the possibility of combining search with context-based inference to solve DCOPs effi- is the assignments to all the variables such that the total cost is minimized. That is, X∗ = arg min fij(xi = di, xj = dj) (cid:88) di∈Di,dj∈Dj fij∈F (a) Constraint graph (b) Constraint matrix (c) Pseudo tree Figure 1: An example of a DCOP and its pseudo tree ciently. Specifically, our main contributions are listed as fol- lows: • We propose a novel complete DCOP algorithm by hy- bridizing search with context-based inference, called HS- CAI where the search adopts a tree-based SBB to find the optimal solution and provides contexts for the inference, while the inference iteratively performs utility propaga- tion for these contexts to construct the tight lower bounds to speed up the search process. • We introduce a context evaluation mechanism to extract the context patterns for the inference from the contexts derived from the search process so as to further reduce the number of context-based inferences. • We theoretically show the completeness of HS-CAI and prove that the lower bounds produced by the context- based inference are at least as tight as the ones estab- lished by the context-free approximated inference under the same memory budget. Moreover, the experimental results demonstrate HS-CAI outperforms state-of-the-art complete DCOP algorithms. Background In this section, we expound the preliminaries including DCOPs, pseudo tree, MB-DPOP and ODPOP. Distributed Constraint Optimization Problems A distributed constraint optimization problem (Modi et al. 2005) can be defined by a tuple (cid:104)A, X, D, F(cid:105) where • A = {a1, a2, . . . , an} is a set of agents. • X = {x1, x2, . . . , xm} is a set of variables. • D = {D1, D2, . . . , Dm} is a set of finite, discrete do- mains. Each variable xi takes a value in Di. • F = {f1, f2, . . . , fq} is a set of constraint functions. Each function fi : Di1 × ··· × Dik → R ≥0 specifies the non- negative cost for each combination of xi1,··· , xik. For the sake of simplicity, we assume that each agent holds exactly one variable (and thus the term agent and vari- able could be used interchangeably) and all constraints are binary (i.e., fij : Di × Dj → R ≥0). A solution to a DCOP A DCOP can be represented by a constraint graph where a vertex denotes a variable and an edge denotes a constraint. Fig. 1 (a) presents a DCOP with five variables and seven constraints. For simplicity, the domain size of each variable is four and all constraints are identical as shown in Fig. 1(b). Pseudo Tree A depth first search (Freuder and Quinn 1985; Dechter, Co- hen, and others 2003) arrangement of a constraint graph is a pseudo tree with the property that different branches are independent, and categorizes its constraints into tree edges and pseudo edges (i.e., non-tree edges). Thus, the neighbors of agent ai can be classified into its parent P (ai), children C(ai), pseudo parents P P (ai) and pseudo children P C(ai) based on their positions in the pseudo tree and the type edges they connect with ai. For clarity, we denote all the (pseudo) parents of ai as AP (ai) = P P (ai)∪{P (ai)} and the set of ancestors who share constraints with ai and its descendants as its separators Sep(ai) (Petcu and Faltings 2005b). Fig. 1(c) presents a possible pseudo tree deriving from Fig. 1(a). MB-DPOP and ODPOP MB-DPOP and ODPOP apply an iterative context-based utility propagation to aggregate the optimal global utility. Specifically, MB-DPOP first uses a cycle-cuts idea (Dechter, Cohen, and others 2003) on a pseudo tree to determine cycle-cut variables and groups these variables into clusters. Within the cluster, MB-DPOP preforms a bounded-memory exploration; anywhere else, the utility propagation from DPOP applies. Specifically, agents in each cluster propa- gate memory-bounded utilities for all the contexts of cycle- cut variables. As for ODPOP, each agent adopts an incre- mental and best-first fashion to propagate the context-based utility. Specifically, an agent repeatedly asks its children for their suggested context-based utilities until it can calculate a suggested utility for its parent during the utility propaga- tion phase. The phase finishes after the root agent receiving enough utilities to determine the optimal global utility. Proposed Method In this section, we present a novel complete DCOP algo- rithm which utilizes both search and inference interleaved. Motivation It can be concluded that search can exploit bounds to prune the solution space but the pruning efficiency is closely re- lated to the tightness of bounds. However, most of search- based complete algorithms can only use local knowledge to compute the initial lower bounds, which leads to inefficient pruning. On the other hand, inference-based complete algo- rithms can aggregate the global utility promptly, but their memory consumption is exponential in the induced width. Therefore, it is natural to combine both search and inference xixj012306198137862942532754 by performing memory-bounded inferences to construct ef- ficient lower bounds for search. Unfortunately, the existing hybrid algorithms only perform an approximated inference to construct one-shot bounds in the preprocessing phase, which would lead to inefficient pruning given a limited memory budget. In fact, the bounds can be tightened by the context-based inference. That is, instead of dropping a set of dimensions, named approximated dimensions, to stay be- low the memory budget, we explicitly consider the running- context assignments to a subset of approximated dimensions (i.e., the context patterns) and compute tight bounds w.r.t. the context patterns. Here, we denote an assigned subset of approximated dimensions as decimated dimensions. More specifically, we aim to combine the advantages of search and context-based inference to optimally solve DCOPs. Different from the existing hybrid methods, we compute tight bounds for the running contexts by perform- ing the context-based inference for the context patterns cho- sen from the contexts derived from the search process. Proposed Algorithm Now, we present our proposed algorithm which consists of a preprocessing phase and a hybrid phase. Preprocessing Phase performs a bottom-up dimension and utility propagation to accumulate the approximated di- mensions and establish the initial lower bounds based on these propagated utilities for search. Accordingly, we em- ploy a tailored version of ADPOP with the limit k to prop- agate the approximated dimensions and incomplete utilities (we omit the pseudo code of this phase due to the limited space). Particularly, during the propagation process, each agent ai selects the dimensions Si of its highest ancestors to approximate to make the dimension size of each out- going utility below k. Then, the approximated dimensions SListi (i.e., the dimensions approximated by ai and its de- scendants) and utility preU tili P (ai) sent from ai to its parent can be computed as follows: SListi = Si ∪ ( SListc i ) (1) ∪ ac∈C(ai) preU tili P (ai) = min Si∪{xi}(localU tili ⊗ ( ⊗ ac∈C(ai) preU tilc i )) (2) i and preU tilc Here, SListc i are the approximated dimen- sions and utility received from its child ac ∈ C(ai), respec- tively. localU tili denotes the combination of the constraints between ai and its (pseudo) parents, i.e., localU tili = ⊗ ai∈AP (ai) fij (3) Taking Fig. 1(c) for example, if we set k = 1, the dimen- sions dropped by a4 are {x1, x2}. Thus, the approximated dimensions and utility sent from a4 to a3 are SList4 3 = {x1, x2} and preU til4 (f41 ⊗ f42 ⊗ f43), re- spectively. Hybrid Phase consists of the search part and context- based inference part. The search part uses a variant of SBB on a pseudo tree (i.e., a simple version of NCBB (Chechetka 3 = min {x1,x2,x4} and Sycara 2006)) to expand any feasible partial assign- ments and provides contexts for the inference part. By using such contexts, the inference part propagates context-based utilities iteratively to produce tight lower bounds for the search part. Traditionally, the context-based inference is implemented by considering the assignments to the approximated dimen- sions (that is, the decimated dimensions are equal to the ap- proximated dimensions). For example, MB-DPOP performs an iterative context-based inference by considering each as- signment combination of cycle-cut variables. However, the approach is not a good choice for our case due to the fol- lowing facts. First, the number of the assignments of cycle- cut variables is exponential, which would incur unacceptable traffic overheads. Moreover, the propagated utilities w.r.t. a specific combination may go out of date since another infer- ence is required as long as the assignments change, which would be very common in the search process. Therefore, it's unnecessary to perform inference for each assignment com- bination of the approximated dimensions. Therefore, we consider to reduce the number of context- based inferences by making the propagated context-based utilities compatible with more contexts. Specifically, for agent ai, we consider the decimated dimensions P Listi ⊆ SListi. Then, the specific assignments to P Listi serve as a context pattern and the propagated utilities will cover all the partial assignments with the same context pattern. That is, ai's context pattern can be defined by: ctxti = {(xj, Cpai(xj))∀xj ∈ P Listi} (4) where Cpai refers to ai's received current partial assign- ment, and Cpai(xj) is the current assignment of xj. Taking agent a3 in Fig. 1(c) as an example, given the limit k = 1, we have SList3 = {x1, x2}. Assume that P List3 = {x1}. Thus, only the assignment of x1 will be considered and x4 (i.e., SList3\P List3) will be still dropped during the context-based inference part. Further, as- sume that ctxt3 = {(x1, 0)}. Then, ctxt3 covers four con- texts ({(x1, 0), (x2, 0)},{(x1, 0), (x2, 1)},{(x1, 0), (x2, 2)} and {(x1, 0), (x2, 3)}). Therefore, a3 only need to perform inference for ctxt3 rather than the four contexts above in this case. Selecting a context pattern is challenging as it offers a trade-off between the tightness of lower bounds and the number of compatible partial assignments. Thus, a good context pattern should comply with the following require- ments. First, the good context pattern should be compati- ble with more contexts so as to avoid unnecessary context- based inference. In other words, these assignments are not likely to change in a short term. Second, the context pattern should result in tight lower bounds. Therefore, we propose a context evaluation mechanism to select the context pat- tern according to the frequency of an assignment of each dimension in the approximated dimensions. In more detail, we consider the context pattern consisting of the assign- ments whose frequency is greater than a specified threshold t. Given t, we have P Listi = {xjCnti((cid:104)xj, Cpai(xj)(cid:105)) > t,∀xj ∈ SListi} where Cnti((cid:104)xj, Cpai(xj)(cid:105)) refers to the frequency of Cpai(xj) for xj. With an appropriate t, the as- After the preprocessing phase (line 1), the root agent starts the context evaluation by initializing evali with true (line 2- 3). Besides, it also starts the search part via CPA messages with its first assignment to its children (line 4-5). Upon re- ceipt of a CPA message, ai first holds the previous Cpai, and stores the received Cpai and evali (line 6). Afterwards, it initializes the lower bounds for each child ac ∈ C(ai) ac- cording to its received utilities (line 7, 23-27). Concretely, the lower bound for ac is established by the context-based utility compatible with Cpai received from ac (line 24-25). Otherwise, the bound is computed by the utility received from ac in the preprocessing phase (line 26-27). Next, ai updates Cnti based on Cpai and the previous one (line 8, 28-32). Specifically, for each dimension in SListi, ai clears its counter if its assignment differs from its previous one (line 29-30). Otherwise, ai increases that counter (line 31- 32). Then, ai finds a context pattern ctxti if the pattern for the context-based inference has not been determined (line 9- 10). After finding one, it allocates ctxti and sends the allo- cated patterns via CTXT messages to its children who need to execute the context-based inference (i.e., inf erChildi) (line 11-15, 33-35). Here, ctxtc i , the allocated pattern for ac, is a partition of ctxti based on ac's approximated dimen- sions SListc i (line 33). When receiving a CTXT message, ai allocates the re- ceived pattern if there is any child who needs to perform the context-based inference (line 17, 33-35). Otherwise, it sends its context-based utility to its parent (line 18-19, 36-40). Here, its context-based utility is computed by the following steps. Firstly, it joins its local utility with the context-based utilities from inf erChildi and the utilities from the other children (line 36). Next, it applies ctxti to fix the values of the partial dimensions in Si so as to improve the complete- ness of the utility (line 38). Finally, it drops the dimensions of the utility to stay below the limit k (line 39). After all the context-based utilities from inf erChildi have arrived, ai sends its context-based utility to its parent if it is not the starter of the context-based inference (line 21-22). Considering a3 in Fig. 1(c), assume that the con- text pattern has not been determined and Cnt3 = {((cid:104)x1, 0(cid:105), 1), ((cid:104)x2, 0(cid:105), 1)}. Given t = 1, we have Cnt3 = {((cid:104)x1, 0(cid:105), 2), ((cid:104)x2, 1(cid:105), 1)} and ctxt3 = {(x1, 0)} after a3 receives a CPA with {(x1, 0), (x2, 1)}. Since the approxi- mated dimensions for its child a4 are {x1, x2}, a3 sends a CTXT message with the context pattern {(x1, 0)} to a4. When receiving the pattern {(x1, 0)}, a4 sends the context-based utility ctxtU til4 (f41(x1 = 0) ⊗ 3 = min {x2,x4} f42 ⊗ f43) to a3. Then, a3 uses ctxtU til4 3 to compute the lower bound for a4 after receiving the CPA message with {(x1, 0), (x2, 2)} or {(x1, 0), (x2, 3)}. Theoretical Results In this section, we first prove the effectiveness of the context- based inference on HS-CAI, and further establish the com- pleteness of HS-CAI. Finally, we give the complexity anal- ysis of the proposed method. signments in the context pattern could not change in a short term. On the other hand, if a partial assignment is hard for pruning, then there would be more assignments included in the context pattern, which guarantees the lower bound tight- ness. In addition, we introduce the variable evali to ensure that the descendants of ai perform an inference only for a context pattern at a time. Once ai has found or received a context pattern, evali is set to false to stop the context evaluation. And when the context pattern is incompatible with Cpai, evali is set to true to indicate that ai can find a new context pattern. Next, we will detail how to implement the context eval- uation mechanism and context-based inference part. Algo- rithm 1 presents the sketch of these procedures. We ignore the search part since it is an analogy to the tree-based branch and bound search algorithm PT-ISABB. Algorithm1:HybridphaseforagentaiWhenInitialize():1performADPOPasapreprocessingphase2ifaiistherootthen3evali←true4di←thefirstelementinDi,Cpa←(xi,di)5sendCPA(Cpa,evali)toac∈C(ai)WhenreceivedCPA(Cpa,eval)fromP(ai):6preCpai←Cpai,Cpai←Cpa,evali←eval7InitBounds()8UpdateSCounter()9ifevalithen10ctxti←{(xj,Cpai(xj))Cnti(hxj,Cpai(xj)i)>t,∀xj∈SListi}11ifctxti>0then12AllocateContext()13evali←flase14ctxti←∅15//markaiasthestarterofthecontext-basedinferencepart16//originalCPAmessagehandlerWhenreceivedCTXT(ctxti)fromP(ai):17AllocateContext()18ifinferChildi=0then19SendCtxtUtil()WhenreceivedCTXTUTIL(ctxtUtilc)fromac∈inferChildi:20ctxtUtilci←ctxtUtilc21ifreceivedallCTXTUTILfrominferChildiandctxti>0then22SendCtxtUtil()FunctionInitBounds():23foreachac∈C(ai)do24ifreceivedaCTXTUTILthatiscompatiblewithCpaifromacthen25lbci(di)←ctxtUtilci(xi=di,Cpai(Sep(ac)))26else27lbci(di)←preUtilci(xi=di,Cpai(Sep(ac)))FunctionUpdateSCounter():28foreachxj∈SListi∧(xj,dj)∈Cpaido29ifpreCpai(xj)6=Cpai(xj)then30Cnti(hxj,Cpai(xj)i)←131else32Cnti(hxj,Cpai(xj)i)←Cnti(hxj,Cpai(xj)i)+1FunctionAllocateContext():33ctxtci←{(xj,dj)(xj,dj)∈ctxti,∀xj∈SListci},∀ac∈C(ai)34inferChildi←{acctxtci>0,∀ac∈C(ai)}35sendCTXT(ctxtci)toac,∀ac∈inferChildiFunctionSendCtxtUtil():36F←localUtili∪{ctxtUtilci∀ac∈inferChildi}∪{preUtilci∀ac∈C(ai)\inferChildi}37S0i←{xj∀xj∈Si∧(xj,dj)/∈ctxti}38join←⊗f∈Ff(ctxti)39ctxtUtili←minS0i∪{xi}join40sendCTXTUTIL(ctxtUtili)toP(ai) Lower Bound Tightness Lemma 1. For a given Cpai, the lower bound lbc i (di) of ac ∈ C(ai) for di produced by the context-based utility (ctxtU tilc i ) is at least as tight as the one estab- lished by the utility (preU tilc i (P A) ≥ i (P A), where P A = Cpai(Sep(ac)) ∪ {(xi, di)}. preU tilc Proof. Directly from the pseudo code, S(cid:48)c, the dimensions dropped by ac in the context-based inference part (line 37), can be defined by: i ). That is, ctxtU tilc S(cid:48)c = {xj(xj, dj) /∈ ctxtc,∀xj ∈ Sc} where ctxtc is the context pattern for ac's context-based in- ference, and Sc is the dimensions dropped by ac in the pre- processing phase. Since ai has received ctxtU tilc i from ac, we have ctxtc > 0 (line 34-35, 20-21). Thus, S(cid:48)c ⊂ Sc is established. Next, we will prove Lemma 1 by induction. Base case. ai's children are leaf agents. For each child i (P A) = ( min localU tilc)(P A) S(cid:48)c∪{xc} ctxtU tilc ac ∈ C(ai), we have (cid:88) (cid:88) = min xc ( xj∈AP (ac )\S(cid:48)c ( xj∈AP (ac )\Sc = min xc (cid:88) + xj∈Sc\S(cid:48)c (cid:88) ≥ min xc ( xj∈AP (ac )\Sc = ( min Sc∪{xc} (cid:88) (cid:88) xj∈S(cid:48)c xj∈Sc (cid:88) fcj (xc, dj ) + fcj (xc, dj ) + fcj (xc, xj )) min xj fcj (xc, xj ) min xj (fcj (xc, dj ) − min xj fcj (xc, xj ))) fcj (xc, dj ) + fcj (xc, xj )) min xj xj∈Sc localU tilc)(P A) = preU tilc i (P A) where dj is the assignment of xj in P A. The equation in the third to the fourth step holds since S(cid:48)c ⊂ Sc. Thus, we have proved the basis. Inductive hypothesis. Assume that the lemma holds for all ai's children. Next, we are going to show the lemma holds for ai as well. For each ac ∈ C(ai), we have ctxtU tilc i (P A) = ( min (localU tilc + S(cid:48)c∪{xc} ctxtU tilc(cid:48) c a c(cid:48) ∈inf erChildc (cid:88) (cid:88) (cid:88) + a + a c(cid:48) ∈C(ac )\inf erChildc (localU tilc + ≥ ( min Sc∪{xc} c(cid:48) ∈C(ac )\inf erChildc (localU tilc + ≥ ( min Sc∪{xc} preU tilc(cid:48) c ))(P A) (cid:88) ctxtU tilc(cid:48) c a c(cid:48) ∈inf erChildc c ))(P A) preU tilc(cid:48) (cid:88) preU tilc(cid:48) c ))(P A) a c(cid:48) ∈C(ac ) = preU tilc i (P A) where inf erChildc are ac's children who need to perform the context-based inference. Thus, Lemma 1 is proved. Correctness Lemma 2. Given the optimal solution X∗, costc(X∗), the cost to the sub-tree rooted at ac ∈ C(ai) is no less than the lower bound lbc lbc i (X∗(xi)). i (X∗(xi)). That is, costc(X∗) ≥ Proof. Since we have proved the lower bounds constructed by the context-based inference part are at least as tight as the ones established by the preprocessing phase in Lemma 1, to prove the lemma, it is sufficient to show that costc(X∗) ≥ ctxtU tilc i (X∗). Next, we will prove Lemma 2 by induction as well. Base case. ai's children are leaf agents. For each child ac ∈ C(ai), we have (cid:88) costc(X∗) = fcj (d∗c , d∗j ) aj∈AP (ac ) = localU tilc(X∗) ≥ ( min S(cid:48)c∪{xc} = ctxtU tilc i (X∗) localU tilc)(X∗) where d∗l is the assignment of xl in X∗, and S(cid:48)c is the di- mensions dropped by ac in the context-based inference part. Thus, the basis is proved. Inductive hypothesis. Assume the lemma holds for all ac ∈ C(ai). Next, we will prove the lemma also holds for ai. For each child ac ∈ C(ai), we have fcj (d∗c , d∗j ) + cost(Spa∗c ) = (cid:88) (cid:88) costc(cid:48) (X∗) aj∈AP (ac ) = localU tilc(X∗) + ≥ localU tilc(X∗) + (cid:88) = (localU tilc + a (cid:88) (cid:88) c(cid:48) ∈C(ac ) a c(cid:48) ∈C(ac ) a c(cid:48) ∈C(ac ) costc(cid:48) (X∗) ctxtU tilc(cid:48) c (X∗) c(cid:48) ∈C(ac ) a (localU tilc + ctxtU tilc(cid:48) c )(X∗) (cid:88) (cid:88) c(cid:48) ∈C(ac ) a a ctxtU tilc(cid:48) c ))(X∗) ctxtU tilc(cid:48) c (localU tilc + (cid:88) c(cid:48) ∈inf erChildc c ))(X∗) preU tilc(cid:48) ≥ ( min S(cid:48)c∪{xc} ≥ ( min S(cid:48)c∪{xc} + a c(cid:48) ∈C(ac )\inf erChildc = ctxtU tilc i (X∗) Thus, the lemma is proved. Theorem 1. HS-CAI is complete. Proof. Immediately from Lemma 2, the optimal solution will not be pruned in HS-CAI. Furthermore, it has been proved that each agent will not receive two identical Cpas in the search part from PT-ISABB (Deng et al. 2019), and the termination of HS-CAI relies on the search part. Thus, HS-CAI is complete. Complexity When it performs a context-based inference, ai needs to store the context-based utilities and utilities received from all the overall space complexity is max) where dmax = maxaj∈Sep(ai) Dj, and O(C(ai)dk k is the maximum dimension limit. Since a CTXTUTIL message only contains a context-based utility, its size is its children. Thus, each experiment, we generate 50 random instances and re- port the average of over all instances. Parameter Tuning Firstly, we aim to examine the effect of different ρ on the performance of HS-CAI to verify the effectiveness of the context evaluation mechanism. Specifically, we consider the DCOPs with 22 agents and the domain size of 3. The graph density varies from 0.2 to 0.6 and ρ varies from 0.05 to 0.65. Here, we do not show the experiment results of ρ greater than 0.65 since the larger ρ leads to the exact same results as ρ with 0.65. Fig. 2 presents the network load of HS-CAI(-M) and HS-CAI with different ρ. The average induced widths in this experiment are 8 ∼ 16. It can be seen from the fig- ure that HS-CAI requires much less network load than HS- CAI(-M). That is because HS-CAI performs inference only for the context patterns selected by the context evaluation mechanism rather than all the contexts as HS-CAI(-M) does. Besides, given the memory budget limit k, it can be ob- served that HS-CAI does not decrease all the time with the increase of ρ. This is due to the fact that increasing ρ which leads to large t can decrease the number of context-based in- ferences but also loose the tightness of lower bounds to some degree. Exactly as mentioned above, the context pattern se- lection offers a trade-off between the tightness of lower bounds and the number of compatible partial assignments. Moreover, it can be seen that the best value of ρ is close to 0.25 in HS-CAI(k = 6) while the one in HS-CAI(k = 10) is near to 0.45. Thus, we choose ρ to 0.25 for HS-CAI(k = 6) and 0.45 for HS-CAI(k = 10) in the following comparison experiments. Performance Comparisons Fig. 3 gives the experimental results under different agent numbers on the sparse configuration where we consider the graph density to 0.25, the domain size to 3 and vary the agent number from 22 to 32. Here, the average induced widths are 9 ∼ 17. It can be seen from Fig. 3(a) and (b) that although the hybrid complete algorithms (e.g., HS-AI and HS-CAI) and PT-FB all use the search strategy to find the optimal so- lution, HS-AI and HS-CAI are superior to PT-FB in terms of the network load and message number. This is because the lower bounds in PT-FB cannot result in effective pruning by only considering the constraints related to the assigned agents. Also, given a fixed k, HS-CAI requires fewer mes- sages than HS-AI since the lower bounds produced by the context-based inference are tighter than the ones established by the context-free approximated inference. Besides, it can be seen that HS-CAI(k = 6) can solve larger problems than HS-AI(k = 6) and the inference-based complete algorithms like DPOP and MB-DPOP, which demonstrates the superior- ity of hybridizing search with context-based inference when the memory budget is relatively low. Although inference requires larger messages than search, it can be observed from Fig. 3(b) that HS-CAI incurs less network load than HS-AI, which indicates that HS-CAI can find the optimal solution with fewer messages owing to the effective pruning and context evaluation mechanism. More- over, we can see from Fig. 3(c) that when solving problems (a) k = 6 (b) k = 10 Figure 2: Network load of varying ρ on different densities max). For a CPA message, it is composed of the assign- O(dk ment of each agent and a context evaluation flag. Thus, the size of a CPA message is O(A). Other messages like CTXT only carry an assignment combination of the approximated dimensions, it only requires O(A) space. The preprocessing phase in HS-CAI only requires A− 1 messages, since only the utility propagation are performed. For the search part and context-based inference part in the hybrid phase, the message number of the search part grows exponentially to the agent number with the same as the search-based complete algorithms. And the message num- ber of the context-based inference part is proportional to the number of the context patterns selected by the context eval- uation mechanism. Empirical Evaluation In this section, we first investigate the effect of the parameter t in the context evaluation mechanism on HS-CAI. Then, we present the experimental comparisons of HS-CAI with state- of-the-art complete DCOP algorithms. Configuration and Metrics We empirically evaluate the performance of HS-CAI and state-of-the-art complete DCOP algorithms including PT- FB, DPOP and MB-DPOP on random DCOPs. Besides, we consider HS-CAI without the context-based inference part as HS-AI and HS-CAI without the context evaluation mech- anism as HS-CAI(-M). Here, HS-AI is actually a variant of PT-ISABB in DCOP settings. All evaluated algorithms are implemented in DCOPSovler1, the DCOP simulator de- veloped by ourselves. Besides, we consider the parameter t in HS-CAI related to both h and dmax, where dmax = maxai∈ADi and h is the height of a pseudo tree. There- fore, we set t = (dmax)ρh. Moreover, we choose k = 6 and k = 10 as the low and high memory budget for MB-DPOP, HS-AI, HS-CAI(-M) and HS-CAI. In our experiments, we use the message number and network load (i.e., the size of total information exchanged) to measure the communication overheads, and the NCLOs (Netzer, Grubshtein, and Meisels 2012) to measure the hardware-independent runtime where the logical operations in the inference and the search are accesses to utilities and constraint checks, respectively. For 1 https://github.com/czy920/DCOPSovler 0.20.30.40.50.6Density105106107108Network Load(KB)(cid:1)(cid:1)(cid:2)(cid:3)(cid:2)(cid:4)(cid:1)(cid:1)(cid:2)(cid:3)(cid:5)(cid:4)(cid:1)(cid:1)(cid:2)(cid:3)(cid:6)(cid:4)(cid:1)(cid:1)(cid:2)(cid:3)(cid:7)(cid:4)(cid:8)(cid:9)0.20.30.40.50.6Density105106107108Network Load(KB)(cid:1)(cid:1)(cid:2)(cid:3)(cid:2)(cid:4)(cid:1)(cid:1)(cid:2)(cid:3)(cid:5)(cid:4)(cid:1)(cid:1)(cid:2)(cid:3)(cid:6)(cid:4)(cid:1)(cid:1)(cid:2)(cid:3)(cid:7)(cid:4)(cid:8)(cid:9) (a) Message Number (b) Network Load (c) NCLOs Figure 3: Performance comparison under different agents on sparse configuration (a) Message Number (b) Network Load (c) NCLOs Figure 4: Performance comparison under different agents on dense configuration with the agent number to 28, HS-CAI(k = 6) requires fewer NCLOs than HS-AI(k = 6) in spite of the exponential com- putation overheads incurred by the iterative inferences. This is because that HS-CAI(k = 6) can provide tight lower bounds to speed up the search so as to greatly reduce the constraint checks when solving the large scale problems un- der the limited memory budget. Besides, we consider the DCOPs with the domain size of 3 and graph density of 0.6 as the dense configuration. The agent number varies from 14 to 24 and the average in- duced widths are 8 ∼ 18. Fig. 4 presents the performance comparison. It can be seen from Fig. 4(a) that DPOP and MB-DPOP cannot solve the problems with the agent num- ber greater than 20 due to the large induced widths. Further- more, since the inference-based complete algorithms have to perform inference on the entire solution space, these al- gorithms require much more NCLOs than the other com- petitors as Fig. 4(c) shows. Additionally, although they both perform the context-based inference, it can be seen from Fig. 4(b) and (c) that HS-CAI exhibits great superiority over MB-DPOP in terms of the network load and NCLOs. That is because HS-CAI only performs inference for the con- text patterns extracted by the context evaluation mechanism, while MB-DPOP needs to iteratively perform inference for all the contexts of cycle-cut variables. As for HS-CAI with different k, it can be seen from Fig. 4(a) and (c) that HS- CAI(k = 10) requires fewer messages but more NCLOs than HS-CAI(k = 6). That is because HS-CAI(k = 10) can produce tighter lower bounds but will incur more com- putation overheads than HS-CAI(k = 6). Conclusion By analyzing the feasibility of hybridizing search and infer- ence, we propose a complete DCOP algorithm, named HS- CAI which combines search with context-based inference for the first time. Different from the existing hybrid complete algorithms, HS-CAI constructs tight lower bounds to speed up the search by executing context-based inference itera- tively. Meanwhile, HS-CAI only needs to perform inference for a part of the contexts obtained from the search process by means of a context evaluation mechanism, which reduces the huge traffic overheads incurred by iterative context-based in- ferences. We theoretically prove that the context-based in- ference can produce tighter lower bounds compared to the context-free approximated inference under the same mem- ory budget. Moreover, the experimental results show that HS-CAI can find the optimal solution faster with less traf- fic overheads than the state-of-the-art. In the future, we will devote to further accelerating the search process by arranging the search space with the infer- ence results. In addition, we will also work for reducing the overheads caused by a context-based utility propagation. Acknowledgments This work is funded by the Chongqing Research Pro- gram of Basic Research and Frontier Technology (No.:cstc2017jcyjAX0030), Fundamental Research Funds for (No.:2019CDXYJSJ0021) and Graduate Research and Innovation Foundation of Chongqing (No.:CYS17023). the Central Universities 222426283032Agent number103104105106107Message Number(cid:1)(cid:2)(cid:3)(cid:2)(cid:4)(cid:5)(cid:6)(cid:1)(cid:2)(cid:3)(cid:2)(cid:7)(cid:1)(cid:8)(cid:9)(cid:10)(cid:4)(cid:5)(cid:6)(cid:1)(cid:2)(cid:3)(cid:2)(cid:7)(cid:1)(cid:8)(cid:11)(cid:12)(cid:10)(cid:2)(cid:13)(cid:6)(cid:14)(cid:5)(cid:15)(cid:16)(cid:6)(cid:17)(cid:18)(cid:7)(cid:1)(cid:8)(cid:9)(cid:10)(cid:15)(cid:16)(cid:6)(cid:19)(cid:17)(cid:18)(cid:7)(cid:1)(cid:8)(cid:9)(cid:10)(cid:15)(cid:16)(cid:6)(cid:17)(cid:18)(cid:7)(cid:1)(cid:8)(cid:11)(cid:12)(cid:10)(cid:15)(cid:16)(cid:6)(cid:19)(cid:17)(cid:18)(cid:7)(cid:1)(cid:8)(cid:11)(cid:12)(cid:10)222426283032Agent number104105106107Network Load (KB)222426283032Agent number105106107108NCLOs141618202224Agent Number103104105106107Message Number(cid:1)(cid:2)(cid:3)(cid:2)(cid:4)(cid:5)(cid:6)(cid:1)(cid:2)(cid:3)(cid:2)(cid:7)(cid:1)(cid:8)(cid:9)(cid:10)(cid:4)(cid:5)(cid:6)(cid:1)(cid:2)(cid:3)(cid:2)(cid:7)(cid:1)(cid:8)(cid:11)(cid:12)(cid:10)(cid:2)(cid:13)(cid:6)(cid:14)(cid:5)(cid:15)(cid:16)(cid:6)(cid:17)(cid:18)(cid:7)(cid:1)(cid:8)(cid:9)(cid:10)(cid:15)(cid:16)(cid:6)(cid:19)(cid:17)(cid:18)(cid:7)(cid:1)(cid:8)(cid:9)(cid:10)(cid:15)(cid:16)(cid:6)(cid:17)(cid:18)(cid:7)(cid:1)(cid:8)(cid:11)(cid:12)(cid:10)(cid:15)(cid:16)(cid:6)(cid:19)(cid:17)(cid:18)(cid:7)(cid:1)(cid:8)(cid:11)(cid:12)(cid:10)141618202224Agent Number104105106107Network Load (KB)141618202224Agent Number105106107108NCLOs References [Atlas, Warner, and Decker 2008] Atlas, J.; Warner, M.; and Decker, K. 2008. A memory bounded hybrid approach to distributed constraint optimization. In Proceedings 10th In- ternational Workshop on DCR, 37 -- 51. [Brito and Meseguer 2010] Brito, I., and Meseguer, P. 2010. Improving DPOP with function filtering. In Proceedings of the 9th AAMAS, 141 -- 148. [Chechetka and Sycara 2006] Chechetka, A., and Sycara, K. 2006. No-commitment branch and bound search for dis- tributed constraint optimization. In Proceedings of the 5th AAMAS, 1427 -- 1429. [Dechter, Cohen, and others 2003] Dechter, R.; Cohen, D.; et al. 2003. Constraint processing. Morgan Kaufmann. [Deng et al. 2019] Deng, Y.; Chen, Z.; Chen, D.; Jiang, X.; and Li, Q. 2019. PT-ISABB: A hybrid tree-based com- plete algorithm to solve asymmetric distributed constraint optimization problems. In Proceedings of the 18th AAMAS, 1506 -- 1514. [Farinelli et al. 2008] Farinelli, A.; Rogers, A.; Petcu, A.; and Jennings, N. R. 2008. Decentralised coordination of low-power embedded devices using the max-sum algorithm. In Proceedings of the 7th AAMAS, volume 2, 639 -- 646. [Farinelli, Rogers, and Jennings 2014] Farinelli, A.; Rogers, A.; and Jennings, N. R. 2014. Agent-based decen- tralised coordination for sensor networks using the max- sum algorithm. Autonomous agents and multi-agent systems 28(3):337 -- 380. [Fioretto et al. 2017] Fioretto, F.; Yeoh, W.; Pontelli, E.; Ma, Y.; and Ranade, S. J. 2017. A distributed constraint opti- mization (DCOP) approach to the economic dispatch with demand response. In Proceedings of the 16th AAMAS, 999 -- 1007. [Fioretto, Pontelli, and Yeoh 2018] Fioretto, F.; Pontelli, E.; and Yeoh, W. 2018. Distributed constraint optimization problems and applications: A survey. Journal of Artificial Intelligence Research 61:623 -- 698. [Fioretto, Yeoh, and Pontelli 2017] Fioretto, F.; Yeoh, W.; and Pontelli, E. 2017. A multiagent system approach to scheduling devices in smart homes. In Proceedings of the 16th AAMAS, 981 -- 989. [Freuder and Quinn 1985] Freuder, E. C., and Quinn, M. J. 1985. Taking advantage of stable sets of variables in con- straint satisfaction problems. In Proceedings of the 9th IJ- CAI, volume 85, 1076 -- 1078. [Gershman, Meisels, and Zivan 2009] Gershman, A.; Meisels, A.; and Zivan, R. 2009. Asynchronous forward bounding for distributed COPs. Journal of Artificial Intelligence Research 34:61 -- 88. [Gutierrez, Meseguer, and Yeoh 2011] Gutierrez, P.; Meseguer, P.; and Yeoh, W. 2011. Generalizing ADOPT and BnB-ADOPT. In Proceedings of the 22nd IJCAI, 554 -- 559. [Hirayama and Yokoo 1997] Hirayama, K., and Yokoo, M. 1997. Distributed partial constraint satisfaction problem. In International Conference on Principles and Practice of Constraint Programming, 222 -- 236. [Kim and Lesser 2014] Kim, Y., and Lesser, V. 2014. DJAO: a communication-constrained DCOP algorithm that com- bines features of ADOPT and Action-GDL. In Proceedings of the 28th AAAI, 2680 -- 2687. [Litov and Meisels 2017] Litov, O., and Meisels, A. 2017. Forward bounding on pseudo-trees for DCOPs and AD- COPs. Artificial Intelligence 252:83 -- 99. [Maheswaran et al. 2004] Maheswaran, R. T.; Tambe, M.; Bowring, E.; Pearce, J. P.; and Varakantham, P. 2004. Tak- ing DCOP to the real world: Efficient complete solutions for distributed multi-event scheduling. In Proceedings of the 3rd AAMAS, volume 1, 310 -- 317. [Maheswaran, Pearce, and Tambe 2006] Maheswaran, R. T.; Pearce, J. P.; and Tambe, M. 2006. A family of graphical- game-based algorithms for distributed constraint optimiza- tion problems. In Coordination of large-scale multiagent systems. Springer. 127 -- 146. [Modi et al. 2005] Modi, P. J.; Shen, W.-M.; Tambe, M.; and Yokoo, M. 2005. ADOPT: Asynchronous distributed con- straint optimization with quality guarantees. Artificial Intel- ligence 161(1-2):149 -- 180. [Netzer, Grubshtein, and Meisels 2012] Netzer, A.; Grub- shtein, A.; and Meisels, A. 2012. Concurrent forward bounding for distributed constraint optimization problems. Artificial Intelligence 193:186 -- 216. [Ottens, Dimitrakakis, and Faltings 2017] Ottens, B.; Dimi- trakakis, C.; and Faltings, B. 2017. DUCT: An upper con- fidence bound approach to distributed constraint optimiza- tion problems. ACM Transactions on Intelligent Systems and Technologyc 8(5):69. [Petcu and Faltings 2005a] Petcu, A., and Faltings, B. 2005a. Approximations in distributed optimization. In Interna- tional Conference on Principles and Practice of Constraint Programming, 802 -- 806. [Petcu and Faltings 2005b] Petcu, A., 2005b. optimization. In Proceedings of the 19th IJCAI, 266 -- 271. [Petcu and Faltings 2006] Petcu, A., and Faltings, B. 2006. ODPOP: An algorithm for open/distributed constraint opti- mization. In Proceedings of the 21st AAAI, 703 -- 708. [Petcu and Faltings 2007] Petcu, A., and Faltings, B. 2007. MB-DPOP: A new memory-bounded algorithm for dis- tributed optimization. In Proceedings of the 20th IJCAI, 1452 -- 1457. [Vinyals, Rodriguez-Aguilar, and Cerquides 2009] Vinyals, M.; Rodriguez-Aguilar, J. A.; and Cerquides, J. 2009. Generalizing DPOP: DPOP, a new complete algorithm for DCOPs. In Proceedings of the 8th AAMAS, 1239 -- 1240. [Yeoh, Felner, and Koenig 2010] Yeoh, W.; Felner, A.; and Koenig, S. 2010. BnB-ADOPT: An asynchronous branch- and-bound DCOP algorithm. Journal of Artificial Intelli- gence Research 38:85 -- 133. [Zhang et al. 2005] Zhang, W.; Wang, G.; Xing, Z.; and Wit- tenburg, L. 2005. Distributed stochastic search and dis- and Faltings, B. A scalable method for multiagent constraint tributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks. Ar- tificial Intelligence 161(1-2):55 -- 87.
1801.00464
2
1801
2018-01-25T14:08:35
Comparative Analysis of Human Movement Prediction: Space Syntax and Inverse Reinforcement Learning
[ "cs.MA" ]
Space syntax matrix has been the main approach for human movement prediction in the urban environment. An alternative, relatively new methodology is an agent-based pedestrian model constructed using machine learning techniques. Even though both approaches have been studied intensively, the quantitative comparison between them has not been conducted. In this paper, comparative analysis of space syntax metrics and maximum entropy inverse reinforcement learning (MEIRL) is performed. The experimental result on trajectory data of artificially generated pedestrian agents shows that MEIRL outperforms space syntax matrix. The possibilities for combining two methods are drawn out as conclusions, and the relative challenges with the data collection are highlighted.
cs.MA
cs
Comparative Analysis of Human Movement Prediction: Space Syntax and Inverse Reinforcement Learning Soma Suzuki Center for Advanced Spatial Analysis University College London Abstract Space syntax matrix has been the main approach for human movement prediction in the urban environment. An alternative, relatively new methodology is an agent- based pedestrian model constructed using machine learning techniques. Even though both approaches have been studied intensively, the quantitative comparison between them has not been conducted. In this paper, comparative analysis of space syntax metrics and maximum entropy inverse reinforcement is performed. The experimental result on trajectory data of artificially generated pedestrian agents shows that MEIRL outperforms space syntax matrix. The possibilities for combining two methods are drawn out as conclusions, and the relative challenges with the data collection are highlighted. learning (MEIRL) I. Introduction The problem of predicting human movement in urban environments features prominently in urban planning as the acquired model is considered as the artificial laboratory that enables us to test ideas and hypothesis that are not easy to explore in the real world (Torrens 2015). Historical approach to infer pedestrian movement is a methodology developed in space syntax community, in which city is represented as a connectivity graph so as to explain human movement rate in each space (Hillier 1993). Even though it turned out that some defined metrics are correlated to human movement rates in the city, it is most unlikely that humans move merely based on the number of links each space has. An alternative promising approach to predict pedestrian movement is to generate human-like agent through learning humans' preferences on road choice given observational trajectory data. This approach is known as Inverse Reinforcement Learning (IRL) in Markov Decision Process (MDP) in machine learning community (Ng and Russell 2000). IRL has been already studied intensively for predicting human movement (Ziebart the valid However, comparison between IRL and space syntax matrix has not been performed. This paper conducts a comparative analysis of two methods for predicting human movement in the urban environment. In section II, space syntax approach for modeling human movement is explained. Next, section III introduces Maximum Entropy Inverse Reinforcement Learning (MEIRL) to generate human-like agents. Then, the quantitative comparison between space syntax matrix and MEIRL is conducted in section IV. Finally, 2008). the possibility of combining space syntax matrix and MEIRL and the future work is discussed as conclusion in section V. II. Space Syntax Metrics First developed by Hillier in University College London (Hillier 1984), space syntax has grown into an independent research area. Primarily, space syntax is a methodology for investigating spatial complexities in an attempt to identify its particular structure that resides at the level of the entire configuration. The methodology is based on the theory that the form-function relation in cities reflects the structural properties of its configuration (Hillier 1998). Through enormous empirical study, it turns out that space syntax metrics can capture human movement (Penn 1998) and has been widely adopted on human movement prediction. In space syntax approach, the city is first represented as connectivity graph, consisting of nodes representing spaces and edges if the corresponding spaces are intersected as shown in Figure 1. Then, individual spaces are ranked based on space syntax matrix for inferring human movement rates. Figure 1: A fictive city (a) and connectivity graph (b) Among various space syntax metrics, researchers in space syntax community claim that pedestrian movement is most well- described by local integration. As illustrated below, local integration is a normalized closeness centrality initially developed in social network analysis (Scott 2000). Space Syntax Metrics: Local Integration Local integration is based on the concept of depth, which assesses how far it is from a node to other nodes within 2 steps. For any particular node in the connectivity graph, the distance (or step) between point and point j denotes the length of the shortest path linking them, if any; otherwise = ∞. For all points, the following set of axioms holds: = 0 only if i = j , with dij dij • • • dij dij ≥ 0 dij = dji dij + djk ≥ dik To obtain local integration, closeness centrality of a node needs to be calculated first. Closeness centrality measures the centrality of a node in a network, which is obtained as the reciprocal of the sum of the number of the steps to other nodes. Thus closeness centrality of node i within two steps is calculated as follows: Ci = 1 ∑k j dij (i f dij ≤ 2) where k represents the number of nodes in the connectivity graph. For instance, node 1 has two nodes in step one and 1 node in step two, thus the sum 1 / (2 × 1 + 1 × 2) indicates the closeness centrality of node 1 considering two steps. Then, the reciprocal of closeness centrality divided by the number of nodes involved minus one leads to local mean depth MD. Finally, by standardizing the variation of mean depth MD between zero and one, relative asymmetry RA is obtained as the local integration of a node (Hillier 1984). MDi = Ci k − 1 2(MDi − 1) R Ai = k − 2 Thereafter individual space is ranked according to the relative asymmetry RA to predict pedestrian movement rate in each space. Even though why the closeness centrality or local integration can be adopted to infer human movement is not clearly justified, a vast amount of empirical data proves that local integration works very well for predicting pedestrian movement in the city. III. Maximum Entropy IRL The alternative approach to predict pedestrian movement is to learn human preference and generate human-like agent. In this section, Maximum Entropy Inverse Reinforcement Learning (MEIRL) is introduced as the methodology for learning pedestrians' preferences. Inverse Reinforcement Learning (IRL) is a problem in Markov Decision Process (MDP), that is, the problem of extracting a reward function given observed, optimal behavior (Ng and Russell 2000). Markov Decision Process A finite MDP is a tuple (S, A, where , γ, R ), Psa S is a finite set of N states { }. sn A is a set of K actions { a1, a2, …, }. ak s1, s2, …, is state transition probabilities upon Psa taking action a in state s. γ ∈ R : 𝕊 × 𝔸 → ℝ that depends on state and action. [0,1] is the discount factor. is the reward function π* π* : a1, a2, 𝕊 → 𝔸 sn Psa [0,1] and a policy π : The classical problem of MDP is to find the optimal policy such that expected reward is maximized. Inverse Reinforcement Learning Conversely, Inverse Reinforcement Learning (IRL) problem consists of finding the reward function from an observed policy. More specifically, given a finite space S = { s1, s2, …, }, set of actions A = { …, }, ak , a discount factor transition probabilities , the goal of γ ∈ 𝕊 → 𝔸 IRL is to find a reward function such that π is an optimal policy . The acquired reward function explains the intrinsic preference of policy demonstrator, or expert agents. Therefore, learning reward function through IRL enables us to generate artificial agents that behave in such a way that pedestrians "would" do in the city. Training data for IRL is a set of m independent trajectories sampled from the expert's (pedestrians) policy Learning optimal policy from experts' demonstrations is called imitation learning. In the imitation learning setting, the targeted reward function is approximated based on path feature counts, , which is the Fζ = ∑ Sj∈ζ sum of the state features along the path. Thus, that linearly maps given the reward weight θ each state feature to a state reward value, the total reward value of a trajectory is: D = {ζ1, ζ2, . . . , ζm} . πE Fsj Fsj Rθ(Fζ) = θTFζ = ∑ sj∈ζ θTFsj The problem of imitation learning, therefore, consists of approximating the reward weight by matching feature counts between expert θ agent's policy and the learner agent's policy. Maximum Entropy IRL To obtain the distribution of path that performs one-to-one correspondence to feature counts, the principle of maximum entropy (Jaynes 1957) is employed. In other words, the adopted distribution of path does not exhibit any additional preferences for some paths beyond feature counts (Ziebart 2008). The probability of a path to be ζi chosen by an agent under reward weight is θ given as follows: P(ζiθ) = 1 Z(θ) = m ∑ ζ∈D Z(θ) exp(θTFζi) exp(θTFζ) θ * Z(θ) is a where the partition function normalized constant. Estimating optimal reward weight implies maximizing the likelihood of the observed data under the D maximum entropy probability distribution illustrated above. The optimal reward weight is then obtained using the gradient of the θ * (log) likelihood. θ* = arg max θ L(θ) L(θ) = 1 M = 1 M = 1 M m ∑ ζ∈D m ∑ ζ∈D m ∑ ζ∈D logP(ζ θ) log 1 Z(θ) exp(θTFζ) θTFζ − logZ(θ) = 1 M m ∑ ζ∈D θTFζ − log m ∑ ζ∈D exp(θTFζ) m Fζ Thus, the gradient of the log-likelihood is ∇θ L(θ) = 1 ∑ M ζ∈D ∑m ζ∈D exp(θTFζ) ∑m ζ∈D exp(θTFζ) m dθTFζ dθ − m P(ζ θ)Fζ ∑ ζ∈D P(sθ)Fs = 1 ∑ Fζ − M ζ∈D = F − ∑ F s∈ζ where the is the expected state feature count of an expert agent. Therefore, the gradient is obtained as the difference between the expected state feature counts of expert agents and the expected state feature counts of learner agents, which can be expressed in terms of expected state visitation frequencies P(sθ) . A pseudocode is presented below. Pseudocode Maximum Entropy IRL θ ← pr ng() and gather D for n = 1 : N do Rθ ← RewardUpdate(θ) πθ ← PolicyUpdate(Rθ) P(sθ) ← FrequencyCompute(πθ) ∇θ L(θ) ← GradCompute(P(sθ)) θ ← ParamUpdate(∇θ L(θ)) selected area. The brief process flow of API is shown in Figure 2. First, geographic data on OSM is downloaded in the selected area by using R package Osmar as illustrated in Figure 3. Then, as only the street data is needed for the trace generation, the street network is extracted from the downloaded geographical data as shown in Figure 4. It is done by selecting data that is tagged as "highway" which is the main key used for identifying any kind of road, street or path on OpenStreetMap. Next, the highway-osmar object is converted into a graph object in order to compute the shortest path. In the graph representation, each node represents an intersection and edge corresponds to a road as shown in Figure 5. Finally, using R package Igraph, the shortest path between randomly specified starting nodes and goal nodes are computed based on Dijkstra's shortest path algorithm. 400 trajectories dataset are generated with the random start and goal point as illustrated in Figure 6: 300 training set and 100 testing set. The constructed connectivity graph is also served to define Markov Decision Process for MEIRL methodology. With the optimal reward function parameter , generated agents are assumed to possess θ* the preference similar to real pedestrians. Therefore, the state visitation frequencies under the optimal reward function P(sθ*) parameter is used to rank individual spaces for human movement prediction. θ* IV. Experiment While In this section, the comparison between space syntax matrix and MEIRL is conducted given the trajectory dataset generated by using an open source vendor Open Street Map (OSM). Dataset To acquire plausible model, the vast amount of pedestrian trajectory, or training data is essential. In this experiment, the artificially generated pedestrians are adopted as collecting dataset pertaining to individual walking trajectory is very challenging (Torrens 2011). the current pervasiveness of mobile devices enables the collection of mobile location data at the unprecedented scale and granularity, the challenge invariably remains in associating movement path with the reason "why" people moved as the recorded trajectory. To illustrate, the GPS data of those who are commuting to her office and those who are on the way to a nightclub cannot be used together as the training data to model pedestrian movement: the former will most likely choose the shortest path and the latter will likely be a random walk. With the purpose of facilitating machine learning approach toward human movement prediction in the city, the API is developed so as to be a pipeline for generating ready-to-be-used training dataset. Assuming that people walking along the shortest route are moving in order merely to reach the goal point, this API generates the shortest path from an arbitrary start point to a goal point in the Figure 3: Selecting area in Open Street Map Figure 4: Extracted street network Figure 6: Generated training data. Different colors are introduced only for distinguishing each path. Finally, MEIRL is conducted. The evolution of feature counts difference during the training is presented in Figure 7. In the experiment, the learning rate is set to a large value and gradually reduce as optimization progress. MEIRL performed well, showing quick convergence. Thereafter, the correlation between space syntax matrix and the test data and the correlation between the state visitation frequencies by MEIRL and the test data are compared. Difference between the expected state feature counts e c n e r e f f i d s t n u o c e r u t a e F Figure 5: Connectivity graph Figure 7: Evolution of feature counts difference As a result, MEIRL showed stronger correlation 0.49 than 0.45 of space syntax matrix, meaning state visitation frequencies by MEIRL captures human movement in the city better than space syntax matrix. V. Conclusion The MEIRL approach successfully performed more accurate prediction than space syntax matrix. However, I believe space syntax will be invariably useful in human movement prediction, employed together with presented agent-based approach. A major challenge in applying reinforcement learning in multi- agent model is how to manage the explosive computational cost as the state-action space grows exponentially with the number of agents and the learning becomes prohibitively slow. To alleviate this drawback, as known as structural reinforcement learning it is possible to reduce the size of the state-action space by supplying the model with the partial, but fundamental pedestrian movement in the form of space syntax graph. Future work may involve employing actual raw GPS data with the development of pipeline where the pedestrian trace data is plausibly associated with the label that explains the motivation of the corresponding movement. in virtual Reference Torrens, P. M. (2015) Slipstreaming human geosimulation geographic environments. Ann. GIS 2015, 325–344. Hillier, B., & Penn, A. & Hanson, J. & Grajewski, T. & Xu, J. (1993) Natural movement: configuration and attraction in urban pedestrian movement. Environment and Planning B, 20, 29-66. Ng, A. Y., & Russell, S. J. (2000) Algorithms for inverse reinforcement learning. Icml, 663– 670. Ziebart, B. D., & Maas, A. L., & Bagnell, J. A., & Dey, A. K. (2008) Maximum entropy learning. inverse reinforcement AAAI Conference on Artificial Intelligence. Hillier, B., & Hanson, J. (1984) The Social Logic of Space. Cambridge University Press. Hillier, B. (1998) A note on the intuiting of forms: Three issues in the theory of design. Environment and Planning B: Planning and Design (25th anniversary issue), 37-40. Penn, A., & Hillier, B., & Banister, D., & Xu, J. (1998), Configurational modeling of urban movement networks, Environment and Planning B: planning and design, 25, 59-84. Scott, J. (2000), Social Network Analysis: a handbook,2, Sage Publications Ltd: London. Ng, A. Y., & Russell, S. J. (2000) Algorithms for inverse reinforcement learning. Icml, 663– 670. Lin, Z., & Feygin, S. A. (2016) Simulating Human-like Navigation in Urban Transportation Environments with Multi- agent Deep (Inverse) Reinforcement Learning. Torrens, P., & Li, X., & Griffin, W. A. (2011) Building agent-based walking models by machine-learning on diverse databases of space-time trajectory samples. Trans. Geogr. Inf. Sci. 15, 67–94.
1708.09630
4
1708
2018-04-09T02:25:13
Resilient Autonomous Control of Distributed Multi-agent Systems in Contested Environments
[ "cs.MA", "cs.LG", "eess.SY" ]
An autonomous and resilient controller is proposed for leader-follower multi-agent systems under uncertainties and cyber-physical attacks. The leader is assumed non-autonomous with a nonzero control input, which allows changing the team behavior or mission in response to environmental changes. A resilient learning-based control protocol is presented to find optimal solutions to the synchronization problem in the presence of attacks and system dynamic uncertainties. An observer-based distributed H_infinity controller is first designed to prevent propagating the effects of attacks on sensors and actuators throughout the network, as well as to attenuate the effect of these attacks on the compromised agent itself. Non-homogeneous game algebraic Riccati equations are derived to solve the H_infinity optimal synchronization problem and off-policy reinforcement learning is utilized to learn their solution without requiring any knowledge of the agent's dynamics. A trust-confidence based distributed control protocol is then proposed to mitigate attacks that hijack the entire node and attacks on communication links. A confidence value is defined for each agent based solely on its local evidence. The proposed resilient reinforcement learning algorithm employs the confidence value of each agent to indicate the trustworthiness of its own information and broadcast it to its neighbors to put weights on the data they receive from it during and after learning. If the confidence value of an agent is low, it employs a trust mechanism to identify compromised agents and remove the data it receives from them from the learning process. Simulation results are provided to show the effectiveness of the proposed approach.
cs.MA
cs
Resilient Autonomous Control of Distributed Multi-agent Systems in Contested Environments Rohollah Moghadam, Student Member, IEEE, Hamidreza Modares, Member, IEEE 1 8 1 0 2 r p A 9 ] A M . s c [ 4 v 0 3 6 9 0 . 8 0 7 1 : v i X r a Abstract-An autonomous and resilient controller is proposed for leader-follower multi-agent systems under uncertainties and cyber-physical attacks. The leader is assumed non-autonomous with a nonzero control input, which allows changing the team behavior or mission in response to environmental changes. A resilient learning-based control protocol is presented to find optimal solutions to the synchronization problem in the presence of attacks and system dynamic uncertainties. An observer-based distributed H∞ controller is first designed to prevent propagating the effects of attacks on sensors and actuators throughout the network, as well as to attenuate the effect of these attacks on the compromised agent itself. Non-homogeneous game algebraic Riccati equations are derived to solve the H∞ optimal synchro- nization problem and off-policy reinforcement learning is utilized to learn their solution without requiring any knowledge of the agent's dynamics. A trust-confidence based distributed control protocol is then proposed to mitigate attacks that hijack the entire node and attacks on communication links. A confidence value is defined for each agent based solely on its local evidence. The proposed resilient reinforcement learning algorithm employs the confidence value of each agent to indicate the trustworthiness of its own information and broadcast it to its neighbors to put weights on the data they receive from it during and after learning. If the confidence value of an agent is low, it employs a trust mechanism to identify compromised agents and remove the data it receives from them from the learning process. Simulation results are provided to show the effectiveness of the proposed approach. Index Terms-Autonomous Controller, Resilient Controller, Reinforcement Learning, Multi-agent System, Distributed Con- trol, H∞ control. I. Introduction The term autonomous is a combination of the Greek words auto (self) and nomous (law, rule) [1]. In system theory, an autonomous system is a system that is self-governing and does not explicitly depend on the independent variable. If the independent variable is time, these systems are also called time-invariant systems. On the other hand, in control theory, an autonomous control is a self-governing control system in the sense that it acts independently and does not rely on prior knowledge of the system dynamics and human intervention. An autonomous controller should be able to learn from what it perceives to compensate for partial or incorrect prior knowledge. Autonomous control design for a multi-agent system (MAS) has gained significant interest due to applications in a variety Rohollah Moghadam and Hamidreza Modares are with the Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Emerson Hall, 301 W 16th St, Rolla, MO 65409 USA (e-mails: [email protected], [email protected]). Manuscript received December 30, 2017; of disciplines from robot swarms to power systems and wire- less sensor networks. In a distributed MAS, decisions are made locally using only agents' available information. This provides scalability, flexibility and avoids a single point of failure [2]– [5]. However, designing autonomous controllers for MASs is challenging and requires learning from experience. Moreover, distributed MASs are prone to cyber-physical attacks. Due to their networked nature, attacks can escalate into disastrous consequences and significantly degrade the performance of the entire network [6]. In a contested environment with adversarial inputs, corrupted data communicated by a single compromised agent can be propagated to the entire network through its neighbors. This corrupted data will be used by autonomous agents for learning which misleads the entire network and, consequently, causes no emergent behavior or an emergent misbehavior. The main bottleneck in deploying successful distributed MASs is designing secure control protocols that can learn about system uncertainties while showing some level of functionality in the presence of cyber-physical attacks. Reinforcement learning (RL) [7]–[9], inspired by learning mechanisms observed in mammals, has been successfully used to learn optimal solutions online in single agent systems for both regulation and tracking control problems [10]–[16] and recently for MASs [17]–[19]. Existing RL-based controllers for leader-follower MASs assume that the leader is passive and without any control input. In this case, the leader is not able to react to environmental or mission changes by replanning its trajectories. On the other hand, existing active leader controllers (e.g., [20]–[22]) are not autonomous as they require having complete knowledge of the leader and agent's dynamics. Moreover, these approaches are generally far from optimal and only take into account the stability, which is the bare minimum requirement. Finally, existing learning-based RL solutions to MASs are not resilient against cyber-physical attacks. Resilient control protocols for MASs have been designed in the literature [23]–[35] to mitigate attacks. Most of the existing approaches either use the discrepancy among the state of agents and their neighbors to detect and mitigate attacks, or use an exact model of agents to predict expected normal behavior and, thus, detect an abnormality caused by attacks. However, we will show that a stealthy attack on one agent can cause an emergent misbehavior in the network with no discrepancy between agent's states and, therefore, the former approaches cannot mitigate these type of attacks. Moreover, this discrepancy could be a result of a legitimate change in the state of the leader. Blindly rejecting the agent's neighbor information can harm the network connectivity and the convergence of the network. On the other hand, model- based approaches require a complete knowledge of the agent's dynamics, which may not be available in many practical applications and avoid the design of autonomous controllers. H∞ control protocols have also been proposed to attenuate the effect of disturbances in MASs [36]–[38]. However, as shown in this paper, standard H∞ control protocols can be misled and become entirely ineffective by a stealthy attack. To the author's knowledge, designing an autonomous and resilient controller that does not require any knowledge of the agent's dynamic and can survive against cyber-physical attacks has not been investigated yet. This paper presents an autonomous and resilient dis- tributed control protocol for leader-follower MASs with a non- autonomous leader. To alleviate the effects of attacks on the MASs, a distributed observer-based control protocol is first developed to prevent corrupted sensory data caused by attacks on sensors and actuators from propagating across the network. To this end, only the leader communicates its actual sensory information and other agents estimate the leaders' state using a distributed observer. To further improve resiliency, distributed H∞ control protocols are designed to attenuate the effect of the attacks on the compromised agent itself. Non-homogeneous game algebraic Riccati equations (ARE) are derived for solv- ing the optimal H∞ synchronization problem for each agent. An off-policy RL algorithm is developed to learn the solutions of the non-homogeneous game ARE without requiring the complete knowledge of the agent's dynamics. To avoid the usage of corrupted data coming from compromised neighbors during and after learning, a trust-confidence based control protocol is developed for attacks on communication links and attacks that hijack the entire node. A confidence value is defined for each agent based solely on its local evidence. Then, each agent communicates its confidence value with neighbors to indicate the trustworthiness of its own informa- tion. Moreover, a trust value is defined for each neighbor to determine the significance of the incoming information. The agent incorporates these trust values along with the confidence values received from neighbors in its update law to eventually isolate the compromised agent. II. Preliminary (cid:105) (cid:104) ai j matrix, with di =(cid:80) In this section, a background of the graph theory is pro- vided. A directed graph G consists of a pair (V,E) in which V = {v1,··· , vN} is a set of nodes and E ⊆ V × V is a set of edges. The adjacency matrix is defined as A = , with ai j > 0 if (v j, vi) ∈ E, and ai j = 0 otherwise. The set of nodes vi with edges incoming to node v j is called the neighbors of node vi, namely Ni = {v j : (v j, vi) ∈ E}. The graph Laplacian matrix is defined as L = D − A, where D = diag(di) is the in-degree j∈Ni ai j as the weighted in-degree of node vi. A (directed) tree is a connected digraph that in-degree of every node is one, except the root node. A directed graph has a spanning tree if there exists a directed tree that connects all nodes of the graph. A leader can be pinned to multiple nodes, resulting in a diagonal pinning matrix G = diag (bi) ∈ RN×N with the pinning gain bi > 0 when the node has access to the 2 leader node and bi = 0, otherwise. 1N is the N-vector of ones and Im(R) denotes the range space of R. λmin(A) denotes the minimum eigenvalue of matrix A. (cid:107).(cid:107) denotes the Euclidean norm for vectors or the induced 2-norm for matrices. The notation A ⊗ B is Kronecker product of matrices A and B. Assumption 1. The communication graph has a spanning tree, and the leader is pinned to at least one root node. III. Standard Synchronization Control Protocols and Their Vulnerability to attacks In this section, the standard synchronization control protocol for MASs is reviewed and its vulnerability to attacks is examined. Consider N agents with identical dynamics given by xi = Axi + Bui + Dωi (1) where xi(t) ∈ Rn and ui(t) ∈ Rm are the state and control input of agent i, respectively. ωi(t) ∈ Rd denotes the attack signal injected into agent i. A, B, and D are the drift, input, and attack dynamics, respectively. Assumption 2. The pair (A, B) is stabilizable. Let the leader dynamics be non-autonomous, i.e., the control input of the leader is a nonzero signal, and is given by (2) where ζ0(t) ∈ Rn and v0(t) ∈ Rm denote the state and input of the leader, respectively. A and B are the same as other agents. ζ0 = Aζ0 + Bv0 Assumption 3. The control input v0 is given and bounded, i.e., there exists a positive constant vm such that (cid:107)v0(cid:107) ≤ vm. Define the tracking error for agent i as (3) Define the local neighborhood tracking error ei ∈ Rn for εi = xi − ζ0 agent i as [39] ei = ai j(x j − xi) + bi(ζ0 − xi) (4) (cid:88) j∈Ni where bi (cid:62) 0 is the pinning gain, and bi > 0 for at least one root node i. The standard distributed tracking control protocol is then given by [40] ui = c1Kei + c2h(Kei) (5) where c1 and c2 are positive scalar coupling gains, and K is a design matrix gain. h(.) is a nonlinear function defined for x ∈ Rn such that  x(cid:107)x(cid:107) , 0, h(x) = i f (cid:107)x(cid:107) (cid:44) 0 i f (cid:107)x(cid:107) = 0 It can be seen that the following condition is required to assure synchronization (6) (7) εi → 0 ⇔ xi → ζ0 Theorem 1. [40] Consider the agent dynamics (1)-(2) with ωi(t) = 0. Suppose Assumptions 1 and 3 hold. Then, agents synchronize to the leader, i.e., εi → 0 ∀i ∈ N under the controller (5) with c1 ≥ (1/λmin(L + G)), c2 ≥ vm and K = −BT P−1, where λmin is the minimum eigenvalue of (L+G) and P > 0 is a solution to the linear matrix inequality AP + PAT − 2BBT < 0. Definition 1. In a graph, agent i is reachable from agent j if there exists a directed path of any length from node j to node i. Definition 2: An agent is called a disrupted/compromised agent, if it is directly under attack. Otherwise, it is called an intact agent. It is shown in [40] for the proof of Theorem 1 that in the absence of attack, if the controller is designed to make the local neighborhood tracking error for all agents go to zero, the synchronization is guaranteed. In the following theorem, however, it is shown that even though the local neighborhood tracking (4) goes to zero for all agents, in the presence of a specific designed attack, it does not guarantee synchronization for intact agents that have a path to a compromised agent. Note that the leader is assumed to be a trusted agent with more advanced sensors and with higher security. Note also that the leader does not receive any information from other agents, which makes it secure against attacks on other agents and the communication network. Lemma 1 [41]. Let Σ be a diagonal matrix with at least one nonzero positive element, and L be the Laplacian matrix. Then, (L + Σ) is a nonsingular M-matrix. Theorem 2. Consider the MAS (1)-(2) with the control pro- tocol (5). Assume that agent i is under an attack ωi that is generated by ωi = Γωi , where the eigenvalues of Γ are a subset of the eigenvalues of the agent's dynamic A. Then, intact agents that are reachable from agent i do not synchronize to the leader, while their local neighborhood tracking error (4) is zero. Proof. See Appendix A. Remark 1. H∞ is one of the most common and effective approaches to attenuate disturbances. However, Theorem 2 implies that the standard H∞ controllers for MASs that use the exchange of relative information can be bypassed by the attacker. This is because although the goal of the H∞ is to attenuate the effect of adversarial input on the local neighborhood tracking error, Theorem 2 shows that the at- tacker can make the local neighborhood tracking error go to zero, while agents are far from synchronization. Therefore, a different controller framework and H∞ controller is presented in this paper that guarantees attenuating attacks on sensors and actuators of a compromised agent. (cid:3) IV. The Proposed Attack Mitigation Approach In this section, the proposed resilient control approach is presented. First, a distributed observer-based H∞ control protocol is developed to not only prevent attacks on physical components, i.e., attacks on sensors and actuators (we call them Type 1 attacks), from propagating throughout the net- work but also attenuate their effect on the compromised agent. Then, a trust-confidence based control protocol is examined 3 to identify and isolate neighbors that are compromised by attacks on the communication network or attacks that take over the control of a compromised agent (we call them Type 2 attacks). Figure 1 shows the structure of the proposed control framework. Fig. 1: The proposed autonomous and secure distributed H∞ controller for multi-agent systems. The observer and H∞ controller allow mitigation of Type 1 attacks and designing autonomous controllers for agents. The trust-confidence mechanism mitigates Type 2 attacks. A. Overall structure of the proposed approach We now formulate a resilient observer-based H∞ distributed control protocol for MAS (1)-(2) in the presence of attacks. In the proposed approach, only the leader communicates its actual sensory information and followers do not exchange their actual state information. This stops propagating Type 1 attacks from a compromised agent to others. To this end, the followers estimate the leader's state using a distributed observer and communicate this estimation to their neighbors to achieve consensus on the leader state. The distributed observer is designed as ∀i = 1, . . . , N (8)  ri = Ari + Bυi (cid:88) υi = cFηi + ρh(Fηi) ηi = j∈Ni where h(.) is defined in (6) and ηi is a revisited local neigh- borhood observer tracking error for agent i defined by C j(t)Ti j(t)ai j(r j − ri) + bi(ζ0 − ri) (9) where 0 ≤ C j(t) ≤ 1 is the confidence of agent j and 0 ≤ Ti j(t) ≤ 1 is the trust value of agent i to its neighbor j. The confidence and trust values along with the design parameters c, ρ and F in (8) are designed in subsection B to mitigate Type 2 attacks, i.e., to identify and remove entirely compromised agents or attacks on communication network, and thus guarantee that ri → ζ0 for all intact agents, regardless of attacks. To further increase resiliency at the local level and attenuate the effects of Type 1 attacks on the compromised agent itself, the control input ui in (1) is designed as a function of ri and xi in subsection C (see Theorem 4) to guarantee that the following bounded L2-gain condition is satisfied for the agent i (cid:82) ∞ (cid:82) ∞ 0 e−αit(cid:107)zi(t)(cid:107)2dt 0 e−αit(cid:107)ωi(t)(cid:107)2dt ≤ γ2 i (10) with zi defined as the controlled or performance output and is obtained by (cid:107)zi(cid:107)2 = (xi − ζ0)T Qi(xi − ζ0) + uT i Riui (11) 4 where αi and γi represent the discount factor and the attenua- tion level of the attack ωi, respectively, and the weight matrices Qi and Ri are symmetric positive definite. If condition (10) is satisfied, then, the H∞ norm of Tωi,zi, i.e., the transfer function from the attack ωi to the performance output zi, is less than or equal to γi. Note also that ωi(t) does not need to be a bounded energy signal because of the discount factor αi. The problem formulation can now be given as follows. Problem 1. (Resilient H∞ Synchronization Problem) Con- sider N agents defined in (1)-(2) with the distributed observer given by (8)-(9). Design the control protocol ui = fi(xi, ri, vi) in (1) along with C j(t), Ti j(t), c, ρ and F in (8)-(9) such that 1) The bounded L2-gain condition (10) is satisfied when 2) The ωi (cid:44) 0. (cid:107)xi(t) − ζ0(t)(cid:107) → 0, i = 1, . . . , N when ωi = 0. synchronization problem is solved, i.e., B. The proposed distributed observer design The distributed observer (8)-(9) only communicates the observer state ri, which cannot be affected by Type 1 attacks on physical components. A trust-confidence mechanism is designed in the following to mitigate Type 2 attacks. To this end, a confidence value is defined for each agent to indicate the trustworthiness of its own observer information. Agents communicate their confidence value with their neighbors to alert them to put less weight on the information they are receiving from them, depending on how low their level of confidence is. This slows down the propagation of Type 2 attacks. If an agent is not confident about its own observer information, then assigns a trust value to its neighbors and incorporates these trust values along with the confidence values received from neighbors in its update law to determine the significance of the incoming information. Figure 2 shows the block diagram of the proposed distributed monitor. it Note also that it is assumed that the attacker designs its signal based on Theorem 2 to deceive intact agents, so that they cannot monitor any anomaly by examining their local neighborhood tracking error. This is considered the worst attack scenario. If, however, the attacker does not satisfy the conditions of Theorem 2, then, intact agents can easily detect attacks by using KullbackLeibler divergence criteria to check discrepancy between the normal statistical properties of the local neighborhood tracking error and its actual ones [42]. 1) Confidence value: A confidence value is defined for each agent which shows the validity of its information. To proceed, define oi = (cid:107)ηi(cid:107) Fig. 2: The distributed monitor structure. for agent i . In contrast to oi, si does not converge to zero if agent i is in the path of an attacker. This is because si = 0 requires r j = ri = ζ0, ∀ j ∈ Ni, which indicates that agent i and its neighbors are synchronized and, therefore, are not in the path of an attacker. In the absence of attack, oi and si converge to zero and have the same behavior. Therefore, by comparing oi and si one can detect whether or not the agent is in the path of a compromised agent. The confidence value Ci(t) in (9) for an intact agent i is defined as (cid:90) t 0 Ci(t) = β e−β(t−τ)qi(τ)dτ with qi(t) = ∆i ∆i + (cid:107)si(t) − oi(t)(cid:107) (14) (15) where β > 0 is a discount factor used to determine how much we value the current experience with regard to the past experiences. ∆i is a threshold value to account for factors other than attacks, i.e., channel fading and disturbance. If agent i is not in the path of any compromised agent, (cid:107)si − oi(cid:107) is zero almost all the time and, consequently, Ci is almost one. On the other hand, if agent i is affected by an attacker, then (cid:107)si − oi(cid:107) (cid:29) ∆i, and Ci is less than one and its value depends on how close the agent is to the source of the attack. Equation (14) can be implemented by the differential equation Ci(t) + βCi(t) = βqi(t). The worst case scenario is assumed in which a disrupted agent broadcasts the confidence value 1 to its neighbors to fool them. 2) Trust value: The trust value is defined to determine the importance of the incoming information of each agent's neighbor. To calculate the trust value of agent i to agent j , j we first measure the difference between the state of agent and the average of the state of all neighbors of agent i using di j(t) = κ (cid:90) t (cid:13)(cid:13)(cid:13)r j(t) − hi(t) (cid:13)(cid:13)(cid:13) + θi θi 0 e−κ(t−τ)li j(t)dτ (16) r j (17) (cid:88) j∈Ni , hi = 1 Ni with li j(t) = for agent i where ηi is defined in (9). Based on Theorem 2, ηi and, consequently, oi converges to zero for intact agents. Now, define (cid:88) j∈Ni si = ai j (cid:13)(cid:13)(cid:13)r j − ri (cid:13)(cid:13)(cid:13) + bi (cid:107)ζ0 − ri(cid:107) where hi denotes the average value of the neighbors of agent i and Ni is the number of neighbors of agent i . The discount factor κ > 0 determines how much we value the current expe- rience of interaction with regard to the past experiences. θi is a threshold value to take into account factors other than attacks. (12) (13) (cid:16) (18) Ci(t), di j(t) Ti j(t) = max (cid:13)(cid:13)(cid:13) ∀ j ∈ Ni Equation (16) can be implemented as di j(t) + κdi j(t) = κli j(t). Now, we define the trust value of agent i to its neighbor j given as Ti j(t) in (9) as (cid:17) Ti j can also be normalized to satisfy (cid:80) (cid:13)(cid:13)(cid:13)r j − hi j∈Ni Ti j(t) = 1. If there is no attack and the network is also synchronized, then, is one ∀ j ∈ Ni. Moreover, when there is no attack and agent i receives considerably different values from its neighbors before synchronization, e.g. as a result of a change in the state of the leader, since Ci is close to one as there is no attack, Ti j is almost one ∀ j ∈ Ni. On the other hand, if agent i is affected by an attack, then Ci is small and the trust of agent i to agent j depends on is zero, and, consequently, Ti j (cid:13)(cid:13)(cid:13) , j ∈ Ni. (cid:13)(cid:13)(cid:13)r j − hi It is shown in Theorem 3 that the proposed observer-based distributed control protocol (8)-(9) guarantees synchronization of intact agents, if the following assumption is satisfied. Assumption 4. The network connectivity is at least (2 f + 1), i.e., at least half of the neighbors of each agent are intact [43]. Define H = (L + G) (19) where L is the graph Laplacian matrix and G is the diagonal pinning matrix.Then, based on Lemma 1, H is a non-singular M-matrix. The following lemmas are used in the proof of Theorem 3. Lemma 2 [44]. Let P > 0 and Assumption 2 be satisfied. Then, the solution P to the following ARE equation AT P + PA + I − PBBT P = 0, (20) is positive definite. Lemma 3 [45]. Let Assumption 1 be satisfied. Then, there exists a positive vector φ = [φ1, . . . , φN]T such that (ΦH + H T Φ) > 0 where Φ = diag{φ1, . . . , φN}, φ = (H T )−11N, and H is defined in (19). Theorem 3. Let Assumption 4 be satisfied. Consider the dynamic observer defined in (8)-(9) with C j(t) given by (14) and Ti j(t) defined in (18). Let F = −BT P, c (cid:62) φmax to the algebraic Riccati equation (20) and φmax = max Then, ri → ζ0 for all intact agents. i=1,...,N Proof. See Appendix B. (cid:14)λmin(ΦH + H T Φ) and ρ ≥ vmax, where P is the solution (φi). (cid:3) Remark 2. Note that for Type 1 attacks, the proposed control framework does not impose any constraints on the number of neighbors or the total number of agents under attacks. Note also that in contrast to existing mitigation approaches, we do not discard the neighbor's information for an agent based solely on the difference between their values. Therefore, when the discrepancy between agents is because of a legitimate change in the leader, the confidence and trust values for each agent become 1 and, consequently, all agents synchronize to the leader. 5 The following subsection shows how to design a resilient observer-based H∞ distributed controller. Non-homogeneous game AREs are derived for solving the optimal H∞ synchro- nization problem. C. The proposed resilient controller It was shown in Theorem 3 that ri → ζ0 for all intact agents regardless of attacks. Similar to [46], one can show that if ui(t) in (1) is designed to guarantee xi → ri, using the separation principle, one can guarantee xi → ζ0. Therefore, in the following, the control input ui is designed to solve Problem 1 with ζ0 replaced with ri. as i(t) = xi(t) − ri(t). The dynamic of the error becomes Define the error between the state of agent i and its observer i(t) = Ai(t) + Bui(t) + Dωi(t) − Bυi(t) Define the augmented system state as Xi(t) = [i(t)T ri(t)T ]T ∈ R2n Using (21) and (8) together yields the augmented system as Xi = T Xi + B1ui + D1ωi + E1υi with T = (cid:34) A 0 0 A (cid:35) (cid:35) (cid:34) B 0 , B1 = , D1 = (21) (22) (cid:35) (23) , (24) (cid:35) (cid:34) D 0 (cid:34) −B (cid:35) B 0 0 E1 = (cid:34) Q1i 0 The performance output (11) in terms of the augmented state (22) (while ζ0 is replaced with ri) becomes (cid:107)Zi(cid:107)2 = XT i QiXi + uT i Riui, Qi = Using (8) and (22), the control protocol for the augmented system can be written as the following non-homogeneous control input ui = KiXi + gi (25) Note that gi is used to compensate the non-homogeneous term υi in the augmented system (23). With the aid of (10) (while ζ0 is replaced with ri), define the discounted performance function in terms of the augmented system (23) as i QiXi + uT XT i Riui − γi 2ωi T ωi (26) dτ The value function for linear systems is quadratic with the form as Vi(Xi(t)) = Xi(t)T PiXi(t) + 2XT i Πi + Γi (27) i QiXi + uT i Riui − γ2 and the corresponding Hamiltonian function becomes i ωi − αiVi + H (Xi, ui, ωi) (cid:44) XT Remark 3. It is assumed here that the full state of agents is available for measurement. However, if not available, the proposed design procedure can be extended for the case of dynamics controllers in which the states of agents are esti- mated using a local observer. This is because local observers dVi dt i ωT (28) (cid:90) ∞ J(Xi, ui, ωi) = e−αi(τ−t)(cid:104) t (cid:105) can estimate agents' state without any exchange of information with their neighbors. On the other hand, if the entire agent is compromised and its state observer is manipulated, its neighbors detect it and discard its information using the proposed trust-confidence mechanism. Theorem 4. (Non-homogenous game ARE) The optimal solu- tion for the discounted performance function (26) is i = −Ri u∗ −1BT 1 (PiXi + Πi) (29) the following non-  where Pi and Πi are the solution of homogeneous game ARE PiT + T T Pi − αiPi − PiB1Ri Πi = Γi = αiΓi + ΠT −1BT 1 Pi + 1 − T T − 1 Πi − 1 αiI2n + PiB1Ri i B1Ri −1BT −1BT γ2 i ΠT i D1DT 1 (cid:18) 1 γ2 i 1 γ2 i PiD1DT 1 1 Pi + Qi = 0 PiD1DT (cid:19) Πi − 2υT Πi − PiE1υi Πi i ET 1 (30) (cid:3) Proof. See Appendix C. The following theorem shows that the control protocol (29) along with (30) solve the H∞ synchronization problem. Theorem 5. Consider the MAS (1)-(2) with the observer (8)- (9). Let the control input ui be given as (29)-(30). Then, Problem 1 is solved. Proof. See Appendix D. (cid:3) V. Model-Free Resilient Off-Policy RL for Solving Optimal Synchronization for Intact Agents In this section, an RL algorithm is proposed to solve Problem 1 on-line without requiring any knowledge of the agents' dynamics. The off-policy RL allows separating the behavior policy from the target policy for both control input and attack. In order to find the optimal control (29) without the requirement of the knowledge of the system dynamics, the off-policy RL algorithm [47] is used in this subsection. Off-policy algorithm has two separate stages. In the first stage, an admissible policy is applied to the system and the system information is recorded over the time interval T. Then, in the second stage, without requiring any knowledge of the system dynamics, the information gathered in stage 1 is repeatedly used to find a sequence of updated policies uk i and ω∗ i . To this end, the augmented system dynamics (23) is first written as i converging to u∗ i and ωk ui − uk Xi = T kXi + B1 + D1 (31) i where Xi is defined in (22) and uk i denote the control and disturbance target policies in iteration k to be updated. Now, using (27), one has + E1υi i (cid:17) (cid:16) ωi − ωk i and ωk (cid:16) (cid:17) Vk i (Xi(t)) = Xi(t)T Pk (32) In this case, the control policy and worst case attack signal i Xi(t) + 2XT + Γk i i Πk i 6 (cid:17) − XT (cid:16) Xi(t)T Pk i ) − 2(uk+1 i i (ωk+1 i ) + 2γ2 i Taking time derivative of Vk i along the augmented system dynamic (32) yields (34) i QiXi i + Γk i i )T Ri(uk i (ωk i )T (ωk i Xi(t) + 2XT i Πk )T Ri(ui − uk i ) )T (ωi − ωk i ) Vk i (Xi(t)) = αi −(uk +γ2 The following off-policy integral RL Bellman equation is derived by multiplying both sides of (34) by e−αi(τ−t) and integrating e−αiT Vk = − (cid:19) i )T (ωk i (ωk dτ i ) )T Ri(ui − uk dτ i ) (35) The off-policy RL algorithm presented by iterating on (35) to solve the non-homogeneous game ARE, is listed in Algorithm 1. (cid:90) t+T (cid:18) i (Xi(t + T)) − Vk i (Xi(t)) (cid:90) t+T XT i QiXi + (uk i ) − γ2 i ) − 2(uk+1 )T (ωi − ωk i )T Ri(uk e−αi(τ−t) e−αi(τ−t) i (ωk+1 2γ2 (cid:19) (cid:18) + t i t i The following theorem shows that using the proposed control framework, the learning mechanism is resilient against both Types 1 and 2 attacks. Theorem 6. Consider the MAS (1)-(2) under the control protocol (29) with the observer dynamics given by (8)-(9). Let the off-policy Algorithm 1 be used to learn the gains in (29). Then, Problem 1 is solved, if Assumptions 1 to 4 are satisfied. Proof. Similar to [47], one can show that the off-policy RL Algorithm 1 solves Problem 1 in an optimal manner, as long as ri → ζ0. That is, for intact agents xi → ζ0 and for a compromised agent the L2 condition (10) is satisfied. This boils down the proof to show that ri → ζ0 even if the system is under attack. On the other hand, Theorem 3 shows that ri → ζ0 regardless of attacks. This completes the proof. (cid:3) Remark 4. In the proposed Algorithm 1, steps 4 to 9 for finding the trust and confidence values are continually em- ployed even after learning. However, once the optimal gain is found, the learning steps 10-12 are skipped, because the gains required for the control policy are computed and there is no need for further computation, unless another learning phase is initiated by any change in the agent dynamics. One might argue that the off-policy Algorithm 1 requires to measure the attack signal ωi(t) which is restrictive. However, the off-policy Algorithm can learn about the worst-case attack signal using actual measurable disturbances (either applied intentionally or coming from nature), instead of measuring attack signals. Once it learned the worst-case scenario, it can attenuate attacks without measuring them. VI. Simulation Results In this section, an example is provided to verify the effec- tiveness of the proposed control protocol. The communication graph is given in Fig. 3. Consider 5 agents with dynamics as (cid:35) (cid:34) 0 −4 1 0 (cid:35) (cid:34) 1 0 (cid:35) (cid:34) 1 0 xi + ui + ωi (36) (56) can be written as uk+1 i ωk+1 i = −Ri 1 γ2 i = −1BT DT 1 (Pk i Xi + Πk 1 (Pk i ) i Xi + Πk i ) (33) xi = Algorithm 1 Autonomous Resilient Control Protocol (ARCP) for agent i 1: Procedure ARCP 2: Apply an admissible behavior policy to the agent 3: For i=1:N Use r j, 4: Compute Ci as 5: j ∈ Ni to compute si and oi (cid:90) t ∆ie−β(t−τ) Ci(t) = β ∆i + (cid:107)si(τ) − oi(τ)(cid:107) dτ 0 di j(t) = κ (cid:90) t Communicate Ci with agents j ∈ Ni For each agent j ∈ Ni , compute (cid:80) θie−κ(t−τ) (cid:17) (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)r j(τ) − 1Ni (cid:16) Use C j, j ∈ Ni and Ti j to find Ti j(t) = max Ci(t), di j(t) θi + 0 j∈Ni (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) dτ r j ηi = C j(t)Ti j(t)ai j(r j − ri) + bi(ζ0 − ri) (cid:88) j∈Ni 6: 7: 8: 9: 10: 11: End for 12: Given uk Compute the observer state ri using update law (8) Collect enough samples Xi = [Xi; Xi(iTs)] and ui at different sampling interval Ts (cid:18) i (Xi(t)) = Bellman equation e−αiT Vk − i and collected information solve the following (cid:90) t+T i (Xi(t + T)) − Vk (cid:90) t+T e−αi(τ−t) (cid:90) t+T i )T Ri(uk )T (ωi − ωk )T Ri(ui − uk t +2γ2 i −2 e−αi(τ−t)(ωk+1 e−αi(τ−t)(uk+1 XT i QiXi + (uk i ) − γ2 i )dτ i (ωk i )T (ωk i ) (cid:19) dτ i t i )dτ i t 13: Once the learning is done, replace the behavior policy with the control solution found using RL Fig. 3: The communication graph among the agents. The leader dynamics is given by (cid:35) (cid:34) 0 −4 1 0 x0 = x0 + (cid:35)(cid:16) (cid:34) 1 0 (cid:17) 4e−0.15t sin(2t) (37) The design parameters are Q1i = 100I2, Ri = 1, αi = 0.1 and, γi = 10 for all agents. Now, assume that Agent 2 is 7 (a) (b) Fig. 4: Agents state, when Agent 2 is under the Type 1 attack (38). (a) The standard control protocol (5) is used. (b) The local neighborhood tracking error (4) for each agent. affected by a Type 1 attack with the attack signal ω2 given as (cid:40) 10 sin(2t) ω2 = 0 t ≥ 10 otherwise (38) Fig. 5: The state of all agents when Agent 2 is under Type 1 attack and the observer defined in (8) is used for each agent. The agents' states are shown in Fig. 4. It is observed from Fig. 4a that when the standard distributed controller (5) is used, before attack all agents synchronize to the leader. However, after the attack, Agents 4 and 5, which have a path to the compromised Agent 2, do not synchronize to the leader. One can see from Fig. 4b that, as stated in Theorem 2, the local neighborhood tracking error (4) converges to zero for all intact agents except the compromised agent. The performance of the observer-based H∞ controller (29) in the presence of Type 1 attack (38) is shown in Fig. 5. One can see that the compromised agent is the only agent that does not follow the leader. Moreover, the H∞ controller attenuates the effect of the attack on the disrupted agent, which can be seen by comparing the deviation level of the compromised agent state from its desired value in Figs. 4a and 5. Now, assume that Agent 2 is under Type 2 attack. In this case, the attack signal (38) is applied to the observer of Agent 2. However, Assumption 4 is not satisfied. The result is shown in Fig. 6. It can be seen from Fig. 6a that using the trust-confidence mechanism, only the compromised agent and its direct neighbor do not synchronize to the leader. The confidence value of the agents is shown in Fig. 6b. One can see that Agents 4 and 5 are not confident about their own observer information, since they are in the path of the compromised agent. To satisfy Assumption 4, it is considered that 2 incoming links from Agent 5 and Agent 1 are connected to Agent 4. Fig. 7 shows the agents output and confidence 05101520Time(s)-10-50510LeaderAgent1DisruptedAgent2Agent3Agent4Agent505101520Time(s)-6-4-2024e1e2e3e4e505101520Time(s)-10-50510LeaderAgent1DisruptedAgent2Agent3Agent4Agent5 non-root nodes. Then, it can be partitioned as  0 −∆ ¯L =  ∈ R(N+1)×(N+1) 0 . . . 0 L f 8 (39) where ∆ ∈ RN×1 denotes a vector whose i-th element is nonzero and indicates that the follower i is connected to the leader. L f ∈ RN×N indicates the interaction between the leader and the followers. Without loss of generality, assume D = B. Using (6), the global dynamic of the MAS (1) under attack with the control input (5) in terms of the Laplacian matrix (39) and after some manipulations, one has x =  B  v0 + (IN+1 ⊗ B) (cid:19), (cid:13)(cid:13)(cid:13)(cid:13)) ¯L ⊗ K + ¯ω (cid:46)(cid:13)(cid:13)(cid:13)(cid:13)(cid:16) (cid:17)  v0  B (cid:16)−c1 ¯L ⊗ K + ¯ω (cid:17), 0 ( ¯L ⊗ K 0 x (IN+1 ⊗ A) x + (cid:18)−(c1 + c2 (IN+1 ⊗ A) x + + (IN+1 ⊗ B) (cid:13)(cid:13)(cid:13)(cid:13)(cid:16) (cid:13)(cid:13)(cid:13)(cid:13)(cid:16) i f i f ( ¯L ⊗ K ( ¯L ⊗ K (cid:17) (cid:17) (cid:13)(cid:13)(cid:13)(cid:13) (cid:44) 0 (cid:13)(cid:13)(cid:13)(cid:13) = 0 x x s , xT 0 , xT 1 , . . . , xT 1 , . . . , ωT N]T and ¯ω = [0, ωT (40) where x = [ζT N]T , and 0 in ¯ω indicates that the leader is a trusted node and is not under attack. It can be seen that agents reach a steady state, i.e., xi → Axi +[BT 0]T v0, if the last terms of (40) tend to zero, i.e., ¯ω ∈ Im(¯c( ¯L ⊗ K)), where ¯c = (c1 + c2/(cid:107)( ¯L ⊗ K)x(cid:107)) or ¯c = c1. Otherwise, since the attack signal has common eigenvalues with the agent dynamics, the agents' states go to infinity. In the latter case, the local neighborhood tracking error goes to zero as xi → ∞. To prove the former case, we first show that ¯ω ∈ Im(¯c( ¯L ⊗ K)), if the attack signal is designed as given in the statement of Theorem. Note that ¯ω ∈ Im(¯c( ¯L ⊗ K)), if there exists a nonzero vector xs such that Define xss = [ζT ¯c( ¯L ⊗ K)xss = ¯ω (41) s ]T , where ζs and xs denote the steady states of the leader and followers, respectively. Since the leader is not under attack, using (39) and (41), one has ζs = Aζ0 +Bv0 and for the followers, − ¯c(∆ ⊗ K)ζs + ¯c(L f ⊗ K)xs = ω (42) Based on Assumption 1, the followers have at least one incoming link from the leader. On the other hand, L f captures the interaction among all followers, as well as the incoming link from the leader. The former is a positive semi-definite Laplacian matrix and the latter is a diagonal matrix with at least one nonzero positive element added to it. Therefore, as stated in Lemma 1, L f is nonsingular and, thus, the solution to (42) becomes xs = (¯c(L f ⊗ K))−1(ω + ¯c(∆ ⊗ K)ζs) (43) Since the eigenvalues of the attack signal are assumed a subset of the eigenvalues of the agent dynamics A, for every ¯ω there exists a nonzero vector xss such that (41) holds. Therefore, ¯ω ∈ Im(¯c( ¯L⊗K)). Now, using (39), the global form of the state neighborhood tracking error (4) can be written as (44) e = −( ¯L ⊗ In)x (a) (b) Fig. 6: Agent 2 is under Type 2 attack but Assumption 4 does not hold. (a) Agents state when the control protocol (29) with the observer (9) is used. (b) Confidence values of all agents. (a) (b) Fig. 7: Agent 2 is under Type 2 attack and Assumption 4 holds. (a) Agents state when the control protocol (29) with the observer (9) is used. (b) Confidence values of all agents. value when Assumption 4 is satisfied. It can be seen from Fig. 7a that only the compromised agent does not synchronize to the leader and all intact agents converge to the leader. The confidence value of the agents is shown in Fig. 7b. One can see that Agent 4 is not confident about its own observer information since it is the only immediate neighbor of the compromised agent. VII. Conclusion A resilient autonomous control framework is proposed for a leader-follower MAS with an active leader. It is first shown that existing standard synchronization control protocols are prone to attacks. Then, a resilient learning-based control proto- col is presented to find optimal solutions to the synchronization problem in the presence of attacks and system dynamic uncertainties. A distributed observer-based H∞ controller is first designed to prevent propagating the effects of attacks on sensors and actuators throughout the network, as well as attenuating the effect of these attacks on the compromised agent itself. Non-homogeneous game algebraic Riccati equa- tions are derived to solve the H∞ optimal synchronization problem. Off-policy reinforcement learning is utilized to learn their solution without requiring any knowledge of the agent's dynamics. Then, a trust-confidence based distributed control protocol is proposed to mitigate attacks that hijack the entire node and attacks on communication links. It is shown that the proposed RL-based H∞ control protocol is resilient against attacks. Appendix A Proof of Theorem 2 Let ¯L be the graph Laplacian matrix of the entire network, in which the leader is the only root node and N followers are 05101520Time(s)-10-5051015LeaderAgent1DisruptedAgent2Agent3Agent4Agent505101520Time(s)00.20.40.60.811.2C1C2C3C4C505101520Time(s)-20-1001020LeaderAgent1DisruptedAgent2Agent3Agent4Agent505101520Time(s)00.20.40.60.811.2C1C2C3C4C5 Since (41) is satisfied, one has ¯c( ¯L ⊗ K)xs = ¯ω ⇒ ¯c(IN ⊗ K)e = − ¯ω or, equivalently ¯cKei = −ωi (45) (46) Equation (46) implies that the local neighborhood tracking error is zero, i.e., e j = 0 for intact agents that are not directly under attacks, i.e., ω j = 0∀ j (cid:44) i. This completes the proof. Appendix B Proof of Theorem 3 Type 1 attacks cannot affect the observer state since the observer cannot be physically affected by an attacker. On the other hand for Type 2 attacks, based on Assumption 4, the total number of compromised agents is assumed less than half of the network connectivity, i.e., 2 f + 1. Therefore, even if f neighbors of an intact agent are attacked and collude to send the same value to misguide it, there still exists f + 1 intact neighbors that communicate values different than the compromised ones. Thus, r j (cid:44) ri for some j ∈ Ni and, therefore, although oi in (12) is zero based on Theorem 2, si in (13) is nonzero and, consequently, its confidence value Ci in (14) will decrease and the attack will be detected. Moreover, since at least half of its neighbors are intact, it can update its trust values to remove the compromised neighbors. On the other hand, the entire network is still connected to the agent under attack and, therefore, the graph is still connected with the intact agents. Therefore, there exists a spanning tree in the graph associated with all intact agents. Let LI(t) be the graph of remaining intact agents with ¯ai j = C j(t)Ti j(t)ai j as its weights. Since LI(t) has a spanning tree, based on the above discussion, the inequality defined in Lemma 2 is still satisfied. The global form of the observer (8) can be written as r = (IN ⊗ A)r + (c(LI(t) + G) ⊗ BF)η + (ρIN ⊗ B)Ψ (47) where r = [rT N]T denotes the global state vector of the agents observer and Ψ = [h(Fη1), . . . , h(FηN)]T . The global form of (9) is 1 , . . . , rT 0 ) η = ((LI(t) + G) ⊗ In)(r − ζ 1 , . . . , ηT N]T and ζ (48) = (1N ⊗ In)ζ0. Using (47) and where η = [ηT defining HI(t) = LI(t) + G, the dynamic of the tracking error (48) becomes η = (IN ⊗ A)η + (cHI(t) ⊗ BF)η + (HI(t) ⊗ B)(ρΨ − v0) (49) = 1N ⊗ v0. Consider the Lyapunov candidate function with v0 as 0 V(η) = ηT (Φ ⊗ P)η where Φ is defined in Lemma 3 and is a positive definite matrix. Using (49), the time derivative of (50) yields V = 2ηT (Φ ⊗ PA)η + 2ηT (cΦHI(t) ⊗ PBF)η (cid:124)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:123)(cid:122)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:125) (cid:124)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:123)(cid:122)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:125) + 2ηT (ΦHI(t) ⊗ PB)(ρΨ − v0) (51) V1 V2 (50) (cid:46) By applying the stationary conditions [50] as ∂Hi ∂ui = 0, ∂ωi = 0, the optimal control and the worst case attack ∂Hi signal can be written as (cid:46) Substituting F = −BT P, V1 can be expressed as 9 Based on Lemma 3, (ΦHI(t) + H T V1 = ηT (Φ⊗(PA+AT P))η−cηT ((ΦHI(t)+H T I (t)Φ)⊗PBBT P)η (52) I (t)Φ) > 0 and the inequality −c(ΦHI(t)+H T I (t)Φ) ≤ −cλmin(ΦHI(t) + H T I (t)Φ)Φ φmax holds [48]. Using the Kro- necker property A ⊗ (B + C) = A ⊗ B + A ⊗ C and ARE (20), (52) becomes (cid:46) I (t)Φ) ≤ −cλmin(ΦHI(t)+H T I (t)Φ) ⊗ PBBT P)η V1 = ηT (Φ ⊗ (PA + AT P))η − cηT ((ΦHI(t) + H T (cid:32) ≤ −ηT (Φ ⊗ In)η λmin(ΦHI(t) + H T (cid:33) I (t)Φ) 1 − c + ηT (Φ ⊗ PBBT P)η φmax V2 = (53) I (t)Φ), which is satisfied if the condition of c in the statement of the theorem is held. Now, for V2 one has Therefore, V1 ≤ 0 if c ≥ φmax N(cid:88) N(cid:88) (cid:14)λmin(ΦHI(t) + H T (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)BT P N(cid:88) N(cid:88) j PB(ρψi−v0) ≤ −(ρ−vM) This implies that V2 ≤ 0, if ρ ≥ vM. Therefore, (54) V = V1 + V2 ≤ 0, if the conditions defined in the statement of the theorem are satisfied. Since V(t) ≤ 0, V(t) is bounded. Note that V(t) ≡ 0 implies that η = 0. Hence, using LaSalles invariance principle [49], it follows that the observer state ri asymptotically converges to the leader state ζ0. αi jηT j (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) αi jηT i=1 i=1 j=1 j=1 Appendix C Proof of Theorem 4 Using the value function (27) for the left-hand side of (26) and differentiating along with the augmented system (23) gives the following Bellman equation (cid:16) i Pi(T Xi + B1ui + D1ωi + E1υi) i Πi + Γi H (Xi, ui, ωi) = 2XT +2(T Xi + B1ui + D1ωi + E1υi)T Πi + 2XT −αi +XT Xi(t)T PiXi(t) + 2XT i Riui − γ2 i QiXi + uT i Πi + Γi i ωT i ωi = 0 (cid:17) (55) i = −Ri u∗ 1 ∗ i = ω γ2 i 1 (PiXi + Πi) −1BT DT 1 (PiXi + Πi) (56) Substituting (56) into Bellman equation (55) results in the following tracking game ARE H(cid:0)Xi, u∗ ∗ i , ω i (cid:16) (cid:1) = XT i  Xi + 2XT PiT + T T Pi − αiPi − PiB1Ri −1BT (cid:16) Πi − PiB1Ri  1 Pi + Qi Πi + PiE1υi − αiΠi + T T Πi 1 i −1BT 1 P i Πi+ i B1R−1 i BT 1 Πi + 1 γ2 i ΠT i D1DT 1 Πi + 2υT i ET 1 Πi (57) Since (57) is satisfied for all Xi, this can occur if, and only if, (30) holds. This completes the proof. PiD1DT 1 γ2 i 1 γ2 i + + + PiD1DT 1 Γi − αiΓi − ΠT  = 0 Appendix D Proof of Theorem 5 i ωT i QiXi + uT i Riui − γ2 i ωi − αiV∗ tion V∗ become The Hamiltonian function (28) for the optimal value func- i , and any control policy ui and disturbance policy ωi H(V∗ i , ui, di) = XT +V∗T iX (T Xi + B1ui + D1ωi + E1υi) i , u∗ i , ui, di) = H(V∗ Using (57), one has H(V∗ i ) + i )T (ωi − ω∗ i ) + γ2(ωi − ω∗ i )T Ri(ui − u∗ (ui − u∗ i ) and based i , ω∗ i , u∗ (28), H(V∗ 0. i ) on Hamiltonian equation i Riui − γ2 i ωi − αiV∗ Then (58) gives XT i ωT i QiXi + uT + i ) − i )T Ri(ui − u∗ iX (T Xi + B1ui + D1ωi + E1υi) = −(ui − u∗ V∗T γ2(ωi − ω∗ i )T (ωi − ω∗ i ). Now, using the optimal control policy ui = u∗ i , ω∗ (58) = i yields i i i Riui − γ2 i ωi − αiV∗ XT i QiXi + uT i ωT i +V∗T iX (T Xi + B1ui + D1ωi + E1υi) i ) ≤ 0 = −γ2(ωi − ω i )T (ωi − ω ∗ ∗ (59) (cid:16) Multiplying both sides of (59) by e−αit, and defining V∗ V∗T iX (T Xi + B1ui + D1ωi + E1υi) as the derivative of V∗ (cid:17) the trajectories of the closed-loop system, gives i Riui + γ2 d/dt Integrating both sides of (60) and using the fact that V∗ i ωT i ωi 0, for every T > 0 and every ωi ∈ L2[0,∞), one has i QiXi − uT e−αitV∗ i i = i along (60) i (.) ≥ (cid:17) ≤ e−αit(cid:16)−XT (cid:90) T e−αiτ(cid:16) (cid:90) T 0 e−αiτγ2 ≤ 0 (cid:17) i QiXi + u∗T XT i Riu∗ i ωidτ + V∗ i ωT i i (X(0)) dτ (61) Using the separation principle for the combination of the observer and the controller completes the proof of Part 1 of Problem 1. The proof of Part 2 is similar to [47] and, therefore, is omitted. References [1] P. J. Antsaklis, K. M. Passino, and S. J. Wang, "An introduction to autonomous control systems," IEEE Control Systems, vol. 11, pp. 5–13, June 1991. [2] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and coop- eration in networked multi-agent systems," Proceedings of the IEEE, vol. 95, pp. 215–233, Jan 2007. 10 [3] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of mobile autonomous agents using nearest neighbor rules," IEEE Transactions on Automatic Control, vol. 48, pp. 988–1001, June 2003. [4] J. Fax and R. Murray, "Information flow and cooperative control of vehicle formations," IEEE Transactions on Automatic Control, vol. 49, no. 9, pp. 1465–1476, 2004. cited By 2455. [5] W. Ren, R. W. Beard, and E. M. Atkins, "Information consensus in multivehicle cooperative control," IEEE Control Systems, vol. 27, pp. 71–82, April 2007. [6] R. Moghadam and H. Modares, "An internal model principle for the attacker in distributed control systems," in 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pp. 6604–6609, Dec 2017. [7] R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction, vol. 1(1). MIT press Cambridge, 1998. [8] W. B. Powell, Approximate Dynamic Programming: Solving the curses of dimensionality, vol. 703. John Wiley & Sons, 2007. [9] F. L. Lewis, D. Vrabie, and K. G. Vamvoudakis, "Reinforcement learning and feedback control: Using natural decision methods to design optimal adaptive controllers," IEEE Control Systems, vol. 32, no. 6, pp. 76–105, 2012. [10] D. Liu, D. Wang, and H. Li, "Decentralized stabilization for a class of continuous-time nonlinear interconnected systems using online learning optimal control approach," IEEE Transactions on Neural Networks and Learning Systems, vol. 25, pp. 418–428, Feb 2014. [11] Y. Jiang and Z.-P. Jiang, "Computational adaptive optimal control for continuous-time linear systems with completely unknown dynamics," Automatica, vol. 48, no. 10, pp. 2699 – 2704, 2012. [12] B. Luo, H. N. Wu, and T. Huang, "Off-policy reinforcement learning for h∞ control design," IEEE Transactions on Cybernetics, vol. 45, pp. 65– 76, Jan 2015. [13] R. Kamalapurkar, B. Reish, G. Chowdhary, and W. E. Dixon, "Con- current learning for parameter estimation using dynamic state-derivative estimators," IEEE Transactions on Automatic Control, vol. 62, pp. 3594– 3601, July 2017. [14] Z. Ni, H. He, and J. Wen, "Adaptive learning in tracking control based on the dual critic network design," IEEE Transactions on Neural Networks and Learning Systems, vol. 24, pp. 913–928, June 2013. [15] B. Kiumarsi and F. L. Lewis, "Actor-critic-based optimal tracking for partially unknown nonlinear discrete-time systems," IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 1, pp. 140–151, 2015. [16] K. G. Vamvoudakis and F. L. Lewis, "Online solution of nonlinear two-player zero-sum games using synchronous policy iteration," Inter- national Journal of Robust and Nonlinear Control, vol. 22, no. 13, pp. 1460–1483, 2012. [17] M. I. Abouheaf, F. L. Lewis, K. G. Vamvoudakis, S. Haesaert, and R. Babuska, "Multi-agent discrete-time graphical games and reinforce- ment learning solutions," Automatica, vol. 50, no. 12, pp. 3038 – 3053, 2014. [18] L. Busoniu, R. Babu ska, and B. D. Schutter, "A comprehensive survey of multiagent reinforcement learning," IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 38, pp. 156–172, March 2008. [19] S. Zuo, Y. Song, F. L. Lewis, and A. Davoudi, "Optimal robust output containment of unknown heterogeneous multiagent system using off-policy reinforcement learning," IEEE Transactions on Cybernetics, vol. PP, no. 99, pp. 1–11, 2017. [20] Y. Hong, J. Hu, and L. Gao, "Tracking control for multi-agent consensus with an active leader and variable topology," Automatica, vol. 42, no. 7, pp. 1177 – 1182, 2006. [21] Y. Yang, H. Modares, D. C. Wunsch, and Y. Yin, "Optimal containment control of unknown heterogeneous systems with active leaders," IEEE Transactions on Control Systems Technology, vol. PP, no. 99, pp. 1–9, 2018. [22] Z. Li, X. Liu, W. Ren, and L. Xie, "Distributed tracking control for linear multiagent systems with a leader of bounded unknown input," IEEE Transactions on Automatic Control, vol. 58, pp. 518–523, Feb 2013. [23] F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Transactions on Automatic Control, vol. 57, pp. 90–104, Jan 2012. [24] H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram, "Resilient asymptotic consensus in robust networks," IEEE Journal on Selected Areas in Communications, vol. 31, pp. 766–781, April 2013. [25] H. Zhang and S. Sundaram, "Robustness of information diffusion algorithms to locally bounded adversaries," in 2012 American Control Conference (ACC), pp. 5855–5861, June 2012. 11 [48] Y. Wan, J. Cao, G. Chen, and W. Huang, "Distributed observer-based cyber-security control of complex dynamical networks," IEEE Transac- tions on Circuits and Systems I: Regular Papers, vol. 64, pp. 2966–2975, Nov 2017. [49] A. Isidori, Nonlinear Control Systems. Communications and Control & Sons, 2012. Engineering, Springer London, 1995. [50] F. L. Lewis, D. Veabie, and V. L. Syrmos, Optimal control. John Wiley [26] A. Teixeira, H. Sandberg, and K. H. Johansson, "Networked control systems under cyber attacks with applications to power networks," in Proceedings of the 2010 American Control Conference, pp. 3690–3696, June 2010. [27] S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Cyber security of water scada systems-part ii: Attack detection using enhanced hydro- dynamic models," IEEE Transactions on Control Systems Technology, vol. 21, pp. 1679–1693, Sept 2013. [28] S. Weerakkody, X. Liu, S. H. Son, and B. Sinopoli, "A graph-theoretic characterization of perfect attackability for secure design of distributed control systems," IEEE Transactions on Control of Network Systems, vol. 4, pp. 60–70, March 2017. [29] Z. Feng and G. Hu, "Distributed secure average consensus for linear multi-agent systems under dos attacks," in 2017 American Control Conference (ACC), pp. 2261–2266, May 2017. [30] A. Khazraei, H. Kebriaei, and F. R. Salmasi, "Replay attack detection in a multi agent system using stability analysis and loss effective watermarking," in 2017 American Control Conference (ACC), pp. 4778– 4783, May 2017. [31] S. Sundaram and C. N. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Transactions on Automatic Control, vol. 56, pp. 1495–1508, July 2011. [32] W. Zeng and M. Y. Chow, "Resilient distributed control in the presence of misbehaving agents in networked control systems," IEEE Transac- tions on Cybernetics, vol. 44, pp. 2038–2049, Nov 2014. [33] H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram, "Resilient asymptotic consensus in robust networks," IEEE Journal on Selected Areas in Communications, vol. 31, pp. 766–781, April 2013. [34] S. Abhinav, H. Modares, F. L. Lewis, F. Ferrese, and A. Davoudi, "Synchrony in networked microgrids under attacks," IEEE Transactions on Smart Grid, vol. PP, no. 99, pp. 1–1, 2017. [35] H. Modares, R. Moghadam, F. Lewis, and A. Davoudi, "Static output- feedback synchronization of multi-agent systems: A secure and unified approach," IET Control Theory & Applications, February 2018. [36] Y. Cao and W. Ren, "Optimal linear-consensus algorithms: An lqr perspective," IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 40, pp. 819–830, June 2010. [37] J. Li, H. Modares, T. Chai, F. L. Lewis, and L. Xie, "Off-policy rein- forcement learning for synchronization in multiagent graphical games," IEEE Transactions on Neural Networks and Learning Systems, vol. 28, pp. 2434–2445, Oct 2017. [38] Q. Jiao, H. Modares, S. Xu, F. L. Lewis, and K. G. Vamvoudakis, "Multi- agent zero-sum differential graphical games for disturbance rejection in distributed control," Automatica, vol. 69, no. Supplement C, pp. 24 – 34, 2016. [39] H. Zhang, F. L. Lewis, and A. Das, "Optimal design for synchronization of cooperative systems: State feedback, observer and output feedback," IEEE Transactions on Automatic Control, vol. 56, pp. 1948–1952, Aug 2011. [40] Z. Li and Z. Duan, Cooperative Control of Multi-Agent Systems: A Consensus Region Approach. Automation and Control Engineering, Taylor & Francis, 2014. [41] F. Lewis, H. Zhang, K. Hengster-Movric, and A. Das, Cooperative Con- trol of Multi-Agent Systems: Optimal and Adaptive Design Approaches. Communications and Control Engineering, Springer London, 2013. [42] M. Basseville and I. Nikiforov, Detection of abrupt changes: theory and application. Prentice-Hall information and system sciences series, Prentice Hall, 1993. [43] F. Pasqualetti, F. Drfler, and F. Bullo, "Attack detection and identification in cyber-physical systems," IEEE Transactions on Automatic Control, vol. 58, pp. 2715–2729, Nov 2013. [44] H. Zhang, F. L. Lewis, and A. Das, "Optimal design for synchronization of cooperative systems: State feedback, observer and output feedback," IEEE Transactions on Automatic Control, vol. 56, pp. 1948–1952, Aug 2011. [45] Z. Li, G. Wen, Z. Duan, and W. Ren, "Designing fully distributed consensus protocols for linear multi-agent systems with directed graphs," IEEE Transactions on Automatic Control, vol. 60, pp. 1152–1157, April 2015. [46] H. Modares, S. P. Nageshrao, G. A. D. Lopes, R. Babuka, and F. L. Lewis, "Optimal model-free output synchronization of heterogeneous systems using off-policy reinforcement learning," Automatica, vol. 71, pp. 334 – 341, 2016. [47] H. Modares, F. L. Lewis, and Z. P. Jiang, "H∞ tracking control of com- pletely unknown continuous-time systems via off-policy reinforcement learning," IEEE Transactions on Neural Networks and Learning Systems, vol. 26, pp. 2550–2562, Oct 2015.
1311.6149
1
1311
2013-11-24T18:08:56
Agent Approach in Support of Enterprise Application Integration
[ "cs.MA" ]
The present approach highlights the synergies between application integration and interaction protocols. Since both fields have advanced in different directions, a number of important technical problems can be addressed by their proper synthesis. In our previous work, we proposed a methodological approach based on Interaction Protocols for Enterprise Applica tion Integration (EAI). This approach permits to specify MAS (Multi-Agent System) interaction protocols, verify their behavior and use them to integrate multiple business applications. The result of the proposed approach is a validated interaction protocol. Based on this protocol, we define in this paper, an agent- based architecture for the EAI. It includes all the concepts nec- essary to support communication and coordination mechanisms such as inter-agent and agent-Web services communication.
cs.MA
cs
International Journal of Computer Science and Telecommunications [Volume 4, Issue 1, January 2013] 47 Agent Approach in Support of Enterprise Application Integration ISSN 2047-3338 Djamel Benmerzoug Faculty of NTIC, University of Constantine 2 benme rzougd j@yahoo .fr Abstract— The present approach highlights the synergies between application integration and interaction protocols. Since both fields have advanced in different directions, a number of important technical problems can be addressed by their proper synthesis. In our previous work [7][6][5], we proposed a methodological approach based on Interaction Protocols for Enterprise Applica tion Integration (EAI). This approach permits to specify MAS (Multi-Agent System) interaction protocols, verify their behavior and use them to integrate multiple business applications . The result of the proposed approach is a validated interaction protocol. Based on this protocol, we define in this paper, an agent- based architecture for the EAI. It includes all the concepts nec- essary to support communication and coordination mechanisms such as inter-agent and agent-Web services communication. Index Terms– Multi-Agent System, Interaction Protocol, Enterprise Application Integration I . INTRODUCT ION T HE penetration of Internet and the World Wide Web in accordance with new technological advances urged companies to seize the opportunities offered by electronic commerce and electronic business. Especial promising are the opportunities for cooperation among several geographically distributed orga- nizations based on open networks and innovative technologies. information and communication Indeed, several companies have showed many interests to the integration of these tech- niques. Interaction Protocols (IP), provide a middle ground between rigid automation and flexible manual execution. Using proto- cols as a mechanism to structure communications, agents can be less sophisticated. Protocol designers analyze and design protocols for desirable properties. Agents publicly declare the protocols in which they can participate making it easier to find agents with whom to interoperate. The importance of interaction is increasing as more and more monolithic systems are broken down into smaller ser- vices. The importance of interaction has been stressed by many authors [23][7][12]. Moreover, interaction is also considered a key issue in various industry standard[22]. In previous work [6][7], we described the use of IP to define and manage collaborative processes in B2B (Business to Business) relationships where the autonomy of participants is preserved. We showed the practicability of our approach by embedding it in a Web services language for specifying pro- tocols, which conducive to reuse, refinement and aggregation of our business protocols. We also elaborated translation rules from interaction pro- tocols notations used in our approach into Colored Petri Nets (CPN). These rules are implemented in IP2CPN 1 [7]: the tool we developed to automatically generate Petri nets from protocols specifications. Resulting Petri nets can be analyzed with dedicated tools to detect errors as early as possible. In this paper, we describe how the Multi-agent System (MAS) use the verified and the validated IP to establish the EAI. The proposed architecture based on the notion of agent. It includes all the concepts necessary to ensure all the phases of the EAI life-cycle. Our suggestion consists in the addition of a specific agent between the MAS application and its IP parts conceived as Web services. In fact, we defined two types of agent, namely, the Enterprise Agent representing an individual enterprise and the Integrator Agent. The remainder of the paper is organized as follows: Section 2 discusses some related work. Section 3 overviews our previ- ous work : The use of IP to define and manage collaborative processes in B2B relationships. Section 4 and 5 give details about the proposed agent-based architecture. In section 6, we study the different aspects related to the communication in our architecture. Section 7 gives some implementation aspects. Finally, concluding remarks are given in section 8. I I . R E L AT E D W O R K EAI is an active research domain. The community is still debating the issues of enterprises collaboration at the business process level. In fact, several areas of research are relevant to our work. We discuss some of them briefly and highlight the differences. a) Web services composition.: BPEL4WS [17] is a language designed to specify the static composition of Web services. However, it mixes interaction activities and business logic making it unsuitable for reuse [13]. In contrast to our approach, BPEL4WS elements are only used to specify messages exchanges between the different business partners. Afterwards, this specification is used by agents to enact the integration of business processes at run time. The Symphony project [10] has developed an algorithm for analyzing a composite service specification for data and control dependences and partitioning it into a set of smaller components. These components are then distributed to differ- ent locations and, when deployed, cooperatively deliver the same semantics as the original workflow. Symphony does not provide any support for failures arising from workflow 1 IP2CPN: Interaction Protocols To Colored Petri Nets Djamel Benmerzoug 48 mismatches since it assumes that the distributed processes will be derived from a single complete BPEL process. Other approaches try to combine Web services with multi- agent systems to ensure composition and interoperability. For example [8] summarize the relationship between agents and Web services with the aphorism Adaptive Workflow Engines = Web Services + Agents: namely, Web services provide the computational resources and agents provide the coordination framework. They propose the use of the BPEL4WS language as a specification language for expressing the initial social order of the multi-agent system. [8] does not provide any design issues to ensure the correctness of their interaction protocols. b) Interaction protocols modelling.: Interaction proto- cols are specific, often standard, constraints on the behaviors of the autonomous agents in a multiagent system. Protocols are essential to the functioning of open systems, such as those that arise in most interesting Web applications. The Dooley graph [21] is an alternative formalism for visu- alizing agent inter-relationships within a conversation. Object- oriented methods like UML [15] offer a way to reduce the gap between users and analyst when considering message transfers, yet they only address the dynamic behavior of individual objects and are informal. The state transition diagram has been extensively used for IP specification due to its clarity. The weakness is that it does not reflect the asynchronous character of the underlying communication [19]. Furthermore, it is not easy to represent integration of protocols. To ensure the correctness of IP specification at design time, [16] propose a translation rules for the conversation of an interaction protocol given in AUML to Petri net. Unfortu- nately, no automatic procedures were provided that guide the conversation of an interaction protocol given in AUML to Petri net representations. c) Discussion.: As shown before, several important strands of research of relevance to interaction protocols have been carried out before. However, the synthesis, enhancement, and application of these techniques on business process inte- gration is a novel contribution of this paper. Given the autonomy and heterogeneity of business partners, we believe that the most natural way to treat interactions is as communications. An interaction protocol involves the exchange of messages with a streamlined set of tokens. Indeed, the use of IP to define business process integration enables a greater autonomy of companies because each company hides its internal activities, services and decisions required to support public processes. In fact, our approach allows us to provide a clear separation of the inter-enterprise collaboration management and local business process one. This dichotomy makes full use of existing workflow system components, to support both public processes and private business processes. Formalisation and verification of autonomous and heteroge- neous collaborative business processes is a key prerequisite for the effective business application. As asserted by [20], mini- mal specifications based on external behavior will maximize interoperability. The present approach shows a design issues of how IP can be specified and verified. Another advantage of our approach is the integration com- pleteness property inherent from our BPEL4WS specification. It means that the IP is itself published and accessed as a Web service that can participate in other application integration. Particular protocols may then be selected and composed to support a desired business application. I I I . AN OV ERV IEW O F T H E P R O P O S E D A P P RO A C H In recent years, EAI modelling and reengineering have been longstanding activities in many companies. Most internal processes have been streamlined and optimized, whereas the external processes have only recently become the focus of business analysts and IT middleware providers. The static integration of inter-enterprise processes as common in past years can no longer meet the new requirements of customer orientation, flexibility and dynamics of cooperation [2]. In [4] we have developed an agent-based method for de- veloping cooperative enterprises information systems. This method permits to explicitly map the business process into software agents. In [5], we have described the use of IP to define and manage public processes in B2B relationships. The use of IP to define public processes enables a greater autonomy of companies. In this way, the IP provide a high abstraction level in the modelling of public processes. In other hand, the B2B integration scenarios typically in - volve distributed business processes that are autonomous to some degree, hence the importance of IP-based modelling. IP are a useful way for structuring communicative interaction among business partners, by organizing messages into relevant contexts and providing a common guide to the all parts. Formally an IP is defined as follow: Definition : An Interaction Protocol is a quadruplet: IP = <ID, R, M, fM >, where: • I D is the identifier of the interaction protocol • R = r1 , r2 , . . . , rn (n > 1) is a set of Roles (priva te business process or Web Services) • M is a set of non-empty primitive (or/and) complex messages, where: – A Primitive Message (P M ) corresponds to the sim- ple message, it is defined as follow: P M = <Sende r, Receiver, CA, Option>, where: ∗ Sender, Receiver ∈ R ∗ CA ∈ FIPA ACL Communicative Act (such as: cfp, inform, . . . ) ∗ Option: contain additional information (Syn- chronous / Asynchronous message, constraints on message,. . . ) – A Complex Message (CM) is built from simple r (primitive) ones by means of operators: CM = P M1 opP M2 . . . opP Mm , whe re: ∗ m > 1, op ∈ {XOR, OR, AND}, and International Journal of Computer Science and Telecommunications [Volume 4, Issue 1, January 2013] 49 ∗ ∀ i ∈ [1,m[, P Mi .S ender = P Mi+1 .S ender , P Mi .S ender ∈ R. • fM : a flow relation defined as : fM ⊆ (RxR), where (RxR) is a Cartesian product (r1 , r2 ) ∈ (RxR), for r1 , r2 ∈ R Figure 1 shows our approach for the treatment of business process integration based on interaction protocols. In this approach, we find two levels: • Design level: Formalisation and verification of interaction protocols. • Operational level: Management of interaction protocols at run-time. Interaction Protocol AUML interaction Diagram BPEL4W S Specification Design Level Operational Level 4 uses Integrator Agent 1 3: Feedback Veri fication (CPN-AMI tool) 2 CPN Model Enterprises Agents Fig. 1. The prop osed appro a ch A. Design level: Formalisation and Verification of Interaction Protocols Developing effective protocols to be executed by au- tonomous partners is challenging. Similar to protocols in traditional systems, IP in open and web-based settings need to be specified rigorously so that business partners can interact successfully. For this reason, developed a method for IP design and verification. This method (see figure 1) uses different models and languages. IP based on the use of Our method motivates AUML/BPEL4WS for application integration modelling, where pre- and post-conditions, rules, guards are specified in OCL2 . AUML (Agent UML) notation [1] [3] is a UML profile dedicated to agents trying to simplify the transition from soft- ware engineering to multi-agent system engineering. In other hand, BPEL4WS [17] (Business Process Execution Language for Web Services) is a de facto standard for describing Web 2 OCL: Object Constraint Language. (www.omg.org/cgi-bin) services composition. In our context, BPEL4WS was used as a specification language for expressing the interaction protocols of the multi-agent system [5]. When protocols are employed in open environments, such as the internet, they must be executed by agents that behave more or less autonomously and whose internal designs are not known. In such settings, therefore, there is a risk that the participating agents may fail to comply with the protocol [18]. Without a rigorous means to verify compliance, the very idea of protocols for interoperation is subverted. The use of formal methods is important because ensuring the correctness of complex protocols is seldom possible via other design approaches. High -level Petri nets are a suitable formal method for the design of IP because of their ability to express concurrency, non-determinism and system concepts at different levels of abstraction. CPN are a popular form of high-level Petri nets that have extensive tool support for the design of systems, including protocols. For this reason, we use Colored Petri Net (CPN) as target notation. CPN allows analysis to check for properties in IP. The semantics of the IP notations used in our approach and its application are described on the basis of translation rules into CPN. Consequently, lifelines, messages, constraints, splitting/merging paths, interaction terminations, and other IP construction elements are translated into a Petri net. After- wards, the resulting Petri net specification can be analysed by dedicated tools to detect errors as early as possible. In a previous work [6], we elaborated translation rules from interaction protocols notations used in our approach into Col- ored Petri nets. These rules are implemented in IP2CPN: the tool we developed to automatically generate the Petri net from protocols specification. The resulting Petri net specification can be analyzed by CPN-AMI tool [11] to detect errors as early as possible. B. Operational Level: Management of interaction protocols at run-time As we already have said before, the BPEL4WS process specification is considered as a specifying language for ex- pressing the interaction protocol of the multi-agents system. In this the rest of this paper we briefly describe how the MAS use the verified and the validated BPEL4WS specification to establish the EAI. Our suggestion consists in the addition of a specific agent between the MAS application and its IP parts conceived as Web services. IV. AN AG EN T-BAS ED AR CH IT ECT UR E F OR EN T ER PR I SE A P P L I C AT I O N I N T E G R AT I O N The proposed architecture based on the notion of agent. It includes all the concepts necessary to ensure all the phases of the Enterprise Application Integration life-cycle. As shown in Fig. 2, our suggestion consists in the addition of a spe- cific agent between the MAS application and its IP parts conceived as Web services. In fact, we defined two types of agent, namely, the Enterprise Agent representing an individual enterprise and the Integrator Agent. Djamel Benmerzoug 50 Integrato r Agent Web Se rv ices Know ledge base (Inetr act io n t races , Web ser v ices compos it io n …) req uest Interac tio n Ma na ger Inter act io n Bu i lder Inter act io n Co ntro ler IP as B PE L4WS Sp ec ifi catio n UDDI Publis h / request res ult Se rvi ces Manage r Commun ica tion Bus r res ult Agen t 1 Agen t 2 …………….. Agen t n Communication Module Planification & Coordination Execution Module G lobal Know ledge Ind iv idua l Knowledge Fig. 3. The stru cture of the Enterprise Agent Enterprise 1 Enterprise 2 …………….. Enterprise n constructed by the agent. B. Description of the Enterprise Agent Fig. 2. The prop osed ar chit e ctur e The main roles of the Integrator agent are the creation, monitoring, and control of IP life cycle. Its architecture fea- tures two modules: an interaction manager and a service one. The interaction manager contains operational knowledge (e.g., Interactions states). It also provides operations for monitoring interaction (i.e., creating and deleting instances). The service manager provides methods for receiving service requests, tracing service executions, and communicating with service requesters in accordance with IP definition (e.g., sending a no- tification informing the requester that deadline for cancelling an operation is passed). A. Description of the Integrator Agent As shown in Fig. 2, the Integrator agent is composed of four main modules. • The knowledge module includes a database and a set of actions. The role of this module is to store information that is necessary for the success of the interaction. Such information is traces of interaction used during the phases of the current states and coordination tasks running. This information is useful for future use of the protocol. • The Interaction Manager module allows the processing of messages depending on the specification of the inter- action protocols (the BPEL4WS specification) and the knowledge parts. • The services management module provides the services necessary for locating and invoking services. • The communication module allows the transport of mes- sages. In our work, we use the FIPA-ACL [14] as the language of communication between the different agents. This module has the role to structure the messages We consider the Enterprise Agent as an entity including a communication module, a planning and coordination module, and an execution module (Fig. 3). • The Communication Module: contains all the processes required to handle the messages: reception, filtering, and translation of incoming messages, and formulation and sending of the outgoing messages. • The Planning and Co-ordination Module: is responsible for managing the cooperation and formulating the offers for achieving sub-goals announced by the Integrator agent. • The Execution Module: this module contains the infor- mation about the internal resources of the individual enterprise, which makes possible the performance of local tasks that are assigned to the enterprise. It establishes the correspondence between the sub-goal assigned to the agent and the internal resources of the enterprise capable of achieving this sub-goal. • The Global Knowledge Module: contains information related to the organisational and operational rules defined by the enterprises. • The Individual Knowledge Module contains information about the agent itself: its capacities and skills, and the current state and workload, i.e. for each skill, indicators are assigned to determine availability, as well as the cost of such skill. V. RO LE S AND B EH AV IOR S O F AG EN T S IP must specify the semantics of the messages exchanged. It also describes the reactions of an agent in a given message. In our case, two main roles involved in the interaction protocols: 1) The Integrator agent supports data extraction from the IP specification and message exchange between agents involved in the interaction. International Journal of Computer Science and Telecommunications [Volume 4, Issue 1, January 2013] 51 knowledges IP Integrator Agent m 0 m 0 m 0 m 0 m 0 Enterp rises Agents Fig. 4. Agents behaviors 2) The role of participants’ agents is to coordinate to satisfy all the requests of the Integrator agent. The interaction protocol that we specified in this paper describes the rules used by the participants’ agents for a correct coordinate. The behavior of agents, as shown in Figure 4, can then be summarized as follows: 1) The Integrator agent (the initiator of the IP) announces the beginning of the integration process and the allo- cation of tasks. For each task to be performed, the Integrator agent announces a specification that includes a description, and a list of requirements and constraints for this task. This information is encapsulated in a message, which represents the initiator message (m0 in Fig. 4). 2) When participants’ agents are identified, the allocation phase of sub goals for participating agents begins. Each participant (Agent) performs the part that has been assigned. The composition of individual results leads to the realization of the overall goal. 3) The Integrator agent ensures the coordination between the different enterprises agents in accordance with the rules of interaction defined in the BPEL4WS specifica- tion. In the context of this work we will not discuss the aspect of local coordination, which may be different from one company to another. To ensure the successful completion of the interaction, the Integrator agent must know how many responses should be ex- pect from the participating agents. The analysis of interaction rules defined in the BPEL4WS specification and the semantics of the ACL allow when if others messages may be received or not. V I . COMM UN IC AT I ON MOD E S This integration process must keep as much as possible the autonomy of architecture core based on agents. Indeed, The agents are coordinated with the Integrator agent and the exchange of messages to enact the EAI. In this architecture, the following communications pathways exist: • agent to agent communication occurs via FIPAs Agent Communication Language (ACL) and is facilitate by a FIPA compliant Agent Management System. kn owl edge bas es Interact ion Manager 1 5 Services Manager 6 4 4 6 WS1 WSn 2 3 UDDI Fig. 5. Agent-Web Ser vi ces Commu ni ca tio n • agent to Web service communication is accomplished via SOAP messages. • agent to BPEL4WS dataspace communication utilizes appropriate protocols/interfaces provided by the datas- pace. The dataspace is used to store BPEL4WS process variables, which maintain the state of the IP. A. Inter-Agent Communication FIPA [14] supplies a standard syntax for messages. These messages are based on the theory of the act of speech, which is the result of the linguistic analysis of human communication. The basis of this theory is to produce an action from the language. In the FIPA-ACL, no specific language for the description of the contents of messages is imposed. Several languages can be used for the description of the contents of the exchanged messages such as KIF (Knowledge Interchange Format), Semantic Language (SL), Prologue and XML (eXten- sible Mark-up Language). XML will be used for the descrip- tion, the specification and the interpretation of the contents of messages exchanged. So, the messages exchanged among the agents are described in FIPA-ACL/XML. The use of XML for the contents of communications among agents permits the display of messages in a Web browser and facilitates the integration with existing Web-based applications. B. Agent - Web service Communication This type of communication is ensured by the Services Manager module of the Integrator agent. This module provides the necessary services for locating and invoking services. Its behavior is presented as follows (see Fig. 5): 1) When the Integrator agent detects a need for which it does not have the capacity , it uses the functionality of Djamel Benmerzoug 52 pub l ic cla ss Integrator exten d s Ag en t { pro te cted vo id se tup () { add Be ha viour(n e w S imp le Beh a vio ur(th is) { import java. uti l.*; import jade. cor e. *; import jade. cor e. behavi our.*; import j ade.l ang. acl. AC LMessage.*; // Tra itemen t .. . cl ass Communication extends C ycl icB ehavi our the Service Manager module to find Web services that could satisfy his need. 2) The Service Manager module requests the UDDI regis try 3) The Service Manager module obtains from the registry a list of descriptions of Web services that matching the search criteria. 4) The Service Manager module starts the invocation of services found to obtain their attributes. 5) The Integrator agent requests the service manager mod- ule to invoke the Web service selected. 6) The Service Manager module sends a parallel invocation message to the selected service and cancel messages to other services not concerned. V I I . SOME I M P L E M E N TAT I O N A S P E C T S The platform chosen for the implementation is Java Agen t } } public class EntrepriseAgent extend s Ag en t { cla ss re ce vo ir e x ten d s Sim p le Beha v iour { //Tra itemen t .. . } pub l ic re ce vo ir( Ag en t a) { su per(a) ; { publ ic C ommuni cati on (A gent a) {super( a );} Vect or goal s = new V ect o r(); publ ic void acti on() { // wait f or message AC LMessage r eceived = m yA gent.r ecei ve(); if(AC LMessage == nul l) { bl ock ();} el se { // message i nt er pr et ati on … … … … … … … … … … // Start P lanR etri eval B ehavi our addBehaviour(new PlanRetrieval(this,goals)); } } } - b - Development framework (JADE) [9]. JADE is a software de- velopment framework, fully implemented in Java, which aims at the development of multi-agent systems and applications that comply with FIPA standard. To achieve such a goal, JADE offers the following list of features to the agent programmer: } pro te cted vo id se tup() { rece vo ir m ybeh a vio ur = ne w rece vo ir( th is); add Be ha viour(m yb eha v iour) ; }} • Distributed agent platform. The agent platform can be distributed on several hosts, each one of them executes one Java Virtual Machine. • FIPA-Compliant agent platform, which includes the Agent Management System, the Directory Facilitator and the Agent Communication Channel. • Efficient transport of ACL messages between agents. A. Using JADE to Develop the Proposed Architecture Creating a JADE agent is as simple as defining a class extending the Jade.core.Agent class and implementing the setup() method. The setup() method is intended to include agent initializations. The actual job an agent has to do is presented as JADE behaviors. The Fig. 6 represents the imple- mentation of the Integrator and the Enterprise agent classes. These classes are extensions of the basic Agent class defined in JADE. The communication module presented in our architecture is derived from JADE class CyclicBehaviour and will therefore run continuously. If no messages have arrived, the behavior will block and restart after a new message has arrived. If a message has arrived, the perception interface has to interpret this message into a set of goals, starts the execution module and resumes waiting for incoming messages. The communi- cation module behavior code is shown in Fig. 6. The Interaction Manager Module is derived from the class SimpleBehaviour. This module takes as input a BPEL4WS specification and builds the appropriate interaction protocol. In this context, an interaction protocol is implemented as an FSMBehaviour behavior. The FSMBehaviour class is a CompositeBehaviour that executes its children (sub behaviour that are going to be used by FSMBehaviours) according to a Finite State Machine defined by the user. In fact, each sub- behaviour is dedicated to an interaction that represents the set of messages exchanged to satisfy a given set of requirements. - a - Fig. 6. a) Agent Cla ss Extension, b) Partial specification of the Communi- cation module V I I I . C O N C L U S I O N In this paper, we have proposed an agent-based architecture for enterprise application integration. The multi-agent provides high level communication languages that preserve the entire richness of the communications. Thus, the FIPA-ACL is used in our approach to formulate messages exchanged between the different agents constituting the system. The content of these m es sag es is described with XML. The use of the JADE platform has allowed us to implement the Integrator Agent and the Enterprise Agents and thus, to simulate the interaction between these entities. R E F E R E N C E S [1] B. Bauer, F. Bergenti, P. Massonet, and J. Odell. Agents and the UML: A Unified Notation for Agents and Multi-agent Systems. In Agent-Oriented Software Engineer ing II, Second Internationa l Workshop, AOSE’01, volume 2222 of LNCS, pages 148–150. Springer, 2001. [2] J. Barjis. Collaborat ive, Participative and Interactive Enterprise Model- ing. In ICEIS’09, volume 24 of Lecture Notes in Business Information Processing, pages 651–662. Springer, 2009. [3] Bernhard Bauer and James Odell. UML 2.0 and ag en ts : how to build agent-ba sed systems with the new UML standard. Eng. Appl. of AI, 18(2):141–157, 2005. [4] Djamel Benmerzoug, Mahmoud Bou faida , and Zizette Bou faida. From the Analysis of Cooperation Within O rganizational Environments to the Design of C oop er at iv e Information Systems: An Agent-Ba sed Approach. In OTM Workshops, volume 3292 of LNCS, pages 495–506, Larnaca, Chypre, October 20 04. S prin ger. International Journal of Computer Science and Telecommunications [Volume 4, Issue 1, January 2013] 53 [5] Djamel Benmerzoug, Mahmoud Bou faida , and Fabrice Kordon. A Specification and Validation Approach for Business Process Integration based on Web Services and Agents. In Proceedings of the 5th Interna - tional Work shop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems, MSVVEIS-2007, In conjunction with ICEIS 2007, pages 163–168. NSTIIC press, 2007. [6] Djamel Benmerzoug, Fabrice Kordon, and Mahmoud Boufaida. A Petri- Net based Formalisation of Interaction Protocols applied to Business Process Integration. In Advances in Enterprise Engineer ing 4th International Work shop on Enterprise & I , Organizational Modeling and Simulation (EOMAS’08), volume 10 of LNBIP, pages 78–92, Montpel- lier, F ranc e, June 2008. Springer. [7] Djamel Benmerzoug, Fabrice Kordon, and Mahmoud Bou faida. For- malisation and Verification of Interaction Protocols for Bu siness Process Integration: a Petri net Approach. International Journa l of Simulation and Process Modelling, 4(3–4):195–204, 2008. [8] P.A. Buhler and J .M. Vida l. Towards adaptive work flow enactment u sing multiagent systems. Interna tiona l Journal On Information Technology and Management, 6:61–87, 2005. [9] C. Huang C. Trappey, A. Trappey and C . Ku. The design of a JADE - based autonomou s work flow management system for collaborative SoC design. Expert Syst. Appl., 36(2):2659–2669, 2009. [10] Chandra S. Mann V. Cha fle, G. and M. Nanda. Decentralized orchestra- tion of composite web services. In The Alternate Track on Web Services at the 13th International World Wide Web Conference, pages 134–143, 2004. [11] CPN -AMI:. http://move.lip6.fr/software/cpnami/. [12] Gero Decker and Mathia s Weske. Interaction-centr ic modeling of process choreographies. Journal of Information Systems, 36(2):292–312, 2011. [13] Nirmit Desai, Amit K. Chopra, and Munindar P. S ing h. Amoeba: A methodology for modeling and evolving cross-organizational bu siness processes. ACM Trans. Softw. Eng. Methodol., 19(2):1– 45, October 2009. [14] FIPA. Foundation for Intelligent Physical Agents: Communicative Act Library Specification, 1997. [15] G. Booch, J . Rumbaugh, and I. Jacobson. The Unified Modelling Language for Object-Oriented Development, Document Set Version 1.0. Rational Software Corporation, Santa Clara, 2002. [16] H. Mazouzi, A. Fallah-Seghrouchni, and S. Hadd ad . Open Protocol De- sign for Complex Interactions in Multi-Agent Systems. In AAM A S ’02 : Proceedings of joint conference on international first the Autonomou s agents and multiagent systems, pages 517–526, New York, NY, USA, 2002. ACM. [17] SAP Siebel Systems IBM, Microsoft. Business process execution language for web services version 1.1. Technical report, 2003. [18] M. Venkatraman and P.S Munindar. Verifying compliance with com- mitment protocols. Int. Journal of Autonomous Agents and Multi- Agent Sys tems, 2(3):217 – 236, 1999. [19] F. Mar tial. Coordinating Plans of Autonomous Agents, volume 610. Spr inger Heidelberg, 1992. [20] Mike P. Papazoglou, Klaus Pohl, Michael Parkin, and Andrea s Metzger, editors. Service Research Cha llenges and Solutions for the Future Internet - S-Cube - Towards Engineering, Managing and Adapting Service-Ba sed Systems, volume 6500 of Lecture Notes in Computer Science. Springer, 2010. [21] H. V. Parunak. Visualizing Agent Conversations: Using Enhanced Dooley Graphs for Agent Design and Analysis, 1996. [22] Wil M. P. van der Aalst, Arjan J. Mooij, Christian Stahl, and Karsten Wolf. Service interaction: Patterns, formalization, and analysis. In Marco Bernardo, Luca Padovani, and Gianluigi Zavattaro, editors, Formal Methods for Web Services, 9th International School on Formal Methods for the Design of Computer, Communication, and Software Sys tems , Lecture Notes in Computer Science, pages 42–88. Spr inger, 2009. [23] Johannes Maria Zaha, Marlon Duma s, Arthur H. M. ter Hofstede, Alistair P. Barros, and Gero Decker. Service interaction modeling: Bridging global and local views. In Tenth IEEE International Enterprise Distr ibuted Object Computing Conference (EDOC 2006), pages 45–55. IEEE Computer Society, 2006.
1112.0404
2
1112
2012-02-06T10:36:03
A Cyclic Representation of Discrete Coordination Procedures
[ "cs.MA", "cs.DM", "eess.SY", "math.OC" ]
We show that any discrete opinion pooling procedure with positive weights can be asymptotically approximated by DeGroot's procedure whose communication digraph is a Hamiltonian cycle with loops. In this cycle, the weight of each arc (which is not a loop) is inversely proportional to the influence of the agent the arc leads to.
cs.MA
cs
ISSN 0005-1179, Automation and Remote Control, 2012, Vol. 73, No. 1, p. 161. c(cid:13) Pleiades Publishing, Ltd., 2012. Original Russian Text c(cid:13) R.P. Agaev and P.Yu. Chebotarev, 2012, published in Avtomatika i Telemekhanika, 2012, No. 1, pp. 178 -- 183. MULTI-AGENT SYSTEMS A Cyclic Representation of Discrete Coordination Procedures1 R. P. Agaev and P. Yu. Chebotarev Trapeznikov Institute of Control Sciences, Russian Academy of Sciences, Moscow, Russia Received May 20, 2011 Abstract -- We show that any discrete opinion pooling procedure with positive weights can be asymp- totically approximated by DeGroot's procedure whose communication digraph is a Hamiltonian cycle with loops. In this cycle, the weight of each arc (which is not a loop) is inversely proportional to the influence of the agent the arc leads to. 1. INTRODUCTION One of the first discrete models of reaching consensus (decentralized coordination) was proposed by n)T is the vector of initial opinions of the members of a group DeGroot [1]. Suppose that s(0) = (s0 and s(k) = (sk n)T is the vector of their opinions after the kth step of coordination. In accordance with DeGroot's model, s(k) = P s(k − 1), k = 1, 2, . . . , where P is a row stochastic influence matrix whose entry pij specifies the degree of influence of agent j on the opinion of agent i. Thereby, 1, . . . , sk 1, . . . , s0 s(k) = P ks(0), k = 1, 2, . . . . (1) A consensus is [asymptotically] reached if limk→∞ sk i = ¯s for some ¯s ∈ R and all i ∈ {1, . . . , n}. De- Groot states that a consensus is reached for any initial opinions if and only if the matrix P ∞ = limk→∞ P k exists and all rows of P ∞ are identical, which is equivalent to the regularity1 of P . If P is not regular, then the opinions do not generally tend to agreement. Yet, a consensus can be reached if the vector of initial opinions belongs to a certain subspace. In [2], we give a characterization of this subspace and propose the method of orthogonal projection which generalizes DeGroot's method. It is shown that in the method of orthogonal projection, as well as in DeGroot's method, no nonbasic agent can affect the final result. In this paper, we show that the result of any DeGroot's procedure with a strong communication digraph as well as the result of any procedure of orthogonal projection without nonbasic agents can be represented by DeGroot's procedure whose communication digraph is a Hamiltonian cycle with loops. In this cycle, the weight of each arc (which is not a loop) is inversely proportional to the influence of the agent the arc leads to. 2. BASIC CONCEPTS AND RESULTS With a stochastic influence matrix P in DeGroot's model we associate the communication digraph Γ with vertex set V (Γ) = {1, . . . , n}. Γ has a (j, i) arc with weight wji = pij whenever pij > 0 (i.e., whenever agent j influences agent i). Thus, arcs in Γ are oriented in the direction of influence; the weight of an arc is the power of influence. 1 This work was supported in part by the Russian Foundation for Basic Research, project no. 09-07-00371 and the program of RAS Presidium "Mathematical Theory of Control." 1 A stochastic matrix is said to be regular if it has no eigenvalues of modulus 1 except for the simple eigenvalue 1. 161 162 AGAEV, CHEBOTAREV The Kirchhoff matrix (see [3, 4]) L = L(Γ) = (ℓij) of digraph Γ is defined as follows: if j 6= i, then wki, i = 1, . . . , n. I will denote ℓij = −wji whenever Γ has the (j, i) arc and ℓij = 0 otherwise; ℓii = Pk6=i the identity matrix of appropriate dimension. By virtue of the above definitions, for the digraph Γ associated with P we have L(Γ) = I − P. (2) Any maximal by inclusion strong (i.e., with mutually reachable vertices) subgraph of a digraph is called a strong component (or a bicomponent) of this digraph. A basic bicomponent is a bicomponent such that the digraph has no arcs coming into this bicomponent from outside. Vertices belonging and not belonging to basic bicomponents are called basic and nonbasic, respectively. Similarly, we call an agent basic/nonbasic whenever the vertex representing this agent is basic/nonbasic. Let b and ν be the number of basic vertices and the number of basic bicomponents in Γ, respectively. If a consensus in DeGroot's model is reached and vertex j is nonbasic, then, as stated in [1], column j in the limiting matrix P ∞ is zero and the initial opinion of agent j does not affect the resulting opinion. Now we present the results from algebraic graph theory used in this paper. A longer list of results useful for decentralized control is given in [2]. If the sequence of powers P k of a stochastic matrix P has a limit P ∞, then P ∞ = J, (3) where J is the normalized matrix of maximum out-forests of the corresponding weighted digraph Γ (a corollary of the matrix tree theorem for Markov chains [5]). P ∞ is the eigenprojection corresponding to 0 (principal idempotent) of L and rank P ∞ = ν; rank L = n − ν, (4) where ν is the number of basic bicomponents in Γ [6, Proposition 11]. By (4) dim N (L) = ν, where dim N (L) is the dimension of the kernel (the nullity) of L. Finally, by [4, Proposition 12], ind L = 1, where ind L (the index of L) is the order of the largest Jordan block of L corresponding to the zero eigenvalue. This implies that mL(0) = ν, (5) where mL(0) is the multiplicity of 0 as an eigenvalue of L. 3. CONVERGENCE IN DEGROOT'S MODEL AND PROPERTIES OF THE COMMUNICATION DIGRAPH As noted above, DeGroot's method with matrix P leads to a consensus for any initial opinions if and only if there exists a limiting matrix P ∞ = limk→∞ P k and all its rows are identical. The equality of the rows of P ∞ implies that P ∞ = 1πT for some probability vector (the components are non-negative and sum to 1) π, where 1 = (1, . . . , 1)T. In this case, the consensus ¯s is expressed by the inner product of the vectors π and s(0): s(∞) = P ∞s(0) = 1πTs(0) = 1¯s, (6) where s(∞) is the resulting vector of opinions, π is the final weight distribution of the DeGroot algorithm, and ¯s = πTs(0) is the consensus. A probability vector π is called a stationary vector of a stochastic matrix P if it is a left eigenvector of P corresponding to the eigenvalue 1: πTP = πT. Obviously, this condition is satisfied for the vector π in the representation P ∞ = 1πT of P ∞, provided that the convergence of DeGroot's method is guaranteed by the regularity of P. AUTOMATION AND REMOTE CONTROL Vol. 73 No. 1 2012 A CYCLIC REPRESENTATION OF DISCRETE COORDINATION PROCEDURES 163 By Theorem 3 in [1], if for any vector of initial opinions s(0), DeGroot's method converges to the consensus πTs(0), then π is a unique stationary vector of P . Let us formulate a criterion of convergence in DeGroot's model in terms of the communication di- graph Γ. The equality of the rows of P ∞ is equivalent to rank P ∞ = 1. Therefore, owing to (4), when the sequence P k converges, consensus is reached for any initial opinions if and only if the communication digraph Γ corresponding to P has a single basic bicomponent (ν = 1). Consequently, provided that the sequence P k converges, ν = 1 is equivalent to the regularity of P . In turn, by (5), this is the case if and only if 0 is a simple eigenvalue of L. Finally, ν = 1 if and only if Γ has a spanning out-tree (also called arborescence and branching) [6, ij ) = J = ( Jij) is the normalized matrix of spanning out-trees: Proposition 6]. In this case (see (3)), P ∞ = (p∞ ij = πj = Jij = p∞ tj t , i, j = 1, . . . , n, (7) where tj is the total weight2 of Γ's spanning out-trees rooted at j and t is the total weight of all spanning out-trees of Γ. A survey of some results on DeGroot's iterative pooling model and its generalizations can be found in [7 -- 9]. Note that one of the new applications of DeGroot's model is information control in social networks [10]. 4. REPRESENTING CONSENSUS PROCEDURES BY WEIGHTED HAMILTONIAN CYCLES WITH LOOPS As shown in [2, Section 6], the final result of the method of orthogonal projection can be represented by a weight vector α: the inner product of α and the vector of initial opinions gives the consensus: ¯s = αTs(0). This is analogous to the representation of the result of a convergent DeGroot's method: P ∞ = 1πT and ¯s = πTs(0) (see (6)). On the other hand, given a probability vector π, it is easy to construct a weighted communication digraph generating π as the final weight distribution (the stationary vector of P ) of DeGroot's method. In this section, we show that all positive weight distributions on the set of agents' opinions are generated by a rather narrow class of digraphs, namely, Hamiltonian cycles of the form n → (n − 1) → · · · → 2 → 1 → n with loops, where the vertices are denoted by 1, . . . , n. By (3) P ∞ = J, where J is the normalized matrix of maximum out-forests of the weighted digraph Γ corresponding to P. Thus, given π, a necessary and sufficient condition of the fulfilment of P ∞ = 1πT is J = 1πT. (8) A Hamiltonian cycle is a strong digraph, so its maximum out-forests are precisely spanning out-trees (see (7)). Recall that the normalized matrix of spanning out-trees (which in this case coincides with J) is the matrix whose (i, j)-entry is tj/t, i, j = 1, . . . , n. Adding loops does not change the set of out-trees. Thus, to solve the problem, i.e., to implement a given probability vector π > 0 as the final weight distribution of DeGroot's method with a communication digraph in the form if a Hamiltonian cycle with loops, it is sufficient to construct a weighted cycle whose vector (t1, . . . , tn)T is proportional to π. Indeed, in this case (t1/t, . . . , tn/t)T coincides with π, which guarantees (8). Such a cycle can be constructed by means of the following lemma. Lemma 1. For any positive vector q = (q1, . . . , qn)T, there exists a unique weighted Hamiltonian cycle of the form n → (n − 1) → · · · → 2 → 1 → n whose vector (t1, . . . , tn)T of total weights of out-trees coincides with q. The weight of the arc entering vertex k in this cycle is q−1 i=1 qi, k = 1, . . . , n. k · n−1qQn 2 The weight of an out-tree (and, more generally, of a digraph) is the product of the weights of all its arcs. AUTOMATION AND REMOTE CONTROL Vol. 73 No. 1 2012 164 AGAEV, CHEBOTAREV Fig. 1. The proof of Lemma 1 is given in the Appendix. Now we apply Lemma 1 to solve our problem. Proposition 1. For any positive probability vector π = (π1, . . . , πn)T, there exists a family of weighted Hamiltonian cycles of the form n → (n − 1) → · · · → 1 → n with loops such that using each of them as the communication digraph in DeGroot's method implements the consensus ¯s = πTs(0) for any vector of initial opinions s(0). The weight of the arc entering vertex k in such a cycle is proportional to π−1 k . As stated above, any communication digraph whose vector (t1, . . . , tn) of the weights of out-trees is proportional to π implements π as the final weight distribution of DeGroot's method. Therefore, to prove Proposition 1, it is sufficient to observe that by Lemma 1, a Hamiltonian cycle with loops and any given order of visiting vertices can be taken as such a digraph. The only thing that should be taken care of is that this cycle must be a communication digraph, i.e., the matrix I − L (see (2)) corresponding to it must be stochastic. Since L has zero row sums and nonpositive off-diagonal entries, I − L is stochastic if and only if the diagonal entries of L are less than or equal to 1. For a Hamiltonian cycle with loops, this condition is satisfied if and only if all its arc weights do not exceed 1. Example 1. Consider the influence matrix P =   0.9 0.1 0 0 0.75 0.25 0.3 0.25 0.2 0.15 0 0 0.1 0.35 0 0.65   and the corresponding communication digraph (Fig. 1a, which does not show loops for simplicity). Proposition 1 enables one to construct another communication digraph, in the form of a Hamiltonian cycle with loops, that shares the final consensus obtained through DeGroot's method with the given digraph for any initial opinions. Observe that P is regular and its stationary vector is: π = 1 101 (45, 36, 10, 10)T . As stated in Section 3, H = P ∞ = J . Proposition 1 P ∞ = 1πT. Now we construct a Hamiltonian cycle H with loops such that P ∞ implies that the vector of arc weights indexed by the vertices of H can be x = 101β( 1 10 )T, where 0 < β ≤ 10 18 , 1, 1)T. In this communication digraph (which is shown in Fig. 1b), loops with weights 7 18 must be attached to vertices 1 and 2, respectively. It follows from Proposition 1 that if the weights of arcs entering each vertex are preserved, then the order of vertices in the cycle can be arbitrary. In particular, the cycle in Fig. 1c is also suitable. 101 we obtain x = ( 2 101 . Taking β = 10 9 and 13 45 , 1 36 , 1 10 , 1 9 , 5 Thus, for each cycle with loops of this type, DeGroot's method leads to the same final consensus procedure (determined by the weight distribution) as for the original communication digraph. Since in Proposition 1, πi is the weight of the original opinion of ith agent in the final consensus (the "influence" of the ith agent), it is worth noting that for communication digraphs in the form of AUTOMATION AND REMOTE CONTROL Vol. 73 No. 1 2012 A CYCLIC REPRESENTATION OF DISCRETE COORDINATION PROCEDURES 165 Hamiltonian cycles with loops, this weight is inversely proportional to the weight of the arc entering vertex i. Thus, in the upshot, the most powerful agent is the one least subject to the influence of the previous agent in the cycle rather than the one maximally affecting the next agent. Finally, Proposition 1 enables one, for any given coordination procedure based on the method of orthogonal projection [2], to construct a DeGroot algorithm (with the communication digraph in the form of a Hamiltonian cycle) that leads to the same consensus for any initial opinions. 5. CONCLUSION It is shown that any convergent discrete iterative pooling procedure taking into account the opinions of all agents with positive weights can be approximated (in terms of achieving the same end result) by DeGroot's procedure whose communication digraph is a Hamiltonian cycle with loops. The weight of the arc entering vertex i in this cycle is inversely proportional to the influence of agent i, while the order of visiting vertices can be arbitrary. APPENDIX Proof of Lemma 1. For any vertex in a Hamiltonian cycle, there is exactly one tree outgoing from this vertex. That tree includes all arcs of the cycle except for the arc entering this vertex. Hence the elements of the vector (t1, . . . , tn)T of total weights of out-trees are given by the equations tk = Y j6=k xj = x−1 k n Y j=1 xj, k = 1, . . . , n, (A.1) where xj is the weight of the arc entering vertex j. Consequently, xk = t−1 k n Y j=1 xj = t−1 k n−1vuut n Y i=1 Y j6=i xj = n−1qQn i=1 ti tk , k = 1, . . . , n. Thus, for the fulfillment of tk = qk (k = 1, . . . , n) it is necessary that xk = n−1qQn i=1 qi qk , k = 1, . . . , n. (A.2) The sufficiency of (A.2) is verified by substituting (A.2) into (A.1). The lemma is proved. ⊓⊔ REFERENCES 1. DeGroot, M.H., Reaching a Consensus, J. Amer. Statist. Associat., 1974, vol. 69, pp. 118 -- 121. 2. Agaev, R.P. and Chebotarev, P.Yu., The Projection Method for Reaching Consensus and the Regularized Power Limit of a Stochastic Matrix, Automat. Remote Control, 2011, vol. 72, no. 12, pp. 2458 -- 2476. 3. Tutte, W.T., Graph Theory. Reading, MA: Addison-Wesley, 1984. 4. Chebotarev, P. and Agaev, R., Forest Matrices Around the Laplacian Matrix, Linear Algebra Appl., 2002, vol. 356, pp. 253 -- 274. 5. Wentzell, A.D. and Freidlin, M.I., On Small Random Perturbations of Dynamical Systems, Russian Math. Surveys, 1970, vol. 25, no. 1, pp. 1 -- 55. 6. Agaev, R.P. and Chebotarev, P.Yu., The Matrix of Maximum Out Forests of a Digraph and Its Applications, Automat. Remote Control, 2000, vol. 61, no. 9, pp. 1424 -- 1450. AUTOMATION AND REMOTE CONTROL Vol. 73 No. 1 2012 166 AGAEV, CHEBOTAREV 7. Jackson, M.O., Social and Economic Networks. Princeton, NJ: Princeton Univ. Press, 2008. 8. Agaev, R.P. and Chebotarev, P.Yu., Convergence and Stability in Consensus and Coordination Problems (A Survey of Basic Results), UBS, 2010, vol. 30, no. 1, pp. 470 -- 505. In Russian. 9. Gilardoni, G.L. and Clayton, M.K., On Reaching a Consensus Using DeGroot's Iterative Pooling, Ann. Statist., 1993, vol. 21, pp. 391 -- 401. 10. Barabanov, I.N., Korgin, N.A., Novikov, D.A. and Chkhartishvili, A.G., Dynamic Models of Informational Control in Social Networks, Automat. Remote Control, 2010, vol. 71, no. 11, pp. 2417 -- 2426. AUTOMATION AND REMOTE CONTROL Vol. 73 No. 1 2012
cs/0505045
1
0505
2005-05-17T13:06:41
A T Step Ahead Optimal Target Detection Algorithm for a Multi Sensor Surveillance System
[ "cs.MA", "cs.RO" ]
This paper presents a methodology for optimal target detection in a multi sensor surveillance system. The system consists of mobile sensors that guard a rectangular surveillance zone crisscrossed by moving targets. Targets percolate the surveillance zone in a poisson fashion with uniform velocities. Under these statistics this paper computes a motion strategy for a sensor that maximizes target detections for the next T time steps. A coordination mechanism between sensors ensures that overlapping areas between sensors is reduced. This coordination mechanism is interleaved with the motion strategy computation to reduce detections of the same target by more than one sensor. To avoid an exhaustive search in the joint space of all sensors the coordination mechanism constraints the search by assigning priorities to the sensors. A comparison of this methodology with other multi target tracking schemes verifies its efficacy in maximizing detections. A tabulation of these comparisons is reported in results section of the paper
cs.MA
cs
Abstract – This paper presents a methodology for optimal target detection in a multi sensor surveillance system. The system consists of mobile sensors that guard a rectangular surveillance zone crisscrossed by moving targets. Targets penetrate the surveillance zone with poisson rates at uniform velocities. Under these conditions we present a motion strategy computation for each sensor such that it maximizes target detection for the next T time-steps. A coordination mechanism among sensors ensures that overlapping and overlooked regions of observation among sensors are minimized. This coordination mechanism is interleaved with the motion strategy computation to reduce detections of the same target by more than one sensor for the same time-step. To avoid an exhaustive search in the joint space of all the sensors the coordination mechanism constrains the search by assigning priorities to the sensors and thereby arbitrating among sensory tasks. A comparison of this methodology with other multi target tracking schemes verifies its efficacy in maximizing detections. A tabulation of these comparisons is reported in the results section of this paper. “Sample” and “time-step” are used equivalently and interchangeably in this paper. Index Terms- multi sensor system, optimal target detection, sensor network, sensor surveillance, multi-agent system I INTRODUCTION A T-Step Ahead Optimal Target Detection Algorithm for a Multi Sensor Surveillance System Henry Hexmoor and Shravan Sogani K Madhava Krishna International Institute of Information Technology CSCE Department, University of Arkansas Fayetteville, AR 72701 Hyderabad – 500 019, INDIA [email protected], [email protected] [email protected] strategy of a sensor that maximizes the number of detections for the next T time steps. The surveillance zone is discretized into a lattice of cells. Each cell stores information about the expected number of targets to be seen at that cell position purely based on target arrival statistics. This is done offline at all the cell locations across the entire surveillance zone. Then during the real-time phase of the algorithm an estimate of the number of detections based on combination of current target information and target arrival statistics is computed. These values are computed not across the entire lattice but for cells that are at a level T from current positions of all the sensors. Cells that are at a level one from the sensor’s current location store detection values for the next T samples, while those that are at level T from the sensor store information only for time step T. By level one we mean the immediate set of eight neighbors in the lattice from the current location of the sensor and level T indicates cells on lattice that are T neighbors away in an eight-connected sense. A depth limited search, with the depth limited by T, maximizing the number of detections performed on the lattice from the sensor’s current position yields the motion strategy for the sensor. Computing the best strategy from its individual perspective can result in motions for each sensor with overlapping regions of observation. A priority based coordination mechanism is interleaved with the motion strategy computation to reduce detections of the same target by more than one sensor that further enhances the detection performance for the entire system. To avoid an exhaustive search in the joint space of all the sensors the coordination mechanism constrains the search by assigning priorities to the sensors. Hence while optimal from a single sensor’s perspective the algorithm is not optimal across all sensors – a choice that one is reasonable to assume in light of prevailing real time demands. The details of this method are presented in section 3 of this paper. Extensive simulation results confirm the efficacy of this strategy in the form of tabular comparisons presented in section 4. The proposed approach is particularly suitable for guarding large open areas that are crisscrossed by moving targets when the number of sensors at disposal for monitoring them is limited. Due to limited number of sensors as well as to glean characteristics of targets over several observations the sensors are allowed to be move. Such surveillance systems find utilities in many security, surveillance and reconnaissance applications. We present a framework for maximizing target detections in a surveillance system consisting of multiple mobile sensors (i.e., robots). The sensors collectively guard a rectangular surveillance zone crisscrossed by moving targets. A-priori information about targets is the knowledge of their poisson rates of entry. Instantaneous or current knowledge about all targets within the sensing range of a sensor is available to the sensor in the form of the target’ velocity information and motion direction. While current information is used in deterministically computing the best places to be at in the subsequent time steps, it does not take into consideration the changes in the environment that occur due to consistent flow of target traffic into and out of the surveillance zone. Knowledge of the statistics of target entry and exit on the other hand are used to compute the statistically optimal places to be at in the future from a given location, but this does not consider the current information gleaned through sensor observations. Hence a combination of both current target information and target statistics is used to compute a motion The rest of the paper is organized as follows. Section 2 places the current work in the context of similar works found in the literature. Section 3 presents the formulation of the methodology and section 4 attests to the efficacy of the methodology in our simulation work. Section 5 concludes and provides further scope for this work. II. BACKGROUND REVIEW Many reconnaissance and surveillance, security, applications require distributed autonomous observation of movements of targets navigating in a bounded area of interest. Multi-sensor surveillance finds applications such as in border patrol, guarding of secured areas, search and rescue and warehouse surveillance [1, 2]. It involves detection of multiple intrusions and/or tracking through coordination between the sensors. Detection and target tracking has been researched from multiple viewpoints. Some efforts have focused on the problem of identifying targets from a given set of data through particle filters [3], and probabilistic methods [4]. The problem of data association or assigning sensor measurements to the corresponding targets were tackled by Joint Probabilistic Data Association Filters by the same researchers such as in [3]. Kluge and others [5] use dynamic timestamps for tracking multiple targets. Krishna and Kalra [6] presented clustering based approaches for target detection and further extended it to tracking and avoidance. The focus of these approaches has been on building reliable estimators for predicting target trajectories that is different from the objective of this effort to maximize target detections. In the context of distributed task allocation and sensor coordination Parker proposed a scheme for delegating and withdrawing robots to and from targets through the ALLIANCE architecture [7]. The protocol for allocation was one based on “impatience” of the robot towards a target while the withdrawal was based on “acquiescence”. Jung and Sukhatme [8] present a strategy for tracking multiple intruders through a distributed mobile sensor network and a strategy for maximizing sensor coverage[8, 9]. Lesser’s group have made significant advances to the area of distributed sensor networks [10] and sensor management [11]. In [12] Parker presents a scheme called A-CMOMMT where the goal is to maximize the number of targets observed over a time interval of length T based on the same philosophy of behavior-based control as in [7]. The authors of this paper present their scheme for resource allocation and coordination in a distributed sensor system through a set of fuzzy rules in [13] and further compare various resource allocation strategies in terms of their detection performance in [14]. The author of [15] has looked at the problem of static placement of sensors in known polygonal environments and [16] describes a distributed sensor approach to target tracking using fixed sensor locations. The current approach is disparate from those of [15,16] in that in the current scheme the sensors are mobile. Among the approaches that we have encountered the closest to this effort are [12] and [8]. In [12] a behavior-based approach, A-CMOMMT, is compared with three other heuristic approaches where the sensor’s motion strategy is arbitrary or random in the first, stationary (the sensor does not move) in the second and based on local force control in the third. However the approaches including A-CMOMMT are heuristic in that while effective they do not guarantee that the motion strategy generated is actually the best possible strategy for those T time steps based on the gathered data. In [8] a motion strategy for tracking multiple targets based on density estimates is presented. The robot attempts to maximize target detections by maintaining itself at a particular distance from the center of gravity of currently observed targets. It is nonetheless not clear if this could again be the best strategy. In contrast, our approach presents a scheme that moves the sensor to provably the optimal regions in the surveillance region in order to maximize detections over the next T samples. In other words, through a depth limited search the sensor comes up with the best possible motion strategy that results in maximizing detections over next T time steps among the various possible strategies from the current sensor location. This is combined with the coordination mechanism to reduce overlapping areas of observation positions this method as novel and different from other approaches the authors have come across in literature. III. THE METHODOLOGY A. Description of Surveillance Zone, Sensors and Targets: We consider the surveillance system depicted in figure 1. The sides of the outer rectangle or the biggest rectangle in figure 1 form the boundary of the surveillance zone – the area enclosed by it is the area of interest where sensors attempt to optimize their rates of detection. The shaded circles are effective sensor ranges in their starting positions. The field of vision (FOV) of a sensor is 360 degrees. The squares with thick boundaries in figure 1 with the sensors at their center are the inscribed squares of the circular FOV of a sensor. In other words, the diameter of the FOV of a sensor is the diagonal of one such inscribed square. Purely from the point of view of facilitating easier computations the sensor considers only those targets that lie within its inscribed square as targets within its FOV. It needs to be emphasized that this simplification does not have any bearing on the overall philosophy of this approach. In the results section the efficacy of this method is verified by uniformly applying this same condition across all other approaches that are compared and the extension to a case of circular FOV is merely one of more involved but computable computations. The entire surveillance region is discretized into a lattice of cells. The cells are represented as the small squares inside the FOV of the leftmost and topmost sensor. The dashed lines along the length and breadth indicate that the cells proceed to fill the entire surveillance zone. At each of the cell locations various aspects of target statistics are computed that are described later. The crosses outside the surveillance zone are the source points from where targets emanate as per Poisson statistics. Targets percolate from each of those sources into that horizontal or vertical half-plane that contains the surveillance zone. Therefore, all targets coming from a particular source will be contained with an angular span of πradians. Furthermore, the following assumptions are made for sensors and targets • A sensor can detect all targets within its FOV or occlusion relations are not considered. • The takeoff angle of a target from its source point is uniformly distributed in [ ]π,0 • All targets move with the same uniform velocity within the surveillance zone along linear trajectories, which can be ascertained by the sensor. The last assumption allows that the statistical values of various parameters computed at every cell in the lattice to take a unique value rather than a probability distribution. In case of a distribution the expected values of the parameters need to be made use of. Figure 1: The surveillance zone is represented by the outer rectangle. The sensors by shaded circles, the crosses outside are the target sources and the small squares within the FOV of top and left sensor are the discretized cells. The dashed lines along the length and breadth indicate that the cells proceed to fill the entire surveillance zone. B Problem Statement and Approach The problem attacked in this paper is stated as follows. Given: SN : The set of all sensors in the system, • { }s , where si denotes the sensor with sn s N s ,...,1,0= S label i , ordered in a sequence. Hence sn the label of the last enumerated sensor is also the number of sensors in the system, which is a constant. tIN , : The set of all targets in the system at time t, where, { }tI i N in i tIn , is the number of targets , and ,...,1,0= tI , , in the system at time step t that varies at every time step and hence dynamic. • J g = • tm , is maximized. In following cost function :,tmg A binary variable that takes the value 1 if a target sn sensors at t. im is observed by any one of the Objective: To develop an algorithm such that the n T tI , ∑ ∑ t m 1 1 = = other words, the number of detections of the targets present in the system at every time step is maximized over T time steps. Approach: The methodology is delineated as a sequence of steps below and some of the steps are elaborated therein and some are explained subsequently. Due to brevity of space, some of the computations mentioned in these steps that peripheral to the core algorithm are not detailed. 1) At each cell, Pi , in the lattice the following are computed and stored. 1a). Piλ : The expected rate of target entry into the FOV of a sensor centered at Pi . If there are Q target sources each Q θ j ∑ = λλ Pi π j 1 = emanating targets at rate λthen , where the ratio the rate at which the sensor at Pi sees targets denotes the expected fraction of the total number of θj π targets that would enter the FOV of the sensor at Pi from the jth of the Q target sources. In figure 1 Q=8. We also denote by θ j jPi =, λ λ π from source j. In other words, among the targets taking off at any angle within [ ]π,0 , from source j only those that takeoff within the angular span [ ]j would enter the FOV of , θδδ + j j the sensor, where jδ is the smallest angle formed by the segment connecting a vertex of the FOV square and source j is the largest angle. and j θδ + j PieT 1b) : The expected escape time for a target through the field of vision of the sensor centered at Pi. The escape time is essentially the time for which a target would be in the FOV before it escapes from a sensor. 1c) d eT : The number of targets expected to be λ= Pi Pi Pi detected by a sensor at Pi for any time step. 1d) jPi ,η : The normalization constant at cell Pi due to target source j. This constant renders the summation of the probability distribution function (pdf) of the escape time of a target through the FOV of a sensor at Pi due to source j to go te , to unity. In other words if is the random variable that jPi measures the escape time of a target for a sensor at cell Pi )jPi ( due to source j and tef jPi ,η sees to that be its pdf then , t b ( ) ∫ tef t a integral are the minimum and maximum possible escape , where the lower and upped bounds of the jPi , = 1 )jPi ( tef times. It is to be noted that in general is not the , same in [ ]b a t t and needs to be broken into sub functions for , respective time intervals for which it has the same closed form representation. The details of how these sub probability distribution functions are computed is not given here for conciseness. 2) For every sensor sj in the system located at a particular cell location Pj the path it takes for the next T time steps is computed such that the number of target detections is maximized based on steps 3 and 4. 3) For sj currently at Pj compute for all cells, Pk , that are at level n, n = T from Pj , the expected number of } ,...,2,1,0{ tk dn , , where the first index, k, in the superscript detections, refers to the cell Pk and the second index t denotes the time step for which it was computed. The computation is based on what sj currently observes at Pj and the target arrival statistics, elements of which are computed in step 1. This computation is carried out at the current cell Pj and those cells one time-step away for the next T time steps. This is done because the sensor can choose to remain at the current cell itself for the next T time steps or migrate to a neighboring cell and stay there for next T-1 steps or come back to the starting cell for any of the future T steps depending on whichever of those various possible strategies yields maximum detections. For cells at depth two this computation is carried T-1 times, corresponding to time steps starting from 2 and ending at T with T inclusive. For a cell at depth T the computation is done once for time step T alone. This results in a tree where each cell at time step t is connected to its eight 1+t . Since the cell that nearest cells as well as itself at connects to itself does for a different time step the two cells though at the same location are different due to difference in time as their information content varies with every time step. Figure 2 shows an instance of the tree, where a cell location i tj labeled as connects to its eight neighbors as well as ,( ), itself at t+1, where j i represents the index of the cell in the ) ,( two dimensional lattice and t its index in time. Thus every node in the tree except the leaf node is connected to nine nodes and the depth of the tree is T. 4) On this nine connected space-time tree perform a depth- tk dn , limited search to maximize the detections with as the objective value of a link that connects a current cell node Pj at t-1 to another node Pk for the next time step t. 5) The paths of the sensors are ordered based on the number of detections. The sensor path that has the highest number of detections has the highest priority. Ties are broken randomly. 6) For overlapping FOV between sensors at certain locations in the paths the number of detections is reduced at the corresponding cell for the corresponding time-step for the sensor with lower priority. The reduction is computed as tk tk tk , , , . The fraction f is proportional to the n n nf = − d d d area of overlaps given by the area of overlapping FOV divided by the area of the FOV. 7) The optimal path for the sensor with the lower priority is tk dn , values through depth recomputed based on the updated limited search. For a sensor with priority p, we check for overlaps with all those sensor trajectories with priorities 1, 2, …, p-1. 8) The steps two to seven are repeated until the end of simulation. Step 1 of the algorithm is performed only once at the start of the simulation across all the cells and is essentially an offline step unless the target statistics changes dynamically. Figure 2: An instance of the nine connected spacetime tree, where every node except the leaves connects to its eight neighbors as well as itself at the next time step. tk dn , B Computing tk dn , Computation of varies if it is being carried out for the same cell location for a future time or for a different cell location. For the case of computing at the same cell the procedure is as follows: Given that the sensor at cell Pi currently or at t=0 observes Pin number of targets then the number of targets it is likely to see T time-steps into the future is given by: Q T ( ∑ ∑ teP λ λ jPi Pi , j t 1 1 = = tT −< k +− n Ti , d = n jPi , Pi T − ) (1) te Here have the same connotations as , , λ λ Pi jPi jPi , , discussed in step 1 and Q is the number of target sources as before. The first term on the right hand side or RHS of equation (1) is the deterministic part that is computed purely based on what the sensor senses now. It merely states that out particle seen currently k of them would disappear by T of Pin time steps. The second term onwards on the RHS denote the TPiλ statistical counterpart. It says that are likely to enter the FOV in T time steps and of which the number in the third term are likely to leave the FOV by T. The third term containing the ( )tT teP denotes summation is explained as follows. −<, jPi the probability that a target from source j that entered the FOV t would have escaped the FOV by T . Hence at ( )tT λ teP is the estimate of the number of −<, jPi jPi , λ is the particles that entered at t and escaped by T , since jiP , estimate of number of particles entering for every t from j into the FOV of the sensor at Pi . The summation over t signifies jPi , Pi ( teP that estimate of the number of particles that would have left by T needs to be done in correspondence with the time at which they entered between now and T. The summation over Q te , signifies that the pdf of is not the same for every source jPi ( )tT j at that cell location. The teP is given below by −<, jPi its pdf with notations from step 1.  0  1   η  jPi ,  t tT 1 ; >−  b The number of candidates likely to be seen for a different cell Pk at T given that Pin number of targets then the number of targets are currently seen at Pi is given by:  Q T ( ∑ ∑  teP λκ λ Pi jPi ,   j t 1 1 = = ) tT =−< tT −< tT ≤−≤ k +− n Tk , d tT <− t T ∫ t a = n T − t b . jPi , tef ( jPi , ); t a ; a ) Pkd ( (2). 1 κ−+ Equation (2) has similar connotations as (1) except for the appearance of κthat represents the fraction of area common to FOV erected at Pi and Pk and Pkd is as discussed in step 1. For that fraction of the FOV at Pk that is not visible from Pi , Pkd , which is the expected number of detections at cell Pk at any instant is made use of. And since ( )κ−1 is the fraction of FOV at Pk that is not visible Pkd is multiplied by that fraction. This makes use of the assumption that the distribution of targets is uniform across an area. In our plots of Pkd done for the surveillance zone variations between cells are steep only towards the edges of the zone. A more rigorous computation involves evaluating the pdf for the overlapped and non-overlapped areas separately. This is being avoided since (2) is computed during the online phase of the algorithm. This assumption is also invoked in step 6 while reducing the number of detections due to overlapping FOV. C The Coordination Phase: The coordination phase prevents paths of sensors to come close to one another to avoid overlapping FOV. This is done tk dn , by imposing penalties and reducing values of and recomputing paths for sensors with lower priorities as described in steps 5, 6 and 7. The path of the sensor with highest detections is fixed. The path with the second highest recomputed if there are overlapping areas of observation with the first. The recomputed path constitutes a motion strategy that is optimal in terms of detections under the constraint that the path of highest sensor is fixed. Similarly the path of the sensor with the least priority sensor when recomputed is optimal under the constraint that the paths of the sensors with higher priority are fixed. Hence at the coordination phase the optimality of the algorithm is not complete. A fully complete  )   algorithm would involve a search in the joint space of all sensors that is combinatorially hard. The depth limited search 9 3 = over T=3 time steps involves a search over paths for 729 reaching an optimal motion strategy. Hence a search in the n joint space for n sensors involves a search over 729 paths, that is computationally infeasible for online applications. The coordination phase resembles the decoupled priority based approaches to multi robot path planning [17,18]. IV SIMULATION RESULTS In this section we report results obtained through simulations on our environment developed using Borland’s JBuilder IDE. The value of the number of time steps, T, used for these simulations is 3, carried out on a P4 workstation with clock speed of 1.8 GHz. Figure 3 shows a snapshot of the environment with 10 sensors. The current position of the sensor is shown through the bigger shaded circle, while the targets through smaller ones. The traces of sensor movements are also shown. Target traces are not shown to avoid cluttering. Figure 3: A simulation system with ten sensors and several targets. The robots are shown through larger circles and targets through smaller ones. The traces of sensors are also shown. Table 1 compares the performance of the system in the presence and absence of coordination. The experiments done with sensor coordination are labeled as 1a, 2a, …, while those without coordination are labeled as 1b, 2b,… . Each experiment lasted for 150 time steps in total. The first column of the table denotes the index of the experiment; the second denotes the number of sensors in the system, the third the average detections or the number of targets detected by at- least one sensor per sample. The fourth signifies the average fraction of targets detected per sample, which is the number of targets detected per sample by one or more sensors divided by the number of targets in the surveillance zone per sample. Columns 5, 6 and 7 represent the number of targets detected exactly by one, two and three sensors per sample. The last column denotes the target velocity. Detections by more than three sensors are not tabulated for they generally assume insignificant values. Of particular interest in comparing the two schemes are the average fraction of target detections as well as the number of targets detected by exactly one, two and three sensors. It is expected that the average fraction of detections as well as the number of targets detected by exactly one sensor to be more for the method with coordination incorporated. Simultaneously the number of targets detected by two or more sensors is anticipated to be higher for the method that does not use the coordination phase. As the overlapping areas of FOV are higher in the absence of coordination the number of targets detected by two or more sensors is also higher. This in turn allows more targets to go undetected and the average fraction of detections to be lesser. The abbreviations used in the column headings are explained in the table caption. EN NS AD ZD AF D1S D2S D3S TV 10 0 2 29 0.6 22 32 10 1a 10 0.8 6.8 19.5 0.52 24.9 27.1 10 1b 22.2 25.7 0.46 22 0.2 0 10 2a 6 10 0 3.2 18.4 0.44 26.8 21.5 2b 6 15 0 0.3 20 0.49 21.1 20.4 10 3a 15 0 3.5 13.8 0.41 24.1 17.3 10 3b 27.2 20.2 0.57 26.5 0.7 0 10 4a 6 10 0 1.3 25.7 0.56 20.4 26.9 6 4b 15 0 0.4 19.6 0.47 22.5 20 10 5a 18.7 23.8 0.44 16.4 1.5 0.9 15 5b 10 Table 1: Comparison between motion strategies with and without sensor coordination. Experiments with labels ending in ‘a’ or the first line in every row have coordination incorporated while those ending in ‘b’ or the second line in each row are uncoordinated. Abreviations are as follows: EN = experiment number, NS = number of sensors, AD = Average Detections per sample, ZD = Zero Detections per sample, AF = Average Fraction per sample, D1S = Detections by exactly 1 sensor, D2S = Detections by exactly 2 sensors, D3S = Detections by exactly 3 sensors, TV = Targets’ Velocity As seen from table 1 the performance of the coordinated scheme with decoupled optimization is better for all experiments with differing NS and TV values than the method sans coordination. For example the number of targets detected by exactly one sensor per sample, the D1S column, is significantly higher in a number of experiments for the coordinated vis-à-vis the uncoordinated scheme. It is higher by 10, 4 and 6 detections per sample in experiments 1, 2 and 3. Also the number of targets detected by two sensors is significantly lesser across all experiments for the coordinated method. In experiments 1 and 5 the number of targets detected by three sensors is almost one per sample for the method lacking coordination. Correspondingly average fraction of targets detected per sample for the coordinated method is higher in all the experiments. The results of the table tally with the expectations and the underlying reasons for these expectations mentioned earlier. In table 2 we compare the current strategy with four of our previous methods of target detection and pursuit [14]. The first column signifies the experiments. Indexes 1a, 2a, etcetera correspond to the current method. Those with indices ‘b’, ‘c’, ‘d’ and ‘e’ correspond to coordinated-distracted, coordinated - dedicated, local-distracted and local-dedicated methods of resource allocation of sensors to targets for target detection [14]. Table 2 shows that across all experiments the current scheme surpasses all others in terms of average fraction of targets detected as well as other criteria such as D1S, D2S, AD and AF. It is to be noted that a difference of 0.06 in average fraction per sample between two methods corresponds to a difference of 4 or 5 target detections per sample (there are 70 to 80 targets in the zone per time-step on an average), which in turn corresponds to a difference of 600 detections in 150 time-steps of simulation. EN NS AD ZD AF D1S D2S D3S TV 10 0 0.2 22 0.46 25.7 22.3 6 1a 1b 6 20.3 27.7 0.42 17.9 2.3 0.1 10 10 0.8 4.4 13.1 0.37 30.5 18.3 6 1c 10 0 2.3 18.7 0.43 27 21 6 1d 10 0.5 4.6 13.1 0.37 30.5 18.3 6 1e 15 0.0 0.5 21.0 0.46 20.2 21.5 10 2a 2b 10 19.0 26.1 0.40 17.5 1.6 0.0 15 15 0.02 1.6 18.0 0.42 25.8 19.7 10 2c 15 0.02 2.2 17.0 0.41 25.4 19.2 10 2d 15 0.0 1.2 18.8 0.42 25.8 20.0 10 2e 10 0 0.7 26.5 0.57 20.2 27.2 6 3a 3b 6 21.2 26.1 0.44 20.2 1.0 0 10 10 0 1.7 19.8 0.45 25.8 21.5 6 3c 10 0 1.0 20.9 0.46 25.4 21.9 6 3d 10 0 1.7 19.8 0.45 25.7 21.5 6 3e 10 0.0 0.7 39.8 0.40 66.0 40.4 10 4a 4b 10 30.0 68.9 0.32 26.3 3.5 0.2 10 10 0.0 1.9 29.0 0.31 74.4 30.9 10 4c 10 0.8 3.5 27.4 0.31 73.7 31.6 10 4d 1.8 4e 10 31.6 73.8 0.30 29.8 0.0 10 0.7 3.4 3.4 3.7 3.2 0.0 0.2 0.04 0.04 0.0 30.0 21.4 25.9 24.8 25.5 29.3 17.7 22.5 21.0 22.4 57.4 64.9 60.3 61.4 60.7 0.35 0.24 0.30 0.28 0.29 Table 2: Comparison of current method (label a) with four previous methods called coordinated-distracted (b), coordinated-dedicated (c), local-distracted (d) and local-dedicated (e). The abreviations are same as in table 1. The comparisons reported in the table were done by introducing targets according to Poisson rates for one of the methods for an experiment that we call as the base method. For the remaining methods of that experiment the targets were introduced in the same fashion as the base method. The value of λwas 0.3 and Q=8 in these simulations. V CONCLUSIONS AND SCOPE A method for motion strategy computation of a sensor that maximizes the number of target detections for the next T- 5a 5b 5c 5d 5e 6 6 6 6 6 15 15 15 15 15 [10] B Horling, R Vincent, R Miller, J Shen, R Becker, K Rawlins, and V Lesser, “Distributed Sensor Network for Real Time Tracking”, In Proceedings of the 5th International Conference on Autonomous Agents:. 417-424, 2001. [11] B Horling, R Miller, M Sims, and V Lesser, “Using and Maintaining Organization in a Large-Scale Distributed Sensor Network”, In Proceedings of the Workshop on Autonomy, Delegation, and Control, (AAMAS 2003). [12] L Parker, “Distributed algorithms for multi-robot observation of multiple moving targets”, Autonomous Robots, 12, 3 (2002) [13] K Madhava Krishna, H Hexmoor, S Pasupuleti and S Chellappa, “A Surveillance System Based on Multiple Mobile Sensors”, Proceedings of FLAIRS, 2004, Special Track in Sensor Fusion. [14] K Madhava Krishna and Henry Hexmoor, “Resource Allocation for a Multi-sensor Surveillance System”, Workshop on Strategies Collaborative Agents, www.cs.unb.ca/~ghorbani/cola/2004/cola04.pdf, 29-39. [15] A. J. Briggs, “Efficient geometric algorithms for robot sensing and control”, Ph.D. thesis, Cornell, 1995 [16] E H Durfee, V R Lesser and D D Corkill, “Coherent cooperation among communicating problem solvers”, IEEE Trans. on Computers, C-36:1275- 1291, 1987. [17]. K. Azarm and G. Schmidt. “Conflict-Free Motion of Multiple Mobile Robots Based on Decentralized Motion Planning and Negotiation”, Proc. IEEE Int. Conf. on Robotics and Automation, p. 3526-3533, 1997. [18] M Bennewitz, W Burgard and S Thrun, “Finding and optimizing solvable priority schemes for decoupled path planning techniques for teams of mobile robots”, Robotics and Autonomous Systems, 41 (2), pp. 89-99, 2002. time steps is presented. The method makes use of a-priori known statistics of target arrivals along with detections reported for the current sample to estimate the number of detections on a lattice of cells. To reduce overlaps a coordination mechanism is specified that performs a constrained search, where the constraints are in the form of priorities assigned to sensors. The absence of an exhaustive search in the joint space due to the constraints renders the algorithm sub-optimal from a multi sensor perspective although optimal with respect to a single sensor in presence of those constraints. The tabulations presented in the results section vindicate the performance of the current approach in comparison to previous approaches for target detection and pursuit. The performance enhancement due to the coordination phase that reduces overlaps in FOV between sensors is also tabulated in section IV. As with any optimization algorithm the tradeoff is between the completeness of the optimization method vis-à- vis real-time requirements. In this aspect considering real time requirements a greedy decoupled optimization is resorted to at the multi sensor level. The performance is also dependent on the resolution of the discretization or the distance between the cells in the lattice. Future scope of this effort lies in identifying possible geometric properties of the surveillance area and nature of sensor paths to reduce the search space in the joint space of sensors that would provide for a real-time multi-sensor optimally detecting algorithm. Other areas of interest involve modifying the framework to provide for probability distributions for statistical parameters computed at the cells that allow targets to take multiple velocities. We also intend to compare the current method with other known methods [12] and extend the current method to include obstacles of simple geometry within surveillance area. REFERENCES: [1] S. A. Stoerer, P. E. Rybski, M. D. Erickson, M. Wyman, M. Gini, D. F. Hougen, N. Papanikolopoulos, “A Robot Team for Exploration and Surveillance: Design and Architecture,” Proceedings of the International Conference on Intelligent Autonomous Systems 6, pp. 767-774, Venice, Italy, July 2000. [2] H R Everett, G A Gilbraeth and R T Laird, “Coordinated control of multiple security robots”, Proceedings of SPIE Mobile Robots, 292-305, 1993 [3] D Schulz; W Burgard, D Fox and A Cremers, “Tracking multiple moving targets with a mobile robot using particle filters and statistical data association”, IEEE International Conference on Robotics and Automation, 1165-1170, 2001 [4] D Schulz and W Burgard, “Probabilistic state estimation of dynamic objects with a moving mobile robot”, Robotics and Autonomous Systems, 2001. [5] B. Kluge, C Kohler and E Prassler, “Fast and robust tracking of multiple objects through a laser range finder”, IEEE International Conference on Robotics and Automation, 1165-1170, 2001 [6] K Madhava Krishna and P K Kalra, “Detection tracking and avoidance of multiple dynamic objects”, Journal of Intelligent and Robotic Systems, 33(4): 371-408, 2002 [7] L Parker, “Cooperative robotics for multi-target observation”, Intelligent Automation and Soft Computing, 5[1]:5-19, 1999 [8] B Jung and G.S. Sukhatme, “Multi-Target Tracking using a Mobile Sensor Network”, Proc., IEEE Intl. Conf. On Robotics and Automation, 2002 [9] S Poduri and G S Sukhatme, “Constrained Coverage for mobile sensor networks”, IEEE ICRA, 165-171, 2004
1811.05931
2
1811
2019-03-11T13:04:28
Evolving intrinsic motivations for altruistic behavior
[ "cs.MA" ]
Multi-agent cooperation is an important feature of the natural world. Many tasks involve individual incentives that are misaligned with the common good, yet a wide range of organisms from bacteria to insects and humans are able to overcome their differences and collaborate. Therefore, the emergence of cooperative behavior amongst self-interested individuals is an important question for the fields of multi-agent reinforcement learning (MARL) and evolutionary theory. Here, we study a particular class of multi-agent problems called intertemporal social dilemmas (ISDs), where the conflict between the individual and the group is particularly sharp. By combining MARL with appropriately structured natural selection, we demonstrate that individual inductive biases for cooperation can be learned in a model-free way. To achieve this, we introduce an innovative modular architecture for deep reinforcement learning agents which supports multi-level selection. We present results in two challenging environments, and interpret these in the context of cultural and ecological evolution.
cs.MA
cs
Evolving Intrinsic Motivations for Altruistic Behavior Jane X. Wang, Edward Hughes, Chrisantha Fernando, Wojciech M. Czarnecki, Edgar A. Duéñez-Guzmán, & Joel Z. Leibo {wangjane,edwardhughes,chrisantha,lejlot,duenez,jzl}@google.com DeepMind London 9 1 0 2 r a M 1 1 ] A M . s c [ 2 v 1 3 9 5 0 . 1 1 8 1 : v i X r a ABSTRACT Multi-agent cooperation is an important feature of the natural world. Many tasks involve individual incentives that are misaligned with the common good, yet a wide range of organisms from bac- teria to insects and humans are able to overcome their differences and collaborate. Therefore, the emergence of cooperative behav- ior amongst self-interested individuals is an important question for the fields of multi-agent reinforcement learning (MARL) and evolutionary theory. Here, we study a particular class of multi- agent problems called intertemporal social dilemmas (ISDs), where the conflict between the individual and the group is particularly sharp. By combining MARL with appropriately structured natu- ral selection, we demonstrate that individual inductive biases for cooperation can be learned in a model-free way. To achieve this, we introduce an innovative modular architecture for deep rein- forcement learning agents which supports multi-level selection. We present results in two challenging environments, and interpret these in the context of cultural and ecological evolution. KEYWORDS multi-agent; evolution; altruism; social dilemmas ACM Reference Format: Jane X. Wang, Edward Hughes, Chrisantha Fernando, Wojciech M. Czar- necki, Edgar A. Duéñez-Guzmán, & Joel Z. Leibo. 2019. Evolving Intrinsic Motivations for Altruistic Behavior. In Proc. of the 18th International Confer- ence on Autonomous Agents and Multiagent Systems (AAMAS 2019), Montreal, Canada, May 13 -- 17, 2019, IFAAMAS, 10 pages. 1 INTRODUCTION Nature shows a substantial amount of cooperation at all scales, from microscopic interactions of genomes and bacteria to species- wide societies of insects and humans [39]. This is in spite of natural selection pushing for short-term individual selfish interests [9]. In its purest form, altruism can be favored by selection when coop- erating individuals preferentially interact with other cooperators, thus realising the rewards of cooperation without being exploited by defectors [10, 14, 22, 23, 51]. However, many other possibili- ties exist, including kin selection, reciprocity and group selection [43, 44, 54, 56, 57, 60]. Lately the emergence of cooperation among self-interested agents has become an important topic in multi-agent deep reinforcement learning (MARL). [35] and [28] formalize the problem domain as an intertemporal social dilemma (ISD), which generalizes matrix game Proc. of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), N. Agmon, M. E. Taylor, E. Elkind, M. Veloso (eds.), May 13 -- 17, 2019, Montreal, Canada. © 2019 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved. social dilemmas to Markov settings. Social dilemmas are character- ized by a trade-off between collective welfare and individual utility. As predicted by evolutionary theory, self-interested reinforcement- learning agents are typically unable to achieve the collectively op- timal outcome, converging instead to defecting strategies [35, 48]. The goal is to find multi-agent training regimes in which individuals resolve social dilemmas, i.e., cooperation emerges. Previous work has found several solutions, belonging to three broad categories: 1) opponent modelling [16, 34], 2) long-term planning using perfect knowledge of the game's rules [36, 49] and 3) a specific intrinsic motivation function drawn from behavioral economics [28]. These hand-crafted approaches run at odds with more recent end-to-end model-free learning algorithms, which have been shown to have a greater ability to generalize (e.g. [11]). We propose that evolution can be applied to remove the hand-crafting of intrinsic motivation, similar to other applications of evolution in deep learning. Evolution has been used to optimize single-agent hyperparame- ters [30], implement black-box optimization [59], and to evolve neu- roarchitectures [41, 55], regularization [4], loss functions [27, 29], behavioral diversity [7], and entire reward functions [52, 53]. These principles tend to be driven by single-agent search and optimization or competitive multi-agent tasks. Therefore there is no guarantee of success when applying them in the ISD setting. More closely related to our domain are evolutionary simulations of predator- prey dynamics [61], which used enforced subpopulations to evolve populations of neurons which are sampled to form the hidden layer of a neural network.1 To address the specific challenges of ISDs, the system we propose distinguishes between optimization processes that unfold over two distinct time-scales: (1) the fast time-scale of learning and (2) the slow time-scale of evolution [similar to 26]. In the former, individual agents repeatedly participate in an intertemporal social dilemma using a fixed intrinsic motivation. In the latter, that motivation is itself subject to natural selection in a population. We model this intrinsic motivation as an additional additive term in the reward of each agent [6]. We implement the intrinsic reward function as a two- layer fully-connected feed-forward neural network, whose weights define the genotype for evolution. We propose that evolution can help mitigate this intertemporal dilemma by bridging between these two timescales via an intrinsic reward function. Evolutionary theory predicts that evolving individual intrinsic reward weights across a population who interact uniformly at ran- dom does not lead to altruistic behavior [1]. Thus, to achieve our goal, we must structure the evolutionary dynamics [43]. We first implement a "Greenbeard" strategy [10, 31] in which agents choose 1See also [50] and [47] for reviews of other evolutionary approaches to cooperative multi-agent problems. interaction partners based on an honest, real-time signal of cooper- ativeness. We term this process assortative matchmaking. Although there is ecological evidence of assortative matchmaking [33], it cannot explain cooperation in all taxa [17, 18, 25]. Moreover it isn't a general method for multi-agent reinforcement learning, since honest signals of cooperativeness are not normally observable in the ISD models typically studied in deep reinforcement learning. To address the limitations of the assortative matchmaking ap- proach, we introduce an alternative modular training scheme loosely inspired by ideas from the theory of multi-level (group) selection [25, 60], which we term shared reward network evolution. Here, agents are composed of two neural network modules: a policy net- work and a reward network. On the fast timescale of reinforcement learning, the policy network is trained using the modified rewards specified by the reward network. On the slow timescale of evo- lution, the policy network and reward network modules evolve separately from one another. In each episode every agent has a distinct policy network but the same reward network. As before, the fitness for the policy network is the individual's reward. In contrast, the fitness for the reward network is the collective return for the entire group of co-players. In terms of multi-level selection theory, the policy networks are the lower level units of evolution and the reward networks are the higher level units. Evolving the two modules separately in this manner prevents evolved reward networks from overfitting to specific policies. This evolutionary paradigm not only resolves difficult ISDs without handcrafting but also points to a potential mechanism for the evolutionary origin of social inductive biases. The paper is structured as follows. In Section 2, we define our problem domain, and describe in detail our agent architecture and training methods. In Section 3, we present results from our experi- ments and further analyses of agent policies. Finally in Section 4, we discuss interpretations of our model as well as make suggestions for future work. 2 METHODS We varied and explored different combinations of parameters, namely: (1) environments {Harvest, Cleanup}, (2) reward network features {prospective, retrospective}, (3) matchmaking {random, assortative}, and (4) reward network evolution {individual, shared, none}. We describe these in the following sections. 2.1 Intertemporal social dilemmas In this paper, we consider Markov games [37] within a MARL set- ting. Specifically we study intertemporal social dilemmas [28, 35], defined as games in which individually selfish actions produce individual benefit on short timescales but have negative impacts on the group over a longer time horizon. This conflict between the two timescales characterizes the intertemporal nature of these games. The tension between individual and group-level rational- ity identifies them as social dilemmas (e.g. the famous Prisoner's Dilemma). We consider two dilemmas, each implemented as a partially ob- servable Markov game on a 2D grid (see Figure 1), with N = 5 players playing at a time. In the Cleanup game, agents tried to col- lect apples (reward +1) that spawned in a field at a rate inversely related to the cleanliness of a geographically separate aquifer. Over time, this aquifer filled up with waste, lowering the respawn rate of apples linearly, until a critical point past which no apples could spawn. Episodes were initialized with no apples present and zero spawning, thus necessitating cleaning. The dilemma occurred be- cause in order for apples to spawn, agents must leave the apple field and clean, which conferred no reward. However if all agents declined to clean (defect), then no rewards would be received by any. In the Harvest game, again agents collected rewarding apples. The apple spawn rate at a particular point on the map depended on the number of nearby apples, falling to zero once there were no apples in a certain radius. There is a dilemma between the short- term individual temptation to harvest all the apples quickly and the consequential rapid depletion of apples, leading to a lower total yield for the group in the long-term. All episodes last 1000 steps, and the total size of the playable area is 25×18 for Cleanup and 38×16 for Harvest. Games are partially observable in that agents can only observe via a 15×15 RGB window, centered on their current location. The action space consists of moving left, right, up, and down, rotating left and right, and the ability to tag each other. This action has a reward cost of 1 to use, and causes the player tagged to lose 50 reward points, thus allowing for the possibility of punishing free-riders [21, 45]. The Cleanup game has an additional action for cleaning waste. 2.2 Modeling social preferences as intrinsic motivations In our model, there are three components to the reward that enter into agents' loss functions (1) total reward, which is used for the policy loss, (2) extrinsic reward, which is used for the extrinsic value function loss and (3) intrinsic reward, which is used for the intrinsic value function loss. The total reward for player i is the sum of the extrinsic reward and an intrinsic reward as follows: (cid:16) (cid:17) , ri(si , ai) = r E i (si , ai) + ui(fi) . (1) i (s, a) is the environment reward obtained The extrinsic reward r E by player i when it takes action ai from state si, sometimes also written with a time index t. The intrinsic reward u(f) is an aggregate social preference across features f and is calculated according to the formula, ui(fiθ) = vTσ WTfi + b (2) where σ is the ReLU activation function, and θ = {W, v, b} are the parameters of a 2-layer neural network with 2 hidden nodes. These parameters are evolved based on fitness (see Section 2.3). The elements of v = (v1, v2) approximately correspond to a linear combination of the coefficients related to advantagenous and dis- advantagenous inequity aversion mentioned in [28], which were found via grid search in this previous work, but are here evolved. The feature vector fi is a player-specific vector quantity that agents can transform into intrinsic reward via their reward network. It's composed of features fij derived from all players 2, so that each 2Note that we use both i and j to index over the players, but i makes reference to the player receiving the intrinsic reward, while j indexes the players sending the features over which the intrinsic reward of player i is defined. Figure 1: Screenshots from (a) the Cleanup game, (b) the Harvest game. The size of the agent-centered observation window is shown in (b). The same size observation was used in all experiments. Figure 2: (a) Agent Aj adjusts policy πj(s, aϕ) using off-policy importance weighted actor-critic (V-Trace) [11] by sampling from a queue with (possibly stale) trajectories recorded from 500 actors acting in parallel arenas. (b) The architecture (shown only for 1 agent) includes a visual encoder (1-layer convolutional neural net with 6 3x3 filters, stride 1, followed by two fully- connected layers with 32 units each), intrinsic and extrinsic value heads (V I and V E), a policy head π, and a long-short term memory (LSTM, with 128 hidden units), which takes last intrinsic and extrinsic rewards (u(f) and r E) and last action as input. The reward network weights are evolved based on total episode return. player has access to the same set of features, with the exception that its own feature is demarcated specially (by always occupying the first element of the vector). The features themselves are a function of recently received or expected future (extrinsic) reward for each agent. In Markov games the rewards received by different players may not be aligned in time. Thus, any model of social preferences should not be overly influenced by the precise temporal alignment of different players' rewards. Intuitively, they ought to depend on comparing temporally averaged reward estimates between players, of pop. policy networks {{ϕ1, h1}, ..., {ϕN , hN }} Algorithm 1 Training Pseudocode - Shared Reward Network Require: P: and hyper-parameters Require: R: pop. of reward networks {θ1, ..., θN }, where θ = {W, v, b} Require: S: procedure to sample from P and R and return 5 players Require: U: procedure to update/evolve weights given a population of Require: F: procedure to calculate and assign fitness given the sampled fitness-scored individuals players 1: while not done do 2: 3: 4: 5: 6: p1:5 = p1, ..., p5 ← S(P, R) env ∼ p(T) 1:5 ← 0 e0 for t := 1 to T do τ t = (r E,t 1:5 , V E,t ▷ Sample 5 players ▷ Sample from distribution p over environments T ▷ Initialize temporally decayed reward ▷ Run for T = 1000 steps 1:5) ← env(p1:5) ▷ Play players in ▷ Calculate feature vectors for players 1:5 , ot 1:5, at environment, collect outputs in a trajectory τ = {τ 1, ..., τ T } for j := 1 to 5 do ▷ Decayed extrinsic reward if retrospective then j ← η e t−1 j else if prospective then j + r E,t fj = e t fj ← V E,t for i := 1 to 5 do j i ← vTσ(cid:0)WTfi + b(cid:1) fi ← reorder(fi, i) ut ▷ Value estimate from extrinsic value head ▷ Calculate intrinsic rewards for players ▷ Calculate intrinsic reward for i := 1 to 5 do ϕi ← RL(ϕi, τ , ui, hi) Fϕk , Fθk ▷ RL training for each ϕ ← F(τ) ▷ Calculate smoothed fitnesses associated with each reward and policy network sampled in this episode for (ϕk, hk) ∈ P do if available_to_evolve(ϕk, hk) then ▷ If burn-in period has passed, update population based on smoothed fitness of individuals 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: (ϕk, hk) ← U(P, Fϕk ) for θk ∈ R do if available_to_evolve(θk) then θk ← U(R, Fθk ) rather than instantaneous values. Therefore, we considered two different ways of temporally aggregating the rewards. The retrospective method derives intrinsic reward from whether an agent judges that other agents have been actually (extrinsically) rewarded in the recent past. The prospective variant derives intrinsic reward from whether other agents are expecting to be (extrinsically) rewarded in the near future.3 For the retrospective variant, fij = et j , where the temporally decayed reward et j for the agents j = 1, . . . , N are updated at each timestep t according to j = η et−1 et j + r E,t j , (3) and η = 0.975. The prospective variant uses the value estimates V E j (see Figure 2b) for fij and has a stop-gradient before the reward network module so that gradients don't flow back into other agents (as in for example DIAL from [15]). 3Our terms prospective and retrospective map onto the terms intentional and conse- quentialist respectively as used by [36, 49]. 2.3 Architecture and Training We used the same training framework as in [29], which performs distributed asynchronous training in multi-agent environments, including population-based training (PBT) [30]. We trained a popu- lation of N = 50 agents4 with policies {πi}, from which we sampled 5 players in order to populate each of 500 arenas (where arena is an instantiation of a single episode of the environment) running in par- allel. Within each arena, an episode of the environment was played with the sampled agents, before resampling new ones. Agents were sampled using one of two matchmaking processes (described in more detail below). Episode trajectories lasted 1000 steps and were written to queues for learning, from which weights were updated using V-Trace (Figure 2a). The set of weights evolved included learning rate, entropy cost weight, and reward network weights θ5. The parameters of the policy network ϕ were inherited in a Lamarckian fashion as in [30]. Furthermore, we allowed agents to observe their last actions ai,t−1, last intrinsic rewards (ui,t−1(fi)), and last extrinsic rewards i,t−1(si , ai)) as input to the LSTM in the agent's neural network. (r E The objective function was identical to that presented in [11] and comprised three components: (1) the value function gradient, (2) policy gradient, and (3) entropy regularization, weighted according to hyperparameters baseline cost and entropy cost (see Figure 2b). Evolution was based on a fitness measure calculated as a moving average of total episode return, which was a sum of apples collected minus penalties due to tagging, smoothed as follows: i = (1 − ν)F n−1 F n i t r E,t + νRn (4) i , where ν = 0.001 and Rn is the total episode return i obtained on episode n by agent i (or reward network i in the case of the shared reward network evolution (see Section 2.5 for details). Training was done via joint optimization of network parameters via SGD and hyperparameters/reward network parameters via evo- lution in the standard PBT setup. Gradient updates were applied for every trajectory up to a maximum length of 100 steps, using a batch size of 32. Optimization was via RMSProp with epsilon=10−5, momentum=0, decay rate=0.99, and an RL discount factor of 0.99. The baseline cost weight (see Mnih et al. [42]) was fixed at 0.25, and the entropy cost was sampled from LogUniform(2 × 10−4,0.01) and evolved throughout training using PBT. The learning rates were all initially set to 4 × 10−4 and then allowed to evolve. PBT uses evolution (specifically genetic algorithms) to search over a space of hyperparameters rather than manually tuning or performing a random search, resulting in an adaptive schedule of hyperparameters and joint optimization with network parameters learned through gradient descent [30]. There was a mutation rate of 0.1 when evolving hyperparameters, using multiplicative perturbations of ±20% for entropy cost and learning rate, and additive perturbation of ±0.1 for reward network parameters. We implemented a burn-in period for evolution of 4 × 106 agent steps, to allow network parameters and hyperparameters =  i 4Similar to as in [11], we distinguish between an "agent" which acts in the environment according to some policy, and a "learner" which updates the parameters of a policy. In principle, a single agent's policy may depend on parameters updated by several separate learners. 5We can imagine that the reward weights are simply another set of optimization hyperparameters since they enter into the loss. Figure 3: (a) Agents assigned and evolved with individual reward networks. (b) Assortative matchmaking, which preferentially plays cooperators with other cooperators and defectors with other defectors. (c) A single reward network is sampled from the population and assigned to all players, while 5 policy networks are sampled and assigned to the 5 players individually. After the episode, policy networks evolve according to individual player returns, while reward networks evolve according to aggregate returns over all players. to be used in enough episodes for an accurate assessment of fitness before evolution. 2.4 Random vs. assortative matchmaking Matches were determined according to two methods: (1) random matchmaking and (2) assortative matchmaking. Random matchmak- ing simply selected uniformly at random from the pool of agents to populate the game, while cooperative matchmaking first ranked agents within the pool according to a metric of recent cooperative- ness, and then grouped agents such that players of similar rank played with each other. This ensured that highly cooperative agents played only with other cooperative agents, while defecting agents played only with other defectors. For Cleanup, cooperativeness was calculated based on the amount of steps in the last episode the agent chose to clean. For Harvest, it was calculated based on the difference between the the agent's return and the mean return of all players, so that having less return than average yielded a high cooperativeness ranking. Cooperative metric-based matchmaking was only done with either individual reward networks or no re- ward networks (Figure 3b). We did not use cooperative metric-based matchmaking for our multi-level selection model, since these are theoretically separate approaches. 2.5 Individual vs. shared reward networks Building on previous work that evolved either the intrinsic reward [29] or the entire loss function [27], we considered the reward network weights to be hyperparameters that could be evolved in parallel with the policy parameters (Figure 3a). Distinct from these methods, we separately evolved the reward network within its own population, thereby allowing different modules of the agent to compete only with like components. This allowed for independent exploration of hyperparameters via separate credit assignment of fitness, and thus considerably more of the hyperparameter land- scape could be explored compared with using only a single pool. In addition, reward networks could be randomly assigned to any policy network, and so were forced to generalize to a wide range of policies. In a given episode, 5 separate policy networks were paired with the same reward network, which we term a shared re- ward network. In line with [30], the fitness determining the copying of policy network weights and evolution of optimization-related hyperparameters (entropy cost and learning rate) were based on individual agent return. By contrast, the reward network parame- ters were evolved according to fitness based on total episode return across the group of co-players (Figure 3c). Figure 4: Total episode rewards, aggregated over players. (a), (b): Comparing retrospective (backward-looking) reward evolution with assortative matchmaking and PBT-only baseline in (a) Cleanup and (b) Harvest. (c), (d): Comparing prospective (forward- looking) with retrospective (backward-looking) reward evolution in (c) Cleanup and (d) Harvest. The black dotted line indicates performance from [28]. The shaded region shows standard error of the mean, taken over the population of agents. This contribution is distinct from previous work which evolved intrinsic rewards [e.g. 29] because (1) we evolve over social features rather than a remapping of environmental events, and (2) reward network evolution is motivated by dealing with the inherent tension in ISDs, rather than merely providing a denser reward signal. In this sense it's more akin to evolving a form of communication for social cooperation, rather than learning reward-shaping in a sparse- reward environment. We allow for multiple agents to share the same components, and as we shall see, in a social setting, this winds up being critical. Shared reward networks provide a biologically principled method that mixes group fitness on a long timescale and individual reward on a short timescale. This contrasts with hand-crafted means of aggregation, as in previous work [5, 38]. 3 RESULTS As shown in Figure 4, PBT without using an intrinsic reward net- work performs poorly on both games, where it asymptotes to 0 total episode reward in Cleanup and 400 for Harvest (the number of apples gained if all agents collect as quickly as they can). Figures 4a-b compare random and assortative matchmaking with PBT and reward networks using retrospective social features. When using random matchmaking, individual reward network agents per- form no better than PBT at Cleanup, and only moderately better at Harvest. Hence there is little benefit to adding reward networks over social features if players have separate networks, as these tend to be evolved selfishly. The assortative matchmaking experiments used either no reward network (u(f) = 0) or individual reward net- works. Without a reward network, performance was the same as the PBT baseline. With individual reward networks, performance was very high, indicating that both conditioning the internal rewards on social features and a preference for cooperative agents to play to- gether were key to resolving the dilemma. On the other hand, shared reward network agents perform as well as assortative matchmaking and the handcrafted inequity aversion intrinsic reward from [28], even using random matchmaking. This implies that agents didn't necessarily need to have immediate access to honest signals of other agents' cooperativeness to resolve the dilemma; it was enough to simply have the same intrinsic reward function, evolved accord- ing to collective episode return. Videos comparing performance of the PBT baseline with the retrospective variant of shared reward network evolution can be found at https://youtu.be/medBBLLM4c0 and https://youtu.be/yTjrlH3Ms9U. Figures 4(c) and (d) compare the retrospective and prospective variants of reward network evolution. The prospective variant, although better than PBT when using a shared reward network, generally results in worse performance and more instability. This is likely because the prospective variant depends on agents learning good value estimates before the reward networks become useful, whereas the retrospective variant only depends on environmentally provided reward and thus does not suffer from this issue. Inter- estingly, we observed that the prospective variant does achieve very high performance if gradients are allowed to pass between agents via the value estimates V E (data not shown); however, this j constitutes centralized learning, albeit with decentralized execution (see [15]). Such approaches are promising but less consistent with biologically plausible mechanisms of multi-agent learning which are of interest here and so were not pursued. We next plot various social outcome metrics in order to better capture the complexities of agent behavior (see Figure 5). Equality is calculated as E(1 − G(R)), where G(R) is the Gini coefficient over individual returns. Figure 5b demonstrates that, in Harvest, having the prospective version of reward networks tends to lead to lower equality, while the retrospective variant has very high equality. Equality in Cleanup is more unstable throughout training, since it's not necessarily optimal, but tends to be lower overall than for Harvest, even when performance is high, indicating that equality might be harder to achieve in different games. Tagging measures the average number of times a player fined another player through- out the episode. The middle panel of Figure 5b shows that there is a higher propensity for tagging in Harvest when using either a prospective reward network or an individual reward network, com- pared to the retrospective shared reward network. This explains the performance shown in Figure 4, as being tagged results in a very high negative reward. Tagging in the Cleanup task is overall much lower than in Harvest. Sustainability measures the average time step on which agents received positive reward, averaged over the episode and over agents. We see in the bottom panel of 5b that having no reward network results in players collecting apples extremely quickly in Harvest, compared with much more sustain- able behavior with reward networks. In Cleanup, the sustainability metric is not meaningful and so this was not plotted. Finally, we can directly examine the weights of the final retro- spective shared reward networks which were best at resolving the ISDs. Interestingly, the final weights evolved in the second layer suggest that resolving each game might require a different set of social preferences. In Cleanup, one of the final layer weights v2 evolved to be close to 0, whereas in Harvest, v1 and v2 evolved to be of large magnitude but opposite sign. We can see a similar pattern with the biases b. We interpret this to mean that Cleanup re- quired a less complex reward network: it was enough to simply find other agents' being rewarded as intrinsically rewarding. In Harvest, however, a more complex reward function was perhaps needed in order to ensure that other agents were not over-exploiting the apples. We found that the first layer weights W tended to take on arbitrary (but positive) values. This is because of random match- making: co-players were randomly selected and thus there was little evolutionary pressure to specialize these weights. We demonstrated that the reward network weights evolved dif- ferently for Cleanup versus Harvest, indicating that the two tasks necessitate different forms of social cooperation for optimal per- formance. This highlights the advantage of evolving rather than hand-crafting the weighting between individual reward and group reward, as optimal weightings cannot necessarily be anticipated for all environments. Evolving such weightings thus constitutes a form of meta-learning, wherein an entire learning system, including intrinsic reward functions, is optimized for fast learning [13, 53]. Here we have extended these ideas to the multi-agent domain. Why does evolving intrinsic social preferences promote coop- eration? Firstly, evolution ameliorates the intertemporal choice problem by distilling the long timescale of collective fitness into the short timescale of individual reinforcement learning, thereby improving credit assignment between selfish acts and their tempo- rally displaced negative group outcomes [28]. Secondly, it mitigates the social dilemma itself by allowing evolution to expose social signals that correlate with, for example, an agent's current level of selfishness. Such information powers a range of mechanisms for achieving mutual cooperation like competitive altruism [24], other- regarding preferences [8], and inequity aversion [12]. In accord, laboratory experiments show that humans cooperate more readily when they can communicate [32, 46]. 4 DISCUSSION Real environments don't provide scalar reward signals to learn from. Instead, organisms have developed various internal drives based on either primary or secondary goals [2]. Here we examined intrinsic rewards based on features derived from other agents in the environment, in order to establish whether such social signals could enable the evolution of altruism to solve intertemporal social dilemmas. In accord with evolutionary theory [1, 43], we found that naïvely implementing natural selection via genetic algorithms did not lead to the emergence of cooperation. Furthermore, assortative matchmaking was sufficient to generate cooperative behavior in cases where honest signals were available. Finally, we proposed a new multi-level evolutionary paradigm based on shared reward networks that achieves cooperation in more general situations. The shared reward network evolution model was inspired by multi-level selection; yet it does not correspond to the prototypical case of that theory since its lower level units of evolution (the policy networks) are constantly swapping which higher level unit (reward network) they are paired with. Nevertheless, there are a variety of ways in which we see this form of modularity arise in nature. For example, free-living microorganisms occasionally form multi- cellular structures to solve a higher order adaptive problem, like slime mold forming a spore-producing stalk for dispersal [58], and many prokaryotes can incorporate plasmids (modules) found in their environment or received from other individuals as functional parts of their genome, thereby achieving cooperation in social dilemmas [20, 40]. Alternatively, in humans a reward network may represent a shared "cultural norm", with its fitness based on cultural information accumulated from the groups in which it holds sway. In this way, the spread of norms can occur independently of the success of individual agents [3]. Note that in this work, we have assumed that agents have perfect knowledge of other agents' rewards, while in real-world systems Figure 5: Social outcome metrics for (a) Cleanup and (b) Harvest. Top: equality, middle: total amount of tagging, bottom: sus- tainability. The shaded region shows the standard error of the mean. to, for instance, a smile/frown or other locally observable social signals), identifiability across episodes, or even deception. The approach outlined here opens avenues for investigating alternative evolutionary mechanisms for the emergence of coop- eration, such as kin selection [19] and reciprocity [56]. It would be interesting to see whether these lead to different weights in a reward network, potentially hinting at the evolutionary origins of different social biases. Along these lines, one might consider study- ing an emergent version of the assortative matchmaking model along the lines suggested by [25], adding further generality and power to our setup. Finally, it would be fascinating to determine how an evolutionary approach can be combined with multi-agent communication to produce that most paradoxical of cooperative behaviors: cheap talk. Figure 6: Distribution of layer 2 weights and biases of evolved retrospective shared reward network at 1.5 × 108 training steps for (a) Cleanup, and (b) Harvest. this is not typically the case. This assumption was made in order to disentangle the effects of cultural evolution from the quality of the signals being evolved over. Natural next steps include adding partial observability or noise to this signal (to make it more analogous ACKNOWLEDGMENTS We would like to thank Simon Osindero, Iain Dunning, Andrea Tacchetti, and many DeepMind colleagues for valuable discussions and feedback, as well as code development and support. REFERENCES [1] Robert Axelrod and William D. Hamilton. 1981. The Evolution of Cooperation. Science 211, 4489 (1981), 1390 -- 1396. http://www.jstor.org/stable/1685895 [2] Gianluca Baldassarre and Marco Mirolli. 2013. Intrinsically Motivated Learning in Natural and Artificial Systems. 1 -- 458 pages. [3] Robert Boyd and Peter J. Richerson. 2009. Culture and the evolution of human cooperation. Philosophical Transactions of the Royal Society of London B: Biologi- cal Sciences 364, 1533 (2009), 3281 -- 3288. https://doi.org/10.1098/rstb.2009.0134 arXiv:http://rstb.royalsocietypublishing.org/content/364/1533/3281.full.pdf [4] ZSH Chan, HW Ngan, AB Rad, and TK Ho. 2002. Alleviating'overfitting'via genetically-regularised neural network. Electronics Letters 38, 15 (2002), 1. [5] Yu-Han Chang, Tracey Ho, and Leslie P Kaelbling. 2004. All learning is local: Multi-agent learning in global reward games. In Advances in neural information processing systems. 807 -- 814. [6] Nuttapong Chentanez, Andrew G. Barto, and Satinder P. Singh. 2005. Intrinsically Motivated Reinforcement Learning. In Advances in Neural Information Processing Systems 17, L. K. Saul, Y. Weiss, and L. Bottou (Eds.). MIT Press, 1281 -- 1288. http:// papers.nips.cc/paper/2552-intrinsically-motivated-reinforcement-learning.pdf [7] Edoardo Conti, Vashisht Madhavan, Felipe Petroski Such, Joel Lehman, Kenneth O Stanley, and Jeff Clune. 2017. Improving exploration in evolution strategies for deep reinforcement learning via a population of novelty-seeking agents. arXiv preprint arXiv:1712.06560 (2017). [8] David J Cooper and John H Kagel. 2016. Other-regarding preferences. The handbook of experimental economics 2 (2016), 217. [9] Charles Darwin. 1859. On the Origin of Species by Means of Natural Selection. Murray, London. or the Preservation of Favored Races in the Struggle for Life. [10] Richard Dawkins. 1976. The selfish gene Oxford university press. New York [11] Lasse Espeholt, Hubert Soyer, Remi Munos, Karen Simonyan, Volodymir Mnih, Tom Ward, Yotam Doron, Vlad Firoiu, Tim Harley, Iain Dunning, et al. 2018. IMPALA: Scalable distributed Deep-RL with importance weighted actor-learner architectures. arXiv preprint arXiv:1802.01561 (2018). [12] Ernst Fehr and Klaus M. Schmidt. 1999. A Theory of Fairness, Competition, and Cooperation*. The Quarterly Journal of Economics 114, 3 (1999), 817 -- 868. https://doi.org/10.1162/003355399556151 [13] Chrisantha Thomas Fernando, Jakub Sygnowski, Simon Osindero, Jane Wang, Tom Schaul, Denis Teplyashin, Pablo Sprechmann, Alexander Pritzel, and An- drei A Rusu. 2018. Meta Learning by the Baldwin Effect. arXiv preprint arXiv:1806.07917 (2018). [14] Jeffrey A Fletcher and Michael Doebeli. 2009. A simple and general explanation for the evolution of altruism. Proceedings of the Royal Society of London B: Biological Sciences 276, 1654 (2009), 13 -- 19. [15] Jakob N. Foerster, Yannis M. Assael, Nando de Freitas, and Shimon Whiteson. 2016. Learning to Communicate with Deep Multi-Agent Reinforcement Learning. CoRR abs/1605.06676 (2016). arXiv:1605.06676 http://arxiv.org/abs/1605.06676 [16] Jakob N. Foerster, Richard Y. Chen, Maruan Al-Shedivat, Shimon Whiteson, Pieter Abbeel, and Igor Mordatch. 2017. Learning with Opponent-Learning Awareness. CoRR abs/1709.04326 (2017). arXiv:1709.04326 http://arxiv.org/abs/1709.04326 [17] Andy Gardner and Stuart A West. 2010. Greenbeards. Evolution: International Journal of Organic Evolution 64, 1 (2010), 25 -- 38. [18] Alan Grafen et al. 1990. Do animals really recognize kin?. Animal Behaviour 39, (1976). 1 (1990), 42 -- 54. 2002), 15 -- 21. [19] Ashleigh Griffin and Stuart West. 2002. Kin selection: Fact and fiction. 17 (01 [20] Ashleigh S Griffin, Stuart A West, and Angus Buckling. 2004. Cooperation and competition in pathogenic bacteria. Nature 430, 7003 (2004), 1024. [21] Özgür Gürerk, Bernd Irlenbusch, and Bettina Rockenbach. 2006. The competitive advantage of sanctioning institutions. Science 312, 5770 (2006), 108 -- 111. [22] W.D. Hamilton. 1964. The Genetical Evolution of Social Behaviour. I. Journal of [23] William D Hamilton. 1964. The genetical evolution of social behaviour. II. Journal Theoretical Biology 7, 1 (July 1964), 1 -- 16. of theoretical biology 7, 1 (1964), 17 -- 52. [24] Charlie L Hardy and Mark Van Vugt. 2006. Nice guys finish first: The competitive altruism hypothesis. Personality and Social Psychology Bulletin 32, 10 (2006), 1402 -- 1413. [25] Joseph Henrich. 2004. Cultural group selection, coevolutionary processes and large-scale cooperation. Journal of Economic Behavior & Organization 53, 1 (2004), 85 -- 88. [26] Geoffrey E Hinton and Steven J Nowlan. 1987. How learning can guide evolution. Complex systems 1, 3 (1987), 495 -- 502. [27] Rein Houthooft, Richard Y. Chen, Phillip Isola, Bradly C. Stadie, Filip Wol- ski, Jonathan Ho, and Pieter Abbeel. 2018. Evolved Policy Gradients. CoRR abs/1802.04821 (2018). arXiv:1802.04821 http://arxiv.org/abs/1802.04821 [28] Edward Hughes, Joel Z Leibo, Matthew G Phillips, Karl Tuyls, Edgar A Duéñez- Guzmán, Antonio García Castañeda, Iain Dunning, Tina Zhu, Kevin R McKee, Raphael Koster, et al. 2018. Inequity aversion improves cooperation in intertem- poral social dilemmas. In Advances in neural information processing systems (NIPS). Montreal, Canada. [29] Max Jaderberg, Wojciech M Czarnecki, Iain Dunning, Luke Marris, Guy Lever, Antonio Garcia Castaneda, Charles Beattie, Neil C Rabinowitz, Ari S Morcos, Avraham Ruderman, et al. 2018. Human-level performance in first-person multi- player games with population-based deep reinforcement learning. arXiv preprint arXiv:1807.01281 (2018). [30] Max Jaderberg, Valentin Dalibard, Simon Osindero, Wojciech M Czarnecki, Jeff Donahue, Ali Razavi, Oriol Vinyals, Tim Green, Iain Dunning, Karen Si- monyan, et al. 2017. Population based training of neural networks. arXiv preprint arXiv:1711.09846 (2017). [31] Vincent Jansen and Minus van Baalen. 2006. Altruism through beard chromody- namics. 440 (04 2006), 663 -- 6. [32] Marco A Janssen, Robert Holahan, Allen Lee, and Elinor Ostrom. 2010. Lab experiments for the study of social-ecological systems. Science 328, 5978 (2010), 613 -- 617. [33] Laurent Keller and Kenneth G. Ross. 1998. Selfish genes: A green beard in the red fire ant. 394 (08 1998), 573 -- 575. [34] Max Kleiman-Weiner, Mark K. Ho, Joseph L. Austerweil, Michael L. Littman, and Joshua B. Tenenbaum. 2016. Coordinate to cooperate or compete: Abstract goals and joint intentions in social interaction. In CogSci. [35] Joel Z Leibo, Vinicius Zambaldi, Marc Lanctot, Janusz Marecki, and Thore Graepel. 2017. Multi-agent reinforcement learning in sequential social dilemmas. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 464 -- 473. [36] Adam Lerer and Alexander Peysakhovich. 2017. Maintaining cooperation in complex social dilemmas using deep reinforcement learning. CoRR abs/1707.01068 (2017). arXiv:1707.01068 http://arxiv.org/abs/1707.01068 [37] Michael L Littman. 1994. Markov games as a framework for multi-agent rein- forcement learning. In Machine Learning Proceedings 1994. Elsevier, 157 -- 163. [38] Maja J Mataric. 1994. Learning to behave socially. In Third international conference on simulation of adaptive behavior, Vol. 617. 453 -- 462. [39] John Maynard Smith and Eors Szathmary. 1997. The major transitions in evolution. Oxford University Press. [40] Sorcha E McGinty, Daniel J Rankin, and Sam P Brown. 2011. Horizontal gene transfer and the evolution of bacterial cooperation. Evolution: International Journal of Organic Evolution 65, 1 (2011), 21 -- 32. [41] Geoffrey F Miller, Peter M Todd, and Shailesh U Hegde. 1989. Designing Neural Networks using Genetic Algorithms.. In ICGA, Vol. 89. 379 -- 384. [42] Volodymyr Mnih, Adrià Puigdomènech Badia, Mehdi Mirza, Alex Graves, Timo- thy P. Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. 2016. Asyn- chronous Methods for Deep Reinforcement Learning. CoRR abs/1602.01783 (2016). arXiv:1602.01783 http://arxiv.org/abs/1602.01783 [43] Martin A. Nowak. 2006. Five Rules for the Evolution of Cooperation. Science 314, 5805 (2006), 1560 -- 1563. https://doi.org/10.1126/science.1133755 arXiv:http://science.sciencemag.org/content/314/5805/1560.full.pdf [44] Martin A Nowak and Karl Sigmund. 2005. Evolution of indirect reciprocity. Nature 437, 7063 (2005), 1291. [45] Pamela Oliver. 1980. Rewards and punishments as selective incentives for collec- tive action: theoretical investigations. American journal of sociology 85, 6 (1980), 1356 -- 1375. [46] Elinor Ostrom, James Walker, and Roy Gardner. 1992. Covenants with and without a sword: Self-governance is possible. American political science Review 86, 2 (1992), 404 -- 417. [47] Liviu Panait and Sean Luke. 2005. Cooperative multi-agent learning: The state of the art. Autonomous agents and multi-agent systems 11, 3 (2005), 387 -- 434. [48] Julien Pérolat, Joel Z. Leibo, Vinícius Flores Zambaldi, Charles Beattie, Karl Tuyls, and Thore Graepel. 2017. A multi-agent reinforcement learning model of common- pool resource appropriation. CoRR abs/1707.06600 (2017). arXiv:1707.06600 http://arxiv.org/abs/1707.06600 [49] Alexander Peysakhovich and Adam Lerer. 2018. Consequentialist conditional cooperation in social dilemmas with imperfect information. In International Con- ference on Learning Representations. https://openreview.net/forum?id=BkabRiQpb [50] Mitchell A Potter and Kenneth A De Jong. 2000. Cooperative coevolution: An architecture for evolving coadapted subcomponents. Evolutionary computation 8, 1 (2000), 1 -- 29. [51] Francisco C Santos, Jorge M Pacheco, and Tom Lenaerts. 2006. Cooperation prevails when individuals adjust their social ties. PLoS computational biology 2, 10 (2006), e140. [52] Satinder Singh, Richard L Lewis, and Andrew G Barto. 2009. Where do rewards come from. In Proceedings of the annual conference of the cognitive science society. 2601 -- 2606. [53] Satinder Singh, Richard L Lewis, Andrew G Barto, and Jonathan Sorg. 2010. Intrinsically motivated reinforcement learning: An evolutionary perspective. IEEE Transactions on Autonomous Mental Development 2, 2 (2010), 70 -- 82. [54] J Maynard Smith. 1964. Group selection and kin selection. Nature 201, 4924 (1964), 1145. [55] Kenneth O Stanley and Risto Miikkulainen. 2002. Evolving neural networks through augmenting topologies. Evolutionary computation 10, 2 (2002), 99 -- 127. [56] Robert L Trivers. 1971. The evolution of reciprocal altruism. The Quarterly review of biology 46, 1 (1971), 35 -- 57. [57] Francisco Úbeda and Edgar A Duéñez-Guzmán. 2011. Power and corruption. Evolution: International Journal of Organic Evolution 65, 4 (2011), 1127 -- 1139. [58] Stuart A West, Ashleigh S Griffin, Andy Gardner, and Stephen P Diggle. 2006. Social evolution theory for microorganisms. Nature Reviews Microbiology 4, 8 (2006), 597. [59] Daan Wierstra, Tom Schaul, Jan Peters, and Juergen Schmidhuber. 2008. Natural evolution strategies. In Evolutionary Computation, 2008. CEC 2008.(IEEE World Congress on Computational Intelligence). IEEE Congress on. IEEE, 3381 -- 3387. [60] David Sloan Wilson. 1975. A theory of group selection. Proceedings of the national academy of sciences 72, 1 (1975), 143 -- 146. [61] Chern Han Yong and Risto Miikkulainen. 2001. Cooperative coevolution of multi-agent systems. University of Texas at Austin, Austin, TX (2001).
1506.09032
1
1506
2015-06-30T11:11:58
Organization of Multi-Agent Systems: An Overview
[ "cs.MA" ]
In complex, open, and heterogeneous environments, agents must be able to reorganize towards the most appropriate organizations to adapt unpredictable environment changes within Multi-Agent Systems (MAS). Types of reorganization can be seen from two different levels. The individual agents level (micro-level) in which an agent changes its behaviors and interactions with other agents to adapt its local environment. And the organizational level (macro-level) in which the whole system changes it structure by adding or removing agents. This chapter is dedicated to overview different aspects of what is called MAS Organization including its motivations, paradigms, models, and techniques adopted for statically or dynamically organizing agents in MAS.
cs.MA
cs
International Journal of Intelligent Information Systems 2015; 4(3): 46-57 Published online June 26, 2015 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20150403.11 ISSN: 2328-7675 (Print); ISSN: 2328-7683 (Online) Organization of Multi-Agent Systems: An Overview Hosny Ahmed Abbas1, *, Samir Ibrahim Shaheen2, Mohammed Hussein Amin1 1Department of Electrical Engineering, Assiut University, Assiut, Egypt 2Department of Computer Engineering, Cairo University, Giza, Egypt Email Address: [email protected] (H. A. Abbas), [email protected] (S. I. Shaheen), [email protected] (M. H. Amin) To cite this article: Hosny Ahmed Abbas, Samir Ibrahim Shaheen, Mohammed Hussein Amin. Organization of Multi-Agent Systems: An Overview. International Journal of Intelligent Information Systems. Vol. 4, No. 3, 2015, pp. 46-57. doi: 10.11648/j.ijiis.20150403.11 Abstract: In complex, open, and heterogeneous environments, agents must be able to reorganize towards the most appropriate organizations to adapt unpredictable environment changes within Multi-Agent Systems (MAS). Types of reorganization can be seen from two different levels. The individual agents level (micro-level) in which an agent changes its behaviors and interactions with other agents to adapt its local environment. And the organizational level (macro-level) in which the whole system changes it structure by adding or removing agents. This chapter is dedicated to overview different aspects of what is called MAS Organization including its motivations, paradigms, models, and techniques adopted for statically or dynamically organizing agents in MAS. Keywords: Multi-Agent Systems, Organization, Organizational Models, Dynamic Reorganization, Self-Organization 1. Introduction [3]. Further, the Complexity and highly distribution are the key characteristics of modern real world systems. The complexity of the near future and even present applications can be characterized as a combination of aspects such as great number of components taking part in the applications, knowledge and control have to be distributed, the presence of non-linear processes in the system, the fact that the system is more and more often open, its environment dynamic and the interactions unpredictable increasing complexity, heterogeneity, and openness of modern software systems have reached a point that imposes new demands on their engineering that conventional engineering approaches will stand powerless in front of future systems increase in scale and complexity either vertically (control and information layers) or horizontally (physical distribution). It doesn’t mean that conventional engineering techniques will become obsolete and have to be thrown away. Absolutely, they only need to be integrated with new as, decomposition, autonomy, modularity, and adaptivity can be collectively combined in one system. MAS are considered as a promising engineering (i.e., architectural) style for developing adaptive software systems able to handle the continuous increase in their complexity as a result of their open, heterogeneous, and continuous evolution nature. They model styles where is expected technologies. It engineering concepts such systems consisting of many the system as distributed autonomous agents cooperate together to achieve system goals. The ability of agents to dynamically reorganize to adapt working environment dynamic changes is a key feature provided by MAS. It is obvious that the natural way to model a complex system is in terms of multiple autonomous components that can act and interact in flexible ways in order to achieve their objectives, and also that agents provide a suitable abstraction for modeling subsystems, components and their relationships [22]. Ferber [23] described how agents, as a form of distributed artificial intelligence, are suitable for use in application domains which are widely distributed. MAS are currently considered as the most representatives among artificial systems dealing with complexity and highly distribution [24]. MAS allow the design and implementation of software systems using the same ideas and concepts that are the very founding of human societies and habits. These systems often rely on the delegation of goals and tasks among autonomous software agents, which can interact and collaborate with others to achieve common goals [34]. In other words, an agent falls somewhere between a simple event-triggered program and one with human collaborative abilities [36]. In contrast to initial MAS research, which concerned individual agents’ aspects such as agents’ architectures, agents’ 47 Hosny Ahmed Abbas et al.: Organization of Multi-Agent Systems: An Overview to the environment conditions and mental capabilities, behaviors, etc, the current research trend of MAS is actively interested in the adaptivity, environment, openness and the dynamics of these systems. Also, there is a great attention towards the MAS technique as a way to design self-organized systems. In open environments, agents must be able to adapt towards the most appropriate organizations according their unpredictable changes. Agent organizations are considered as an emergent area of MAS research that relies on the notion of openness and heterogeneity of MAS and imposes new demands on traditional MAS models [44]. MAS that have the ability to dynamically reorganize (regardless of the type of reorganization, self or enforced) will be adaptive enough to survive against their dynamic and continuously changing working environments. Dynamic reorganization can take many forms, for instance, agents can dynamically change their roles, behaviors, locations, acquaintances, or the whole system organization structure can be dynamically changed. following An agent organization can also be defined as a social entity composed of a specific number of members (agents) that accomplish several distinct tasks or functions and that are structured and communication interrelationships in order to achieve the main aim of the organization. Thus, agent organizations assume the existence of global common goals, outside the objectives of any individual agent, and they exist independently of agents [64][65]. some specific topology This chapter is dedicated to provide a comprehensive overview of MAS organization including its motivations, paradigms, and familiar organizational models. The remaining of this chapter is organized as follows: Section 2 explores MAS literature to identify the motivations towards agent organizations. Section 3 presents different approaches and paradigms used to organize agents within multi-agent systems. Section 4 introduces what is called organizational models, which concern the abstractions, languages, approaches and techniques for modeling dynamically reorganized MAS. And Section 5 concludes the article and highlights future work. 2. Motivations to MAS Organization This section is dedicated to identify from MAS literature the suggested motivations to give increasing attention to MAS organization. Basically, a MAS is formed by the collection of autonomous agents situated in a certain environment, respond to their environment dynamic changes, interact with other agents, and persist to achieve their own goals or the global system goals. There are two viewpoints of MAS engineering, the first one is the agent-centered MAS (ACMAS) in which the focus is given to individual agents. With this viewpoint, the designer concerns the local behaviors of agents and also their interactions without concerning the global structure of the system. The global required function of the system is supposed to emerge as a result of the lower level individual agents interactions in a bottom-up way. Picard et al. [13] stated that the agent-centered approach takes the agents as the “engine” for the system organization, and agent organizations implicitly exist as observable emergent phenomena, which states a unified bottom-up and objective global view of the pattern of cooperation between agents. Further, Picard gives the ant colony [15] as an example, where there is no organizational behavior and constraints are explicitly and directly defined inside the ants. The main idea is that the organization is the result of the collective emergent behavior due to how agents act their individual behaviors and interact in a common shared and dynamic environment. The key problems of the ACMAS viewpoint are unpredictability and uncertainty. Because the whole is more than the sum of its parts [14], this approach can lead to undesirable emergent behaviors that may impact system performance, as a result, this approach might be not suitable to design and engineer complex multi-agent systems. The MAS applications engineered by the ACMAS approach are closed for agents that are not able to use the same type of coordination and behavior, and that all global characteristics and requirements are implemented in the individual agents and not outside them [10]. Weyns [11] stated that giving the responsibility of system organization implicitly to individual agents, as in the ACMAS approach, in addition to their functional responsibilities is not adequate because it is a type of dual responsibility, which is very complex to engineer and not suitable for handling real world complexity and other emerged characteristics such as highly distribution, unpredictability, uncertainty, and continuous evolution. The second viewpoint of MAS engineering is what is called organization-centered MAS (OCMAS) in which the structure of the system is given a bigger attention through the explicit abstraction of agent organization. With that approach, the designer designs the entire organization and coordination patterns on the one hand, and the agents’ local behaviors on the other hand. It is considered as a top-down approach because the organization abstraction imposes some rules or norms used by agents to coordinate their local behaviors and interactions with other agents. The OCMAS viewpoint has been promoted by many pioneers in MAS research. For instance, Jennings and Wooldridge [2] stated that MAS contribute to the software engineering (SE) discipline as a way to simplify the design of complex software systems but considering MAS with no real structure isn’t suitable for handling current software systems complexity, and higher order abstractions should be used and some way of structuring the society is typically needed to reduce system complexity, to increase system efficiency, and to more accurately model the problem being tackled. Odell et al. [4] stated that the current practice of MAS design tends to be limited to individual agents and small face-to-face groups of agents that operate as closed systems which is not adequate to model and design of complex adaptive systems. Also Gutknecht and Ferber [66] argued that taking organizational concepts, such as groups, roles, structures, dependencies, etc, as first class citizens, and relating them to the behavior of agents is a key issue for building large scale and complex systems. In another article, Ferber [6] also stated that International Journal of Intelligent Information Systems 2015; 4(3): 46-57 48 representing a MAS as an organization consists of roles enacted by agents arranged (statically or dynamically) to form groups of agents, can handle many drawbacks such as system complexity, uncertainty, and system dynamism. truly heterogeneous Gasser [3] stated that we simply have hardly any real experience building realistically coordinated multi-agent systems that work together and almost no basis for systematic reflection and analysis of that experience. Further, Horling et al. [5] stated that our real world getting more complex and highly distributed and that should be reflected in new software engineering paradigms such as MAS. Therefore, the adoption of higher order abstract concepts like organizations, societies, communities, and groups of agents can reduce systems complexity, increase its efficiency, and improve system scalability. (Coordination, Organization, Institutions and Norms in agent systems) which concerns the OCMAS viewpoint. in the near future, The OCMAS viewpoint is more adequate for engineering complex adaptive multi-agent systems, which are expected to be, the mainstream approach for engineering large-scale and even ultra-large scale application domains especially with the evolving topic of the Internet of Things (IoT) [17], which concerns devices capable to communicate via the Internet and manipulate an enormous amount of data. Examples of such application domains are CPS (Cyber-Physical Systems) [16], Smart Grids [18], global SCADA (Supervisor Control and Data Acquisition) [19], Pervasive Computing [20], Ubiquitous Computing [21], etc. The next section explores the familiar paradigms of MAS organization. together helps in a system should work Establishing an organizational structure that specifies how agents the achievement of effective coordination in MAS [39]. Broek [7] stated that complexity of real world applications needs to be tackled from higher abstraction order such as organizations which can be used to limit the scope of interactions, provide strength in numbers, reduce or manage uncertainty, and formalize high-level goals which no single agent may be aware of. Further, Hübner [8] confirmed that organizations provide a framework for structuring and managing agents’ interactions and serve as a kind of tuning of the agents autonomy level. Furthermore, Burns et al. [12] stated that in organization theory [25][26], it is commonly accepted that different types of organizational structure are suitable for particular environmental conditions and one of the main reasons for creating organizations is to provide stable means for coordination that enable the achievement of global goals. Moreover, Corkill et al. [36] stated that as agent-based systems become more widespread and complex, designed organization will become an important aspect of effective system performance, and the possible situations where organization design will be very important such as, large number of agents, long duration of agent activities, more repetitive activities, more activities require shared resources, more collaborative the activities, more specialized agents, less capable agents, and less slack resources are available. Also, they emphasized that no one organization is right for every situation. they suggested In nutshell, proposing a way for statically or dynamically organizing MAS, has been given great attention by MAS researchers, as a promising approach for handling the challenging issue of engineering complex and large-scale software systems. The adoption of the ACMAS or OCMAS viewpoints mainly depends on the nature of application domain and the degree of system complexity. The developers interested in bottom-up self-organized systems will prefer the ACMAS approach and the developers interested in top-down system reconfiguration will prefer the OCMAS approach. In the MAS literature there are two communities each adopts and concerns one of the two engineering approaches. The first one is SASO (Self-Adaptive and Self-Organizing systems) which concerns the ACMAS viewpoint. And the second one is COIN 3. Paradigms of MAS Organization the organization management and Originally, the organization abstract is inspired from business human organizations, which are constituted of a number of roles, so a key concept in the design of OCMAS is that of roles, which define normative behavioral repertoires for agents [4]. A role is defined as an abstract description of some activity or functionality, for instance in a business human organization we may see a role like Manager who is responsible of the coordination between other organization members (roles). In MAS, agents are supposed to enact roles according to the capabilities of each agent. It is also possible that one agent can enact many roles in the same time. The role enacted by an agent has a direct effect on the agent behavior and interaction with other roles (agents). Odell et al. [27] described two familiar ways for assigning roles to agents, endogenously by emergent self-organization as the system runs, or exogenously by the system designer when the system is constructed or modified. The adoption of human organization theory was the focus of distributed systems in general before multi-agent systems, which systems [30][31][32][33]. themselves distributed are they Modern organizations (real or virtual) are characterized by information flows, and their complex structure, dense incorporation of technology, also information characterized by highly dynamic, constantly changing, organic structure and show hardly identified, not formalized, non-linear behavior [28][29]. These challenges enforce the urgent need to a new way of engineering multi-agent systems. [37] described an agent organization as an entity that is composed of a set of agents, working together to achieve a shared purpose through a division of labor, integrated by decision processes continuously through time. Further, Galbraith pointed out that an organization consists of patterns of behavior and interaction that are relatively stable and change slowly over time. from human organizations, Galbraith Inspired Shehory [1] defined MAS organization as the way in which multiple agents are organized to form a multi-agent system. The relationships and interactions among the agents and 49 Hosny Ahmed Abbas et al.: Organization of Multi-Agent Systems: An Overview specific roles of agents within the organization are the focus of multi-agent organization. The use of organizations provides a new way for describing the structures and the interactions that take place in MAS. Dignum [10] stated that agent organization can be understood from two perspectives: organization as a process and organization as an entity. In other words, organizations can be considered as the process of organizing a set of individual agents, thus in this sense it is used to refer to constraints (structures, norms and patterns) found in a social context that shape the actions and interactions of agents [53]. In other situations, it can be considered as an entity in itself, with its own requirements and objectives and is represented by (but not identical to) a group of agents. In fact, agent organizations demand the integration of both perspectives and rely for a great extent on the notion of openness and heterogeneity of MAS. Figure 1 illustrates how a MAS can be seen from two levels, the individual agents’ level and the organizational level. The organizational level presents a higher order abstraction of the lower agents’ level. Figure 1. Organizational level vs. individual level in MAS. Ferber et al. [6] proposed a set of general principles that should be taken into account when designing MAS with organizational dimension: 1. The organizational level describes the “what” and not the “how”. In other words, the organizational level imposes a structure into the pattern of agents’ activities, but does not describe how agents behave. 2. No agent description and therefore no mental issues at the organizational level. The organizational level should not say anything about the way agents would interpret this level. 3. An organization provides a way for partitioning a system, each partition (or agent group) constitutes a context of interaction for agents. Thus, a group is an organizational unit in which all members are able to interact freely. Ferber principles provide important general guidelines for OCMAS research. They identify precisely the logical relation between agents and their organization regardless of the nature of organization (i.e. a process or an entity). The first principle concerns the autonomy of agents. Agents should be autonomous but they may be guided by some general organizational norms or constraints. Full autonomy is not a preferred agent characteristic in MAS research, we can only find a type of full autonomy with humans because they have perfect rational minds, but agents (software or hardware) designed for specific missions in certain application domains and the concept of safety imposes some constraints on agents’ autonomy, in these situations, a designed organization, where agents give up some degree of self-motivation and autonomy can be an appropriate choice [36]. The second principle concerns the unawareness of agents about the existence of the organizational level, which according to Ferber should be transparent from agents. In other words, agents should be affected indirectly by the change of system organization (i.e., through environment). The third principle concerns system modularity. Organizations provide a way for, statically or dynamically, decomposing the system. Modularity and flexibility of system decomposition enhance system maintainability. teams, congregations, societies, the major organizational paradigms used Horling and Lesser [5] also stated that organizational design employed by an agent system can have a significant, quantitative effect on its performance characteristics, and they surveyed in multi-agent systems. These include hierarchies, holarchies, coalitions, federations, markets, and matrix organizations. Also, they provided a description of each paradigm, and discuss its advantages and disadvantages, further, they provided examples of how each organization paradigm may be instantiated and maintained. Table 1 provides a summary of Horling and Lesser [5] work. The Table contains a number of methods by which MAS could be organized and highlights the key characteristics, benefits, and drawbacks of each organization paradigm. Similar work was provided by Carley and Gasser [35]. The main conclusion of these surveys is that no single organization paradigm is necessarily better than all others in all situations. The selection made by a designer should be dictated by the needs imposed by the system's goals, the resources at hand, and the environment in which the participants will exist. In other words, an organization paradigm that can be described as a fit-to-all paradigm does not exist (at least till now!). A MAS can be statically (in design time) organized using any of the organization paradigms presented in Table 1, not only this but also hybrids of these and others in addition to dynamic changes from one organization style to another are also possible [1] with the price of implementation complexity. The later case is called dynamic reorganization which is currently a very active research area within MAS discipline. The next subsections present in more details the concept of dynamic reorganization and relevant concepts, self-organization and emergence. its captivating 3.1. Dynamic Reorganization Earlier proposed MAS organization mechanisms tackled with organizational aspects at design time, that approach requires some important initial knowledge about the exact purposes and objectives of the system-to-be and every interaction to which it may be confronted in the future have to be known in design time [41]. However, the openness, complexity, and heterogeneity of modern software systems impose new demands and requirements on agent-oriented software engineering (AOSE) [71], which is concerned with International Journal of Intelligent Information Systems 2015; 4(3): 46-57 50 the development of feasible, effective, and adaptive MAS. Building adaptive MAS (AMAS) able to handle openness, complexity, and highly distribution of modern real world applications has recently attracted great attention. Table 1. Analysis of Some of Possible MAS Organization Paradigms (adopted from [5]). Paradigm Key Characteristic Benefits Decomposition Maps to many common domains; handles scale well Holarchy Decomposition with autonomy Exploit autonomy of functional units Coalition Dynamic, goal-directed Exploit strength in number Team Congregation Group level cohesion Long-lived, utility-directed Address larger grained problems; task-centric Facilitates agent discovery Society Open system Public services; well defined conventions Federation Middle-agents Market Competition through pricing Matchmaking, brokering, translation services, facilitates dynamic agent pool Good at allocation, increased utility through centralization, increased fairness through bidding Matrix Multiple managers Resource sharing, multiple influenced agents Compound Concurrent organizations Exploit benefits of several organizational styles Drawbacks Potentially brittle, can lead to bottlenecks or delays Must organize holons, lake of predicable performance Short-term benefits may not outweigh organization construction costs Increased communication Sets may be overly restrictive Potentially complex, agents may require additional society-related capabilities Intermediaries become bottlenecks Potential for collusion, malicious behaviour, allocation decision complexity can be high Potential of conflicts, need for increased agent sophistication Increased sophistication, drawbacks of several organizational styles AMAS designed to be capable to adapt themselves to unforeseen situations in an autonomous manner. They can be realized by enabling the system to dynamically reorganize to adapt its environment changes [42]. Dynamic reorganization is a way to design and develop AMAS. It can be described as the change of MAS structure and behavior as a result of internal (local) or external (supervisory) demand. The external demand can be for example human intervention. The internal demand emerges from the system itself as an autonomous system to adapt environments changes. Generally, dynamic reorganization in MAS takes place as a result of individual agents' interactions. However, in many application domains the environment can stimulate MAS reorganization (e.g., when removing or adding environment resources), the system may reorganize to adapt the change of environment. In other words, reorganization is the answer to change in the environment. Dignum et al. [40] identified two types of MAS dynamic reorganization, emergent Organization in which global behavior cannot be specified in advance, but emerges from the interaction of local behaviors. In other words, agents’ interactions may eventually create dynamic organizations [44]. Thus, emergent organizational behavior is primarily a bottom-up process in which agents look for interaction and local control decisions that have been effective in the past and give similar decisions preference in the future. The ACMAS viewpoint concerns this type of reorganization. The other type of reorganization is called designed organization, which has an explicit the coordination of the agents participating. Designed systems are design created and task-environment to develop an explicit organizational structure, that is then elaborated by the individual agents into appropriate behaviors. Designed organization exhibits predicable and controllable behavior, dynamic change implies the need for highly intelligent and organization information knowledge interaction structure that determines using communicative agents (at least some of them) that can reason about and negotiate change. Designed organization is the main concern of the OCMAS approach. In human organizations, it has been proven that designed organizations perform better than those that emerge naturally. This viewpoint holds for agent organizations as well, that is because the global behavior of emergent organizations cannot be predicted and changes cannot be guided, which makes this type less suitable for situations where coordinated and goal-directed global action is required. Picard et al. [13] added the agents’ awareness /unawareness of the existence of the organization structure as a dimension of the organization modification process and he identified four cases: 1. The agents don’t represent the organization, although the observer can see an emergent organization. In some sense, they are unaware that they are part of an organization. 2. Each agent has an internal and local representation of cooperation patterns which it follows when deciding what to do. This local representation is obtained either by perception, communication or explicit reasoning. 3. The organization exists as a specified and formalized schema, made by a designer but agents don’t know anything about it and even do not reason about it. They simply comply with it as if the organizational constraints were hard-coded inside them. 4. Agents have an explicit the organization which has been defined. The agents are able to reason about it and to use it in order to initiate cooperation with other agents in the system. The agents are able to reason about it and to use it in order to initiate cooperation with other agents in the system. representation of Case 1 and 2 considered as ACMAS and case 3 and 4 considered as OCMAS. The importance of Picard classification of MAS dynamic reorganization is that nearly 51 Hosny Ahmed Abbas et al.: Organization of Multi-Agent Systems: An Overview most of known reorganization methods fit to a specific case or multiple cases. Similar classification proposed by Sichman et al. [44], but he used the concept of observer in the same position as the agent awareness of the organization. Table 2 provides the global picture of possible types of MAS organization with examples. As shown in the table MAS the organization awareness/unawareness of the presence of the organizational level. individual agents about according classified to is Table 2. The global picture of MAS organization. Agents unaware Agents aware ACMAS=Emergent organization Organization is observed. It is implicitly programmed in agents, interactions, and environment. Organization is observed. Coalition mechanisms programmed in the agents. Concerned Community SASO COIN Examples Swarm-based systems [72] Contract-Net Interaction Protocol [73] OCMAS = Designed organization Organization is a design model. It may be hard coded in the agents. Organization is programmed in the agents and/or in specialized middleware services. Concerned Community COIN Examples AOSE methodologies such as: MASE [74], INGENIAS [75]. Picard also, after finishing his valuable study proposed a comprehensive definition of dynamic reorganization as follows: “Reorganization is a process, endogenous or exogenous, concerning systems in which organization is explicitly manipulated through specifications, constraints or other means, in order to ensure an adequate global behavior, when the organization is not adapted. Agents being aware of the organization state and structure, they are capable of manipulating primitives to modify their social environment. This process can be both initiated by an external entity or by agents themselves, by reasoning directly on the organization (roles, organizational specification) and the cooperation patterns (dependencies, commitments, powers).” This definition assumes that the agents are aware of the existence of the organizational level, thus it concerns the OCMAS viewpoint. But, what if agents are unaware of the organization level? According to Picard, in this case the dynamic reorganization process is called self-organization which defined by Picard as follows: “Self-organization is an endogenous and bottom-up process concerning systems in which only local information and representations are manipulated by agents unaware of the organization as a whole, in order to adapt the system to the environmental pressure by modifying the organization, therefore by changing directly the system configuration influences, differentiation), or the environment of the system, by local interactions and propagation, by avoiding predefined model biases.” neighborhoods, (topology, indirectly This definition states that self-organization represents the ACMAS viewpoint. In a self-organized system, agents are unaware of the organization level, the reorganization process is decentralized, implicit, endogenous, and agents are responsible of the system dynamic reorganization, which is often initiated by an environmental change. In a dynamically reorganizing system where agents are aware of the organization level, this process can be decentralized or not, but always explicit and directly performed by entities (designer or COIN Organizational models such as: AGR [58] MOISE+ [67] agents) manipulating organizational primitives. Therefore, the awareness is a key dimension added by Picard to identify self-organized MAS. The next section provides detailed review of the self-organization concept in MAS. 3.2. Self-Organization recently in concepts appeared self-configuration, etc) are Self-* properties [43] (i.e., self-organization, self-healing, the most self-adaptation, captivating software engineering. They remind us of Einstein ideas about Time Machine, which was and still a far dream of human to travel through time. Human also dreams to design a system, regardless of its nature (software or hardware), able to do all things by itself. A system has all known self-* properties will be amazing. Actually, this type of systems is imaginary (at least till now!); we can only see this system in science fiction movies. However, it is possible to design systems with one or more of self-* properties for predefined purposes and under certain circumstances. The first use of the term self-organization returns to Ashby [56], in 1947, he stated that a system is said to be self-organized if it changed its own organization rather than being changed by an external entity. Self-organization in software systems received great attention since the last few years. It is an attractive way to handle the dynamic requirements in software in general and MAS in specific. It refers to a process where a system changes its internal organization to adapt to changes in its goals and its working environment without explicit external control. Understanding the mechanisms that can be used to model, assess and engineer self-organizing behavior in MAS is currently an issue of major interest [38]. Picard’s definition of self-organization (see previous section) can be rephrased as follows: Self-organization is a process where some form of overall order or coordination arises out of the local interactions between the components of an initially disordered system. This process is spontaneous: it is not necessarily directed or controlled by any agent or subsystem inside or outside of the system. It is often triggered International Journal of Intelligent Information Systems 2015; 4(3): 46-57 52 by random fluctuations, which are triggered and amplified by positive feedback. The resulting organization is wholly decentralized or distributed over all the components of the system, it is typically very robust and able to survive and self-repair substantial damage or perturbations. The roots of the term self-organization return to the work of Glansdorff and Prigogine [46] through thermodynamics studies. They discovered that open systems decrease their entropy (order comes out of disorder) when an external energy is applied on the system. Matter organizes itself under this external pressure to reach a new state where entropy has decreased. Nature is full of self-organization forms and patterns, for instance social behavior of insects like ants or termites, which formed as a result of indirect communication through environment without the need for any type of direct interaction, this type of interaction is called Stigmergy. Social behavior of humans is also self-organized and gives rise to emergent complex global behaviors. Human beings typically work with local information and through local direct or indirect interactions producing complex societies [45]. Researchers from variety of disciplines who were interested in self-organization in nature found MAS as the adequate engineering style for modeling and simulation of the self-organization phenomena and after a period of time the situation reversed as the MAS researchers, who are concerned with AOSE gave a greet attention to bio-inspired models for developing complex, open, and heterogeneous MAS-based applications. Self-organization and emergence are currently the main focus of AOSE researchers. The adoption of naturally inspired methods and approaches for engineering self-organized MAS is currently a very active research area [47][48]. Mechanisms such as direct interactions [49], Stigmergy [50], reinforcement [51], and agents’ cooperation [52] are widely used to design MAS with self-organization behavior. Another relevant and interesting concept is that of emergence, which can be considered as a process takes place in complex systems (which may or may not be self-organized). Self-organization results from emergence, but there is no guarantee that a self-organized system will always generate emergent phenomena. Understanding how to engineer systems that are capable of presenting self-organized behavior and desirable emergence is currently a very active research area too. The next section introduces briefly the concept of emergence. 3.3. Emergence A lot of confusion exists about the meaning of the two relevant terms emergence and self-organization. One of the sources of the confusion comes from the fact that a combination of both phenomena often occurs in dynamical systems [53]. In MAS domain, self-organization and emergence concepts are recently getting great focus as a way to engineer open, heterogeneous, and complex MAS-based applications such as complex adaptive systems (CAS) [54], which are fluidly changing collections of distributed interacting components that react to both their environments and to one another. The familiar definition of emergence is as a phenomenon where global behavior arises from the interactions between the local parts of the system. This general and vague definition indicates that still there is no consensus of a clear definition for emergence. Also, it indicates the absence of clear understating of its nature. In contrast to the reductionism theory [55], which allows a system to be reduced to the sum of its parts, the emergent global behavior cannot be predicted by observing its parts local behaviors. An accepted operational definition of emergence was proposed by De Wolf and Holvoet [53] as follows: “A system exhibits emergence when there are coherent emergents at the macro-level that dynamically arise from the interactions between the parts at the micro-level. Such emergents are novel with respect to the individual parts of the system.” This definition uses the concept of an ‘emergent’ as a general term to denote the result of the process of emergence, i.e., properties, behavior, structure, patterns, etc. The ‘level’ mentioned refers to certain points of view. The macro-level considers the system as a whole and the micro-level considers the system from the viewpoint of the individual entities that make up the system. The concept of emergence is very complex and it is not fall in the scope of this article, interested readers are invited to explore the emergence relevant references. 3.4. Discussion their Static design of MAS is not adequate for modern real world applications, which characterized by increasing complexity heterogeneity, and openness. Even closed systems in which the number of agents is constant with time should have a type of adaptive dynamic behaviors. All possible behaviors of modern systems cannot be captured at design time and that requires these systems to be adaptive able to adapt changes in their working environments. Dynamic reorganization is currently a familiar way for developing adaptive MAS. As shown in Section 2, the adoption of organizational aspects within MAS is promoted and recommended by pioneers of MAS research. Dynamic reorganization can be described as the change of MAS structure and behavior as a result of internal or external demand. The external demand can be for example human intervention. The internal demand emerges from the system itself as an autonomous system to adapt environments changes. Self-organization is a dynamical and adaptive process where systems acquire and maintain structure themselves, without external control. In self-organizing systems, robustness is used in terms of adaptivity in the presence of perturbations and change. A self-organizing system is expected to cope with that change and to maintain its organization autonomously. Emergence emphasizes the presence of a novel coherent macro-level emergent (property, behavior, structure, etc) as a result of the interactions between micro-level parts. A combination of emergence and self-organization is a promising approach to engineer large-scale multi-agent 53 Hosny Ahmed Abbas et al.: Organization of Multi-Agent Systems: An Overview systems. In most systems that are considered in MAS literature, emergence and self-organization occur together. Research in MAS and CPS communities focuses on such systems. In very complex (multi-agent) systems, i.e. distributed, open, large, situated in a dynamic context, etc., the combination of is recommended. self-organization emergence and When a researcher proposes an approach to dynamically reorganize a multi-agent system to adapt environments’ changes, he actually proposes what the MAS domain consensus agreed to call as an Organizational (or organization) Model. MAS organizational models will play a critical role in the development of future larger and more complex MAS. The main concern of organizational models is to describe the structural and dynamical aspects of organizations [9]. They have proven to be a useful tool for the analysis and design of multi-agent systems. Furthermore, they provide a framework to manage and engineer agent organizations, dynamic reorganization, self-organization, emergence, and autonomy within multi-agent systems. The next section introduces organizational models in some details. 4. Organizational Models software agent-oriented Organizational models have been recently used in agent theory for modeling coordination in open systems and to ensure social order in MAS applications [64]. The adoption of organizational models is currently given great importance within most engineering methodologies. The motivation to this direction is that in open environments, agents must be able to adapt towards the most appropriate organizations according to the environment conditions and their unpredictable changes. As a result, organizational models should guarantee the ability of organizations to dynamically reorganize as a response to dynamic environment changes. Organizational models are responsible of how efficiently and effectively organizations carry out their tasks, they have been recently used in agent theory for modeling coordination in open systems and to ensure social order in multi-agent system applications [7]. From the business management discipline an organizational model, also called as organizational structure, defines an organization through its framework, including lines of authority, communications, duties and resource allocations. A model is driven by the organization’s goals and serves as the context in which processes operate and business is done. The ideal model depends on the nature of the business and the challenges it faces. In turn, the model determines the number of roles needed and their required skill sets. In MAS, the purpose of an organizational model is to enhance the analysis and design of OCMAS, so it's usually integrated with a particular agent-based software engineering methodology. Before exploring some of the familiar organizational models proposed for modeling complex MAS, it is a suitable time to show the difference between them and MAS development methodologies. In general, a methodology is a body of methods employed by a discipline. A method is a procedure for attaining something. A methodology aims to prescribe all the elements necessary for the development of a software system [57]. AOSE community concerns creating development methodologies suitable for the development of agent-oriented or agent-based software. Typically, a development methodology (agent-oriented or not) comprises an ordered set of phases such planning, analysis, design, implementation, deployment. An organizational model is a tool adopted within a development methodology for modeling the system-to-be. Typically, it starts in the analysis phase but can expand through design and implementation phases, or in other cases it can expanded through the whole development life cycle. validation, and The next section explores some of familiar proposed MAS organizational models focusing in their tackled organizational aspects, their advantages, and their disadvantages. 4.1. Familiar Organizational Models There is a lot of MAS organizational models proposed in the literature; each of them tackles MAS organization from a different viewpoint. Some of them adopt the ACMAS viewpoint, others adopt the OCMAS viewpoint, and some adopt a hybrid approach concerns both ACMAS and OCMAS viewpoints. In what follows, three of familiar organizational models are introduced. 4.1.1. AGR and AGRE Ferber et al. [6] proposed a very concise and minimal OCMAS model called AGR, for Agent/Group/Role, also known as the AALAADIN model [58]. The authors of AGR model proposed a set of notations and a methodological framework to help the designer to build MAS using AGR. Further, they presented a set of diagrams (organizational structure, cheeseboard diagram, and organizational sequence diagrams), which may represent the different aspects (static and dynamic) of OCMAS. Their model is based on the dynamic creation of agents groups (agents partitioning) and dynamic forming of hierarchies of groups (Holarchies). They pointed out that their AGR-based model can be integrated with Gaia [59] MAS development methodology to complete the analysis and design phases of MAS development. Figure 2 presents the AGR meta-model. Figure 2. The AGR Meta-Model. International Journal of Intelligent Information Systems 2015; 4(3): 46-57 54 The core concepts on which the AGR model is based are agent, group and role. The agent in AGR is assumed to be an active, communicating entity which plays roles within groups, with no restrictions on its internal architecture. The group is defined as the basic unit of agent aggregation. Each agent is part of one or more of these groups. The role is an abstract representation of an agent function, service or identification within a group. Each agent can handle several roles, and each role handled by an agent remains local to a group. Other important abstract concepts are also shown the AGR meta-model shown in Figure 9.1, they are Group Structure and Organizational Structure. The group structure is an abstract representation of the roles required in this group and their interaction relationships and protocols. The organization structure is the set of group structures expressing the design of a multi-agent organizational scheme. In other paper, Ferber et al. [60] presented an extension of the AGR organizational model, called AGRE (AGR + Environment), which simply geometrical) environments. This extension is based on the concept of a space which can be seen either as a physical area or as a social group. includes physical (or of agents heterogeneous relationships. On The main advantages of the AGR/AGRE models are: supporting architectures, heterogeneous communication languages, and dynamic role-group the disadvantages are multi-role agents which make agents internally complex; roles sharing between Groups can cause overloaded agents, agents ask to join groups which require highly knowledgeable agents, use of mediator agents (brokers) which can be a source of bottlenecks, and very few known real applications. the other hand, 4.1.2. MOISE for multI-agent SystEms); Hannoun et al. [67] proposed MOISE (Model of Organisation for modeling organizational aspects of MAS. Similar to the AGR model, their model is based on three major concepts: roles, organizational links (roles relations), and groups. What distinguishes the MOISE model is that it tries to integrate both viewpoints, ACMAS and OCMAS. By this way MOISE gives the chance to the designer to model totally or partially the social behavior of system agents by specify the possible organizational structures and that will be useful for system verification and validation. On the other hand, for the sake of flexibility, agents should be able to reason about their social behaviors and have a direct influence on system dynamic reorganization. The MOISE model is structured along with three levels: (i) for each agent, definition of the tasks that it is responsible of (individual level), (ii) aggregation of agents in large structures (aggregate level), (iii) global structuring and interconnection of the agents and structures with each other (society level). The organization in MOISE is viewed as a normative set of rules that constrains the agents’ behaviors [67]. The MOISE organizational model was extended by Hübner et al. to MOISE+ [68] to create an organization-centered model for independently specify the structural and functional aspects then link them by a deontic aspect. Another extension to MOISE+ [69] was done to add dynamic reorganization process to adapt environment changes. 4.1.3. MACODO in Weyns et al. [61] presented an organizational model for context-driven dynamic agent organizations. The model defines abstractions that support application developers to describe dynamic reorganization. The organizational model is part of an integrated approach, called MACODO (Middleware Architecture for COntext-driven Dynamic agent Organizations); life-cycle management of dynamic organizations is separated from the agents, organizations are first-class citizens, and their dynamics are governed by laws. Moreover, the authors provided a formal specification to describe and specify the semantics of their organizational model abstractions using Z specification language [62], which is based on set theory and first order predicate calculus. The main concern of MACODO is to directly relate organization dynamics to context changes in the environment. this model, the is We argue that the main drawback of the MACODO organizational model the pure dynamically created organization; we argue that an organization should be tackled from the two perspectives, static and dynamic for the sake of long-term system stability. Dynamically creating and vanishing of organizations without keeping an amount of static behavior can impact system stability and prevents it from reaching an equilibrium state. In other words, there should be an amount of balance between static and dynamic organizational behaviors. The authors applied their model to traffic monitoring application. To our best knowledge, there is no any other real world application designed with MACODO. 4.2. Discussion In MAS literature, there is large number of organizational models proposed by MAS researchers from all over the world to support the organizational aspects within MAS. Some of these models adopt the ACMAS viewpoint, others are concerned with the OCMAS viewpoint, and others adopt a hybrid approach combines both viewpoints. For the sake of this article size, it is not possible to explore all proposed organizational models in details, but interested readers can see [70], which is a handbook of research on MAS organizational models recent organizational model. Bellow, we provide our remarks about these models: contains many of (cid:1) This large number of organizational models indicates that concerning organizational aspects within MAS is currently a very interesting research area. (cid:1) It also emphasize that till now there is no a fit-to-all organizational models that can be used to design MAS-based systems in all application domains. (cid:1) Nearly, each of these models was dedicated to specific real world application domain and it is not applied to other applications. 55 Hosny Ahmed Abbas et al.: Organization of Multi-Agent Systems: An Overview (cid:1) Some of these organizational models tackle with organization structure issues at design time (pure static), and others tackle them at will (pure dynamic). References (cid:1) In some of them the organization abstraction is not dynamic explicit reorganization is given to individual agents in addition to their functional responsibilities. responsibility and the of (cid:1) Most of them considered the intra-organization and did not tackle with inter-organization reorganization. How to model the interaction among organizations? (cid:1) Few organizational models tackled both static and dynamic aspects of organizations and environments. (cid:1) In most of them the individual agent initiates to join a certain organization and this require that the agent has a reasonable knowledge about the services of each organization to select the appropriate one to join. We argue that letting the organization itself to select suitable agents to award it a role is the better approach because organization knowledge is more global than that of an individual agent. Based on these remarks and limitations of most previously proposed MAS organizational models, we proposed a novel organizational model for engineering complex large-scale MAS-based applications. The new MAS organizational model was called NOSHAPE and conceptually presented in [76]. NOSHAPE is supposed to handle all the limitations of other the overlapping relationships among higher order abstraction entities such as organizations of agents, worlds of organizations, and even universes of worlds within MAS to realize and utilize their captivating characteristics. related models. It exploits 5. Conclusion and Future Work the to including reorganize system-to-be MAS organization can be considered as a process to dynamically adapt environment dynamic changes. Or, it can be considered as an entity facilitates the partitioning of the system-to-be. Organizations are a typical way to structure and manage interactions among agents. Establishing an organizational structure that specifies how agents in a system should work together helps the achievement of effective coordination in MAS. This chapter provided a comprehensive overview about MAS organization its motivations, paradigms, models, and other related concepts such as self-organization and emergence. In MAS literature, we found very large number of organizational models proposed to support dynamic reorganization of the MAS, this large number of organizational models indicates that concerning organizational aspects within MAS is currently a very active and interesting research area and that till now there is no a fit-to-all MAS organizational model that can be used for engineering all possible application domains. This conclusion motivates us to propose a novel organizational model for engineering complex and highly distributed large-scale MAS such as modern industrial networks (i.e., SCADA [19]). [1] Shehory, O. Architectural properties of multi-agent systems. Technical Report CMU-RI-TR-98-28, The Robotics Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213, 1998. [2] Jennings, N. R., & Wooldridge, M. Agent-Oriented Software Engineering. in Bradshaw, J. ed. Handbook of Agent Technology, AAAI/MIT Press, 2000. [3] Gasser, L. (2001). Perspectives on Organizations in Multi-Agent Systems. and Applications, Michael Luck et al (pp. 1–16). Berlin: Springer-Verlag. doi:10.1007/3-540-47745-4_1. In Multi-Agent Systems [4] Odell, J. J., Parunak, H. V. D., & Fleischer, M. (2003). The role of roles in designing effective agent organizations. In Software Engineering for Large-Scale Multi-Agent Systems (pp. 27–38). Springer Berlin Heidelberg. doi:10.1007/3-540-35828-5_2. [5] Horling, B., & Lesser, V. (2004). A survey of multi-agent organizational paradigms. The Knowledge Engineering Review, 19(4), 281–316.doi:10.1017/ S0269888905000317. [6] Ferber, J., Gutknecht, O., & Michel, F. (2004). From agents to organizations: an organizational view of multi-agent systems. In Agent-Oriented Software Engineering IV (pp. 214–230). Springer Heidelberg. doi:10.1007/978-3-540-24620-6_15. Berlin [7] Van Den Broek, E. L., Jonker, C. M., Sharpanskykh, A., & Treur, J. (2006). Formal modeling and analysis of organizations. In Coordination, Organizations, Institutions, and Norms in Multi-Agent Systems (pp. 18-34). Springer Berlin Heidelberg. [8] Hübner, J. F., Vercouter, L., & Boissier, O. (2009). Instrumenting multi-agent organisations with artifacts to support reputation processes. In Coordination, Organizations, Institutions and Norms in Agent Systems IV (pp. 96–110). Springer Heidelberg. doi:10.1007/978-3-642-00443-8_7. Berlin [9] Ferber, J., Michel, F., & Báez, J. (2005). AGRE: Integrating for environments with organizations. multi-agent systems (pp. 48-56). Springer Berlin Heidelberg. In Environments [10] Dignum, V. (2009). The role of organization in agent systems. Handbook of Research on Multi-Agent Systems: Semantics and Dynamics of Organizational Models, 1-16. [11] Weyns, D., Haesevoets, R., & Helleboogh, A. (2010). The MACODO organization model for context-driven dynamic agent organizations. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(4), 16. [12] Burns, T., & Stalker, G. (1961). The Management of Innovation, Tavistock, London. [13] Picard, G., Hübner, J. F., Boissier, O., & Gleizes, M. P. (2009, June). Reorganisation and self-organisation in multi-agent systems. In 1st International Workshop on Organizational Modeling, ORGMOD (pp. 66-80). [14] Upton, J., Janeka, I., & Ferraro, N. (2014). The whole is more than the sum of its parts: aristotle, metaphysical. Journal of Craniofacial Surgery, 25(1), 59-63. International Journal of Intelligent Information Systems 2015; 4(3): 46-57 56 [15] A. Drogoul, B. Corbara, and S. Lalande. MANTA: New experimental results on the emergence of (artificial) ant societies. In Nigel Gilbert and Rosaria Conte, editors, Artificial Societies: the Computer Simulation of Social Life, pages 119–221. UCL Press, London, 1995. [16] Rajkumar, R. R., Lee, I., Sha, L., & Stankovic, J. (2010, June). Cyber-physical systems: the next computing revolution. In Proceedings of the 47th Design Automation Conference (pp. 731-736). ACM. [17] Mattern, F., & Floerkemeier, C. (2010). From the Internet of Computers to the Internet of Things. In From active data management to event-based systems and more (pp. 242-259). Springer Berlin Heidelberg. [18] James Momoh (2012), Smart Grid: Fundamentals of Design and Analysis, Wiley-IEEE Press; 1 edition (March 20, 2012). [19] Abbas, H. A. (2014). Future SCADA challenges and the promising solution: the agent–based SCADA. International Journal of Critical Infrastructures, 10(3), 307-333. [20] Saha, D., & Mukherjee, A. (2003). Pervasive computing: a paradigm for the 21st century. Computer, 36(3), 25-31. [21] Friedewald, M., & Raabe, O. (2011). Ubiquitous computing: impacts. Telematics and technology An overview of Informatics, 28(2), 55-65. [22] Jennings NR (2001) An agent-based approach for building complex software systems. Communications of the ACM 44 (4):35–41 [23] Ferber J (1999) Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence. Addison-Wesley, Harlow, England. [24] Wooldridge, M.: An Introduction to Multi-Agent Systems. Wiley, New York (2002). [25] Posey, Rollin B. (March 1961). "Modern Organization Theory edited by Mason Haire". Administrative Science Quarterly 5 (4): 609–611. [26] Hertz, D. and R. Livingston. (1950). Contemporary Organizational theory: A review of current concepts and methods. Human Relations, 3 (4), 373-394. [27] Odell, J. J., Parunak, H. V. D., & Fleischer, M. (2003). The role of roles in designing effective agent organizations. In Software Engineering for Large-Scale Multi-Agent Systems (pp. 27-38). Springer Berlin Heidelberg. [28] Van Den Broek, E. L., Jonker, C. M., Sharpanskykh, A., & Treur, J. (2006). Formal modeling and analysis of organizations. In Coordination, Organizations, Institutions, and Norms in Multi-Agent Systems (pp. 18-34). Springer Berlin Heidelberg. [29] Miles, R. E., Snow, C. S., Mathews, J. A., Miles, G., & Coleman, H. J. (1997). Organizing in the knowledge age: Anticipating the cellular form. The Academy of Management Executive, 11(4), 7-20. [30] Lesser, V. R., & Corkill, D. D. (1981). Functionally accurate, and systems. Systems, Man cooperative distributed Cybernetics, IEEE Transactions on,11(1), 81-96. [31] Corkill, D. D. (1980). An organizational approach to planning in distributed problem-solving systems. Technical Report 80-13, Department of Computer and Information Science, University of Massachusetts, Amherst, Massachusetts 01003. [32] Jay Galbraith. Designing Complex Organizations. Addison-Wesley, 1973. [33] Fox, M. S. (1981). An organizational view of distributed systems. Systems, Man and Cybernetics, IEEE Transactions on, 11(1), 70-80. [34] Giovanna Di Marzo Serugendo et al (2011), “Self-organizing Software, From Natural to Artificial Adaptation”, Springer. [35] M. Carley and L. Gasser. Computational organization theory. In G. Weiss, editor, Multiagent Systems: A Modern Approach to Distributed Arti_cial Intelligence, pages 299.330. MIT Press, 1999. [36] Corkill, D. D., & Lander, S. E. (1998). Diversity in agent organizations. Object Magazine, 8(4), 41-47. [37] Jay R. Galbraith. Organization Design. Addison-Wesley, 1977. [38] Giovanna di Marzoserugendo et al, “Self-organization in multi-agent systems”, The Knowledge Engineering Review, Vol. 20:2, 165–189., 2005, Cambridge University Press. [39] K. S. Barber and C. E. Martin, ‘Dynamic reorganization of the 5th in Proceedings of decisionmaking groups’, Autonomous Agents, (2001). [40] Dignum, V., Dignum, F., & Sonenberg, L. (2004, September). Towards dynamic reorganization of agent societies. In Proceedings of Workshop on Coordination in Emergent Agent Societies at ECAI (pp. 22-27). [41] Bernon, C., Camps, V., Gleizes, M. P., & Picard, G. (2005). Engineering adaptive multi-agent systems: The adelfe methodology. Agent-oriented methodologies, 172-202. [42] Guessoum, Z., Briot, J. P., Marin, O., Hamel, A., & Sens, P. (2003). Dynamic and adaptive replication for large-scale reliable multi-agent systems. InSoftware engineering for large-scale multi-agent systems (pp. 182-198). Springer Berlin Heidelberg. [43] Berns, A., & Ghosh, S. (2009, September). Dissecting self-* properties. In Self-Adaptive and Self-Organizing Systems, 2009. SASO'09. Third IEEE International Conference on (pp. 10-19). IEEE. [44] Sichman, J. S., Dignum, V., & Castelfranchi, C. (2005). Agents' organizations: a concise overview. Journal of the Brazilian Computer Society, 11(1), 3-8. [45] Serugendo, G. D. M., Gleizes, M. P., & Karageorgos, A. (2006). Self-Organisation and Emergence in MAS: An Overview. Informatica (Slovenia),30(1), 45-54. [46] P. Glansdorff and I. Prigogine. Thermodynamic study of Structure, Stability and Fluctuations. Wiley, 1971. [47] Mano, J. P., Bourjot, C., Lopardo, G., & Glize, P. (2006). Bio-inspired mechanisms for artificial self-organised systems. Informatica, 30(1), 55-62. [48] Giovanna (2011) Di Marzo Serugendo et al, “Self-organizing Software, From Natural to Artificial Adaptation”, Springer, 2011. [49] Zambonelli, F., Gleizes, M. P., Mamei, M., & Tolksdorf, R. (2004, May). Spray computers: frontiers of self-organization. In Autonomic Computing, 2004. Proceedings. International Conference on (pp. 268-269). IEEE. 57 Hosny Ahmed Abbas et al.: Organization of Multi-Agent Systems: An Overview [50] Karuna, H., Valckenaers, P., Saint-Germain, B., Verstraete, P., Zamfirescu, C. B., & Van Brussel, H. (2005). Emergent forecasting using a stigmergy approach in manufacturing coordination and control. In Engineering Self-Organising Systems (pp. 210-226). Springer Berlin Heidelberg. [51] Weyns, D., Schelfthout, K., Holvoet, T., & Glorieux, O. (2004). Role based model for adaptive Agents. In Fourth Symposium on Adaptive Agents and Multiagent Systems at the AISB'04 Convention. Garcia-Fornes, A., & Espinosa, A. (2007). Supporting agent organizations. In Multi-Agent Systems and Applications V (pp. 236-245). Springer Berlin Heidelberg. [65] Dignum, V., Dignum, F.: A Landscape of Agent Systems for the Real World. Tech. Report Utrecht University (2007) [66] Gutknecht, O., & Ferber, J. (1998). A model for social structures in multi-agent systems (Vol. 98040). Technical Report RR LIRMM. [52] M.P. Gleizes, V. Camps, and P. Glize. A theory of emergent computation based on cooperative self-organisation for adaptive artificial systems. Fourth European Congress of Systems Science. Valencia, 1999. [67] Hannoun, M., Boissier, O., Sichman, J. S., & Sayettat, C. (2000). MOISE: An organizational model for multi-agent systems. In Advances in Artificial Intelligence (pp. 156-165). Springer Berlin Heidelberg. [53] De Wolf, T., & Holvoet, T. (2004). Emergence and self-organisation: a statement of similarities and differences. Engineering Self-Organising Systems, 3464, 1-15. [54] Akgün, A. E., Keskin, H., & Byrne, J. C. (2014). Complex adaptive systems theory and firm product innovativeness. Journal of Engineering and Technology Management, 31, 21-42. [55] Streng, W. (2005). Reductionism versus Holism–Contrasting Approaches.Consilience. Interdisciplinary Communications, 2006, 11-14. [56] Ashby, W.R.: Principles of self-organizing dynamic systems. Journal of General Psychology 37 (1947) 125–128. [68] Hübner, J. F., Sichman, J. S., & Boissier, O. (2002, July). Moise+: towards a structural, functional, and deontic model for mas organization. In Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1 (pp. 501-502). ACM. [69] Hübner, J. F., Sichman, J. S., & Boissier, O. (2004). Using the MOISE+ for a Cooperative Framework of MAS Reorganisation. In Advances in artificial intelligence–SBIA 2004 (pp. 506-515). Springer Berlin Heidelberg. [70] Dignum, V. (Ed.). (2009). Handbook of Research on Multi-Agent Systems: Semantics and Dynamics of Organizational Models: Semantics and Dynamics of Organizational Models. IGI Global. [57] Giorgini, P., & Henderson-Sellers, B. (2005). Agent-oriented methodologies: an introduction. Agent-oriented Methodologies, 1-19. [71] Jennings, N. R. (1999). Agent-oriented software engineering. In Multiple Approaches to Intelligent Systems (pp. 4-10). Springer Berlin Heidelberg. [58] Ferber, J. and Gutknecht, O., Aalaadin: a meta-model for the analysis and design of organizations in multi-agent systems. in Third International Conference on Multi-Agent Systems, (Paris, 1998), IEEE, 128-135. [72] Duan, Junhua, Yi-an Zhu, and Shujuan Huang. "Stigmergy agent and swarm-intelligence-based multi-agent system." Intelligent Control and Automation (WCICA), 2012 10th World Congress on. IEEE, 2012. [59] Wooldridge, M., Jennings, N. R., & Kinny, D. (2000). The Gaia methodology for agent-oriented analysis and design. Autonomous Agents and Multi-Agent Systems, 3(3), 285-312 . [73] Smith, R. G. (1980). The contract net protocol: High-level communication and control in a distributed problem solver. IEEE Transactions on computers, (12), 1104-1113. [60] Ferber, J., Michel, F., & Báez, J. (2005). AGRE: Integrating for environments with organizations. multi-agent systems (pp. 48-56). Springer Berlin Heidelberg. In Environments [61] Weyns, D., Haesevoets, R., & Helleboogh, A. (2010). The MACODO organization model for context-driven dynamic agent organizations. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(4), 16. [62] Spivey, J. M. (1989). The Z notation (Vol. 1992). New York: Prentice Hall. [63] Coutinho, L. R., Sichman, J. S., & Boissier, O. (2005, October). Modeling organization in mas: A comparison of models. In First Workshop on Software Engineering for Agent-oriented Systems (pp. 1-10). [64] Argente, E., Palanca, J., Aranda, G., Julian, V., Botti, V., [74] S.A. DeLoach. Methodologies and Software Engineering for Agent Systems. The Agent-Oriented Software Engineering Handbook Series : Multiagent Systems, Artificial Societies,and Simulated Organizations, volume 11, chapter The MaSE Methodology. Kluwer Academic Publishing (available via Springer), 2004. [75] Juan Pav´on and Jorge J. G´omez-Sanz. Agent oriented software engineering with ingenias. In Vladim´ır Mar´ık, Jorg P. Muller, and Michal Pechoucek, editors, CEEMAS, volume 2691 of Lecture Notes in Computer Science, pages 394–403. Springer, 2003. [76] Abbas, H. A. (2014). Exploiting the Overlapping of Higher Order Entities within Multi-Agent Systems. International Journal of Agent Technologies and Systems (IJATS), 6(3), 32-57. doi:10.4018/ijats.2014070102.
1702.03614
1
1702
2017-02-13T02:50:55
Multitask diffusion adaptation over networks with common latent representations
[ "cs.MA", "stat.ML" ]
Online learning with streaming data in a distributed and collaborative manner can be useful in a wide range of applications. This topic has been receiving considerable attention in recent years with emphasis on both single-task and multitask scenarios. In single-task adaptation, agents cooperate to track an objective of common interest, while in multitask adaptation agents track multiple objectives simultaneously. Regularization is one useful technique to promote and exploit similarity among tasks in the latter scenario. This work examines an alternative way to model relations among tasks by assuming that they all share a common latent feature representation. As a result, a new multitask learning formulation is presented and algorithms are developed for its solution in a distributed online manner. We present a unified framework to analyze the mean-square-error performance of the adaptive strategies, and conduct simulations to illustrate the theoretical findings and potential applications.
cs.MA
cs
Multitask diffusion adaptation over networks 1 with common latent representations Jie Chen, Member, IEEE, Cédric Richard, Senior Member, IEEE, Ali H. Sayed, Fellow Member, IEEE 7 1 0 2 b e F 3 1 ] A M . s c [ 1 v 4 1 6 3 0 . 2 0 7 1 : v i X r a Abstract Online learning with streaming data in a distributed and collaborative manner can be useful in a wide range of applications. This topic has been receiving considerable attention in recent years with emphasis on both single-task and multitask scenarios. In single-task adaptation, agents cooperate to track an objective of common interest, while in multitask adaptation agents track multiple objectives simultaneously. Regularization is one useful technique to promote and exploit similarity among tasks in the latter scenario. This work examines an alternative way to model relations among tasks by assuming that they all share a common latent feature representation. As a result, a new multitask learning formulation is presented and algorithms are developed for its solution in a distributed online manner. We present a unified framework to analyze the mean-square-error performance of the adaptive strategies, and conduct simulations to illustrate the theoretical findings and potential applications. Multitask learning, distributed optimization, common latent subspace, online adaptation, diffusion strategy, collaborative processing, performance analysis. Index Terms I. INTRODUCTION Multi-agent networks usually consist of a large number of interconnected agents or nodes. Interconnections between the agents allow them to share information and collaborate in order to solve complex tasks collectively. Examples abound in the realm of social, economic and biological networks. Distributed algorithms over such networks offer a valuable alternative to centralized solutions with useful properties such as scalability, robustness, and decentralization. When endowed with adaptation abilities, these algorithms enable agents to continuously learn Copyright (c) 2016 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to [email protected]. The work of J. Chen was supported in part by the NSFC grant 61671382. The work of C. Richard was supported in part by the Agence Nationale pour la Recherche, France, (ODISSEE project, ANR-13-ASTR-0030). The work of A. H. Sayed was supported in part by NSF grants CIF-1524250 and ECCS-1407712. A short and preliminary version of this work appears in the conference publication [1]. J. Chen is with CIAIC of School of Marine Science and Technology, Northwestern Polytechinical University, Xi'an, 710072, China (e- mail: [email protected]). C. Richard is with the Université de Nice Sophia-Antipolis, CNRS, France (e-mail: [email protected]), in collaboration with Morpheme team (INRIA Sophia-Antipolis). A. H. Sayed is with the department of electrical engineering, University of California, Los Angeles, CA 9005-1594, USA (email: [email protected]). 2 and adapt in an online manner to concept drifts in their data streams [2], [3]. Broadly, distributed strategies for online parameter estimation can be applied to single-task or multi-task scenarios. In the first case, agents cooperate with each other to estimate a single parameter vector of interest, such as tracking a common target. Reaching consensus among the agents is critical for successful inference in these problems. In the multitask case, the agents cooperate to estimate multiple parameter vectors simultaneously, such as tracking a collection of targets moving in formation [4]. Extensive studies have been conducted on adaptive distributed strategies for single-task problems. Existing techniques include incremental [5]–[8], consensus [9]–[11], and diffusion strategies [1], [2], [12]–[17]. Incremental techniques require determining a cyclic path that runs across all nodes, which is generally a challenging (NP-hard) task to perform. Besides, feature makes the incremental strategies sensitive to link failures and problematic for adaptation. Consensus techniques aim to reach an agreement among nodes on the estimate of interest via local information exchanges, but they have been shown [2], [3] to suffer from instability problems when used in the context of adaptive networks due to an inherent asymmetry in the update equations. Diffusion techniques, on the other hand, have been shown to have superior stability and performance ranges [18] than consensus-based implementations. For these reasons, we shall focus on diffusion-type implementations in this paper. Besides single-task scenarios, there are also applications where it is desirable to estimate multiple parameter vectors at the same time, rather than promote consensus among all agents [19]. For example, geosensor networks that monitor dynamic spatial fields, such as temperature or windspeed variations in geographic environments, require node-specific estimation problems that are able to take advantage of the spatial correlation between the measurements of neighboring nodes [20], [21]. A second example is the problem of collaborative target tracking where agents track several objects simultaneously [4], [19]. Motivated by these applications, there have been several variations of distributed strategies to deal with multitask scenarios as well. Existing strategies mostly depend on how the tasks relate to each other and on exploiting some prior information. In a first scenario, nodes are grouped into clusters, and each cluster of nodes is interested in estimating its own parameter vector. Although clusters may generally have distinct though related estimation tasks to perform, the nodes may still be able to capitalize on inductive transfer between clusters to improve their estimation accuracy. Multitask diffusion strategies were developed to perform estimation under these conditions [4], [22]. One useful way to do so is to employ regularization. A couple of other useful works have also addressed variations of this scenario where the only available information is that clusters may exist in the network but nodes do not know which other nodes share the same estimation task [23]–[25]. In [26], the authors use multitask diffusion adaptation with a node clustering strategy to identify a model between the gait information and electroencephalographic signals. In [27], the authors consider the framework in [4] to devise a distributed strategy that allows each node in the network to locally adapt inter-cluster cooperation weights. The authors in [28] promote cooperation between clusters with (cid:96)1-norm co-regularizers. They derive a closed- form expression of the proximal operator, and introduce a strategy that also allows each node to automatically set its inter-cluster cooperation weights. The works in [29], [30] propose alternative node clustering strategies. In a 3 second scenario, it is assumed that there are parameters of global interest to all nodes in the network, a collection of parameters of common interest within sub-groups of nodes, and a set of parameters of local interest at each node. A diffusion strategy was developed to perform estimation under these conditions [31], [32]. Likewise, in the works [33]–[35], distributed algorithms are derived to estimate node-specific parameter vectors that lie in a common latent signal subspace. In another work [36], the diffusion LMS algorithm is extended to deal with structured criteria built upon groups of variables, leading to a flexible framework that can encode various structures in the parameters. An unsupervised strategy to differentially promote or inhibit collaboration between nodes depending on their group is also introduced. Alternatively, in recent years, there has been an increasing interest in modeling relations between tasks by assuming that all tasks share a common feature representation in a latent subspace [37]–[39]. The authors in [38] proposed a non-convex method based on Alternating Structure Optimization (ASO) for identifying the task structure. A convex relaxation of this approach was developed in [40]. In [39], the authors showed the equivalence between ASO, clustered multitask learning [41], [42] and their convex relaxations. The efficiency of such task relationships has been demonstrated in these works for clustering and classification problems. In our preliminary work [1], we introduced this framework within the context of distributed online adaptation over networks. Useful applications can be envisaged. First, consider the case where the common subspace is spanned by certain selected columns of the identity matrix. This means that a subset of the entries of the parameter vector to be estimated are common to all nodes while no further restriction is imposed on the other entries. Another example concerns beamforming for antenna arrays with a generalized side-lobe canceller (GSC). The latent subspace corresponds to the space where interfering signals reside [43]. A third example deals with cooperative spectrum sensing in cognitive radios, where the common latent subspace characterizes common interferers [31]. Drawing on these motivations, this paper deals with distributed learning and adaptation over multitask networks with common latent representation subspaces. Algorithms are designed accordingly, and their performance analyzed. The contributions of this work include the following main aspects: • We formulate a new multitask estimation problem, which assumes that all tasks share a common latent subspace representation in addition to node-specific contributions. Additional constraints can be incorporated if needed. This work contrasts with earlier works [4], [28], where the inductive transfer between learning tasks is promoted by regularizers. It also differs from [31], which considers direct models by stacking local and global variables in an augmented parameter vector. Moreover, the work [38] uses a similar inductive transfer model but the common latent subspace is unknown and embedded into a joint estimation process. Our work is the first one to introduce an online estimation algorithm over networks. Estimating the common latent subspace of interest within this context is a challenging perspective. • We explain how this formulation can be tailored to fit individual application contexts by considering additional model constraints. We illustrate this fact by considering two convex optimization problems and the associated distributed online algorithms. The first algorithm is a generalization in some sense of the diffusion LMS 4 algorithm, which can be retrieved by defining the low-dimensional common latent subspace as the whole parameter space. The second algorithm uses (cid:96)2-norm regularization to account for the multitask nature of the problem. This opens the way to other regularization schemes depending on the application at hand. • We present a unified framework for analyzing the performance of these algorithms. This framework also allows to address the performance analysis of the multitask algorithms in [4], [19], [44], [45] in a generic manner, though these analyses were performed independently of each other in these works. The rest of the paper is organized as follows. Section II introduces the multitask estimation problem considered in this paper. Then, two distributed learning strategies are derived in Section III by imposing different constraints on common and node-specific representation subspaces. Section IV provides a general framework for analyzing distributed algorithms of this form. In Section V, experiments are conducted to illustrate the characteristics of these algorithms. Section VI concludes the paper and connects our work with several other learning strategies. Notation. Normal font x denotes scalars. Boldface small letters x denote vectors. All vectors are column vectors. Boldface capital letters X denote matrices. The asterisk (·)∗ denotes complex conjugation for scalars and complex- conjugate transposition for matrices. The superscript (·)(cid:62) represents transpose of a matrix or a vector, and (cid:107)·(cid:107) is the (cid:96)2-norm of its matrix or vector argument. Re{·} and Im{·} denote the real and imaginary parts of their complex argument, respectively. Matrix trace is denoted by trace(·). The operator col{·} stacks its vector arguments on the top of each other to generate a connected vector. The operator diag{·} formulates a (block) diagonal matrix with its arguments. Identity matrix of size N × N is denoted by I N . Kronecker product is denoted by ⊗, and expectation is denoted by E{·}. We denote by Nk the set of node indices in the neighborhood of node k, including k itself, and Nk its set cardinality. II. MATCHED SUBSPACE ESTIMATION OVER MULTITASK NETWORKS A. Multitask estimation problems over networks Consider a connected network composed of N nodes. The problem is to estimate an L × 1 unknown vector wo k at each node k from collected measurements. At each time n, node k has access to local streaming measurements {dk(n), xk,n}, where dk(n) is a scalar zero-mean reference signal, and xk,n is a 1 × L zero-mean row regression k,nxk,n} > 0. The data at agent k and time n are assumed to be related vector with covariance matrix Rx,k = E{x∗ via the linear model: dk(n) = xk,nwo k + zk(n) (1) k is an unknown complex parameter vector, and zk(n) is a zero-mean i.i.d. noise with variance σ2 where wo z,k = E{zk(n)2}. The noise signal zk(n) is assumed to be independent of any other signal. Let Jk(w) be a differentiable convex cost function at agent k. In this paper, we shall consider the mean-square-error criterion: Jk(w) = E{dk(n) − xk,nw2} (2) It is clear from (1) that each Jk(w) is minimized at wo a more general sense) as a task. Depending on whether the minima of all Jk(w) are achieved at the same wo not, the distributed learning problem can be single-task or multitask oriented [4]. k to estimate (or model in k or k. We refer to each parameter wo With single-task networks, all agents aim at estimating the same parameter vector wo shared by the entire network, that is, 5 (3) for all k ∈ {1, ..., N}. Several popular collaborative strategies, such as diffusion LMS [1], [2], [13], [14], were derived to address this problem by seeking the minimizer of the following aggregate cost function: k = wo wo N(cid:88) J glob(w) = Jk(w) (4) in a distributed manner. Since the individual costs (2) admit the same solution, wo is also the solution of (4). It has been shown that using proper cooperative strategies to solve (4) can improve the estimation performance [2], k=1 [3]. With multitask networks, each agent aims at determining a local parameter vector wo k. It is assumed that some similarities or relations exist among the parameter vectors of neighboring agents so that cooperation can still be meaningful, namely, (5) where the symbol ∼ refers to a similarity relationship in some sense, which can be exploited to enhance performance. Depending on the problem characteristics, this property can be promoted in several ways, e.g., by introducing some k ∼ wo wo (cid:96) if (cid:96) ∈ Nk regularization term, or by assuming a common latent structure. Networks may also be structured into clusters where agents within each cluster estimate the same parameter vector [4], [44]. B. Node-specific subspace constraints Although agents aim to estimate distinct minimizers wo k, exploiting relationships between solutions can make cooperation among agents beneficial. Regularization is one popular technique for introducing prior information about the solution. It can improve estimation accuracy though it may introduce bias [4], [19], [46]. In this paper, we explore an alternative strategy that assumes that the hypothesis spaces partially overlap. Specifically, we assume that each wo k can be expressed in the form: wo k = Θuo + o k (6) where Θuo is common to all nodes with Θ denoting an L × M matrix with known entries and uo an unknown M × 1 parameter vector (common to all nodes), and where o k is an unknown node-specific component. We assume that matrix Θ = [θ1, . . . , θM ] is full-rank with M ≤ L. Overcomplete sets of column vectors {θ1, . . . , θM} may be advantageous in some scenarios but this usually requires to impose further constraints such as sparsity over uo. We shall not discuss this case further in order to focus on the main points of the presentation. Model (6) means 6 that all tasks share the same parameter vector Θuo, which lies in the subspace spanned by columns of Θ. This subspace representation can be useful in several applications. For instance, consider the case where Θ is composed of selected columns of the identity matrix I L. This means that a subset of the entries of wo k are common to all agents while no further assumptions are imposed on the other entries. This situation is a natural generalization of the single-task scenario. Another example concerns beamforming problems with a generalized sidelobe canceller (GSC), where Θ acts as a blocking matrix to cancel signal components that lie in the constraint space [43]. In machine learning, formulation (6) is referred to as the alternating structure optimization (ASO) problem [38], [39]. The subspace Θ is, however, learnt simultaneously via a non-convex optimization procedure. In what follows, we shall assume that Θ is known by each agent. Before proceeding further, we clarify the difference between model (6) addressed here and in our preliminary work [1], and the model studied in [31], [32], [35], [47], [48]. In these last works, the authors consider particular information access models where global and local components are assumed to be related to distinct regressors. The centralized problem can then be formulated by stacking the global and local regressors, and by considering a parameter vector augmented accordingly. In our work, motivated by applications of the latent space model in batch-mode learning, we address the problem where the parameter vectors to be estimated lie in global and local latent subspaces. We do not need to distinguish explicitly between global and local regressors. Instead, as shown in the sequel, some extra conditions are needed so that model (6) is identifiable. Among other possibilities, we shall investigate two strategies where constraints on Θ and o k are imposed. Replacing (6) into (2), the global cost function is expressed as a function of a common parameter u and node- specific perturbations {k}N k=1: J glob(cid:0)u,{k}N k=1 (cid:1) = N(cid:88) k=1 E(cid:8)dk(n) − xk,n(Θu + k)2(cid:9) (7) k by each agent to benefit from the cooperative estimation of u. Problem (7) is still We expect the estimation of wo insufficient for estimating the tasks {wo k}. This is because the decomposition wk = Θ u + k is not unique. Indeed, given any optimum solution {¯u, ¯k}, and any s = Θx, we can generate another optimum solution by considering the shift {¯u − x, ¯k + s}. This ambiguity prevents us from deriving collaboration strategies based on u. From the point of view of convex analysis, the Hessian matrix of (7) is rank deficient and no unique solution exists. III. PROBLEM FORMULATIONS AND SOLUTION ALGORITHMS Problem (7) can be modified to make it well-determined and more meaningful. In this section, among other possibilities, we investigate two strategies that consist of imposing further constraints and derive the corresponding distributed algorithms. These two formulations guarantee the uniqueness of the solution and have clear interpreta- tions. A. Node-specific subspace constraints 7 We restrict the node-specific components {k}N k=1 to lie in the complementary subspace to span(Θ). The problem can be formulated as: min u,{k}N k=1 J glob(cid:0)u,{k}N k=1 (cid:1) subject to k ∈ span(Θ⊥), ∀k = 1, . . . , N (8) where the L − M columns of matrix Θ⊥ span the complementary subspace to span(Θ), that is, Θ∗ Θ⊥ = 0. We write: (9) where ξk is a column vector of size (L − M ). Now, replacing (9) into (8), the optimization problem becomes unconstrained and the objective function is given by: k = Θ⊥ ξk (cid:1) J glob(cid:0)u,{ξk}N N(cid:88) N(cid:88) k=1 = = k=1 k=1 E(cid:8)dk(n) − xk,n(Θu + Θ⊥ξk)2(cid:9) (cid:17) E{dk(n)2} + u Rx,k ∗Θ∗(cid:16) N(cid:88) (cid:110) N(cid:88) (cid:111) − 2 Re k=1 (cid:110) N(cid:88) Θu + N(cid:88) (cid:111) k=1 ∗ kΘ∗ ⊥Rx,kΘ⊥ξk + 2 Re ξ u (cid:110) ∗Θ∗ N(cid:88) (cid:111) Rx,kΘ⊥ξk k=1 − 2 Re ∗ dx,kΘu p where Rx,k = E{x∗ k,nxk,n} is the covariance matrix of xk,n, and pdx,k = E{dk(n)x∗ between the input data xk,n and the reference output data dk(n). ∗ dx,kΘ⊥ξk p k=1 k=1 (10) k,n} is the covariance vector Lemma 1: Problem (8) has a unique solution with respect to u and {k}N k=1 if the perturbations {k}N k=1 lie in a subspace orthogonal to span(Θ). Proof of Lemma 1 is provided in Appendix A. We shall now derive a distributed algorithm to seek the minimizer k, we of (8). Focusing on the terms that depend on u in (10), and setting parameters ξk to their optimum values ξo consider first the global cost function over the variable u: ∗Θ∗ u Rx,kΘu + 2 Re ∗Θ∗ u Rx,kΘ⊥ξo k ∗ dx,kΘu p + gk(ξo k) (cid:111) − 2 Re (cid:110) (cid:111) (cid:17) (cid:110) (cid:16) N(cid:88) N(cid:88) k=1 k=1 Ju,k(u) J glob u (u) = = k in (10). The term(cid:80)N (11) E{dk(n)2} is discarded because where gk(ξo k) collects all the terms depending only on ξo it is constant with respect to the arguments u and {ξk}N (u) has a unique minimizer for all nodes over the network, we can use a single-task adapt-then-combine (ATC) diffusion strategy to estimate uo [13], [15]. We introduce a right-stochastic matrix C with nonnegative entries c(cid:96)k such that: glob k=1. Since J u k=1 c(cid:96)k = 1, and c(cid:96)k = 0 if k /∈ N(cid:96) (12) N(cid:88) k=1 8 With each node k, we associate the local cost over the variable u: Observe that (cid:80)N k=1 J loc glob u,k(u) = J u respect to u, it can be expressed at each node k as follows: glob (u) because matrix C is right-stochastic. Since J u J loc u,k(u) = c(cid:96)kJu,(cid:96)(u) (13) (cid:88) (cid:96)∈Nk (cid:88) (cid:88) (cid:96)(cid:54)=k (cid:96)(cid:54)=k J glob u (u) = J loc u,k(u) + = J loc u,k(u) + J loc u,(cid:96)(u) (cid:107)u − uo(cid:107)2∇2J loc u,(cid:96) (u) is quadratic with (14) u,(cid:96) denotes the Hessian matrix of J loc where ∇2J loc by any positive semi-definite matrix Σ, i.e., (cid:107)u(cid:107)2 characterization of eigenvalues [13, Sec. 3.1], we approximate ∇2J loc (cid:107)u − uo(cid:107)2∇2J loc Minimizing (14) in two successive steps yields: ≈ b(cid:96)k(cid:107)u − uo(cid:107)2. u,(cid:96) u,(cid:96)(u) with respect to u, and (cid:107)u(cid:107)2 Σ is the squared norm of u weighted Σ = u∗Σu. Following an argument based on the Rayleigh-Ritz u,(cid:96) by a multiple of the identity matrix, so that (cid:88) φk,n = uk,n−1 − µ∇J loc uk,n = φk,n + µ u,k(uk,n−1) b(cid:96)k(uo − uk,n−1) (cid:96)(cid:54)=k (15) (16) where µ is a positive step size. Its choice to ensure stability of the algorithm will be elaborated on later in Sec. IV. Now, note the following. First, iteration (16) requires knowledge of uo, which is not available. Each node (cid:96) has a readily available, however, an approximation for uo, which is φk,n. Therefore, we replace uo by φk,n in (16). Second, φk,n at node k is generally a better estimate for uo than uk,n−1 since it is obtained by incorporating information from the neighbors through (15). Therefore, we replace uk,n−1 by φk,n in (16). Then, absorbing coefficients b(cid:96)k into another set of nonnegative coefficients that satisfies: a(cid:96)k = 1, and a(cid:96)k = 0 if (cid:96) /∈ Nk, (17) (cid:96)=1 which means that matrix A with entries a(cid:96)k is left-stochastic, using an instantaneous approximation of the gradient, and limiting the summation in (16) to the neighbors of node (cid:96) (see [13], [15] for more details on a similar derivation in the context of single-task diffusion strategies), we can update uk,n as follows: (cid:2)d(cid:96)(n) − x(cid:96),n(Θuk,n−1) − x(cid:96),n(Θ⊥ξ(cid:96),n−1)(cid:3) c(cid:96)kΘ∗ ∗ (cid:96),n x (cid:88) (cid:96)∈Nk φk,n = uk,n−1 + µ uk,n = a(cid:96)kφ(cid:96),n (cid:88) (cid:96)∈Nk (18) (19) where ξk,n−1 is an estimate for the unknown minimizer ξo k, to be evaluated as explained further ahead in (21). N(cid:88) Focusing on the terms that depend on {ξk}N k=1 in (10), and setting parameter u to its optimum value uo, we consider the global cost function over the variables ξk: (cid:110) ξ ⊥Rx,kΘuo(cid:111) − 2 Re (cid:110) kΘ∗ ∗ ∗ dx,kΘ⊥ξk p (cid:111)(cid:17) (cid:48) k(uo) + g (20) ⊥Rx,kΘ⊥ξk + 2 Re (cid:1) (cid:0){ξk}N (cid:16) N(cid:88) N(cid:88) k=1 ξ k=1 kΘ∗ ∗ Jξ,k(ξk) k=1 glob J ξ = = 9 (21) (25) (26) k(ξo where g(cid:48) k) collects all the terms depending only on uo in (10). Now since the parameters ξk are node-specific, if no further constraints are imposed, they can be updated independently of each other via an LMS-type update: ξk,n = ξk,n−1 + µΘ∗ ∗ ⊥x k,n (cid:2)dk(n) − xk,n(Θuk,n−1+ Θ⊥ξk,n−1)(cid:3) At each time instant n, node k updates its parameters uk,n−1 and ξk,n−1 using (18)–(19) and (21), respectively. The local estimate wk,n is then given by: wk,n = Θuk,n + Θ⊥ξk,n (22) It is interesting to note that we can rewrite the algorithm without using the auxiliary variables uk,n and {ξk,n}N by substituting the relations: k=1, uk,n = (Θ∗Θ)−1Θ∗ ⊥Θ⊥)−1Θ∗ ξk,n = (Θ∗ wk,n ⊥wk,n (23) (24) into (18)–(19) and (21), respectively. Selecting C = I N to avoid exchanging raw data and node-specific components, we can implement the update of wk,n−1 to an intermediate value ψk,n as follows: ψk,n (a) = Θφk,n + Θ⊥ξk,n (b) = Θuk,n−1 + Θ⊥ξk,n−1 + µ (cid:104) = wk,n−1 + µSΘx ∗ k,n (ΘΘ∗ + Θ⊥Θ∗ (cid:2)dk(n) − xk,nwk,n−1 (cid:3) (cid:105) k,n[dk(n) − xk,n(Θuk,n−1 + Θ⊥ξk,n−1)] ∗ ⊥)x with SΘ = ΘΘ∗ + Θ⊥Θ∗ ⊥. For step (a), we use (22) with the intermediate value φk,n of uk,n in (18) and ξk,n. Step (b) follows from their adaptation steps (18) and (21). Now substituting (19) in (22) to aggregate the intermediate estimates of uk,n from the neighbors of node k, we arrive at the combination step: wk,n (22) = Θuk,n + Θ⊥ξk,n (c) = Θ a(cid:96)k(Θ∗Θ)−1Θ∗ ψk,n+Θ⊥(Θ∗ ⊥Θ⊥)−1 Θ∗ ⊥ψk,n = a(cid:96)kP Θψ(cid:96),n + P Θ⊥ψk,n (cid:88) (cid:88) (cid:96)∈Nk (cid:96)∈Nk 10 where P Θ = Θ(Θ∗Θ)−1Θ∗ and P Θ⊥ = I L − P Θ are the projection matrices over subspaces Θ and Θ⊥. For step (c), we use (23)–(24) with the intermediate estimate ψk,n. Finally, we arrive at the ATC strategy summarized in Algorithm 1. The first step in (28) is an adaptation step where node k uses the data realizations {dk(n), xk,n} to update its existing estimate wk,n−1 to an intermediate value ψk,n. All other nodes in the network are performing a similar step. The second step in (29) is an aggregation step. To update its intermediate estimate to wk,n, each node k combines the existing estimates of its neighbors in the common latent subspace Θ to build up a common representation, and refines it with a node-specific value in Θ⊥. In the special case when A = I N , so that no information exchange is performed, the ATC strategy reduces to a non-cooperative solution where each node k runs its own individual descent algorithm. Matrix SΘ in the adaptation step (28) is positive-definite. It arises from the calculation of the gradient of (10) with respect to u and ξk. The algorithm can be simplified by replacing SΘ by I L in (28) without compromising the convergence of the method (as analyzed further ahead in Section IV). We then arrive at the recursion: ψk,n = wk,n−1 + µ x ∗ k,n (cid:2)dk(n) − xk,nwk,n−1 (cid:3) (27) Strictly speaking, observe that SΘ = I L if, and only if, the columns of Θ and Θ⊥ form an orthonormal basis of IRL. Note that the adaptation step (27) is the LMS solution for minimizing the cost in (10) with respect to wk. Before leaving this section, we would like to point out that the algorithm described in [31], which addresses direct models by stacking global and local variables in an augmented parameter vector, may be used to solve problem (8), provided that an appropriate variable change is performed in order to make the latent variables uk,n and ξk,n explicit in wk,n. The resulting algorithm has the same performance as Algorithm 1 defined by (28), (29), but, obviously, they do not have the same form since they do not operate in the same domain. This structural difference has a major consequence for Algorithm 1. As already explained, it can be further tuned by replacing the matrix SΘ in (28) by any positive definite matrix while ensuring convergence of the method. This extra degree of freedom will be taken into account in the analysis of the algorithm, where the only condition on SΘ is to be positive definite. We will also show that setting SΘ to I L, besides simplifying Algorithm 1, can greatly improve its performance. B. Node-specific subspace constraints with norm-bounded projections The second formulation we consider is to relax the constraint that node-specific components {k}N k=1 must lie in span(Θ⊥). We now assume that they are norm-bounded in some sense. The problem is formulated as follows: (cid:1) J glob(cid:0)u,{k}N N(cid:88) k=1 min u,{k}N k=1 subject to (cid:107)P Θk(cid:107)2 ≤ ν1, k=1 N(cid:88) k=1 (cid:107)P Θ⊥k(cid:107)2 ≤ ν2 (30) Algorithm 1: ATC diffusion LMS with node-specific subspace constraints Parameters: Preset - positive step-size µ for all agents; - left-stochastic combination matrix A; - full-rank matrix Θ with columns {θ1, . . . , θM}. Initialization: Set initial weights wk,0 = 0 for all k ∈ {1, ..., N}. Algorithm: At each time instant n ≥ 1, and for each agent k, update wk,n as: (cid:2)dk(n) − xk,nwk,n−1 (cid:3) ∗ ψk,n = wk,n−1 +µSΘ x k,n wk,n = a(cid:96)kP Θψ(cid:96),n + P Θ⊥ψk,n (cid:88) (cid:96)∈Nk 11 (28) (29) Since the objective function and the constraints are convex in (u,{k}N formulated as a regularized optimization problem that consists of minimizing a global cost of the form [49]: k=1), the constrained problem (30) can be J glob(cid:0)u,{k}N k=1 N(cid:88) (cid:1) = E(cid:8)dk(n) − xk,n(Θu + k)2(cid:9) + η1 N(cid:88) (cid:107)P Θk(cid:107)2 + η2 (cid:107)P Θ⊥k(cid:107)2 (31) N(cid:88) k=1 k=1 k=1 where η1 and η2 are positive regularization parameters that are related to the bounds ν1 and ν2. Lemma 2: Problem (30) has a unique solution with respect to u and {k}N Proof of Lemma 2 is provided in Appendix B. Other norms such as the general (cid:96)p,q-norm may be used with k in (30), depending on the application. Some form of regularization on u may also be included. However, using the (cid:96)2-norm with k in (30) enables us to solve the problem with respect to wk, without using the auxiliary variables u and {k}N k=1. Indeed, let us rewrite (31) as follows: k=1. J glob(cid:0)u,{wk}N k=1 (cid:1) = E(cid:8)dk(n) − xk,nwk2(cid:9) + η1 N(cid:88) (cid:107)P Θ(wk − Θu)(cid:107)2 + η2 N(cid:88) The optimality condition relative to u gives: k=1 k=1 Θ∗ P Θ(wo k − Θuo) = 0 N(cid:88) k=1 Node k can apply a steepest-descent iteration to minimize the cost in (35) with respect to {wk}N the gradient vector of (35) we get: ∇J glob = (Rx,kwk − pdx) + η1 (Θ∗Θ)−1Θ∗ wo k k=1 (cid:13)(cid:13)(cid:13)P Θwk − 1 N(cid:88) N (cid:0)P Θwk − 1 N(cid:88) (cid:96)=1 P Θw(cid:96) + η2 (cid:13)(cid:13)(cid:13)2 (cid:1) + η2P Θ⊥wk N(cid:88) k=1 (cid:105)∗ P Θw(cid:96) N (cid:96)=1 N(cid:88) k=1 (cid:104) from which the optimal parameter vector uo can be expressed as: N(cid:88) N(cid:88) E(cid:8)dk(n) − xk,nwk2(cid:9) + η1 uo = 1 N k=1 J glob(cid:0){wk}N k=1 (cid:1) = N(cid:88) k=1 Substituting (34) into (32), and using that P Θ is Hermitian and idempotent (i.e., P Θ = P 2 Θ), yields: (cid:107)P Θ⊥wk(cid:107)2 (32) (33) (34) (cid:107)P Θ⊥wk(cid:107)2 (35) k=1. Computing (36) 12 Starting from an initial condition wk,0, we arrive at the steepest descent iteration: (cid:104) (cid:16) wk,n = wk,n−1 − µ (Rx,kwk,n−1 − pdx) + η2P Θ⊥wk,n−1 − µη1 P Θwk,n−1 − 1 N P Θw(cid:96),n−1 N(cid:88) (cid:96)=1 (cid:17) (cid:105) (37) This iteration indicates that the update term involves adding two correction terms to wk,n−1. Among many other forms, we can implement the update in two successive steps by adding one correction term at a time: (cid:104) (Rx,kwk,n−1 − pdx) + η2P Θ⊥wk,n−1 ψk,n = wk,n−1 − µ (cid:16) (cid:17) P Θwk,n−1 − 1 wk,n = ψk,n − µη1 N P Θw(cid:96),n−1 N(cid:88) (cid:105) (cid:96)=1 Step (38) updates wk,n−1 to an intermediate value ψk,n. We now revise (38)–(39) to achieve a diffusion LMS type algorithm. The intermediate value ψ(cid:96),n at node (cid:96) is generally expected to be a better estimate for wo (cid:96) than w(cid:96),n−1 since it is updated by the first step (38). Therefore, we replace w(cid:96),n−1 by ψ(cid:96),n in the second step (39) as follows to get: wk,n = ψk,n − µη1 = (ψk,n−P Θψk,n)+ (cid:16) P Θψk,n − 1 N N(cid:88) (cid:17) (cid:16) N(cid:88) (1−µη1)P Θψk,n+ P Θψ(cid:96),n (cid:96)=1 (cid:96)=1 (cid:17) ψ(cid:96),n µη1 N (40) N for (cid:96) (cid:54)= k, and akk = Observe that P Θ⊥ψk,n = ψk,n − P Θ ψk,n, and introduce the coefficients a(cid:96)k = µη1 1 − µη1 + µη1 N . We get: wk,n = P Θ⊥ψk,n + a(cid:96)kP Θψ(cid:96),n (41) Considering that each node in the network can only share information with its neighbors, and using instantaneous approximations for Rx,k and pdx, we arrive at: ψk,n = (I L − µη2P Θ⊥)wk,n−1 + µx wk,n = a(cid:96)kP Θψ(cid:96),n + P Θ⊥ψk,n (cid:88) ∗ k,n (cid:96)∈Nk (cid:2)dk(n) − xk,nwk,n−1 (cid:3) with akk = 1 − µη1 + µη1 µk, these coefficients are nonnegative and satisfy (cid:80)N Nk for (cid:96) ∈ Nk and (cid:96) (cid:54)= k. Note that, for sufficiently small step-sizes (cid:96)=1 a(cid:96)k = 1 for all k. We will treat these coefficients as free parameters that can be chosen by the designer according to these conditions (i.e., nonnegative coefficients that add Nk and a(cid:96)k = µη1 up to one on each column of matrix A). We summarize this statement in Algorithm 2. Algorithms 1 and 2 employ the same aggregation step in (29) and (45). Node k combines the intermediate estimates of its neighbors in the common subspace Θ without affecting the local contribution in the complementary subspace Θ⊥. The norm constraint (30) in Θ⊥ leads to a leaky-LMS alike term in the adaptation step (44). (38) (39) (42) (43) N(cid:88) (cid:96)=1 Algorithm 2: ATC diffusion LMS with node-specific subspace constraints (norm-bounded projections) Parameters: Preset - positive step-size µ for all agents; - full-rank matrix Θ with columns {θ1, . . . , θM}. Initialization: Set initial weights wk,0 = 0 for all k = 1, ..., N. Algorithm: For each instant n ≥ 1, and for each agent k, update wk,n−1: ψk,n = (I L − µη2P Θ⊥)wk,n−1 + µx a(cid:96)kP Θψ(cid:96),n + P Θ⊥ψk,n wk,n = (cid:88) (cid:96)∈Nk ∗ k,n (cid:2)dk(n) − xk,nwk,n−1 (cid:3) 13 (44) (45) Let us now examine two special cases of Algorithm 2. First, in the case where Θ = 0, problem (31) reduces to a regularized least-mean squares problem with wk = k. That is, the algorithm reduces to the non-cooperative leaky-LMS algorithm. On the other hand, if Θ = I L, the algorithm reduces to diffusion LMS. Before leaving this section, we briefly discuss the complexity of Algorithms 1 and 2. Both algorithms have the same adapt-then-combine structure as the diffusion LMS except that each node needs to project data on Θ and Θ⊥. This means that each node k only needs to update the L× 1 parameter vectors ψk,n and wk,n at each time instant. Next, each node k needs to transmit wk,n to its Nk − 1 neighbors. A projection performed by a matrix-vector product has a computational complexity of O(L log2 L) [50]. All the other operations performed by each node have a complexity of O(L). IV. PERFORMANCE AND CONVERGENCE ANALYSES In this section, we examine the convergence properties and network performance of the proposed adaptive strategies. We shall first describe a convergence framework for a family of distributed algorithms, where Algorithms 1 and 2 are special cases. Quantities specifically related to Algorithms 1 or 2 will be distinguished by superscripts (1) and (2), respectively. In order to perform the analysis, we collect information from across the network into block vectors and matrices. Let us denote by wn and wo the block weight vector at instant n and the block optimum weight vector, both of size LN × 1, that is wn = col{w1,n, . . . , wN,n} wo = col{wo N} 1, . . . , wo We denote the difference between the optimum wo k and the instantaneous estimate wk,n by: vk,n = wo k − wk,n (46) (47) (48) 14 We collect the weight error vectors vk,n from across all nodes into the block weight error vector: vn = col{v1,n, . . . , vN,n} (49) Assumption 1: (Independent inputs) The regression vectors xk,n arise from a stationary random process that is k,nxk,n} > 0. A direct consequence of temporally stationary, white, and independent over space with Rx,k = E{x∗ this condition is that xk,n is independent of v(cid:96),m for all (cid:96) and m ≤ n. A. Mean weight behavior analysis The estimation error in (28) and (44) can be rewritten as a function of vk,n: dk(n) − xk,nwk,n−1 = zk(n) + xk,nvk,n−1 (50) In what follows, we first show that the weight error update relations for both Algorithms 1 and 2 are of the form: vn = Bnvn−1 − µ gn − r, (51) with Bn an LN × LN time-dependent matrix, gn an LN × 1 zero-mean time-dependent vector, and r a constant LN × 1 vector. Consequently, it will be possible to represent their mean weight behavior in the form of a state- transition equation with a bounded driving term: (52) with B = E{Bn−1}. Let H x,n be the block diagonal matrix of size LN × LN, and pzx,n the vector of length LN × 1, defined as follows: E{vn} = B E{vn−1} − r H x,n (cid:44) diag{x N,nxN,n} ∗ ∗ 1,nx1,n, . . . , x N,n} (cid:44) col{z1(n)x ∗ ∗ 1,n, . . . , zN (n)x pzx,n The expectation of H x,n and pxz,n are given by: H x (cid:44) E{H x,n} = diag{Rx,1, . . . , RN,2} 1) Mean weight behavior of Algorithm 1: Define the intermediate weight error vector (cid:101)ψk,n: pzx (cid:44) E{pzx,n} = 0 (cid:101)ψk,n = wo k − ψk,n (cid:101)ψn = col{(cid:101)ψ1,n, . . . ,(cid:101)ψN,n} (53) (54) (55) (56) (57) (58) (59) and collect these vectors from across all nodes into the block weight error vector: for (cid:101)ψn: Subtracting wo k from both sides of the update relation (28), and using relation (50), leads to the update equation (cid:101)ψn = (I LN − µDSΘH x,n)vn−1 − µDSΘpzx,n where DSΘ = diag{SΘ, . . . , SΘ} is an LN × LN block diagonal matrix with SΘ as diagonal entries. Let A = A⊗ I L. Defining DP Θ and DP Θ⊥ as the LN × LN block diagonal matrices with P Θ and P Θ⊥ as diagonal entries, respectively, equation (29) can be written in vector form as: Combining this equation with (59), the weight error update relation can be written in a single expression: Subtracting wo from both sides of the above expression, we have: vn =(cid:0)A(cid:62) vn =(cid:0)A(cid:62) DP Θ + DP Θ⊥ Now we denote several terms in the weight error expression (62) by: wn =(cid:0)A(cid:62) (cid:1)ψn DP Θ + DP Θ⊥ (cid:1)(cid:101)ψn −(cid:0)A(cid:62) DP Θ + DP Θ⊥ DP Θ + DP Θ⊥ − I LN (cid:1)(cid:2)(I LN − µDSΘH x,n)vn−1 − µDSΘpzx,n (cid:1)(I LN − µDSΘH x,n) n =(cid:0)A(cid:62) (cid:1)DSΘpzx,n n =(cid:0)A(cid:62) DP Θ + DP Θ⊥ DP Θ + DP Θ⊥ g(1) r(1) = (A(cid:62) − I LN )DP Θwo, B(1) (cid:1)wo (cid:3) − (A(cid:62) − I LN )DP Θwo 15 (60) (61) (62) (63) (64) (65) (66) (67) (68) (70) (71) (72) and the associated expected values: =(cid:0)A(cid:62) B(1) (cid:44) E{B(1) n } DP Θ + DP Θ⊥ n } = 0 g(1) (cid:44) E{g(1) (cid:1)(I LN − µDSΘH x) With the above notation, the weight error update relation (62) can be written as: vn = B(1) n vn−1 − µ g(1) n − r(1) Taking the expectation on both sides of (68), and using Assumption 1, we arrive at the mean weight behavior for Algorithm 1: E{vn} = B(1) E{vn−1} − r(1) (69) 2) Mean weight behavior of Algorithm 2: Subtracting wo k from both sides of the update relation (44), and using relation (50), yields: Subtracting wo from both sides of (45), we have: (cid:101)ψn = (I − µη2DP Θ⊥ − µH x,n)vn−1 − µ(pzx,n − η2DP Θ⊥ wo) (cid:1)(cid:101)ψn −(cid:0)A(cid:62) (cid:1)wo vn =(cid:0)A(cid:62) (cid:1)(cid:2)(I LN −µη2DP Θ⊥−µH x,n)vn−1 vn =(cid:0)A(cid:62) − µ(pzx,n − η2DP Θ⊥ wo)(cid:3) − (A(cid:62) − I LN )DP Θ wo DP Θ + DP Θ⊥ − I LN DP Θ + DP Θ⊥ DP Θ +DP Θ⊥ Combining this equation with (70), the weight error update relation can be written in a single expression: 16 where we used the fact that I LN = DP Θ +DP Θ⊥ . Next, we denote several terms in the weight error expression (72) by: n =(cid:0)A(cid:62) n =(cid:0)A(cid:62) B(2) DP Θ+DP Θ⊥ DP Θ + DP Θ⊥ g(2) r(2) = (A(cid:62) − I LN)DP Θwo − µη2 (cid:0)A(cid:62) (cid:1)(I LN −µη2DP Θ⊥−µH x,n) (cid:1)pzx,n (cid:1)DP Θ⊥ wo DP Θ + DP Θ⊥ (73) (74) (75) (76) (77) (78) and the associated expected values: =(cid:0)A(cid:62) B(2) (cid:44) E{B(2) n } DP Θ +DP Θ⊥ n } = 0 g(2) (cid:44) E{g(2) (cid:1)(I LN −µη2DP Θ⊥ −µH x) With the above notation, the weight error update relation (72) can be written as: vn = B(2) n vn−1 − µ g(2) n − r(2) Taking the expectation on both sides of (78), and using Assumption 1, we get the mean weight behavior of Algorithm 2: E{vn} = B(2) E{vn−1} − r(2) (79) 3) Stability in the mean: The mean-weight error recursions (69) and (79) are of the same form as (52). The convergence of such recursive state-transition equations, with a bounded driving term, is determined by the stability of matrix B. Algorithm parameters should be chosen to satisfy the mean stability condition ρ(B) < 1, where ρ(·) denotes spectral radius of its matrix argument. In this case, the bias of the algorithm will be given by: E{vn} = −(I LN − B)−1r lim n→∞ (80) We shall now establish two results that provide ranges for selecting the step size µ to ensure convergence in the mean for each algorithm. Theorem 1: (Stability in the mean for Algorithm 1) Assume data model (1) and Assumption 1 hold. We select a doubly stochastic matrix A. Assume {Θ, Θ⊥} forms an orthonormal basis of IRL. Then, for any initial condition, Algorithm 1 asymptotically converges in the mean if the step-size satisfies: maxk λmax(Rx,k) where λmax(·) denotes the maximum eigenvalue of its matrix argument. 0 < µ < 2 (81) Proof: The convergence of (69) is determined by the stability of matrix B(1). The required mean stability condition is met by selecting µ so that: ρ(cid:0)(A(cid:62) DP Θ + DP Θ⊥ )(I LN − µSΘH x)(cid:1) < 1 (82) 17 (83) (84) (85) (86) (87) (88) (cid:13)(cid:13)2 (cid:13)(cid:13)P Θ⊥xi (cid:13)(cid:13)2 i=1 = j=1 aji = 1 with aji ≥ 0, Jensen's inequality guarantees: (cid:13)(cid:13)2(cid:17) i=1 j=1 i=1 j=1 aji P Θxj (cid:1)x DP Θ + DP Θ⊥ (cid:13)(cid:13)2 = aji P Θxj + P Θ⊥xi (cid:13)(cid:13)(cid:0)A(cid:62) (cid:13)(cid:13)(cid:13)2 +(cid:13)(cid:13)P Θ⊥xi Let x = col{x1, . . . , xN} be any block vector of size LN × 1. We have: Given that A is left stochastic, namely,(cid:80)N (cid:13)(cid:13)(cid:13) N(cid:88) (cid:13)(cid:13)(cid:13)2 +(cid:13)(cid:13)P Θ⊥xi (cid:13)(cid:13)(cid:13) N(cid:88) N(cid:88) (cid:16)(cid:13)(cid:13)(cid:13) N(cid:88) (cid:13)(cid:13)(cid:13)2 N(cid:88) (cid:13)(cid:13)(cid:13)2 ≤ N(cid:88) (cid:13)(cid:13)2 (cid:13)(cid:13)P Θxj (cid:13)(cid:13)2(cid:17) ≤ N(cid:88) N(cid:88) N(cid:88) (cid:13)(cid:13)P Θxj (cid:13)(cid:13)2 + N(cid:88) N(cid:88) (cid:13)(cid:13)P Θ⊥xi (cid:13)(cid:13)2 + (cid:13)(cid:13)P Θxj where for step (a) we use that A is right stochastic, namely,(cid:80)N (cid:13)(cid:13) ≤ 1 Consequently, the quantity in (84) can be upper-bounded as follows: (cid:16)(cid:13)(cid:13)(cid:13) N(cid:88) (cid:13)(cid:13)A(cid:62) = (cid:107)x(cid:107)2 N(cid:88) aji P Θxj aji P Θxj i=1 j=1 aji j=1 i=1 j=1 j=1 i=1 j=1 aji (a) = i=1 aji = 1. We conclude that: (89) We know that the spectral radius of any matrix X satisfies ρ(X) ≤ (cid:107)X(cid:107), for any induced norm. Then we have: DP Θ + DP Θ⊥ ρ(cid:0)(A(cid:62) DP Θ + DP Θ⊥ )(I LN − µSΘH x)(cid:1) ≤(cid:13)(cid:13)A(cid:62) (89)≤ (cid:13)(cid:13)I LN − µSΘH x (cid:13)(cid:13) The mean stability condition is thus met by selecting µ so that:(cid:13)(cid:13)I LN − µSΘH x DP Θ + DP Θ⊥ (cid:13)(cid:13) (cid:13)(cid:13)(cid:13)(cid:13)I LN − µSΘH x (cid:13)(cid:13) < 1. In the case where {Θ, Θ⊥} (90) (91) forms an orthonormal basis of IRL, then SΘ = I L. This leads us to the condition in (81). Theorem 2: (Stability in the mean for Algorithm 2) Assume data model (1) and Assumption 1 hold. We select a doubly stochastic matrix A. Then, for any initial condition, Algorithm 2 asymptotically converges in the mean if the step-size satisfies: 0 < µ < 2 maxk λmax(η2P Θ⊥ + Rx,k) (92) Proof: The convergence of (79) is determined by the stability of matrix B(2). Considering that: DP Θ + DP Θ⊥ )(I LN − µη2 DP Θ⊥ − µH x)(cid:1) ≤(cid:13)(cid:13)I LN − µη2 DP Θ⊥ − µH x ρ(cid:0)(A(cid:62) DP Θ + DP Θ⊥(cid:107) ≤ 1, the mean stability condition is met by selecting µ so that(cid:13)(cid:13)I LN − µη2 DP Θ⊥ − (cid:13)(cid:13) < 1. This leads us to the condition in (92). Furthermore, by Weyl's theorem, we have λmax(η2P Θ⊥+Rx,k) ≤ (cid:13)(cid:13) (93) since (cid:107)A(cid:62) µ H x 18 η2 + λmax(Rx,k) since P Θ⊥ and Rx,k are Hermitian matrices and λmax(P Θ⊥) = 1. This leads to the sufficient condition: 0 < µ < 2 η2 + maxk λmax(Rx,k) (94) B. Mean-square error behavior analysis We now study the mean-square error behavior of Algorithms 1 and 2. To this end, we consider the general update Σ of the weight vector vn relation (52) since both algorithms are of this form. From (51), the squared norm (cid:107)vn(cid:107)2 weighted by any positive semi-definite matrix Σ, i.e., (cid:107)vn(cid:107)2 Σ − 2 Re{r Σ = v∗ ∗ΣBnvn−1} − 2µ Re{g nΣvn, satisfies the following relation: nΣ(Bnvn−1 − r)} ∗ − µ2(cid:107)gn(cid:107)Σ + (cid:107)r(cid:107)2 Σ = (cid:107)vn−1(cid:107)2 B∗ (cid:107)vn(cid:107)2 (95) nΣBn Under the independence assumption, and considering that gn includes the zero-mean noise term zn which is independent of any other signal, taking expectations of both sides of (95) leads to: In the above expression, Σ is any positive semi-definite matrix that the user is free to choose in order to derive different performance metrics, and Σ(cid:48) = E{B n} in the second term on the RHS of (96). For the two presented algorithms, G is respectively given by: (A(cid:62) nΣBn}. Let G be the expected value of E{gng∗ ∗ (97) z,N Rx,N} D DP Θ +DP Θ⊥ )∗ z,1Rx,1, . . . , σ2 ∗ SΘ G(1) = (A(cid:62) G(2) = diag{σ2 DP Θ + DP Θ⊥ )DSΘdiag{σ2 z,1Rx,1, . . . , σ2 z,N Rx,N} E{(cid:107)vn(cid:107)2 Σ} = E{(cid:107)vn−1(cid:107)2 Σ(cid:48)} + µ2 trace{ΣE{gng n}} + (cid:107)r(cid:107)2 ∗ Σ − 2 Re(cid:8)E{r ∗ΣBnvn−1}(cid:9) (96) (98) (99) (100) (101) With G, equation (96) is expressed as: E{(cid:107)vn(cid:107)2 Σ} = E{(cid:107)vn−1(cid:107)2 Σ(cid:48)} + µ2trace{ΣG} + (cid:107)r(cid:107)2 Σ − 2 Re(cid:8)r ∗Σ B E{vn−1}(cid:9) Vectorizing matrices Σ and Σ(cid:48) by σ = vec(Σ) and σ(cid:48) = vec(Σ(cid:48)), it can be verified that: where the (LN )2 × (LN )2 matrix K is given by: (cid:48) = Kσ σ K = E{B n ⊗ B (cid:62) n} ≈ B ∗ (cid:62) ⊗ B ∗ The above approximation can be used provided that the step size is sufficiently small so that the influence of the second-degree term in µ can be neglected [13]. Equation (99) can then be expressed as: σ} = E{(cid:107)vn−1(cid:107)2 where we use the notation (cid:107)·(cid:107)Σ and (cid:107)·(cid:107)σ interchangeably, and E{(cid:107)vn(cid:107)2 (cid:16) sn−1 = vec µ2 G + rr Kσ} + s (cid:62) n−1 σ ∗ − 2 Re(cid:8)B E{vn−1}r ∗(cid:9)(cid:17) (102) (103) Theorem 3: (Mean-square stability) Assume data model (1) and Assumption 1 hold. Assume further that the step size µ is sufficiently small to guarantee the stability in the mean of the algorithms, and to ensure that (102) can be used as a reasonable representation for the evolution of the (weighted) mean-square error. Mean-square stability of 19 cooperative algorithms characterized by (51) requires the step-size µ to be chosen such that it ensures the stability of matrix K (in addition to the mean stability condition ρ(B) < 1). Proof: Iterating (102) starting from n = 0, we find that E{(cid:107)vn(cid:107)2 σ} = (cid:107)v0(cid:107)2 n−iKi−1σ (cid:62) K nσ + (104) with initial condition v0 = wo−w0. Provided that K is stable, the first term on the RHS of (104) converges to zero as n → ∞. We know from (52) that E{vn} is bounded because (52) is a BIBO stable recursion with a bounded driving term r. The second term on the RHS of (104) then converges as n → ∞. We conclude that E{(cid:107)vn(cid:107)2 σ} converges to a bounded value as n → ∞, and the algorithm is mean-square stable. i=1 s Theorem 4: (Transient MSD) Consider a sufficiently small step size µ to ensure mean and mean-square stabilities. E{(cid:107)vn(cid:107)2} of the cooperative algorithms characterized by (51), obtained by setting The MSD learning curve ζn = 1 N Σ = 1 N I LN , evolves according to the following recursion for n ≥ 1: (cid:2)(γn−1 + sn−1)(cid:62)vec(I LN ) − (cid:107)v0(cid:107)2 ζn = ζn−1 + 1 N (cid:62) γn = K γn−1 + (K − I (LN )2)(cid:62) sn−1 (cid:3) (I (LN )2−K)K n−1σ n(cid:88) with initial conditions ζ0 = 1 N (cid:107)v0(cid:107)2 and γ0 = 0. Proof: Comparing (104) at instants n and n − 1, we can relate E{(cid:107)vn(cid:107)2 (cid:62) n(cid:88) σ} = E{(cid:107)vn−1(cid:107)2 σ} − (cid:107)v0(cid:107)2 E{(cid:107)vn(cid:107)2 (I (LN )2−K)K n−1σ + s = E{(cid:107)vn−1(cid:107)2 σ} − (cid:107)v0(cid:107)2 Introducing the notation γn−1 = (I (LN )2−K)K n−1σ +s (cid:104) n(cid:88) n−iKi−1 − n−1(cid:88) (cid:62) s i=1 (cid:62) n−1σ+ s i=1 σ} and E{(cid:107)vn−1(cid:107)2 σ} as follows: n−iKi−1σ − n−1(cid:88) n−1−iKi−1σ (cid:62) n(cid:88) n−1−iKi−1(cid:105)(cid:62) n−iKi−1σ−n−1(cid:88) i=1 i=2 (cid:62) (cid:62) s s s (cid:62) n−1−iKi−1σ we can reformulate the recursive expression (107) as follows: i=2 i=1 E{(cid:107)vn(cid:107)2 σ} = E{(cid:107)vn−1(cid:107)2 σ} − (cid:107)v0(cid:107)2 (I (LN )2−K)K n−1σ + (γn−1 + sn−1)(cid:62) σ γn = K (cid:62) γn−1 + (K − I (LN )2)(cid:62) sn−1 with γ0 = 0. To derive the transient curve for the MSD, replace σ by 1 N vec{I LN}. Corollary 1: (Steady-state MSD) If the step size is chosen sufficiently small to ensure mean and mean-square convergence, then the steady-state MSD, defined as ζ∞ = limn→∞ ζn, is given by: ζ∞ = 1 N ∞ (I (LN )2 − K)−1vec(I LN ) (cid:62) s (111) (105) (106) (107) (108) (109) (110) 20 with s∞ = limn→∞ sn determined by (103), using E{v∞} = limn→∞ E{vn} determined by (80). Proof: From expression (102), we get: E{(cid:107)vn(cid:107)2 (I (LN )2−K)σ} = s (cid:62) ∞σ lim n→∞ Observe that the MSD calculation requires us to choose σ that satisfies: This leads to expression (111). (I (LN )2 − K) σ = 1 N vec(I LN ) V. SIMULATIONS (112) (113) In this section, we report simulation results that illustrate the theoretical results. All agents were initialized with zero parameter vectors wk,0 = 0 for all k. Simulated curves were obtained by averaging over 100 runs as we obtained sufficiently smooth curves to check the consistency with theoretical results. A. Algorithm validation We considered a network consisting of 12 agents with interconnections shown in Fig. 1(a). The parameter vectors to be estimated were of length L = 5. The input data xk,n were generated from circularly-symmetric zero-mean complex Gaussian distributions. White input data were considered first, by setting: Next, correlated input data, characterized by the following covariance matrix, were considered: Rx,k = σ2 x,k I 5 √−1 the imaginary unit. The modeling noises zk,n were i.i.d. zero-mean circularly-symmetric Gaussian with j = z,k were sampled from U(0.8, 1.2) and variables, independent of any other signals. The variances σ2 U(0.18, 0.22), respectively. Their values are shown in Fig. 1(b). We considered two sets of subspace basis vectors. The first set is the standard basis: x,k and σ2 Θ1 = [e1, e2, . . . , eM ], (116) where ei denotes a vector of length N with 1 at the ith entry and 0 otherwise. Its orthogonal complementary subspace is spanned by Θ1,⊥ = [eM +1, . . . , eL]. This setup can be interpreted as a variable selection process for  Rx,k = σ2 x,k × 1 −.4 + .3j 1 −.4 − .3j .2 + .1j −.4 − .3j .1 + .05j .02 − .02j .2 − .1j −.4 + .3j 1 .1 − .05j .2 − .1j −.4 + .3j .2 + .1j −.4 − .3j .1 + .05j .2 + .1j −.4 − .3j 1  .02 + .02j .1 − .05j .2 − .1j −.4 + .3j 1 (114) (115) 21 (a) Network topology. (b) Agent input and noise variances. Fig. 1. Network topology and input-noise variances. information exchange, where the first M entries of the optimal parameter vectors are identical across the network. Parameter M was set to 3. The second set of basis vectors is a complex Vandermonde matrix: (117)  Θ2 = 1 e−jψ1 ··· 1 e−jψ2 ··· e−j(L−1)ψ1 e−j(L−1)ψ2 ··· ··· ··· ··· 1 e−jψM ··· e−j(L−1)ψM  with ψk = 2πd sin θk. Matrix Θ2 can represent the array manifold of a uniform linear array (ULA) with inter- λo element space d, operating at wavelength λo with impinging signal directions of angles θk. Parameter M was set to 3, with θ1 = π 2 . We considered three settings to validate the theoretical results. 6 , θ2 = π 4 , θ3 = π 3 and d = λo In the first setting, we assumed that model (6) matches the observation data. The entries of the coefficient vectors k were sampled from the Gaussian distribution N (0, 1). The step-size parameter µ for Algorithm 1 was uo and ξo successively set to 0.01 and 0.02. A uniform combination matrix A with a(cid:96)k = Nk−1 was used. With Θ1, note that matrix SΘ is equal to I 5. With Θ2, it was successively set to ΘΘ∗ + Θ⊥Θ∗ ⊥ as in (29), and to I 5. The transient behavior and the steady-state MSD were determined theoretically. The results with subspace settings Θ1 and Θ2, for white and correlated input data, are shown in Fig. 2. It can be observed that setting SΘ to I 5 for Θ2 leads to a better convergence behavior. For Algorithm 2, we did not set the parameter η1 explicitly but we used the same combination matrix A as for Algorithm 1. Parameters (µ, η2) were set to (0.02, 0.01) with white input data. With correlated input data, the following combinations (µ, η2) were considered: {(0.01, 0.01); (0.01, 0.02); (0.02, 0.01)}. The results are shown in Fig. 3. The simulation results match the theoretical results, and illustrate the trade-off between the convergence speed and the steady-state MSD. It can also be observed with Algorithm 2 that a small value for η2 is preferable since constraining the norm of node-specific components in the complementary subspace Θ⊥ introduces a bias that can degrade the performance. As leaky-LMS, this kind of regularization can improve the stability of the algorithm for some particular problems and practical applications, at the cost of an extra estimation bias. We then considered another scenario in order to illustrate the interest of the extra degree of freedom provided 156211374891210<2x0.80.850.90.9511.051.11.151.2<2z0.180.1850.190.1950.20.2050.210.2150.22123456789101112 22 (a) Using Θ1. (b) Using Θ2. Fig. 2. Learning curves and model validation of Algorithm 1 with different settings. (a) Using Θ1. (b) Using Θ2. Fig. 3. Learning curves and model validation of Algorithm 2 with different settings. (a) Using Θ1. (b) Using Θ2. Fig. 4. Learning curves and model validation of the algorithms using ξk with small variances. by η2 in Algorithm 2. Experimental setups were left unchanged with correlated inputs except for the entries of k, which were sampled from Gaussian distribution N (0, 0.01). We successively set η2 to 0, 0.1 and 1 in order to ξo progressively constrain the variance of ξk. Note that with η2 = 0, Algorithm 2 reduces to Algorithm 1. The results with Θ1 and Θ2 are provided in Fig. 4. The result with non-cooperative LMS is also provided as a reference. In the second setting, we assumed that the node-specific components o k in (6) do not strictly lie in the comple- mentary subspace Θ⊥. To evaluate the robustness of our algorithms and the power of the analytical models, we Iterationn05001000150020002500300035004000MSD(dB)-30-25-20-15-10-50510Simulated transient MSDTheoretical transient MSDTheoretical steady-state MSD7=0:02,whiteinput7=0:01,whiteinput7=0:01,correlatedinput7=0:02,correlatedinputIterationn05001000150020002500300035004000MSD(dB)-30-25-20-15-10-50510Simulated transient MSDTheoretical transient MSDTheoretical steady-state MSD7=0:01,whiteinput7=0:02,correlatedinput7=0:02,whiteinput7=0:01,correlatedinput7=0:01,correlatedinput,S#7=0:01,whiteinput,S#Iterationn05001000150020002500300035004000MSD(dB)-30-25-20-15-10-50510Simulated transient MSDTheoretical transient MSDTheoretical steady-state MSD7=0:02,22=0:01,whiteinput7=0:02,22=0:01,correlatedinput7=0:01,22=0:02,correlatedinput7=0:01,22=0:01,correlatedinputIterationn05001000150020002500300035004000MSD(dB)-25-20-15-10-50510Simulated transient MSDTheoretical transient MSDTheoretical steady-state MSD7=0:01,22=0:01,correlatedinput7=0:02,22=0:01,correlatedinput7=0:02,22=0:01,whiteinput7=0:01,22=0:02,correlatedinputIterationn05001000150020002500300035004000MSD(dB)-30-25-20-15-10-50Simulated transient MSDTheoretical transient MSDTheoretical steady-state MSDnon-cooperative22=0(coincidentwithAlg1)22=0:122=1Iterationn05001000150020002500300035004000MSD(dB)-35-30-25-20-15-10-50510Simulated transient MSDTheoretical transient MSDTheoretical steady-state MSDnon-cooperative22=0(coincidentwithAlg1)22=0:122=1 23 Fig. 5. Learning curves of the algorithms using ξk with small variances. set: o k = Θνo k + Θ⊥ξo k (118) where νo k) lie in span(Θ) but differ from one node to another. The entries of uo and νo k are zero-mean circular Gaussian variables. This setting refers to a non-ideal situation because components k were sampled from Θ(uo + νo Gaussian distributions N (0, 1) and N (0, 0.01), respectively. The step-size µ was set to 0.01 for Algorithms 1 and 2. Parameter η2 in Algorithm 2 was set to 0.01. Subspace Θ1 and white input signals were considered to test the model. The transient behavior and the steady-state MSD were determined theoretically. The simulation results provided in Fig. 5 match the theoretical results, and illustrate that cooperation among nodes can still be beneficial when optimal solutions in the subspace Θ are different but close to each other. This is another illustration of the conclusion reached in [19] for single-task diffusion LMS operating in multitask environments. In the third setting, we exploited the leaky property of Algorithm 2 to promote its use in real applications. It is well known that the (non-cooperative) leaky LMS algorithm introduces an estimation bias compared to the (non- cooperative) LMS, but improves its robustness when applied to practical applications [51]. In particular, it avoids the so-called weight-drift problem of the LMS algorithm [52]. To highlight this phenomenon in the context of diffusion adaptation, we assumed that, say, the last tap/channel of node #1 was failing to work and was providing consistent null-valued readings, i.e., [xn,1]5 = 0 for all n. We also assumed that, e.g., finite-precision effect was corrupting the combination step (29), or (45), with an additive non-zero mean disturbance qk. The poor conditioning of regressors associated with a non-zero mean disturbance is known to possibly lead to a weight-drift problem. We considered the same experimental setup as in the first experiment with the standard basis Θ1. We picked each entry of the random vectors qk according to the Gaussian distribution N (10−4, 10−8). We set η2 to 0.1. All the vectors wk were initialized to 0. Fig. 6 shows the behavior of the weight vector at node #1 for (a) Algorithm 1 with SΘ = I 5, and (b) Algorithm 2. We can observe the drift of the 5th entry of w1 with Algorithm 1. Algorithm 2 alleviates this effect. Iterationn050010001500MSD-30-25-20-15-10-50510Theoreticalsteady-stateMSDTheoreticaltransientMSDSimulatedtransientMSDnon-cooperativeAlgorithm2,22=0:01Algorithm1 24 (a) Weight behavior of Algorithm 1. (b) Weight behavior of Algorithm 2. Fig. 6. Weight behavior of Algorithms 1 and 2 with singular inputs and non-zero mean disturbance. B. Target localization We now consider a target localization problem. Cooperative localization with a diffusion strategy was already addressed in the case of a single target [13], and of multiple nearby targets [4]. We focus here on the case where targets lie in a manifold. To make the presentation clearer, we assumed that the targets were collinear in IR3. Their locations were estimated by the network with 100 nodes shown in Fig. 7(a). Each node randomly selected a target to localize. Let R be a member of the rotation group SO(3) defined by the matrix R = Rx(θx) Ry(θy) Rz(θz), where Rx(θx), Ry(θy) and Rz(θz) are rotation matrices that rotate vectors by an angle of θx,y,z around x, y and z axis, respectively. The coordinate vector wo q of each target q was generated as follows: wo q = R1,2u + qr3 (119) where R1,2 is the matrix composed of the first and second columns of R, and r3 corresponds to the third column of R. As illustrated in Fig. 7(b), this model means that all targets lie on a common line defined by point R1,2u and direction vector r3. Parameter q characterizes the location of each target q on this line. We considered the problem of estimating u (common to all targets) and the parameters q for seven targets. We set the angles and the parameter vectors in (119) as follows: π 6 , θx = v = [1 2](cid:62) θy = π 3 , θz = π 4 1 = 0, 2 = 1, 3 = 3, 4 = 4, 5 = 7, 6 = 7.5, 7 = 9 The distance between each agent k and target q can be expressed in the inner product form: rkq = xkq(wo q − pk) (120) (121) (122) (123) where pk is the location of agent k, and xkq is the unit-norm row vector pointing from pk to wo that agents were aware of their location pk. Let dkq = rkq + xkq pk, that is, dkq = xkq wo q. We assumed q. The problem was to Realpartofw1-0.6-0.4-0.200.20.40.60.811.2Imaginarypartofw1-0.5-0.4-0.3-0.2-0.100.10.20.30.40.50.60.70.80.9151342Realpartofw1-0.6-0.4-0.200.20.40.60.8Imaginarypartofw1-0.4-0.3-0.2-0.100.10.20.30.40.50.613542 25 (a) Network topology. (b) Collinear targets. Fig. 7. Network topology and locations of targets. (a) Network MSD. (b) Estimation results (non-coop. LMS). (c) Estimation results (Algorithm 1). Fig. 8. Estimated network MSD and estimation results for a single realization. q from noisy streaming measurements {dkq(n), xkq,n} collected by each agent k, and governed by the estimate wo linear model [13]: dkq(n) = xkq,nwo q + zkq(n) with kq diag{αk1(n), αk2(n)} xkq,n = [1 − βk(n)] xkq + x ⊥ (124) with zkq(n) a zero-mean temporally and spatially i.i.d. Gaussian noise of variance σ2 z. As shown in (124), the measured direction vector xkq,n was assumed to be a noisy realization of the unit-norm vector pointing from pk to q, with x⊥ kq a unit-norm orthogonal contribution to xkq. Random variables αk1(n), αk2(n), βk(n) and zk(n) were wo zero-mean Gaussian with standard deviation σα1 = σα2 = 0.1, σβ = 0.001 and σz = 0.3, respectively. We ran the (non-cooperative) LMS algorithm at each node, and Algorithm 1, with Θ = R1,2 and Θ⊥ = r3. The step-size µ was set to 0.1. A uniform combination matrix A with a(cid:96)k = Nk−1 was used for Algorithm 1, where Nk denotes the cardinality of the neighborhood of node k. Figure 8(a) compares the MSD of these strategies. Figures 8(b) and 8(c) show one realization of the target locations estimated with the (noncooperative) LMS algorithm and Algorithm 1. This experiment illustrates the advantage of cooperative strategies over the non-cooperative one. 55.25.45.65.86−3−2.8−2.6−2.4−2.2−200.20.40.60.81xyzR1,2ur3xyzIterationn01000200030004000500060007000MSD(dB)-25-20-15-10-5051015Non-cooperativeLMSCooperativealgorithm−10−50−0.500.511.522.5012345x y zTrueEstimated−10−50−0.500.511.522.5012345x y zTrueEsitamted 26 VI. CONCLUSION AND PERSPECTIVES In this paper, we formulated an online multitask adaptation problem that assumes that all tasks share a common latent feature representation, locally refined by node-specific contributions. This model can be extended into inter- esting directions by imposing new constraints, depending on applications. Based on this principle, we derived two cooperative algorithms and analyzed their performance. Although this work considers that common representation subspaces are known a priori, it paves the way towards more general frameworks. APPENDIX A PROOF OF LEMMA 1 The uniqueness of the solution of (8) follows from the strict convexity of (10), which is ensured by the positive definiteness of its Hessian matrix. For the quadratic cost (10), the Hessian matrix with respect to the vector of stacked variables col{u, ξ1, . . . , ξN} is block diagonal [3, App. B], with blocks given by the following matrix X and its transpose:  X 0 Θ∗(cid:0)(cid:80)N 0 X k=1 Rx,k ⊥Rx,1Θ Θ∗ ...  (cid:1)Θ Θ∗Rx,1Θ⊥ . . . Θ∗Rx,N Θ⊥ (cid:62) Θ∗ ⊥Rx,1Θ⊥ 0 ... Θ∗ ⊥Rx,N Θ 0 Θ∗ ⊥Rx,N Θ⊥ ∇2J glob = with X =   (125) where Θ and Θ⊥ have full column rank. The positive definiteness of (125) can be checked by verifying the positive definiteness of each term Θ∗ Rx,kΘ and of the Schur complement relative to the block diagonal corner of X, namely, [53] Schur(X) = Rx,kΘ−Θ∗ Rx,kΘ⊥(Θ∗ ⊥Rx,kΘ⊥)−1Θ∗ (126) ⊥Rx,kΘ(cid:3) N(cid:88) (cid:2)Θ∗ k=1 where each inverse (Θ∗ is positive definite since it is the Schur complement of the block Θ∗ ⊥Rx,kΘ⊥)−1 exists since Θ⊥ has full column rank. Each term inside the summation (126) Rx,k Θ in the positive definite matrix:  Θ∗ Rx,kΘ Θ∗ Θ∗ ⊥Rx,kΘ Θ∗ Rx,kΘ⊥ ⊥Rx,kΘ⊥  = [Θ Θ⊥]∗ Rx,k[Θ Θ⊥] > 0 (127) This guarantees the positive definiteness of (126). It follows that the cost in (10) is strictly convex and has a unique minimizer. APPENDIX B PROOF OF LEMMA 2 Without loss of generality, assume that η1 > η2. Otherwise, replace (129) by: E(cid:8)dk(n) − xk,n(Θu + k)2(cid:9) + η1 N(cid:88) k=1 (cid:107)k(cid:107)2 + (η2 − η1) Recalling that P Θ⊥ = I L − P Θ, the objective function (31) can be written as follows: k=1 J glob(cid:0)u,{k}N J glob(cid:0)u,{k}N N(cid:88) (cid:1) = (cid:1) = (η1 − η2) k=1 k=1 E(cid:8)dk(n) − xk,n(Θu + k)2(cid:9) + η2 N(cid:88) k=1 (cid:107)P Θk(cid:107)2 + N(cid:88) (cid:124) k=1 (cid:123)(cid:122) J glob 1 N(cid:88) k=1 27 (128) (129) (cid:107)P Θ⊥k(cid:107)2 N(cid:88) (cid:107)k(cid:107)2 k=1 (cid:125) The uniqueness of the minimizer of (31) follows from its strict convexity. For the quadratic cost in (129), the 1 with respect to the vector of stacked variables col{u, 1, . . . , N} is again block diagonal, with Hessian of J its blocks determined by the matrix Y below and its transpose: glob ∇2J glob 1 = 0 (cid:62) 0 Y  Y Θ∗(cid:0)(cid:80)N  (cid:1)Θ with Y =  k=1 Rx,k Rx,1Θ ... Rx,N Θ Θ∗Rx,1 Rx,1 + η2 I 0 . . . ... Θ∗Rx,N  Rx,k(Rx,k + η2I)−1Rx,kΘ(cid:3) Rx,N + η2 I 0 (130) (131) (132) (133) (134) The positive definiteness of (130) can be checked by verifying the positive definiteness of each term Rx,k + η2 I and of the Schur complement relative to the right block diagonal corner in (130), namely, [53] N(cid:88) (cid:2)Θ∗ Schur(Y ) = Rx,kΘ−Θ∗ Since they are positive definite, each covariance matrix Rx,k can be decomposed as follows: k=1 Rx,k = U k diag{λk,1, . . . , λk,L} U ∗ k where the λk,i are the eigenvalues of Rx,k, which are real and positive, and U k is the corresponding matrix of eigenvectors. Since U k is an orthonormal matrix, each term in the summation (132) can be written as: Θ∗ =Θ∗ Rx,kΘ − Θ∗ Udiag Rx,k(Rx,k + η2I)−1Rx,kΘ , . . . , λk,L − λ2 k,L k,1 λk,1 − λ2 λk,1+η2 λk,L+η2 (cid:110) (cid:111) ∗Θ > 0 U block diagonal matrix diag{Rx,1+η2I, . . . , Rx,N +η2I} is positive definite. Finally, since (η1−η2)(cid:80)N Since Θ has full column rank, the above matrix and the Schur complement (132) are positive definite. In addition, the k=1 (cid:107)P Θk(cid:107)2 in (129) is convex, problem (129) is strictly convex and problem (30) has a unique solution. 28 REFERENCES [1] J. Chen, C. Richard, A. O. Hero, and A. H. Sayed, "Diffusion LMS for multitask problems with overlapping hypothesis subspaces," in Proc. IEEE Int. Workshop on Machine Learn. for Signal Process. (MLSP), Reims, France, Sept. 2014, pp. 1–6. [2] A. H. Sayed, "Adaptive networks," Proceedings of the IEEE, vol. 102, no. 4, pp. 460–497, 2014. [3] A. H. Sayed, "Adaptation, learning, and optimization over networks," in Foundations and Trends in Machine Learning, vol. 7, pp. 311–801. NOW Publishers, Boston-Delft, Jul. 2014. [4] J. Chen, C. Richard, and A. H. Sayed, "Multitask diffusion adaptation over networks," IEEE Trans. Signal Process., vol. 62, no. 16, pp. 4129–4144, Aug. 2014. [5] D. P. Bertsekas, "A new class of incremental gradient methods for least squares problems," SIAM J. Optimiz., vol. 7, no. 4, pp. 913–926, Nov. 1997. [6] M. G. Rabbat and R. D. Nowak, "Quantized incremental algorithms for distributed optimization," IEEE J. of Sel. Topics Areas Commun., vol. 23, no. 4, pp. 798–808, Apr. 2005. [7] D. Blatt, A. O. Hero, and H. Gauchman, "A convergent incremental gradient method with constant step size," SIAM J. Optimiz., vol. 18, no. 1, pp. 29–51, Feb. 2007. [8] C. G. Lopes and A. H. Sayed, "Incremental adaptive strategies over distributed networks," IEEE Trans. Signal Process., vol. 55, no. 8, pp. 4064–4077, Aug. 2007. [9] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multi-agent optimization," IEEE Trans. Autom. Control, vol. 54, no. 1, pp. 48–61, Jan. 2009. [10] S. Kar and J. M. F. Moura, "Distributed consensus algorithms in sensor networks: Link failures and channel noise," IEEE Trans. Signal Process., vol. 57, no. 1, pp. 355–369, Jan. 2009. [11] K. Srivastava and A. Nedic, "Distributed asynchronous constrained stochastic optimization," IEEE J. Sel. Topics Signal Process., vol. 5, no. 4, pp. 772–790, Aug. 2011. [12] A. H. Sayed, S.-Y Tu, J. Chen, X. Zhao, and Z. Towfic, "Diffusion strategies for adaptation and learning over networks," IEEE Sig. Process. Mag., vol. 30, no. 3, pp. 155–171, May 2013. [13] A. H. Sayed, "Diffusion adaptation over networks," in Academic Press Library in Signal Processing, R. Chellapa and S. Theodoridis, Eds., pp. 323–454. Academic Press, Elsevier, 2014. [14] C. G. Lopes and A. H. Sayed, "Diffusion least-mean squares over adaptive networks: Formulation and performance analysis," IEEE Trans. Signal Process., vol. 56, no. 7, pp. 3122–3136, Jul. 2008. [15] F. S. Cattivelli and A. H. Sayed, "Diffusion LMS strategies for distributed estimation," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1035–1048, Mar. 2010. [16] J. Chen and A. H. Sayed, "Diffusion adaptation strategies for distributed optimization and learning over networks," IEEE Trans. Signal Process., vol. 60, no. 8, pp. 4289–4305, Aug. 2012. [17] J. Chen and A. H. Sayed, "Distributed Pareto optimization via diffusion strategies," IEEE J. Sel. Topics Signal Process., vol. 7, no. 2, pp. 205–220, Apr. 2013. [18] S.-Y. Tu and A. H. Sayed, "Diffusion strategies outperform consensus strategies for distributed estimation over adaptive networks," IEEE Trans. Signal Process., vol. 60, no. 12, pp. 6217–6234, Dec. 2012. [19] J. Chen, C. Richard, and A. H. Sayed, "Diffusion LMS over multitask networks," IEEE Trans. Signal Process., vol. 63, no. 11, pp. 2733–2748, Jun. 2015. [20] R. Abdolee, B. Champagne, and A. H. Sayed, "Estimation of space-time varying parameters using a diffusion LMS algorithm," IEEE Trans. Signal Process., vol. 62, no. 2, pp. 403–418, Jan. 2014. [21] Y. Hirata, D. P. Mandic, H. Suzuki, and K. Aihara, "Wind direction modelling using multiple observation points," Philosophical Transactions of the Royal Society A, vol. 366, pp. 591–607, 2008. [22] R. Nassif, C. Richard, A. Ferrari, and A. H. Sayed, "Multitask diffusion LMS with sparsity-based regularization," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Brisbane, Australia, 2015, pp. 3516–3520. 29 [23] X. Zhao and A. H. Sayed, "Distributed clustering and learning over networks," IEEE Trans. Signal Process., vol. 63, no. 13, pp. 3285–3300, Jul. 2015. [24] J. Chen, C. Richard, and A. H. Sayed, "Adaptive clustering for multitask diffusion networks," in Proc. European Signal Process. Conf. (EUSIPCO), Nice, France, Sept. 2015, pp. 200–204. [25] R. Nassif, C. Richard, J. Chen, A. Ferrari, and A. H. Sayed, "Diffusion LMS over multitask networks with noisy links," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Shanghai, China, 2016. [26] S. Monajemi, K. Eftaxias, S. Sanei, and Ong S.-H., "An informed multitask diffusion adaptation approach to study tremor in Parkinson's disease," IEEE J. Sel. Topics Signal Process., vol. 10, no. 7, pp. 1306–1314, Oct. 2016. [27] Y. Wang, W. P. Tay, and W. Hu, "Multitask diffusion LMS with optimized inter-cluster cooperation," in Proc. IEEE Stat. Signal Process. Workshop (SSP), Palma de Mallorca, Spain, 2016, pp. 1–5. [28] N. Roula, C. Richard, A. Ferrari, and A. H. Sayed, "Proximal multitask learning over networks with sparsity-inducing coregularization.," IEEE Trans. Signal Process., vol. 64, no. 23, pp. 6329–6344, Dec. 2016. [29] S. Monajemi, S. Sanei, Ong S.-H., and A. H. Sayed, "Adaptive regularized diffusion adaptation over multitask networks," in Proc. IEEE Int. Workshop on Machine Learn. for Signal Process. (MLSP), Boston, USA, Sept. 2015, pp. 1–5. [30] S. Khawatmi, A. M. Zoubir, and A. H. Sayed, "Decentralized clustering over adaptive networks," in Proc. European Signal Process. Conf. (EUSIPCO), Nice, France, 2015, pp. 2696–2700. [31] J. Plata-Chaves, N. Bogdanovi´c, and K. Berberidis, "Distributed diffusion-based LMS for node-specific adaptive parameter estimation," IEEE Trans. Signal Process., vol. 63, no. 13, pp. 3448–3460, Jul. 2015. [32] J. Plata-Chaves, H. H. Bahari, M. Moonen, and A. Bertrand, "Unsupervised diffusion-based LMS for node-specific parameter estimatin over wireless sensor networks," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Shanghai, China, Mar. 2016, pp. 4159–4163. [33] A. Bertrand and M. Moonen, "Distributed adaptive node-specific signal estimation in fully connected sensor networks – Part I: sequential node updating," IEEE Trans. Signal Process., vol. 58, no. 10, pp. 5277–5291, Oct. 2010. [34] A. Bertrand and M. Moonen, "Distributed adaptive estimation of node-specific signals in wireless sensor networks with a tree topology," IEEE Trans. Signal Process., vol. 59, no. 5, pp. 2196–2210, May 2011. [35] N. Bogdanovi´c, J. Plata-Chaves, and K. Berberidis, "Distributed incremental-based LMS for node-specific adaptive parameter estimation," IEEE Trans. Signal Process., vol. 62, no. 20, pp. 5382–5397, Oct. 2014. [36] J. Chen, S. K. Ting, C. Richard, and A. H. Sayed, "Group diffusion LMS," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Shanghai, China, March 2016. [37] J. Baxter, "A model of inductive bias learning," J. Artif. Intell. Res., vol. 12, no. 1, pp. 149–198, Feb. 2000. [38] R. K. Ando and T. Zhang, "A framework for learning predictive structures from multiple tasks and unlabeled data," J. Mach. Learn. Res., vol. 6, pp. 1817–1853, 2005. [39] J. Zhou, J. Chen, and J. Ye, "Clustered multi-task learning via alternating structure optimization," in Proc. Adv. Neural Inf. Process. Syst., Granada, Spain, Dec. 2011, pp. 702–710. [40] J. Chen, L. Tang, J. Liu, and J. Ye, "A convex formulation for learning shared structures from muliple tasks," in Proc. Ann. Int. Conf. Machine Learning (ICML), Montreal, Canada, Jun. 2009, pp. 137–144. [41] L. Jacob, F. Bach, and J.-P. Vert, "Clustered multitask learning: A convex formulation," Adv. Neural Inf. Process. Syst., vol. 21, pp. 745–752, 2009. [42] G. Obozinski, B. Taskar, and M. Jordan, "Joint covariate selection and joint subspace selection for multiple classification problems," Stat. Comput., vol. 20, no. 2, pp. 231–252, 2010. [43] L. J. Griffiths and C. W. Jim, "An alternative approach to linear constrained adaptive beamforming," IEEE Trans. Antenn. Propag., vol. 30, no. 1, pp. 27–34, Jan. 1982. [44] X. Zhao and A. H. Sayed, "Clustering via diffusion adaptation over networks," in Proc. Int. Workshop Cognitive Inf. Process. (CIP), Parador de Baiona, Spain, May 2012, pp. 1–6. 30 [45] R. Nassif, C. Richard, A. Ferrari, and A. H. Sayed, "Performance analysis of multitask diffusion adaptation over asynchronous networks," in Proc. Asilomar Conf. Signals, Systems and Computers (ASILOMAR), Pacific Grove, CA, USA, Nov. 2014, pp. 788–792. [46] J. Chen and C. Richard, "Performance analysis of diffusion LMS in multitask networks," in Proc. IEEE Int. Workshop on Compt. Adv. in Multi-Sensor Adaptive Process. (CAMSAP), Saint Martin, France, Dec. 2013, pp. 137–140. [47] J. Plata-Chaves, N. Bogdanovi´c, and K. Berberidis, "Distributed incremental-based RLS for node-specific parameter estimation over adaptive networks," in Proc. European Signal Process. Conf. (EUSIPCO), Marrakech, Morocco, Sept. 2013, pp. 1–5. [48] N. Bogdanovi´c, J. Plata-Chaves, and K. Berberidis, "Distributed diffusion-based LMS for node-specific parameter estimation over adaptive networks," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Florence, Italy, May 2014, pp. 7223–7227. [49] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004. [50] I. Gohberg and V. Olshevsky, "Fast algorithms with preprocessing for matrix-vector multiplication problems," J. Complexity, vol. 10, no. 4, pp. 411–427, 1994. [51] A. H. Sayed, Fundamentals of Adaptive Filtering, J. Wiley & Sons, Hoboken, NJ, 2003. [52] V. H. Nascimento and A. H. Sayed, "Unbiased and stable leakage-based adaptive filters," IEEE Trans. Signal Process., vol. 47, no. 12, pp. 3261–3276, 1999. [53] F. Zhang, The Schur Complement and its Applications, Springer, 2005.
1803.11457
1
1803
2018-03-30T13:47:36
Co-evolution and morphogenetic systems
[ "cs.MA", "cs.CY" ]
The emerging field of morphogenetic engineering proposes to design complex heterogeneous system focused on the paradigm of emergence. Necessarily at the interface of disciplines, its concepts can be defined through multiple viewpoints. This contribution aims at linking a co-evolutionary perspective on such systems with morphogenesis, and therein at bringing a novel conceptual approach to the bottom-up design of complex systems which allows to fully consider co-evolutive processes. We first situate systems of interest at the interface between biological and social systems, and introduce a multidisciplinary perspective on co-evolution. Building on Holland's signals and boundaries theory of complex adaptive systems, we finally suggest that morphogenetic systems are equivalent to combinations of co-evolutionary niches. This introduces an entry to morphogenetic engineering focused on co-evolution between components of a system. Applications can be found in a broad range of subjects, which we illustrate with the example of planning in territorial systems, suggesting an extended scope for the relevance of morphogenetic engineering concepts.
cs.MA
cs
Co-evolution and morphogenetic systems Juste Raimbault1,2 1UPS CNRS 3611 ISC-PIF, Paris, France 2UMR CNRS 8504 G´eographie-cit´es, Paris, France [email protected] Abstract The emerging field of morphogenetic engineering proposes to design complex heterogeneous system focused on the paradigm of emergence. Necessarily at the interface of disciplines, its concepts can be defined through multiple viewpoints. This contribution aims at linking a co- evolutionary perspective on such systems with morphogenesis, and therein at bringing a novel conceptual approach to the bottom-up design of com- plex systems which allows to fully consider co-evolutive processes. We first situate systems of interest at the interface between biological and social systems, and introduce a multidisciplinary perspective on co-evolution. Building on Holland's signals and boundaries theory of complex adaptive systems, we finally suggest that morphogenetic systems are equivalent to combinations of co-evolutionary niches. This introduces an entry to mor- phogenetic engineering focused on co-evolution between components of a system. Applications can be found in a broad range of subjects, which we illustrate with the example of planning in territorial systems, sug- gesting an extended scope for the relevance of morphogenetic engineering concepts. 1 Introduction The standard opposition between bottom-up self-organized systems and top- down architected has been challenged by the field of morphogenetic engineering (ME), which focuses on the design of systems from the bottom-up: tuning the behavior of agents and processes at the micro level allows in this paradigm to obtain a desired functionality at the macro level, without any centralization (Doursat et al., 2013). Doursat (2011) identifies two streams of research em- bracing this approach, namely complex systems controlled by Information and Communication Technologies (ICT) and ICT inspired by complex systems, typ- ically in the spirit of bio-inspired designs. Swarm chemistry (Sayama, 2009) is a good illustration how simple rules produce complex emergent patterns in swarm of particles, and how these can be interactively evolved (Sayama et al., 2009). The type of systems to which ME applies stays however limited, as it for example does not grasp social or territorial systems. The theoretical and practical implications of an extension in scope of ME would be significant, as it 1 would for example converge with bottom-up approach to planning for territorial systems (Batty, 2007). We propose here such a extension in scope, in an indirect way through the conceptual exercise of a new entry on morphogenetic systems from the point of view of co-evolution. The aim of this paper is thus twofold: (i) develop the concept of co-evolution and show how it connects to morphogenesis and ME; (ii) show how this link between co-evolution and morphogenesis opens new potentialities for the application of ME concepts. The rest of the paper is organized as follows: we first develop the parallel between biological and social systems, what will suggest the exploration of the concept of co-evolution, on which a multidiscplinary view is then constructed. We recall then the concept of morphogenesis and introduce its connexion with co-evolution. This allows us to conclude with an illustration of a possible scope extension of ME to territorial systems. 2 A parallel between biological and social sys- tems 2.1 Epistemology of life The parallel between social and biological systems is not rare, altough it some- times relies on analogies as for example in West's Scaling theory which applies similar growth equations starting from scaling laws, with however inverse con- clusions concerning the relation between size and pace of life (Bettencourt et al., 2007). Scaling relations do not hold when we try to apply them to a single ant, and they must be applied to the whole ant colony which is then the organism studied. When adding the property of cognition, we confirm that it is the rel- evant level, since the colony shows advanced cognitive properties, such as the resolution of spatial optimization problems, or the quick answer to an external perturbation. Human social organizations, cities, could be seen as organisms ? Banos (2013) extends the metaphor of the urban anthill but recalls that the parallel stops quickly. We can however show that some concepts from the epistemology of biology can be useful to understand social systems. Monod (1970) develops epistemological principles for the study of life. Living organisms answer to three essential properties that differentiate them from other systems: (i) the teleonomy , i.e. the property that these are "objects with a project", project that is reflected in their structure and the structure of artifacts they produce; (ii) the importance of morphogenetic processes in their constitu- tion; (iii) the property of the invariant reproduction of information defining their structure. Monod furthermore introduces research directions towards a theory of cultural evolution. Teleonomy is crucial in social structures, since any organization aims at satisfying a set of objectives, even if in general it will not succeed and the objectives will co-evolve with the organization. This notion of multi-objective optimization is typical of complex socio-technical systems. 2 2.2 Morphogenesis and co-evolution We postulate that the concept of morphogenesis is an essential tool to under- stand social systems, with a definition very similar to the one used in biology. We sum it up as the existence of relatively autonomous processes guiding the growth of the system and implying causal circular relations between form and function, that witness an emergent architecture in the sense of Doursat et al. (2012). For social systems, isolating the system is more difficult and the notion of boundary will be less struct than for a biological system. Finally, the reproduction of information is at the core of cultural evolution, through the transmission of culture and memetics, the difference being that the ratio of scales between the frequency of transmission and mutation and cross- over processes or other non-memetic processes of cultural production is relatively low, whereas is many orders of magnitude in biology. An example shows that the parallel is not always absurd : Gabora and Steel (2017) proposes an auto- catalytic network model for cognition, that would explain the apparition of cultural evolution through processes that are analogous to the ones that occurred at the apparition of life. But even if processes are at the origin analogous, the nature of evolution is then quite different, as show van der Leeuw et al. (2009), Darwinian criteria for evolution being not sufficient to explain the evolution of our organized societies. 2.3 Levels of emergence One point that also must retain our attention is the greater difficulty to define levels of emergence for social systems: Roth (2009) underlines the risk to fall into ontological dead-ends if levels were badly defined. He argues that more generally we must go past the single dichotomy micro-macro that is used as a caricature of the concepts of weak emergence, and that ontologies must often be multi-level and imply multiple intermediate levels. This echoes to the question of the exis- tence of strong emergence in social structures, that in sociological terms corre- sponds to the idea of the existence of "collective beings" (Angeletti and Berlan, 2015). Morin (1980) indeed distinguishes living systems of the second type (multi-cellular) and of the third type (social structures), but precises that the subjects of the latest are necessarily unachieved. This thematic entry on social and biological systems suggests therefore a cru- cial conceptual role of morphogenesis and co-evolution in understanding these systems, and therefore a possible link between morphogenetic systems and co- evolution. We will now develop this concept in more details. 3 A multidisciplinary approach to co-evolution Co-evolution is indeed used in several disciplines, but does not have a unified definition. We propose to take advantage of this disparity of views and con- struct a multidisciplinary approach. We sequentially review several disciplines, 3 starting from biology with a progressive shift to social systems. 3.1 Biology The concept of co-evolution in biology is an extension of the well-known con- cept of evolution, that can be tracked back to Darwin. Durham (1991) recalls the components and systemic structures that are necessary for the presence of evolution, that are: 1. Processes of transmission, implying transmission units and transmission mechanisms. 2. Processes of transformation, that necessitates sources of variation. 3. Isolation of sub-systems such that the effects of previous processes are observable in differentiations. Therefore, a population submitted to constraints (often conceptually syn- thesized as a fitness) that condition the transmission of the genetic heritage of individuals (transmission), and to random genetic mutations (transformation), will indeed be in evolution in the spatial territories it populates (isolation), and by extension the species to which it can be associated. Co-evolution is then defined as an evolutionary change in a characteristic of individuals of a population, in response to a change in a second population, which in turn responds by evolution to the change in the first, as synthesized by Janzen (1980). He furthermore highlights the subtlety of the concept and warns against its unjustified uses: the presence of a congruence between two characteristics that seem adapted one to the other does not necessarily imply a co-evolution, since one species could have adapted alone to one characteristic already present in the other. This rough presentation partly hides the real complexity of ecosystems: pop- ulations are embedded in trophic networks and environments, and co-evolutionary interactions would imply communities of populations from diverse species, as presented by Strauss et al. (2005) under the appellation of diffuse co-evolution. Similarly, spatio-temporal dynamics are crucial in the realization of these pro- cesses: Dybdahl and Lively (1996) study for example the influence of the spatial distribution on patterns of co-evolution for a snail and its parasite, and show that a higher speed of genetic diffusion in space for the parasite drive the co- evolutionary dynamics. The essential concepts to retain from the biological point of view are thus: (i) existence of evolution processes, in particular transmission and transformation; (ii) in circular schemas between populations in the case of co-evolution; and (iii) in a complex territorial frame (spatio-temporal and environmental in the sense of the rest of the ecosystem). 4 3.2 Cultural evolution This development on co-evolution was brought by the parallel between biological and social systems. The evolution of culture is theorized within a proper field, and witnesses many co-evolutive dynamics. Mesoudi (2017) recalls the state of knowledge on the subject and future issues, such as the relation with the cumulative nature of culture, the influence of demography in evolution processes, or the construction of phylogenetic methods allowing to reconstruct branches of past evolutionary trees. To give an example, Carrignon et al. (2015) introduces a conceptual frame for the co-evolution of culture and commerce in the case of ancient societies for which there are archeological data, and proposes its implementation with a multi-agent model which dynamics are partly validated by the study of stylized facts produced by the model. The co-evolution is here indeed taken in the sense of a mutual adaptation of socio-spatial structures, at comparable time scales, in this more general frame of cultural evolution. Cultural evolution would even be indissociable from genetic evolution, since Durham (1991) postulates and illustrates a strong link between the two, that would themselves be in co-evolution. Bull et al. (2000) explore a stylized model including two types of replicant populations (genes and memes) and shows the existence of phase transitions for the results of the genetic evolution process when the interaction with the cultural replicant is strong. 3.3 Sociology The concept was used in sociology and related disciplines such as organisation studies, following the parallel done before the same way as cultural evolution. In the field of the study of organisations, Volberda and Lewin (2003) develop a conceptual frame of inter-organisational co-evolution in relation with internal management processes, but deplore the absence of empirical studies aiming at quantifying this co-evolution. In the context of production systems manage- ment, Tolio et al. (2010) conceptualize an intelligent production chain where product, process and the production system must be in co-evolution. 3.4 Economic geography In economic geography, the concept of co-evolution has also largely been used. The idea of evolutionary entities in economy comes in opposition to the neo- classical current which remains a majority, but finds a more and more relevant echo (Nelson and Winter, 2009). Schamp (2010) proceeds to an epistemological analysis of the use of co-evolution, and opposes the view of a neo-schumpeterian approach to economy which considers the emergence of populations that evolve from micro-economic rules (what would correspond to a direct and relatively isolationist reading of biological evolution) to a systemic approach that would consider the economy as an evolutive system in a global perspective (what would correspond to diffuse co-evolution that we previously developed), to propose a 5 precise characterization that would correspond to the first case, assuming co- evolving institutions. The most important for our purpose is that he underlines the crucial aspect of the choice of populations and of considered entities, of the geographical area, and highlights the importance of the existence of causal circular relations. Diverse examples of application can be given. Colletis (2010) introduces a framework for the co-evolution of territories and technology (questioning for ex- ample the role of proximity on innovations), that reveals again the importance of the institutional aspect. The framework proposed by Ter Wal and Boschma (2011) couples the evolutionary approach to companies, the literature on indus- tries and innovation in clusters, and the approach through complex networks of connexions between the latest in the territorial system. In environmental economics, Kallis (2007) show that "broad" approaches (that can consider most of co-dynamics as co-evolutive) are opposed to stricter approaches (in the spirit of the definition given by Schamp (2010)). 3.5 Geography In geography, the stream of research which is the closest empirically and the- oretically to notions of co-evolution corresponds to the evolutive urban theory. The concept of co-evolution was present since the foundations of the theory (Pumain, 1997): the system of cities as a complex adaptive system is composed of subsystems that are interdependent in a complex way, often with circular causalities. The corrsponding models include this vision in an implicit way, but co-evolution is not explicitly highlighted nor precisely defined, in terms that would be quantifiable or structurally identifiable. Paulus (2004) gives empiri- cal proofs of mechanisms of co-evolution through the study of the evolution of economic profiles of French cities. The interpretation used by Schmitt (2014) is based on an entry by the evolutive urban theory, and fundamentally consists in a reading of systems of cities as highly interdependent entities. 3.6 Physics Finally, we can mention that the term of co-evolution is also used in physics. Its use for physical systems may induce some debates, depending if we sup- pose or not that the transmission assumes a transmission of information 1. In the case of a purely physical ontological transmission (physical beings), then a large part of physical systems are evolutive. Hopkins et al. (2008) develop a cosmological frame for the co-evolution of cosmic heterogenous objects which presence and dynamics are difficultly explained by more classical theories (some types of galaxies, quasars, supermassive black holes). Antonioni and Cardillo 1Information is defined within the shanonian theory as an occurence probability for a chain of characters. Morin (1976) shows that the concept of information must indeed be thought conjointly to a given context of the generation of a self-organizing negentropic system, i.e. realizing local decreases in entropy in particular thanks to this information. This type of system is necessarily alive. We consider here this complex approach to information. 6 (2017) study the co-evolution between synchronization and cooperation proper- ties within a Kuramoto oscillators network. 3.7 A synthetic definition of co-evolution Most of these approaches fit in the theory of complex adaptive systems de- veloped by Holland (2012): it takes any system as an imbrication of systems of boundaries, that filter signals or objects. Within a given limit, the corre- sponding subsystem is relatively autonomous from the outside, and is called an ecological niche, in a direct correspondence with highly connected communities within trophic or ecological networks. This way, interdependent entities within a niche are said to be co-evolving. We will come back on that approach below, when establishing the link with morphogenesis. We retain from this multidisciplinary view of co-evolution the following im- portant points: 1. The presence of evolution processes is primary, and their definition is al- most always based on the existence of transmission and transformation processes. 2. Co-evolution assumes entities or systems, belonging to distinct classes, which evolutive dynamics are coupled in a circular causal way. Approaches can differ depending on the assumptions of populations of these entities, singular objects, or components of a global system then in mutual inter- dependency without a direct circularity. 3. The delineation of systems and subsystems, both in the ontological space (definition of studied objects), but also in space and time, and their distri- bution in these spaces, is fundamental for the existence of co-evolutionary dynamics, and it seems in a large number of cases, of their empirical char- acterization. We propose therefore a synthetic entry for the specific case of transporta- tion networks and territories, echoing these points. It verifies the three following specifications. First of all, evolutive processes correspond to transformations of components of the system at the different scales: for the example of territorial systems transformation of cities on the long time, of their networks, trans- mission between cities of socio-economic characteristics carries by microscopic agents but also cultural transmission, reproduction and transformation of agents themselves (firms, households, operators)2. These evolutive processes may imply a co-evolution. Within a territorial system, can simultaneously co-evolve: (i) given entities (a given infrastructure and given characteristics of a given territory for example, i.e. individuals), when their mutual influence will be circularly causal (at the corresponding scale); (ii) 2This list is based on assumptions of the evolutive urban theory developed by Pumain (2008). It can not be exhaustive, since what would be the "ADN of a city" remains an open question. 7 populations of entities, what will be translated for example as such type of in- frastructure and given territorial components co-evolve at a statistical level in a given geographical region; (iii) all the components of a system when there exists strong global interdependencies at a large scale. Our approach is thus funda- mentally multi-scale and articulates different significations at different scales. Finally, the constraint of an isolation implies, in relation with the previous point, that co-evolution and the articulation of significations will have a meaning if there exists spatio-temporal isolations of subsystems in which different co- evolutions operate. 4 Morphogenesis Morphogenesis is at the very heart of concepts in ME. We have furthermore seen that it naturally arises when comparing biological and social systems. We will precise now its meaning and unveil its link with co-evolution. 4.1 Definition of morphogenesis The morphogenesis of a system consists in evolution rules that produce the emer- gence of its successives states and its form. It corresponds to self-organization, with the additional property that an emergent architecture exists (Doursat et al., 2012), in the sense of causal circular relations between the form and the function. Morphogenesis can be tracked back to first contributions in biology such as (Thompson, 1942), but the first interdisciplinary perspective can be with few doubts attributed to Turing (1952) which introduced a reaction-diffusion model to explain the growth of the embryo. Progresses towards the understanding of embryo morphogenesis (in particular the isolation of particular processes pro- ducing the differentiation of cells from an unique cell) have been made only re- cently with the use of complexity approaches in integrative biology (Delile et al., 2016). To show how morphogenesis applies to social systems, we can consider the ex- ample of urban systems. The idea of urban morphogenesis, i.e. of self-consistent mechanisms that would produce the urban form, is used in the field of architec- ture and urban design (as for example the generative grammar of "Pattern Lan- guage" of Alexander (1977)), in relation with theories of urban form (Moudon, 1997). This idea can be pushed to small spatial extents such as the one of the building (Whitehand et al., 1999) but it is in our case more relevant to consider it at a mesoscopic scale, in terms of land-use changes within an intermediate scale of territorial systems, with similar ontologies as the urban morphogenesis modeling literature. For example Bonin et al. (2012) describes a model of ur- ban morphogenesis with qualitative differentiation, whereas Makse et al. (1998) give a model of urban growth based on a mono-centric population distribution perturbed with correlated noises. Raimbault et al. (2014) show with a model of co-evolution between transportation networks and housing how the interplay 8 between the urban form and functions plays a determining role in the emergent behavior of the urban system. The concept of morphogenesis is important in our approach in link with modularity and scale. Modularity of a complex system consists in its decom- position into relatively independent sub-modules, and the modular decompo- sition of a system can be seen as a way to disentangle non-intrinsic correla- tions (Kolchinsky et al., 2015) (what can be thought in analogy to a block di- agonalisation of a first order dynamical system). In the context of large-scale cyber-physical systems design and control, similar issues naturally raise and specific techniques are needed to scale up simple control methods (Wang et al., 2017). The isolation of a subsystem yields a corresponding characteristic scale. Isolating possible morphogenesis processes implies a controlled extraction (con- trolled boundary conditions e.g.) of the considered system, corresponding to a modularity level and thus a scale. When local processes are not enough to explain the evolution of a system (with reasonable variations of initial condi- tions), a change in scale is necessary, caused by an underlying phase transition in modularity. Finally, it is important to remark that a subsystem for which morphogenesis makes sense, which boundaries are well defined and which processes allow it to maintain itself as a network of processes, is close to an auto-poietic system in the extended sense of Bourgine and Stewart (2004)3. These systems regulate then their boundary conditions, what underlines the importance of boundaries that we will finally develop. 4.2 Linking morphogenesis and co-evolution We can now introduce the link between morphogenesis and co-evolution. It is build on Holland's approach to complex adaptive systems (CAS) with his theory of CAS as agents which fundamental property is to process signals through to their boundaries (Holland, 2012). In this theory, complex adaptive systems form aggregates at diverse hierarchical levels, which correspond to different level of self-organization, and boundaries are vertically and horizontally entangled in a complex way. That approach introduces the notion of niche as a relatively inde- pendent subsystem in which resources circulate (the same way as communities in a network): numerous illustrations such as economical niches or ecological niches can be given. Agents within a niche are then said to be co-evolving. This notion of co-evolution coincides with the definition we gave, in partic- ular at the level of a population of entities. The decomposition of a system in niches relates then to the modular decomposition that came in the morpho- genesis approach. We postulate therefore the following fundamental conceptual link: the presence of morphogenetic processes in a system is equivalent to a de- composition in niches in which its components are co-evolving. In other words, 3Which are however not cognitive, making these morphogenetic systems not alive in the sense of auto-poietic and cognitive. Given the difficulty to define the delineation of cities for example, we will leave open the issue of the existence of auto-poietic territorial systems, and will consider in the following a less restrictive point of view on boundaries. 9 the properties of a morphogenetic system are essentially determined by the co- evolutive processes between its elements. This proposition does not fundamentally changes the way to consider mor- phogenetic engineering, but gives a complementary entry, with strong basis in biology and other disciplines. We believe that this epistemological loop demon- strates the relevance of ME to study and design such kind of systems, since it exhibits a correspondence between the core concept of morphogenesis and an approach that is essentially multidisciplinary. This legitimates an extent of the scope of ME, as we will finally illustrate for the case of planning of territorial systems. 5 An example of application: planning of terri- torial systems as morphogenetic engineering Territorial and urban planning correspond to a well established tradition of top- down approach to the design of systems. It has been shown by Hall (1982) that this approach is far from being optimal both in terms of correspondence to the expected evolution of the corresponding territorial system, but also in terms of performance indicators. On the other hand, Jacobs (1961) early suggested that bottom-up processes and neighborhood effects were crucial for the well-being of a city, close to seeing it as a morphogenetic living organism. Planning practices remain however highly architectured and hierarchical. Moreover, the evolutive urban theory (Pumain, 1997) suggests that terri- torial systems are mostly composed of co-evolutive entities. In particular, the interactions and strong interdependencies between cities would be significant drivers of their growth processes (Bretagnolle and Pumain, 2010), through the hierarchical diffusion of innovation which cycles are furthermore a potential explanation for urban scaling laws (Pumain et al., 2006). This type of system integrates co-evolution niches both as system components (the set of co-evolving agents) but also as the spatial support of the system (the regional territories that are relatively modular one to another). The importance of co-evolutive processes in territorial systems and the con- ceptual link we established above suggest the relevance of applying morphogene- sis to territorial systems: considering the appropriated co-evolutive niches, what would be equivalent to the appropriated morphogenetic subsystems, a problem of territorial planning can be mapped to a problem of ME. It would allow to answer questions such as how to obtain a desired territorial functionality from the bottom-up, by local actions on the behavior of agents or local interventions on the urban environment, what is in fact the exact logic of ME applied to the planning of territorial systems. We claim that this transfer could not be made directly, as the notion of morphogenesis of territorial systems is fuzzy and ontologies, scales and boundaries of the considered system would be difficult to consider without the conceptual entry of co-evolution. There naturally remain unanswered questions on the practical implemen- 10 tation of such a bottom-up ME approach to territorial planning, since similar planning approaches applying complex systems paradigms such as fractal cities by Frankhauser et al. (2018) still keep a high level of top-down control. These questions should be the object of future work that can be investigated for ex- ample through modeling. This illustration shows how this conceptual extension of ME by linking mor- phogenesis and co-evolution allows the application of ME to new types of sys- tems, in particular territorial systems that are a given case of socio-technical systems. We believe broader applications should be found, since an action on the theoretical domain of knowledge (here a conceptual development) must im- pact the empirical domain (here the fields of application) because of their close relation (Raimbault, 2017). 6 Conclusion In conclusion, a parallel between biological and social systems done in the spirit of extending the scope of ME has lead us to a multidisciplinary approach to co-evolution. We then linked it with morphogenesis, suggesting an entry to morphogenetic systems from the point of view of co-evolution. The application to the planning of territorial systems as morphogenetic design shows the poten- tialities of this conceptual extension. Our contribution is significant since it is to the best of our knowledge the first time that (i) an approach to co-evolution embracing a broad spectrum of disciplines is introduced; (ii) an explicit link between morphogenesis and co-evolution is proposed. References Alexander, C. (1977). A pattern language: towns, buildings, construction. Oxford university press. Angeletti, T. and Berlan, A. (2015). Les etres collectifs en question. Trac´es. Revue de Sciences humaines, (29):7 -- 22. Antonioni, A. and Cardillo, A. (2017). Coevolution of synchronization and cooperation in costly networked interactions. Physical Review Letters, 118(23):238301. Banos, A. (2013). Pour des pratiques de mod´elisation et de simulation lib´er´ees en g´eographies et shs. HDR. Universit´e Paris, 1. Batty, M. (2007). Cities and complexity: understanding cities with cellular automata, agent- based models, and fractals. The MIT press. Bettencourt, L. M., Lobo, J., Helbing, D., Kuhnert, C., and West, G. B. (2007). Growth, innovation, scaling, and the pace of life in cities. Proceedings of the national academy of sciences, 104(17):7301 -- 7306. Bonin, O., Hubert, J.-P., et al. (2012). Mod`ele de morphog´en`ese urbaine: simulation d'espaces qualitativement diff´erenci´es dans le cadre du mod`ele de l'´economie urbaine. In 49`e colloque de l'ASRDLF. Bourgine, P. and Stewart, J. (2004). Autopoiesis and cognition. Artificial life, 10(3):327 -- 345. 11 Bretagnolle, A. and Pumain, D. (2010). Simulating urban networks through multiscalar space-time dynamics: Europe and the united states, 17th-20th centuries. Urban Studies, 47(13):2819 -- 2839. Bull, L., Holland, O., and Blackmore, S. (2000). On meme -- gene coevolution. Artificial life, 6(3):227 -- 235. Carrignon, S., Montanier, J.-M., and Rubio-Campillo, X. (2015). Modelling the co-evolution In Winter Simulation Conference (WSC), 2015, of trade and culture in past societies. pages 3949 -- 3960. IEEE. Colletis, G. (2010). Co-´evolution des territoires et de la technologie: une perspective institu- tionnaliste. Revue d' ´Economie R´egionale & Urbaine, (2):235 -- 249. Delile, J., Doursat, R., and Peyri´eras, N. (2016). Mod´elisation multi-agent de l'embryogen`ese animale. Mod´elisations, simulations, syst`emes complexes, pages 581 -- 624. Doursat, R. (2011). The myriads of alife: Importing complex systems and self-organization into engineering. In Artificial Life (ALIFE), 2011 IEEE Symposium on, pages 1 -- 8. IEEE. Doursat, R., Sayama, H., and Michel, O. (2012). Morphogenetic engineering: toward pro- grammable complex systems. Springer. Doursat, R., Sayama, H., and Michel, O. (2013). A review of morphogenetic engineering. Natural Computing, 12(4):517 -- 535. Durham, W. H. (1991). Coevolution: Genes, culture, and human diversity. Stanford Univer- sity Press. Dybdahl, M. F. and Lively, C. M. (1996). The geography of coevolution: comparative popu- lation structures for a snail and its trematode parasite. Evolution, 50(6):2264 -- 2275. Frankhauser, P., Tannier, C., Vuidel, G., and Houot, H. (2018). An integrated multifractal modelling to urban and regional planning. Computers, Environment and Urban Systems, 67:132 -- 146. Gabora, L. and Steel, M. (2017). Autocatalytic networks in cognition and the origin of culture. arXiv preprint arXiv:1703.05917. Hall, P. (1982). Great Planning Disasters: With a New Introduction, volume 1. Univ of California Press. Holland, J. H. (2012). Signals and boundaries: Building blocks for complex adaptive systems. MIT Press. Hopkins, P. F., Hernquist, L., Cox, T. J., and Keres, D. (2008). A cosmological framework for the co-evolution of quasars, supermassive black holes, and elliptical galaxies. i. galaxy mergers and quasar activity. The Astrophysical Journal Supplement Series, 175(2):356. Jacobs, J. (1961). The death and life of great american cities. New-York, NY: Vintage. Janzen, D. H. (1980). When is it coevolution. Evolution, 34(3):611 -- 612. Kallis, G. (2007). When is it coevolution? Ecological Economics, 62(1):1 -- 6. Kolchinsky, A., Gates, A. J., and Rocha, L. M. (2015). Modularity and the spread of pertur- bations in complex dynamical systems. Physical Review E, 92(6):060801. Makse, H. A., Andrade, J. S., Batty, M., Havlin, S., Stanley, H. E., et al. (1998). Modeling urban growth patterns with correlated percolation. Physical Review E, 58(6):7054. 12 Mesoudi, A. (2017). Pursuing darwin's curious parallel: Prospects for a science of cultural evolution. Proceedings of the National Academy of Sciences, 114(30):7853 -- 7860. Monod, J. (1970). Le hasard et la N´ecessit´e. Points. Morin, E. (1976). La M´ethode, tome 1. la nature de la nature. Le Seuil. Morin, E. (1980). La M´ethode, tome 2. La Vie de la Vie. Le Seuil. Moudon, A. V. (1997). Urban morphology as an emerging interdisciplinary field. Urban morphology, 1(1):3 -- 10. Nelson, R. R. and Winter, S. G. (2009). An evolutionary theory of economic change. Harvard University Press. Paulus, F. (2004). Co´evolution dans les syst`emes de villes: croissance et sp´ecialisation des aires urbaines fran¸caises de 1950 `a 2000. PhD thesis, Universit´e Panth´eon-Sorbonne-Paris I. Pumain, D. (1997). Pour une th´eorie ´evolutive des villes. Espace g´eographique, 26(2):119 -- 134. Pumain, D. (2008). The socio-spatial dynamics of systems of cities and innovation processes: a multi-level model. The Dynamics of Complex Urban Systems, pages 373 -- 389. Pumain, D., Paulus, F., Vacchiani-Marcuzzo, C., and Lobo, J. (2006). An evolutionary theory for interpreting urban scaling laws. Cybergeo: European Journal of Geography. Raimbault, J. (2017). An applied knowledge framework to study complex systems. In Complex Systems Design & Management, pages 31 -- 45. Raimbault, J., Banos, A., and Doursat, R. (2014). A hybrid network/grid model of urban In 4th International Conference on Complex Systems morphogenesis and optimization. and Applications, pages 51 -- 60. Roth, C. (2009). Reconstruction failures: Questioning level design. In Epistemological Aspects of Computer Simulation in the Social Sciences, pages 89 -- 98. Springer. Sayama, H. (2009). Swarm chemistry. Artificial life, 15(1):105 -- 114. Sayama, H., Dionne, S., Laramee, C., and Wilson, D. S. (2009). Enhancing the architecture of interactive evolutionary design for exploring heterogeneous particle swarm dynamics: An in-class experiment. In Artificial Life, 2009. ALife'09. IEEE Symposium on, pages 85 -- 91. IEEE. Schamp, E. W. (2010). On the notion of co-evolution in economic geography. The handbook of evolutionary economic geography, page 432. Schmitt, C. (2014). Mod´elisation de la dynamique des syst`emes de peuplement: de SimpopLo- cal `a SimpopNet. PhD thesis, Paris 1. Strauss, S. Y., Sahli, H., and Conner, J. K. (2005). Toward a more trait-centered approach to diffuse (co) evolution. New Phytologist, 165(1):81 -- 90. Ter Wal, A. L. and Boschma, R. (2011). Co-evolution of firms, industries and networks in space. Regional studies, 45(7):919 -- 933. Thompson, D. W. (1942). On growth and form. Cambridge University Press. Tolio, T., Ceglarek, D., ElMaraghy, H., Fischer, A., Hu, S., Laperri`ere, L., Newman, S. T., and V´ancza, J. (2010). Species -- co-evolution of products, processes and production systems. CIRP Annals-Manufacturing Technology, 59(2):672 -- 693. 13 Turing, A. M. (1952). The chemical basis of morphogenesis. Philosophical Transactions of the Royal Society of London, 237:1 -- 37. van der Leeuw, S., Lane, D., and Read, D. (2009). The Long-Term Evolution of Social Organization, pages 85 -- 116. Springer Netherlands, Dordrecht. Volberda, H. W. and Lewin, A. Y. (2003). Co-evolutionary dynamics within and between firms: From evolution to co-evolution. Journal of management studies, 40(8):2111 -- 2136. Wang, Y.-S., Matni, N., and Doyle, J. C. (2017). Separable and Localized System Level Synthesis for Large-Scale Systems. arXiv preprint arXiv:1701.05880. Whitehand, J., Morton, N., and Carr, C. (1999). Urban morphogenesis at the microscale: how houses change. Environment and Planning B: Planning and Design, 26(4):503 -- 515. 14
1502.07601
2
1502
2015-03-03T19:15:42
Data Driven Validation Framework for Multi-agent Activity-based Models
[ "cs.MA" ]
Activity-based models, as a specific instance of agent-based models, deal with agents that structure their activity in terms of (daily) activity schedules. An activity schedule consists of a sequence of activity instances, each with its assigned start time, duration and location, together with transport modes used for travel between subsequent activity locations. A critical step in the development of simulation models is validation. Despite the growing importance of activity-based models in modelling transport and mobility, there has been so far no work focusing specifically on statistical validation of such models. In this paper, we propose a six-step Validation Framework for Activity-based Models (VALFRAM) that allows exploiting historical real-world data to assess the validity of activity-based models. The framework compares temporal and spatial properties and the structure of activity schedules against real-world travel diaries and origin-destination matrices. We confirm the usefulness of the framework on three real-world activity-based transport models.
cs.MA
cs
Data Driven Validation Framework for Multi-agent Activity-based Models Jan Drchal, Michal Certick´y, and Michal Jakob Faculty of Electrical Engineering Czech Technical University in Prague [email protected] {certicky,jakob}@agents.fel.cvut.cz Abstract. Activity-based models, as a specific instance of agent-based models, deal with agents that structure their activity in terms of (daily) activity schedules. An activity schedule consists of a sequence of activ- ity instances, each with its assigned start time, duration and location, together with transport modes used for travel between subsequent ac- tivity locations. A critical step in the development of simulation models is validation. Despite the growing importance of activity-based models in modelling transport and mobility, there has been so far no work fo- cusing specifically on statistical validation of such models. In this paper, we propose a six-step Validation Framework for Activity-based Models (VALFRAM) that allows exploiting historical real-world data to assess the validity of activity-based models. The framework compares tempo- ral and spatial properties and the structure of activity schedules against real-world travel diaries and origin-destination matrices. We confirm the usefulness of the framework on three real-world activity-based transport models. 1 Introduction Transport and mobility have recently become a prominent application area for multi-agent systems and agent-based modelling [Chen and Cheng, 2010]. Models of transport systems offer an objective common ground for discussing policies and compromises [de Dios Ort´uzar and Willumsen, 2011], help to understand the underlying behaviour of these systems and aid in the actual decision making and transport planning. Large-scale, complex transport systems, set in various socio-demographic contexts and land-use configurations, are often modelled by simulating the be- haviour and interactions of millions of autonomous, self-interested agents. Agent- based modelling paradigm generally provides a high level of detail and allows representing non-linear patterns and phenomena beyond traditional analytical approaches [Bonabeau, 2002]. Specific subclass of agent-based models, called activity-based models, address particularly the need for realistic representation of travel demand and transport-related behaviour. Unlike traditional trip-based models, activity-based models view travel demand as a consequence of agent's 2 needs to pursue various activities distributed in space and understanding of travel decisions is secondary to a fundamental understanding of activity be- haviour [Jones et al., 1990]. Gradual methodological shift towards such a behaviourally-oriented model- ling paradigm is evident. An early work on the topic is represented by the CARLA model, developed as part of the first comprehensive assessment of behaviourally-oriented approach at Oxford [Jones et al., 1983]. Later work is represented by the SCHEDULER model -- a cognitive architecture producing activity schedules from long- and short-term calendars and perceptual rules [Garling et al., 1994], TRANSIMS -- an integrated system of travel forecasting models, including activity scheduler [Smith et al., 1995], or ALBATROSS -- the first model of complete activity scheduling process automatically estimated from data [Arentze and Timmermans, 2000]. In order to produce dependable and useful results, the model needs to be valid1 enough. In fact, validity is often considered the most important property of models [Klugl, 2009]. The process of quantifying the model validity by deter- mining whether the model is an accurate representation of the studied system is called validation and the validation process needs to be done thoroughly and throughout all phases of model development [Law, 2009]. Despite the growing adoption of activity-based models and the generally acknowledged importance of model validation, a validation process for activity- based models in particular has not yet been standardized by a detailed method- ological framework. Validation techniques and guidelines are addressed in most modelling textbooks [Balci, 1994,Law, 2007] and have even been instantiated in the form of a validation process for general agent-based models [Klugl, 2009]; however, such techniques are still too general to provide concrete, practical methodology for the key validation step: statistical validation against real-world data. In this paper, we address this gap and propose a validation framework en- titled VALFRAM (Validation Framework for Activity-based Models), designed specifically for statistically quantifying the validity of activity-based transport models. The framework relies on the real-world transport behaviour data and quantifies the model validity in terms of clearly defined validation metrics. We illustrate and demonstrate the framework on several activity-based transport models of a real-world region populated by approximately 1 million citizens. 2 Preliminaries 2.1 Activity-based Models Activity-based models [Ben-Akivai et al., 1996] are multiagent models in which the agents plan and execute so-called activity schedules -- finite sequences of ac- tivity instances interconnected by trips. Each activity instance needs to have a 1 Valid model is a model of sufficient accuracy (precision). We use these terms inter- changeably in the following text. 3 specific type (e.g. work, school or shop), location, desired start time and dura- tion. Trips between activity instances are specified by their main transport mode (e.g. car or public transport). 2.2 Validation Methods Validation methods in general are usually divided into two types: -- Face validation subsumes all methods that rely on natural human intelli- gence such as expert assessments of model visualizations. Face validation shows that model's behaviour and outcomes are reasonable and plausible within the frame of the theoretic basis and implicit knowledge of system experts or stake-holders. Face validation is in general incapable of produc- ing quantitative, comparable numeric results. Its basis in implicit expert knowledge and human intelligence also makes it difficult to standardize face validation in a formal methodological framework. In this paper, we therefore focus on statistical validation. -- Statistical validation (sometimes called empirical) employs statistical mea- sures and tests to compare key properties of the model with the data gathered from the modelled system (usually the original real-world system). From a higher-level perspective, VALFRAM can be viewed as an activity- based model-focused implementation of the statistical validation step of a more comprehensive validation procedure for generic agent-based models, introduced in [Klugl, 2009], as depicted in Figure 1. Besides the face and statistical valida- tion, this procedure features other complementary steps such as calibration and sensitivity analysis. Fig. 1: Higher-level validation procedure for agent-based models in general, in- troduced in [Klugl, 2009]. VALFRAM implements the statistical validation step specifically for activity-based models. Being set in the context of activity-based modelling, the VALFRAM frame- work is concerned with the specific properties of activity schedules generated by the agents within the model. These properties are compared to historical real-world data in order to compute a set of numeric similarity metrics. In case of activity-based models, implemented by VALFRAMConcept, Implementation, VerificationRun-able ModelFace ValidationSensitivity AnalysisStatistical ValidationNot validOver-simplificationUnsuccessfulNot plausibleNot successfulPlausible ModelMinimalModelCalibrationPlausibility CheckCalibratedModelDeployableModel 4 3 VALFRAM description In this section a detailed description of VALFRAM is given. We cover validation data, validation objectives and finally measures defined by VALFRAM. 3.1 Data A requirement for statistical validation of any model is data capturing the re- levant aspects of the behaviour of modelled system, against which the model is validated. To validate an activity-based model, the VALFRAM framework requires two distinct data sets gathered in the modelled system: 1. Travel Diaries: Travel diaries are usually obtained by long-term surveys (tak- ing up to several days), during which participants log all their trips. The resulting data sets contain anonymized information about every participant (usually demographic attributes such as age, gender, etc.), and a collec- tion of all their trips with the following properties: time and date, duration, transport mode(s) and purpose (the activity type at the destination). More detailed travel diaries also contain the locations of the origin and the desti- nation of each trip. 2. Origin-Destination Matrix (O-D Matrix): The most basic O-D matrices (sometimes called trip tables) are simple two-dimensional square matrices displaying the number of trips travelled between every combination of origin and destination locations during a specified time period (e.g. one day or one hour). The origin and destination locations are usually predefined, mutually exclusive zones covering the area of interest and their size determines the level of detail of the matrix. In real-world systems, O-D matrices may be obtained by roadside monitoring, household surveys or derived from mobile phone networks [Caceres et al., 2007]. 3.2 VALFRAM Validation Objectives The VALFRAM validation framework is concerned with a couple of specific properties of activity schedules produced by modelled agents. These particular properties need to correlate with the modelled system in order for the model to accurately reproduce the system's transport-related behaviour. At the same time, these properties can actually be validated based on available data sets -- travel diaries and O-D matrices. In particular, we are interested in: A. Activities and their: 1. temporal properties (start times and durations), 2. spatial properties (distribution of activity locations in space), 3. structure of activity sequences (typical arrangement of successive activity types). B. Trips and their: 1. temporal properties (transport mode choice in different times of day; durations of trips), 2. spatial properties (distribution of trip's origin-destination pairs in space), 3. structure of transport mode choice (typical mode for each destination activity type). 5 3.3 VALFRAM Validation Metrics To validate these properties of interest, we need to perform six validation steps (A1, A2, A3, B1, B2, B3), as depicted in Table 1 and detailed in the rest of this section. In each validation step, we compute specific numeric metrics (statis- tics). For all metrics, higher values of these statistics indicate a larger difference between the model and validation set, i.e., lower accuracy. A.Activities B.Trips 1.Time 2.Space 3.Structure distribution Task Compare the distributions of start times and dura- tions for each activity type using Kolmogorov-Smirnov (KS) statistic. Compare of each activity type in 2D space using RMSE. Plot heat maps for additional feedback. i) Compare activity counts within activity schedules using χ2 statistics. ii) Com- pare distributions of activ- ity schedule subsequences as n-grams profiles using χ2 statistics. Data set Travel Diaries Task Compare the distribution of selected modes by time of day and the distribution of travel times by mode using χ2 and KS statistics. Data set Travel Diaries Space-aware Travel Diaries Compute the distance be- tween generated and real- world O-D matrix using RMSE. Origin- Destination Matrix Travel Diaries Compare the distribution of selected transport mode for each type of target activity type using χ2 statistics. Travel Diaries Table 1: Six validation steps of VALFRAM framework and corresponding vali- dation data sets needed for each of them. A1. Activities in Time: The comparison of activity distributions in time is realized by means of a well-established Kolmogorov-Smirnov two-sample statis- tic [Hollander et al., 2013]. VALFRAM applies the method to start time distri- butions p(startact. type) as well as to duration distributions p(durationact. type). The statistic is defined as the maximum deviation between the empirical cumulative distribution functions FM and FV which are based on the model and validation data distributions: dKS = supx FM (x)− FV (x). The values lie in the interval [0, 1]. Figure 2a shows an example application of the Kolmogorov-Smirnov statistic comparing two different models to validation data. A2. Activities in Space: The comparison of activity distributions in space is performed separately for every activity type. Unlike in the previous step, the distributions are two-dimensional (latitude, longitude or projected coordinates). The process consists of the following steps. First, bivariate empirical cumulative distribution functions (ECDFs) FM and FV are constructed using coordinate data for both model and validation data, respectively. Second, FM and FV are 6 (a) work activity start time (b) Modeled area, sleep activity Fig. 2: Start time distributions for work activity shown for validation data and two different models (a) including Kolmogorov-Smirnov statistics. Modelled area including sleep activity spatial PDF visualized as a heat map (b). regularly sampled getting matrices EM and EV both having m rows and n columns. Third, Root Mean Squared Error (RMSE) of the two matrices is com- ij ≤ 1, puted using decdf = the measure decdf is again limited to the [0, 1] interval. ij ≤ 1 and EV /(mn). As EM ij − EV (cid:0)EM (cid:80)n (cid:1)2 ij i=1 j=1 (cid:113)(cid:80)m Figure 2b shows the spatial probability distribution function (PDF) of sleep type activities on the validation set visualized as a heat map. The probability distribution was approximated from data using Gaussian kernels. Similar heat maps might be helpful when developing a model as they can show where problems or imprecisions are. A3. Structure of Activities: In the previous steps, we examined the activity distributions in time and space. In this step, we consider the activity composition of the entire activity schedules. We propose a measure which compares distribu- tions of activity counts in activity schedules as well as a measure comparing the distribution of possible activity type sequences. Activity Count: The comparison of activity counts in activity schedules is based on a well-known Pearson's chi-square test [Sokal and Rohlf, 1994]. The procedure is performed separately for each activity type. First, frequencies f M and f V for the count i are collected for both model and validation data. Va- i lidation data frequencies f V i and in turn validation frequencies sV scaled to match the sum of model's frequen- i i chi-square statistic is computed as i are then used to get count proportions pV and sV i f M i sV i cies ((cid:80) χ2 =(cid:80) i i = (cid:80) (cid:0)f M i − sV i (cid:1)2 i ). Using f M i /sV i . Activity Sequences: We also compare activity sequence distributions. The method is based on the well-established text mining techniques [Cavnar et al., 1994] [Manning, 1999]. Particularly, we compare n-gram profiles using chi-square statis- tic. N-gram is a continuous subsequence of the original sequence having a length exactly n. Consider an example activity schedule consisting of the following activ- ValidationModelAModelB051015200start(h)p(startwork)dKSA=0.56dKSB=0.22 7 ity sequence: (cid:104)none, sleep, work, leisure, sleep, none(cid:105)2. The set of all 2-grams (bigrams) is then: {(cid:104)none, sleep(cid:105),(cid:104)sleep, work(cid:105),(cid:104)work, leisure(cid:105),(cid:104)leisure, sleep(cid:105), (cid:104)sleep, none(cid:105)}. We create an n-gram profile by counting frequencies of all n-grams in a range n ∈ {1, 2,··· , k} for all activity schedules. All the N n-grams are then sorted by their counts in a decreasing order so that the counts are fi ≥ fj for any two n-grams i and j where 1 ≤ i < j ≤ N (for a tie fi = fj one should sort in the lexicographical order). We only work with a proportion P of n-grams having the highest count in the profile. More precisely, we take only the first M i=1 fi is true. n-grams, where M is the highest value for which(cid:80)M i=1 fi ≤ P(cid:80)N In order to compare n-gram profiles of model and validation data, we employ chi-square statistic matching both profiles by the corresponding n-grams (only n-grams found in both profiles are considered). B1. Trips in Time: The validation of trips in time consists of two sub-steps: a comparison of mode distributions for a given time of day and a comparison of travel time distributions for selected modes. Modes by Time of Day: The comparison of mode distributions for a given time of day, i.e., p(modetime range), is based on exactly the same approach which we used to compare activity counts (validation step A3): the χ2 statistic is computed for mode frequencies of trips starting in a selected time interval. We suggest computing χ2 statistic for twenty four one-hour intervals per day, although other partitionings are possible. Travel Times per Mode: Travel time distributions for modes p(travel timemode) are validated in the same way as activities in time (see validation step A1) using Kolmogorov-Smirnov statistic dKS. B2. Trips in Space: In order to validate trip distributions in space, we pro- pose a symmetrical dissimilarity measure based on O-D matrix comparison. The algorithm is realized in three consecutive steps. First, O-D matrices are rear- ranged to use a common set of origins and destinations. Second, both matrices are scaled to make trip counts comparable. Third, RMSE for all elements which have non zero trip count in either of the matrices is computed. The algorithm starts with two O-D matrices: model matrix M and validation matrix V . Each element Mij (or Vij) represents a count of trips between origin i and destination j. The positional information (i.e., latitude/longitude or other type of coordinates) is denoted mi, mj ∈ CM for model and similarly vi, vj ∈ CV for validation data where CM and CV are sets of all possible coordinates (e.g., all traffic network nodes). Note that in most practical cases CM (cid:54)= CV . As an example we can have precise GPS coordinates generated by the model, however, only approximate or aggregated trip locations from validation travel diaries. As we have to work with the same locations in order to compare the O-D matrices, we need to select a common set of coordinates C. In practice, this would be typically the validation data location set (C = CV ) while all locations from CM must be projected to 2 Note, that none activities are added to the beginning and end of the activity schedule in order to preserve information about initial/terminal activity. 8 it by replacing each mi by its closest counterpart in C. This might eventually lead to resizing of the O-D matrix M as more origins/destinations might get aggregated into a single row/column. In many cases the total number of trips in M and V can be vastly different. The second step of the algorithm scales both M and V to a total element sum ij and V (cid:48) of one: M(cid:48) now represents a relative traffic volume between origin i and destination j. . Each element of both M(cid:48) Mij(cid:80) (cid:80) and V (cid:48) ij = j Mij ij i Finally, we compute the O-D matrix distance using the following equation: i j Vij ij = Vij(cid:80) (cid:80) (cid:118)(cid:117)(cid:117)(cid:116) (cid:80) (cid:0)M(cid:48) (cid:80) (cid:12)(cid:12)(cid:8)(i, j) : M(cid:48) j i ij − V (cid:48) ij > 0 ∨ V (cid:48) (cid:1)2 ij > 0(cid:9)(cid:12)(cid:12) . ij dOD = (1) ij, V (cid:48) Note that the equation is RMSE computed over all origin-destination pairs which appear either in M(cid:48) ij or in both. We have decided to ignore the elements which are zero in both matrices as these might represent trips which might not be possible at all (i.e., not connected by the transport network). Possible values ij ≤ 1). of dOD lie in interval [0, 1] (the upper bound is given by M(cid:48) B3. Mode for Target Activity Type: The validation of the mode choice for target activity type is again based on χ2 statistic. Here, we collect counts per each mode for each target activity of choice. ij ≤ 1 and V (cid:48) 4 VALFRAM Evaluation In general, we expect a statistical validation framework to meet three key con- ditions: 1. The framework quantifies the precision of the validated models in a way which allows comparing model's accuracy in replicating different aspects of the beahviour of the modelled system. 2. Data required for validation are available. 3. Validation results produced by the framework correlate with the expectations based on expert insight and face validation. VALFRAM meets conditions 1 and 2 for activity-based models by explic- itly expressing the spatial, temporal and structural properties of activities and trips, using only travel diaries and O-D matrices. To evaluate it with respect to condition 3, we have built three different activity-based models, formulated hypotheses about them based on our expert insight and used VALFRAM to validate both of them. 4.1 Evaluation Models The first model, denoted MA (model A), is a rule-based model inspired by ALBA- TROSS3 [Arentze and Timmermans, 2000]. The second model, denoted MB, is a 3 Although we call MA the rule-based model, it estimates activity count, durations and occasionally start times using linear-regression models based on data. All other activity schedule properties are based on rules constructed using expert knowledge. 9 fully data-driven model based on Recurrent Neural Networks (RNNs). More spe- cifically, the model employs fully-connected Long-Short Term Memory (LSTM) units [Hochreiter and Schmidhuber, 1997] and several sets of softmax output units. Given the training dataset based on travel diaries, the model is trained to repetitively take current activity type and its end time as input in order to pro- duce a trip (including trip duration and main mode) and the following activity (defined by type and duration). As MB is currently unable to generate spatial component of the schedules (e.g., activity locations), VALFRAM steps A2 and B2 are evaluated on a predecessor of MA denoted M(cid:48) Auses a less sophisticated approach to select activity locations. A (model A(cid:48)). M(cid:48) All MA, MB and M(cid:48) A models were used to generate a sample of 100,000 ac- tivity schedules. Our validation set V contained approximately 1,800 schedules. Such a disproportion is typical in reality, since obtaining real-world data tends to be more costly than obtaining synthetic data from model. All the data used in this study cover a single workday. An overview of the modelled area is depicted in Figure 2b. In the following text we present five hypotheses based on our insight of mo- dels. Note that all VALFRAM steps A1 through B3 are performed in order to evaluate them. 4.2 Test Hypotheses Hypothesis 1: The rule-based model MA uses very simple linear classifier for decisions on activity start times, so it will likely perform worse than the RNN- based model in their assignment. On the other hand, the activity scheduler in MA performs schedule optimization, during which it adapts activity durations according to rules psychologically plausible. This should produce more realistic behaviour than the purely data-driven RNN model4. Step A1 of VALFRAM confirms the hypothesis. Figure 3a depicts the distri- butions p(startwork) for validation data V and models MA and MB. The values KS > dB dA KS indicate the higher precision of the RNN model, with the most sig- nificant difference in the case of work and school activities. On the other hand, Figure 3b shows that MA outperforms MB in terms of activity durations. Hypothesis 2: Activity sequences of real-world system tend to be harder to replicate using simple rule-based models than robust data-driven approaches. Results of the step A3 (activity counts) for all the activity types are shown in Table 2. The data-driven model MB outperforms MA with the exception of the leisure activity (which we later found to be insufficiently covered by the RNN training data). Note that both MA and MB give the same χ2 value for the sleep activity which is caused by the fact that both models generate daily schedules having strictly two sleep activities in the current setup. For the step A3 (activity sequences) we got the following results for both models using the proportion P = 0.9 and k = 11 (same as the longest sequence in data): 4 At least given the limited size of the RNN training dataset. 10 (a) start time (b) duration Fig. 3: An example of activity in time comparison. The values of dKS are shown for both models MA and MB. MB outperforms MA on start times while the situation is the opposite for durations. χ2 ≈ 8.4 × 105 for MA and χ2 ≈ 2.6 × 105 for MB showing superiority of the RNN model. Model MA MB sleep 21468.1 21468.1 work 2889.3 255.7 school leisure 1750.3 542.2 293.8 4625.7 shop 974.2 773.8 Table 2: Activity counts for selected activities (χ2 statistic). Model MB outper- forms model MA with the exception of the leisure activity type. Hypothesis 3: While rule-based model optimizes the whole daily activity plans, RNN-based model works sequentially and schedules new activity based only on the previous ones. Therefore, it will be less precise towards the end of the day. By a further analysis of step A3 (activity sequences), which involved the comparison of a set of n-grams having highest frequency difference, we have, indeed, found that the RNN model tends to be less precise towards the end of the generated activity sequence resulting in schedules not ended by the sleep activity in a number of cases. Moreover, Figure 4 shows a comparison of mode by time of day selection χ2 values (step B1) for MA and MB showing that although MB is initially more precise it eventually degrades and the rule-based model MA prevails. Hypothesis 4: Unlike the rule-based model, the RNN model has no access to trip-planning data (i.e., transport network, timetables) which will decrease its performance in selecting trip modes. KS = 0.37 < dB For the step B1 (travel times per mode) we got dA KS = 0.31 for car and dA KS = 0.43 for public transport modes. Results of the step B3 are summarized in Table 3 also supporting the superiority of MA in modelling mode selection. Hypothesis 5: Model M(cid:48) activity location selection. A will be inferior to MA as it uses an oversimplified KS = 0.22 < dB For the step A2 this is clearly demonstrated in Figure 5 by dA ecdf for the leisure and shop activities (only activity types affected by the algorithm ecdf < dA(cid:48) sleepworkschoolleisureshopModelAModelB00.51dKSsleepworkschoolleisureshop00.51dKS 11 Fig. 4: Modes by the time of day. The figure shows a comparison of χ2 values for car and public transport modes for one hour intervals between 3:00 and 23:00. Model MA MB sleep 562 2875.2 work 1371.7 3437.9 school leisure 1120 12817.3 475.1 7286.2 shop 5 2507.3 Table 3: Transport mode selection for target activity type (χ2 statistic). Model MA outperforms model MB in four out of five activity types. OD = 3.7 × 10−4 < dA(cid:48) selecting activity locations). For the step B2 we get dA OD = 4.8 × 10−4 which again supports the hypothesised improvement of A over A(cid:48). Fig. 5: Activities in space: comparison of Model A to Model A(cid:48). M(cid:48) to MA for flexible activities (dA ecdf ) based on 18 × 31 ECDF matrices. ecdf < dA(cid:48) A is inferior 5 Conclusion We have introduced a detailed methodological framework for data-driven statis- tical validation of multiagent activity-based transport models. The VALFRAM framework compares activity-based models against real-world travel diaries and origin -- destination matrices data. The framework produces several validation metrics quantifying the temporal, spatial and structural validity of activity sched- ules generated by the model. These metrics can be used to assess the accuracy of the model, guide model development or compare the model accuracy to other models. We have applied VALFRAM to assess and compare the validity of three activity-based transport models of a real-world region comprising around 1 mil- lion inhabitants. In the test application, the framework correctly identified strong χ234567891011121314151617181920212223ModelAModelB01000200030004000intervalstartsleepworkschoolleisureshopModelAModelA'0.000.020.040.060.08decdf 12 and weak aspects of each model, which confirmed the viability and usefulness of the framework. References Arentze and Timmermans, 2000. Arentze, T. and Timmermans, H. (2000). Albatross: a learning based transportation oriented simulation system. Eirass Eindhoven. Balci, 1994. Balci, O. (1994). Validation, verification, and testing techniques through- out the life cycle of a simulation study. Annals of operations research, 53(1):121 -- 173. Ben-Akivai et al., 1996. Ben-Akivai, M., Bowman, J. L., and Gopinath, D. (1996). Travel demand model system for the information era. Transportation, 23(3):241 -- 266. Bonabeau, 2002. Bonabeau, E. (2002). Agent-based modeling: Methods and tech- niques for simulating human systems. Proceedings of the National Academy of Sci- ences, 99(suppl 3):7280 -- 7287. Caceres et al., 2007. Caceres, N., Wideberg, J., and Benitez, F. (2007). Deriving origin destination data from a mobile phone network. IET, 1(1):15 -- 26. Cavnar et al., 1994. Cavnar, W. B., Trenkle, J. M., et al. (1994). N-gram-based text categorization. Ann Arbor MI, 48113(2):161 -- 175. Chen and Cheng, 2010. Chen, B. and Cheng, H. H. (2010). A review of the applica- tions of agent technology in traffic and transportation systems. IEEE Transactions on Intelligent Transportation Systems, 11(2):485 -- 497. de Dios Ort´uzar and Willumsen, 2011. de Dios Ort´uzar, J. and Willumsen, L. (2011). Modelling Transport. Wiley. Garling et al., 1994. Garling, T., Kwan, M.-p., and Golledge, R. G. (1994). Computational-process modelling of household activity scheduling. Transportation Research Part B: Methodological, 28(5):355 -- 364. Hochreiter and Schmidhuber, 1997. Hochreiter, S. and Schmidhuber, J. (1997). Long short-term memory. Neural computation, 9(8):1735 -- 1780. Hollander et al., 2013. Hollander, M., Wolfe, D. A., and Chicken, E. (2013). Nonpara- metric Statistical Methods. Wiley, 3rd edition. Jones et al., 1983. Jones, P. M., Dix, M. C., Clarke, M. I., and Heggie, I. G. (1983). Understanding travel behaviour. Number Monograph. Jones et al., 1990. Jones, P. M., Koppelman, F., and Orfeuil, J.-P. (1990). Activ- ity analysis: State-of-the-art and future directions. Developments in dynamic and activity-based approaches to travel analysis, pages 34 -- 55. Klugl, 2009. Klugl, F. (2009). Agent-based simulation engineering. PhD thesis, Habil- itation Thesis, University of Wurzburg. Law, 2007. Law, A. M. (2007). Simulation modeling and analysis, 4th edition. McGraw-Hill New York. Law, 2009. Law, A. M. (2009). How to build valid and credible simulation models. In Simulation Conference (WSC), Proceedings of the 2009 Winter, pages 24 -- 33. IEEE. Manning, 1999. Manning, C. D. (1999). Foundations of Statistical Natural Language Processing. MIT press. Smith et al., 1995. Smith, L., Beckman, R., Anson, D., Nagel, K., and Williams, M. E. (1995). Transims: Transportation analysis and simulation system. In Fifth National Conference on Transportation Planning Methods Applications-Volume II: A Com- pendium of Papers Based on a Conference Held in Seattle, Washington. Sokal and Rohlf, 1994. Sokal, R. R. and Rohlf, F. J. (1994). Biometry: The Principles and Practices of Statistics in Biological Research. W. H. Freeman, 3rd edition.
0808.3569
3
0808
2008-09-01T20:34:05
Offloading Cognition onto Cognitive Technology
[ "cs.MA", "cs.CL" ]
"Cognizing" (e.g., thinking, understanding, and knowing) is a mental state. Systems without mental states, such as cognitive technology, can sometimes contribute to human cognition, but that does not make them cognizers. Cognizers can offload some of their cognitive functions onto cognitive technology, thereby extending their performance capacity beyond the limits of their own brain power. Language itself is a form of cognitive technology that allows cognizers to offload some of their cognitive functions onto the brains of other cognizers. Language also extends cognizers' individual and joint performance powers, distributing the load through interactive and collaborative cognition. Reading, writing, print, telecommunications and computing further extend cognizers' capacities. And now the web, with its network of cognizers, digital databases and software agents, all accessible anytime, anywhere, has become our 'Cognitive Commons,' in which distributed cognizers and cognitive technology can interoperate globally with a speed, scope and degree of interactivity inconceivable through local individual cognition alone. And as with language, the cognitive tool par excellence, such technological changes are not merely instrumental and quantitative: they can have profound effects on how we think and encode information, on how we communicate with one another, on our mental states, and on our very nature.
cs.MA
cs
Offloading Cognition onto Cognitive Technology / Page 1 To Appear in: Itiel E. Dror & Stevan Harnad (Eds) Cognition Distributed: How Cognitive Technology Extends Our Minds. Amsterdam: John Benjamins. Offloading Cognition onto Cognitive Technology Itiel E. Dror School of Psychology University of Southampton Southampton , United Kingdom SO171BJ Stevan Harnad Chaire de recherché de Canada Institut des sciences cognitives Université du Québec à Montréal Montréal, Québec, Canada H3C3P8 & School of Electronics and Computer Science University of Southampton Southampton , United Kingdom SO171BJ ABSTRACT: "Cognizing" (e.g., thinking, understanding, and knowing) is a mental state. Systems without mental states, such as cognitive technology, can sometimes contribute to human cognition, but that does not make them cognizers. Cognizers can offload some of their cognitive functions onto their thereby extending technology, cognitive performance capacity beyond the limits of their own brain power. Language itself is a form of cognitive technology that allows cognizers to offload some of their cognitive functions onto the brains of other cognizers. Language also extends cognizers' individual and joint performance powers, distributing the load through interactive and collaborative cognition. Reading, writing, print, telecommunications and computing further extend cognizers' capacities. And now the web, with its network of cognizers, digital databases and software agents, all accessible anytime, anywhere, has become our “Cognitive Commons,” in which distributed cognizers and cognitive technology can interoperate globally with a speed, scope and degree of interactivity inconceivable through local individual cognition alone. And as with language, the cognitive tool par excellence, such technological changes are not merely instrumental and quantitative: they can have profound effects on how we Offloading Cognition onto Cognitive Technology / Page 2 think and encode information, on how we communicate with one another, on our mental states, and on our very nature. Introductory Overview: With the development and wide use of cognitive technologies (Dror, 2007; Dascal & Dror, 2005), questions arise as to their effects on their human users and society, as well as on their own scope and limits: Can cognitive technologies (i) increase cognitive capacities and thus enhance human efficiency? (ii) affect how people and society go about achieving their goals? (iii) highlight and transform how we view ourselves and our goals? (iv) modify how we cognize and thus change our mental states and nature? (v) give rise to new forms of cognition (such as distributed cognition) and mental states that are either distributed across or even embodied in cognitive technology? These issues are examined as follows: (1) The notion of an "extended mind" -- with mental states (i.e., felt states) “distributed” beyond the narrow bounds of the individual brain – is not only as improbable as the notion that the US government can have a distributed migraine headache, but arbitrary. (2) "Cognition" -- if it is simply defined as the ability to do the kinds of things that cognizers like us can do, plus the underlying functional mechanisms for doing them -- can be arbitrarily defined to be as wide or as narrow as we like . (3) Vagueness about the nature, locus and scope of cognizing leads to a dissociation of “cognitive states” from mental states. However, their co- occurrence had been our only basis for distinguishing cognitive performance capacity from other capacities and functionality (animate or inanimate, narrow or wide). (4) If cognitive states are indeed not mental states, it follows that "cognitive technology" is not just something used by cognizers, but a functional part of the cognitive states themselves, because the boundary between user and tool disappears, and cognitive states become merely instances of functional states in general. (5) We then do not need the terms "cognitive" and "distributed cognition" at all, and can just talk about relatively complex and wide or narrow functional states, leaving it a coincidence and mystery (at least at this stage) that every single case of what we used to call “cognitive” also happened to be mental. (6) A way to resolve this is to accept that only mental states are cognitive states, that cognition is only narrow, and that the only place it is "distributed" is within a single cognizer's brain. Offloading Cognition onto Cognitive Technology / Page 3 (7) The only kind of “technology” that might really turn out to be intrinsically cognitive, rather than just being a tool used by cognizers, would be a robot that could pass the Turing Test (TT) -- because such a TT-scale robot would almost certainly have mental states, and hence it would be a cognizer in its own right. (8) Whatever distributed activity was going on within the functional mechanism generating such a TT robot’s performance capacity would then indeed be a case of distributed cognition (exactly as the distributed activity within our own brains is distributed cognition) – even if not all the components of its generating mechanism were located inside the robot’s head. (9) The “cognitive technology” used by such a TT robot, however, would still not be part of its distributed cognitive (hence mental) state, just as it is not a part of ours. (10) Nor would a group of such TT robots, interacting and collaborating, be a case of distributed cognition; it would merely be a case of collaborative cognition among individual (narrow) TT-robot cognizers, just as it is in the case of a group of collaborating human cognizers. (11) Cognitive technology does, however, extend the scope and power of cognition, exactly as sensory and motor technology extends the scope and power of the bodily senses and movement. (12) Just as we can see further with telescopes, move faster with cars, and do more with laser microsurgery than we can do with just our unaided hands and heads, so we can think faster and further, and do more, with language, books, calculators, computers, the web, algorithms, software agents, plus whatever is in the heads of other cognizers. (13) Both sensorimotor technology and cognitive technology extend our bodies’ and brains’ performance capacities as well as giving us the feeling of being able to do more than just our bodies and brains alone can do. (14) Sensorimotor and cognitive technology can thus generate a perceptual change, rather like virtual reality (VR), making us feel a difference in our body image and causal power (perhaps not unlike what the physical metamorphosis from caterpillar to butterfly might feel like, as one sensed one’s newfound somatic capacity to fly). (15) This change in perceived body image is indeed a change in mental state; but although its distal inputs and outputs certainly extend wider than the body (as all sensory inputs and all motor outputs do), the functional mechanism of that altered mental state is still just proximal -- skin and in – exactly as when it is induced by VR technology. Offloading Cognition onto Cognitive Technology / Page 4 (16) Hence, although sensorimotor and cognitive technology can undeniably extend our bodies’ sensorimotor and cognitive performance powers in the outside world, only their sensorimotor input and output contact points with our bodies are part of our cognitive (= mental) state, not the parts that extend beyond. (17) Perhaps it could be otherwise too, as in the case of a hypothetical TT- robot whose generating mechanism is indeed partly located outside its body: Maybe parts of our brain could be removed and still functionally integrated with the rest wirelessly, through telemetry or some other action at a distance: But that would just be a widened, spatially distributed body. (18) The resultant distributed cognitive state would still not be the same thing as considering a telescope, car, library or calculator as parts of a distributed cognitive state (for either a human or a TT robot): Those would still just be parts of the sensorimotor I/O to and from the cognizer’s body. (19) We are not aware of the generating mechanism underlying our cognitive capacity, however, only of its outcome: Hence retrieving a word from memory or retrieving a word via a Google search feels much the same to us. (20) Does the fact that cognizing is a conscious mental state, yet we are unconscious of its underlying functional mechanism, mean that the underlying functional mechanism could include Google, Wikipedia, software agents and other human cognizers’ heads after all? That question is left open for the reader. (21) The worldwide web, a distributed network of cognizers, digital databases and sofware agents, has become our “Cognitive Commons,” in which cognizers and cognitive technology can share cognizing anytime and anywhere, and interact globally with a speed, scope and degree of interactivity that yield distributed cognizing with performance powers inconceivable within the scope of individual cognition. (22) Such changes go beyond mere quantitative increase in efficiency and performance power. As we increase our use and reliance on cognitive technologies, they effect and modify how we cognize, how we do things and what we do. Just as motor technology extended our physical ability and modified our physical life, cognitive technology extends our cognitive ability and modifies our mental life. Part I: What Distributed Cognition Is Not. Meaning: Narrow and Wide. Philosophers, in wrestling with the problem of meaning (“Is meaning in the head or is it in the world?”) have sometimes resorted to Offloading Cognition onto Cognitive Technology / Page 5 saying that there are two kinds of meaning, “narrow” and “wide,” the former located between the ears and the latter distributed across the entire universe -- both the Newtonian universe of distant stars and the Platonic universe of the eternal truths of logic and mathematics. The wide meaning of “apple,” for example, includes not only whatever it is that I may have in mind when I think of or say “apple,” but also what apples really are, out there in the world.1 That, however, is all metaphysics, and concerns the existence and “reality” of some elusive entity called “meaning.” The mission of cognitive science is more modest: Humans and other organisms have certain functional capacities, including metabolism, reproduction, and locomotion. It is clear that each of these capacities is “narrow,” even though it sometimes involves a local interaction between the organism and part of the world around it (be that other organisms or the inanimate world). Performance Capacity. Movement itself, inasmuch as it includes the movements of parts of the organism, and not just the whole of the organism, covers everything that we are able to do; and that, in turn, extends naturally to all of our cognitive capacities – what we are able to think, deduce, understand, etc. – encompassing also the internal mechanisms that generate those capacities. So far, that makes all of cognition narrow: skin and in. It is not that we do not (as in metabolism and reproduction) interact with objects (and skins) outside our own skin. Although usually it is not particularly illuminating to speak of eating and digestion as a dyadic function, “distributed” between predator and prey. Reproductive function is for the most part decidedly dyadic and to that extent distributed more widely than a single organism.2 Distributed Perception? Gibson (1966), too, has stressed that even something as seemingly passive as seeing is in fact interactive, with the locomotory organism perceiving things in terms of their sensorimotor “affordances” – what our dynamic bodies are able to do with external things. Don’t look for the purely sensory property that all “chairs” share: their real invariant is that they afford “sittability upon” – a property that cannot even be defined without reference to the shape and motor capacity of our bodies as well as the shape of things in the external world. Does it follow from this that the perceptual state of perceiving something is a distributed state that includes the perceiving organism as well as the external object or event or action that is being perceived? And – to extend this question further – is the cognitive state of thinking or knowing about something a distributed state, 1 This is even more evident when it comes to what is meant by “superstrings” or “prime number.” 2 In the case of sexual reproduction, ab ovo, and in the case of asexual reproduction, a posteriori, so to speak. Indeed, there is perhaps a lesson to be learned about cognitive function from the two forms of reproductive function, since both are “productive” of something beyond the narrow borders of the particular organism in question. Offloading Cognition onto Cognitive Technology / Page 6 consisting of the cognizing organism plus the external object or event or action (or property or state) that is being cognized (Clark & Chalmers 1998; Wilson 2004)? Let us defer reply until we consider a few more cases, noting only that this question about whether perception/cognition is just (i) internal and local or (ii) internal/external and distributed is similar to the question of whether meaning is narrow or wide. Physical States: Narrow and Wide: A trivial answer would be that every physical state is “distributed” in that nothing is ever causally isolated from everything else. So in singling out (“individuating”) any physical “state” we are individuating an arbitrary subset of the total state of the universe: This chair is not causally isolated from the ground it rests upon, nor the ground from the rest of the planet, spinning about the solar system, etc. By that token, all states are wide – as wide as the world, including oneself, sitting on the chair. But the fact that there is no such thing as an absolutely isolated local entity or state is not what we mean when we ask whether cognitive states are narrow or wide. Otherwise, the state of a toaster, toasting bread, is wide too, and includes not only the toaster and the bread, but also the events transpiring on faraway Alpha Centauri. But, leaving aside the physics and metaphysics of wide causality and action-at-a- distance: what about just the toaster and the bread? Does the “state” of a toaster, toasting bread, include the bread, being toasted? It seems obvious that this distinction, too, is arbitrary, hence trivial: We can include the toaster in a distributed hybrid state and call that a state of the toaster, or a state of toasting. Or we can say that the toaster does what it does, and the bread gets done to it whatever is done to it, but we will consider their states as distinct, acting upon one another (more the toaster acting on the bread than vice versa, unless the toast catches fire) but not a joint, distributed state worth speaking of as such, in useful discussions of either toasters or bread, and their respective functional states and properties. Autonomous Systems. But although there are no states or systems that are completely isolated causally, there are surely “things” – like chairs and bread and toasters -- that are sufficiently isolated to be called autonomous things. Some of these autonomous things will be (again, only relatively) static, like chairs and bread, and some relatively dynamic, like a toaster – if plugged in and functioning. Some of these autonomous things may also be parts of other, wider autonomous things. Toasters have functional parts that can do what they do on their own, in isolation from the toaster. A toaster, in turn, may be part of a more elaborate device that toasts as well as butters, fills and wraps your sandwich; or simply a component in a modular commercial kitchen. So in this approximate way, bracketing the issue of wide causality, we arrive at the notion of autonomous systems, like toasters, composed sometimes of components Offloading Cognition onto Cognitive Technology / Page 7 that are themselves autonomous systems. Let us call those subcomponents autonomous modules, and note that any autonomous system could in principle also be an autonomous module in one (or many) wider autonomous systems. But is a toaster really autonomous? Don’t we have to build it, plug it in to the electrical system, and then put in the bread, and set the level, etc.? Are the toaster and bread and ourselves just part of a still wider distributed system, the one with the real autonomy, while the toaster and the bread are merely “slave” systems, with no autonomy of their own? We cannot avoid extending our relentless questions to asking what we really mean by “autonomy”: Is anything really autonomous, apart from the universe itself, or God almighty? This is again the question of causal isolation, and maybe we can again finesse it by settling for commonsense approximations: A system is autonomous if it can do what it does “on its own.” It’s just that systems differ in what they can do on their own. A toaster is an autonomous system that can only toast bread -- and that, only if a person plugs it in, puts in the bread, presses the switch. A person is an autonomous system that can (among other things) plug in a toaster, put in bread, and press the switch. And so it goes. Both autonomy and functional capacity look modular, and superordinate autonomous systems may include the distributed modularity of many component autonomous systems. We can easily get lost in this mereological maze, so let us avoid the lure of “general system theory” and just note that, yes, there are quasi-autonomous things and quasi-autonomous states, and those things and states may themselves be distributed parts of other, wider quasi-autonomous things and states. That’s all indisputable even before we get to the question of cognizing and distributed cognition. But before we broach that question, we alas have to ask yet another basic question: What is cognition? Cognitive and Vegetative Function. To a first approximation, we have already answered this: cognition is whatever gives cognitive systems the capacity to do what they can do. It is the causal substrate of performance capacity. Cognitive systems (“cognizers”) include ourselves and perhaps other animals (and possibly also extraterrestrial creatures, if they exist). Do they include anything more? Are living systems the only cognizers? Are cognizers necessarily local, or can they be distributed? And is the capacity underlying everything that we cognizers can do cognitive, or only the capacity underlying some of what we can do? One question at a time. Let us first agree that not everything a human being can do is cognitive. Breathing, for example, except in some special cases, is not cognitive; neither is balance, again, except in some special cases. What are the special cases? They are when we breathe or adjust our balance consciously. Otherwise, breathing and balance are unconscious and automatic – we might call them “vegetative” rather than cognitive functions. Offloading Cognition onto Cognitive Technology / Page 8 Consciousness. But surely consciousness itself cannot be the mark of cognition either, because although when we take conscious control of our breathing or our balance that is undoubtedly cognitive, we are not really conscious of how we control breathing or balance. If we suddenly feel we are suffocating or falling over, we “command” our lungs to breathe and our limbs to right themselves, but we are hardly conscious of how our commands are implemented. It is physiologists who must discover how we manage to do those things. And, by the same token, if we do something that we are more accustomed to calling cognitive, such as perceiving a chair, understanding the meaning of a word, or remembering the product of seven times nine, all of which we cognize consciously, we are nevertheless unconscious of how we manage to perceive a chair as a chair,3 how we understand the meaning of, say “cognitive,” or even how we retrieve (from wherever we “stored” it decades ago) the product of seven and nine. Fear not, dear reader, we have not been forced into the clutches of the metaphysical problem of Free Will here. We simply need to make the observation that what makes some of our capacities cognitive rather than vegetative ones is that we are conscious while we are executing them, and it feels like we are causing them to be executed – not necessarily that we are conscious of how they get executed (Libet 1985). But that’s not enough. We have an initial approximate criterion for what performance capacities count as cognitive: It is the ones we execute consciously, which just means that we normally have to be conscious while we are executing them (This criterion is actually flawed, but we will fix it later.) Is There Cognizing Without Consciousness? Now the second question: Are there any other cognitive systems besides ourselves and animals? We have already noted that not all of our performance capacities are cognitive: the cognitive ones are the ones we execute consciously (although we are not conscious of how they are executed by our brains). The question of whether systems other than animals like us cognize is hence related to the question of whether or not there can be cognizing without consciousness: It concerns which organisms are conscious, and whether nonconscious -- perhaps even nonliving -- systems, can be cognizers too. The “Other-Minds” Problem. Let us quickly agree (with Hume and Descartes) that there is absolutely no way for one to know for sure whether anyone (or anything) but oneself is conscious. (This is called the “other minds” problem, and it is insoluble.) Hence we already have a problem here, if consciousness is the mark of the cognitive. We can’t know for sure who or what is or isn’t conscious. But do things get even worse? Doomed to be left agnostic about whether anyone or anything else is conscious, are we even more agnostic, then, about whether nonconscious systems can cognize? 3 i.e., how to detect its Gibsonian “affordances.” Offloading Cognition onto Cognitive Technology / Page 9 What Is Alive? Here there may be useful lessons to be drawn from the problem of life: Very similar questions have been raised about what it is for a system to be alive. We used to think there had to be a “vital force.” Now we know better; life is just the state of certain dynamical systems, having certain structural and functional properties, including molecular ones. The properties of living systems are all objective and observable, so once it has been ascertained that those properties are indeed present, there is no vitalist homologue of the “other minds” problem to trouble us, about whether or not the system is really in a biotic state, i.e., “really alive.” The observable, objective properties of living systems exhaust all there is to being alive (other, perhaps, than the “other minds” problem itself, for those who hold that all living systems must be conscious!). Biotic States: Narrow and Wide? The same question of distributedness – “narrow” versus “wide” life – arises also with living things: We all know the case of the amoeba, which is an individual, autonomous, one-celled organism, definitely alive in its own right. But when individual amoebae find themselves together in a certain chemical gradient, they coalesce and become a further, superordinate, fungus-like organism called a slime-mold. This is “distributed” life, in the sense that it is wider than any of the individual amoebae (who nevertheless remain alive too), and encompasses the entire slime mold, which is then an autonomous, superordinate, living organism. Something like the slime mold was also probably the origin of all multicellular organisms, all the way up to ourselves: We are instances of “wide” life, distributed over all our individual living (though only minimally autonomous) cells. Distributed Life. So far, so good. But, can a group of organisms working and functioning as one, be an individual organism? What about a sports team or an army unit? Or a colony of ants or bees? Even more controversially, some have gone on to argue that an entire biological species may also be an individual organism -- a wider, superordinate organism, distributed over all its members, much the way the slime mold is a superordinate organism distributed over its individual modules, the amoebae (Hull 1976). And it can get even wider, some arguing that Earth itself is a superordinate organism, “Gaia,” distributed over the entire biosphere (Lovelock 2000). Perhaps some exobiologists will want to argue that if there is life elsewhere in the universe, then all instances of biotic systems are distributed subcomponents of yet another individual mega-organism. We will not settle the question of “distributed life” here one way or the other, except to note that (apart from the relatively coherent multi-cellular organisms “supervening” on individual living cells) the criteria for individuating wider and wider forms of life begin to look just as arbitrary as the extension of physical states (on the grounds that no physical sub-state is totally isolated causally) to the size of the entire universe. Nor is it clear any more what, if anything, is at stake when we Offloading Cognition onto Cognitive Technology / Page 10 can call many distributed things one superordinate thing at will, mixing and matching according to taste. We should try to avoid such a state of affairs with distributed cognition. The questions of distributed life and of distributed cognition, however, are not independent, because (to a first approximation) it is living organisms that cognize (those of them that do), and it is likewise living organisms that are conscious (those of them that are). Spatial and Causal Disjointness. Up to the level of continuous multi-cellular organisms, we can agree about what is and is not a living organism. Consensus and coherence collapse only when we move to the level of the species or Gaia, as both the spatial distance and the causal interactions among the component organisms get distributed more and more widely and loosely: Fungi are the biggest uncontestable organisms on the planet. Some of them can grow underground to a size of over 2,000 acres and live more than 2,000 years. Their individual fruiting bodies, the mushrooms (that we mistake as being the whole organism), though remote from one another in space, are all continuously connected. What about a coral colony, or, better, an ant colony? Is it such a stretch from the spatially continuous and tightly coupled causal interactions of the amoebae that constitute a slime mold to the only somewhat more spatially disjoint and less tightly coupled causal interactions of the ants that constitute a colony? Within multi- cellular organisms there is action at a distance (for example, via chemical gradients) as well as coherent but distributed activity (as in a neural network). And we all know that “spatial continuity” breaks down at microscopic scales. Fortunately, in individuating organisms there are other criteria besides spatial and temporal continuity. There is DNA, which can help resolve (up to cloning) whether or not two bits are (or were) indeed parts of the same organism. But genetic relatedness is only relative, which is what allows some to argue that species are individuals and that Gaia is a mega-organism. Distributed Mental States? We can avoid having to wrestle with the metaphysical problem of individual identity in making our bets as to whether something is a case of individual life or just multiple life, interacting. Siamese twins offer a clue: Why are we ready to contemplate the possibility that Gaia, or an entire species, or an ant colony, might be one single, widely distributed, physically disjoint organism, yet we are not ready to consider that Siamese twins, no matter how tightly fused they are physically, are one single organism? The example illustrates how tightly interconnected and fused the questions of distributed life and distributed cognition really are (at least in our minds): The reason we would never dream of saying that Siamese twins are one single distributed organism is that they have two different minds. And distinctness (or identity) of minds trumps all of our other intuitions and inclinations, insofar as Offloading Cognition onto Cognitive Technology / Page 11 individuating either organisms or cognizers is concerned. Suppose Siamese twins could share every last body part yet could still have two distinct minds: not as in the ambiguous case of multiple personality disorder, where the “minds” (if they are really different minds at all) come and go serially, like masks, but where they are always jointly present, and you can communicate with them, and they with one another, simultaneously, exactly as in the case of ordinary Siamese twins (except that both cannot speak at exactly the same time). We would still have profound difficulty seeing them as one and the same “organism” – or perhaps we should say that the notion of an individual “organism” would simply lose its meaning for us in such a situation: They would be one “biotic system,” in some technical sense, but two distinct “cognizers.”4 Is this “animism” (which was probably always latent in the “vitalism” that has since been discredited by molecular and evolutionary biology), just in our minds? Should we be accepting objective, system-based functional inventories of what does or does not count as a distinct cognizer, as we do with what does or does not count as being alive? Or does our subjective sense have some privileged say in the matter? Mind-Reading. The very same mentalistic intuition that underlies how many cognizers we perceive within a single organism can cut the other way too: The reason most of us are not ready to see an ant colony, a species, a corporation, a government, a sports team, an army unit or Gaia as either an individual organism or a cognizer is that we do not perceive any of them as having a mind. We can, with a little effort, see a tree or a fungus, a coral, an amoeba or a slime mold as a living organism, like us, especially if biologists tell us it is so; but we would have great difficulty seeing any of them as cognizers – unless we are ready to see them as being conscious (having a mind). We do have natural “mind-reading” abilities and inclinations (Whiten 1991), as along with fertile imaginations. When we are children, and our animism is at its ”widest,” we are ready to see a tree as watching or even waving at us, or to believe that it hurts the tree when we kick it. Past a certain age, children also have a great deal of difficulty not believing that it hurts a dog, or another child, if they kick it.5 We perceive other minds because we can (sometimes) detect the Gibsonian “affordances” (perhaps via our “mirror neurons”) of being in a mental state: We know what it’s like to have a mind, because we each have one. The rest is our “mirror neurons,” detecting when another mind is in a mental state like our own, because it is doing something like what we would be doing in that mental state. In other words, we mind-read through a combination of having a mind and perceiving its bodily performance correlates in others (Gallese & Goldman 1998). 4 In contrast a baby born with extra limbs will always be considered as a single organism, regardless of how many extra limbs it has, as long as it has just one cognizing mind. 5 Although without moral training, that is not necessarily enough to prevent the child from kicking it! Offloading Cognition onto Cognitive Technology / Page 12 The "other minds" problem does not go away; our 'mind reading' is not based on flawless deductive reasoning. The logic that similar consequences must have similar causes (I have a mind and know its bodily outcome, therefore such bodily outcomes in others must be caused by a mind) gives raise to false positives and false negatives. Hence we are fallible mind-readers. Seeing the tree as having a mind is probably a false positive. Might seeing Gaia as not having a mind be a false negative? Perhaps. But let us be clear about exactly what we would be getting right or wrong, when we made a correct “hit” versus a false positive or negative: Living and Cognizing. If Gaia, or a species (e.g., the earth’s elephant population as a whole) did have a mind, that would mean, roughly speaking, that it was the kind of thing that was capable of having a headache (not necessarily having a head, just having a headache), say, a migraine. The migraine is just a stand-in, here, for our intuitions about what it is to have a mind at all. To have a mind is to be in a mental state, and a mental state is simply a felt state: To have mind is to feel something – to feel anything at all (e.g., a migraine).6 And make no mistake about it: you must have a mind – i.e. you must be in a mental state, you must be able to feel -- in order to have any inkling at all of what it means to have a mind! A toaster will not get that from a dictionary definition. Outside minds there is nothing but mindless (feelingless, insentient) functionality. The Migraine Test. The migraine is merely our stand-in for the capacity to feel anything at all -- in other words, for being conscious. We all know what it feels like to have a headache. All feelings are pretty much like that, mutatis mutandis, from what it feels like to perceive a chair, to what it feels like to understand the meaning of a word or to remember the product of seven and nine. Note that what is essential for having a mind is not having the performance capacity itself – being able to detect the presence of the chair, being able to define or reply correctly to the word, being able to retrieve “sixty-three ” -- nor is it essential to have an understanding of the underlying causal mechanism of that performance capacity (knowing how we manage to do it). The essential thing for having a mind is being able to feel what it is like to have and execute the capacity – or to feel anything at all (e.g., a migraine). This is the consciousness that accompanies cognizing (though without necessarily any consciousness of how the cognizing actually works). Suppose it was somehow true that Gaia (or the entire elephant species, or an ant colony) was indeed a superordinate living organism, distributed across everything in the earth’s biosphere (or across all elephants, or all the ants in a colony). And suppose the reason we wrongly thought Gaia was not an organism was that we couldn’t imagine such a distributed system as being capable of having a migraine (or any other mental state). We could of course have been wrong about that too: Maybe 6 Having a mind, being in a mental state, being conscious, being in a conscious state, feeling, being in a feeling state, feeling anything at all -- all of these are synonymous. Offloading Cognition onto Cognitive Technology / Page 13 Gaia could have a migraine. (Because of the other-minds problem, there is no way to be sure one way or the other.) But suppose we were right that Gaia has no mind yet wrong that Gaia is not a living organism. In that case, our mind-reading mirror-neurons would have been right – they detected no mind. But they would nevertheless have steered us into a false negative, because Gaia, though mindless, is nevertheless alive. In contrast, the child’s mirror-neurons commit a false positive on the migraine test, wrongly inferring that a tree does have a mental state, though it does not, but the child is nevertheless right (though for the wrong reasons) that the tree is alive. In both cases, being an organism was conflated, animistically, with having a mind. This is an error; living and feeling are not necessarily the same thing. There can be living organisms that have no mental states and there can be nonliving systems that do have mental states. Cognitive States and Mental States. Can the same distinction be made, however, if we apply the same mind-reading criterion to being a cognizer, rather than to being a living organism? We (or rather, our mind-reading mirror neurons) insisted, in the case of the Siamese twins with only one body, that even if Biology were to tell us that they were one single organism, they would still be two distinct cognizers, if they had two distinct minds: They would not have one, shared mind, even though they did have one, shared body. And if they had a migraine, it would be two migraines, even if it was implemented in one and the same head -- just as when something is a “headache” for the US Congress, it is at most N distinct headaches in the heads of N distinct members of congress, with no further superordinate entity feeling an N+1st headache (or feeling anything at all). There is no such thing as a distributed migraine – or, rather, a migraine cannot be distributed more widely than one head. And as migraines go, so goes cognizing too -- and with it cognition: Cognition cannot be distributed more widely than a head -- not if a cognitive state is a mental state. Cognitive Technology: Tools R Us? Does this settle the question of distributed cognition, or does it beg it? The case for distributed cognition is based mostly on cognitive technology: the argument is that even something as simple as an external piece of paper with a phone number on it is a piece of cognitive technology -- a peripheral device on which data are stored. If the phone number were encoded inside one’s brain, as a memory, there would be no dispute at all about its being part of the (internally) distributed cognitive state of, say, knowing or finding that phone number. Why, then, would we no longer consider that same datum as part of that distributed cognitive state just because its locus happened to be outside the cognizer’s body? Moreover, once we realize that our cognitive states include data that are located on an external piece of paper, then it becomes apparent that they include far more than that -- widely distributed things, ranging from everything located in our libraries and on the Web, to every auxiliary device, process or datum that may enter into any cognizing or its outcome, extending also to everything located in the narrow heads Offloading Cognition onto Cognitive Technology / Page 14 of all other individual cognizers (Hollan et al. 2000). Whether we want to include in a cognitive state everything that can potentially enter into anyone’s cognizing or only what actually enters into someone’s cognizing, either way, on this extended view, cognition is looking exceedingly wide. The Extended Mind. This wide view of distributed cognition is also called the “extended mind hypothesis” (Clark & Chalmers 1998; Wilson 2004). It has some affinities with wide theories of meaning, in which apples themselves, or the truths about apples, are taken to be part of the distributed meaning of “apple,” which is thereby extended beyond what may be going on within the narrow confines of the head of any individual, local cognizer. The extended mind is also reminiscent of the notion of “wide” toaster-states (in which the bread is part of a distributed state of the toaster), thereby also inheriting the apparent arbitrariness of such state extensions. We must accordingly ask ourselves why we would want to contemplate such arbitrary extensions of what it is to have or to be a mind, hence to be a cognizer and to cognize? Why would it even cross our minds? The answer is again the (insoluble) other-minds problem: Since there is no way of knowing for sure whether any cognizer other than oneself has a mind, there is even less way of knowing whether or not there can be cognizing without a mind, or even of knowing what the actual geographic boundaries of a mind are. We know, objectively, what cognition does. Doing is performance capacity. Cognitive science is also beginning to make some progress in explaining the functional mechanism generating that performance capacity (i.e., how our brains do it). We also know that so far the only systems that our adult “mind-reading” capacities have tentatively identified as being cognizers have been living organisms like ourselves. Our confidence that we have detected an “other mind” increases the more the candidate resembles ourselves, both in its appearance and in its performance capacities. That is in fact the (narrow) meaning of “cognition”: the kinds of things that I and other living organisms can do, using our minds. But there are other candidates that also seem to be able to do some of the things that living organisms like us can do, and not just the vegetative things, but the things we have identified as cognitive, when performed by us. Computers and robots are not only doing more and more of what only living organisms like us used to be able to do, but even the functional mechanisms that biology and cognitive science are proposing to explain how organisms do it often turn out to draw on the same functional mechanisms that explain how computers and robots do it. (Indeed, the functional explanation often comes from the fact that we have programmed computers and designed robots to do what we do, and in so doing, we have also provided a potential explanation of how our own brains do it). So, if it walks and quacks like a duck, and even its internal mechanism is like that of a duck, it’s only natural to assume it’s some kind of duck too. Offloading Cognition onto Cognitive Technology / Page 15 The Turing Test. This is the rationale and the methodology behind the Turing Test (TT; Turing 1950; Epstein et al. 2008): If we can design a system that can do everything that we can do -- and do it so well that even our mind-reading mirror- neurons perceive it as having a mind -- then we have no more (or less) reason to doubt that it has a mind that we have for doubting that other human beings have minds (again because of the other-minds problem). In addition, the TT-passing candidate – which has to be a robot, because a computer alone cannot have all of our sensorimotor capacities – will provide us with at least one explanation of the functional mechanism underlying our own cognitive capacity. Hence the question of narrow vs. wide cognition is also a question about what is and is not part of the functional mechanism of a TT-passing robot: What needs to be “inside” such a robot in order to pass the TT? Note that this is not the question of whether we need to pack all its functions inside its head, the way ours are packed inside our heads. It is conceivable that the mechanism of the TT robot could be more widely distributed: some of it inside and some of it outside its body, integrated wirelessly, perhaps, from some central location. The states consisting of the joint activity of the robot-internal and the robot-external components of the mechanism that give the robot the capacity to pass the TT would be indisputably distributed cognitive states. But those hypothetically distributed robot states (if they are possible at all) do not settle the question we are inquiring about here. Nor would they settle it even if it were somehow possible to breed people with parts of their brains physically located outside their bodies and their joint activity integrated through wireless telemetry or some such. Such a hypothetical distributed robot (or person) could even have a distributed migraine. But what we would really have then would be a robot (or person) with an extended (or distributed) body. The constituents of its mental states would all still be (distributed) within that one distributed body. Our brains, after all, are still parts of our bodies, even if they could be removed, all or in part, temporarily or permanently, the way our hearts have been, and somehow kept functionally integrated with our bodies wirelessly. This is all cog-sci-fi. But the point of the example is to show that this sort of hypothetical cognitive state – distributed across multiple parts of a robot’s functional mechanism (or even multiple parts of an organism’s brain) that happen to be widely separated in space but coordinated wirelessly (Dennett 1981) – does not address the question of whether or not cognitive technology is part of our cognitive state too. An affirmative answer to the question of whether, if the parts of my brain that control the left and right sides of my body could be moved out of my brain and two miles apart, while still being able to remotely coordinate my walking, does not address the question of whether cars or calculators are a part of my mind. 7 7 Please note that if cognitive technology is only a tool and not part of our mind and a cognizer itself, this does not imply that it does not have profound effects on how we cognize --more on this later. Offloading Cognition onto Cognitive Technology / Page 16 Software Agents. It is not just today’s (sub-TT) robots that appear to be doing some of the things we cognizers do: Software agents seem to be doing it too, including communities of distributed software agents, interacting among themselves, trawling the net, executing local as well as distributed computations on local and distributed data, and displaying -- not just individually but also collectively -- performance capacities that, in living organisms like ourselves, we would have taken to be the result of cognizing (Dror 2007). These autonomous devices – both hardware and software -- are, of course, like toasters. But they are “cognitive” toasters, in that they operate not on bread but on informational inputs, to generate, as output, performance that we would have called cognitive if we had been the ones doing it. Particularly in the case of the joint activity of distributed software agents, autonomously crawling the web, it is obvious why the question of whether a datum is internal or external becomes arbitrary. The datum may be the input to one agent or the output of another, and the distributed cognitive system consists of all the agents and their inputs and outputs together anyway. It makes little sense, nor is it of much use, to try to say which is the bread and which is the toaster in such cases. But is what these systems are doing (whether they are local pieces of hardware or distributed digital data and the software agents programmed to process them) cognizing, or just something that is similar to what ordinarily requires cognizing to do? The question seems to be as undecidable as whether or not Gaia is really a living organism. Part II: What Distributed Cognition Is. Wide-Body Beings. In Part I we argued that inasmuch as cognition is mentation (i.e., insofar as cognizing is thinking), there can only be distributed cognitive states where there can be distributed mental states. Within the head there are narrowly distributed cognitive states, since neural states are presumably not all local and punctate. If the mechanism that generates mental states and bodily performance capacity (normally the brain) could be more widely distributed in space (beyond the head), and still be integrated somehow so as to generate coordinated mental states and bodily function, then that too would be widely distributed cognition, whether in a hypothetical TT-scale robot or a hypothetically re-engineered organism, but that would also be a widely distributed body. Distributed cognition would still not be wider than the body. Can there be distributed cognition beyond the bounds of the body and the brain? In particular, can external cognitive technology serve as a functional part of our cognitive states, rather than just serving as input to and output from them? Mental States Are Conscious States. Let us consider brain states, rather than just mental or cognitive states. We have agreed that not everything our bodies do is Offloading Cognition onto Cognitive Technology / Page 17 cognitive. Some of it, like breathing, balance, or temperature control is vegetative. So, too, are the brain states that implement those vegetative functions. We have also agreed that although cognizing is conscious, we are not conscious of how cognizing is implemented. When we recognize a chair, or understand a word, or retrieve the product of seven and nine from our memory, the outcome, a conscious experience, is delivered to us on a platter. We are not conscious of how we recognized the chair, understood the word, or retrieved “63”. Hence the brain states that implement those cognitive functions are not conscious either. Are unconscious brain states mental? Are Unconscious Brain States Mental? The natural answer would seem to be: no. Unconscious states are unconscious states. The states of a toaster are unconscious and certainly not mental. Until further notice, “conscious states” is synonymous with “mental states.” The brain states implementing vegetative function are not mental either: Presumably a person in a chronic vegetative state is as unconscious as a toaster (although, because of the other-minds problem, we can never be sure about either the toaster or the comatose person). The only reason we want to call the brain states that occur while we are conscious mental states is that they occur while we are in a conscious state, and they physically implement that conscious state. (We are on the fuzzy boundary of the mind/body problem here.) But just as vegetative states such as the regulation of breathing, which occur unconsciously while we are conscious, are nevertheless not themselves mental, nor part of our mental state, why would we want to call the unconscious state that “delivers” our conscious mental state mental? When you say to yourself “what is seven times nine?” and then “sixty-three” pops up, you are certainly conscious of thinking “sixty-three.” So that’s definitely mental; and so is the brain state that corresponds to your thinking “sixty-three.” But what about the brain state that actually found and delivered the “sixty-three”? You are certainly not conscious of that, although you were just as conscious while your brain was finding and delivering “sixty-three” as while you were breathing, though you don’t feel either of those states. Neural vs Google Storage and Retrieval. Let us make the retrieval interval longer then, just to make the problem more vivid: You are trying to remember the name of a poet. You know he wrote “Tell me not in mournful numbers, life is but an endless dream” and his name is on the tip of your tongue, but you just can’t retrieve it. You go to sleep, and next morning “Henry Wadsworth Longfellow” immediately pops up. You were not even awake during the brain state that retrieved it. So what difference does it make if you recall it through an unconscious retrieval state in your brain, or by Googling it (again relying on a state in some remote computer and database of which you are not conscious)? Are they not both based on an unconscious, nonmental state, in the first case narrow and neural, inside your brain, in the second case wide and computational, distributed between your brain and a computer hundreds or thousands of miles away? Offloading Cognition onto Cognitive Technology / Page 18 Distributed Databases. And what about a modern child, who has never bothered to memorize the multiplication tables, as you did, because a computer is always at hand? The only way he ever retrieves 7 x 9 is to key it in, and read off the product . He blindly consults his computer when you blindly consult your memory: What’s the difference? Never mind computers: the poet’s name could be read out of a static book that indexes poems’ first lines. Or you could just ask somebody who knows to tell you who wrote those lines. What difference does it make if the database in which the datum is stored, outside your awareness, is in your brain, or on the shelf of a library, or in someone else’s brain? Offloading Brainwork. The beginning of cognitive technology was surely language, which allowed cognizers to “offload” a lot of brainwork onto other brains that could do it for you, and deliver you the results, and vice-versa (Cangelosi & Harnad 2001; Dascal 2004). Are our own neural states, plus Google states, plus book states, plus the neural states in the heads of other cognizers all parts of distributed cognitive states – and if so, whose cognitive states? I am presumably the cognizer of my narrow cognitive states, but who is the cognizer of the wide ones? Or are cognitive states just sui generis, rather than belonging to anyone in particular? Neural firings in brains, plus keystrokes on computers, bits coursing across fibre optic cables, remote disk activity, print in a library book, neural states in other people’s brains – all just parts of wide, distributed, disembodied cognitive states, taking place here, there, and everywhere: cognizing, with no cognizer?8 At the very least, we need to pinpoint the cognizer of the distributed cognitive state. Let us say it is the user of the cognitive technology, and that what we are asking is whether the technology outside the body is part of or merely I/O to/from a narrow cognitive state inside his brain? Sensorimotor Technology and Augmented Reality. Let us start by considering a kindred kind of technology, perhaps not quite cognitive, only sensorimotor, with the corresponding states being sensorimotor states rather than fully cognitive ones: Sensorimotor technology probably began in our species’ prehistory with tools and weapons, which extended our performance capacities dramatically. Let us consider a relatively recent tool: If you look at a star through a telescope, is that a distributed sensorimotor state, consisting of your brain and retina plus the telescope (and perhaps also the star), in which your visual capacity is augmented by the telescope’s power of refraction? Or is it just input to your narrow, skin-and-in sensorimotor state – input augmented by the telescope? 8 (rather like a distributed life, with no organism living it; or a distributed migraine, with no one experiencing it)? Isn’t cognition with no cognizer cognizing it like a feeling with no feeler feeling it?) Offloading Cognition onto Cognitive Technology / Page 19 If you are driving a car, is that an extended sensorimotor state, in which your body is moving at speeds in excess of what it can manage alone, narrowly? The wider, distributed sensorimotor state might include the car and its locomotor capacity. Or is it just output from your narrow, skin-and-in sensorimotor state (in this case a slow movement of your foot on the pedal) – output augmented by the horse-power of our external vehicle? Another example would be operating a crane, and the extended power to reach and manipulate objects that are too far, big and heavy to be manipulated in your narrower sensorimotor state. Is this a widely augmented I, or just I/O to narrow old me? But before we dismiss too quickly the notion of a wider sensorimotor state, note that some of us have literally experienced a change in our felt body image when driving a large car: Our sense of our own width, pulling through a narrow squeeze, extends to the width of our car, not just our narrow body. This change in body image is not unlike the effect induced by distorting prisms, Virtual Reality, or even surgery, prosthetic limbs, and neurological re-adaptation. Tadpoles mutating into frogs and caterpillars mutating into butterflies might be undergoing similar sensorimotor changes in their body images and powers because of real changes in their (narrow) bodies: Are technology-extended bodies all that different? The Advent of Language. The effects of cognitive technology can be similar to those of sensorimotor technology. Language evolved neurologically for speech and its interactive tempo. We can accelerate recorded speech technologically beyond the rate we can speak it, yet still understand it. Beyond a certain speed, speech becomes gibberish – yet we can read and understand written language at far faster speeds (probably because hearing is a more serial medium of processing and vision is more parallel). It is virtually certain that there was no specific neural adaptation for reading, which was a technological invention of less than 10,000 years ago. In contrast, the language areas of our brain were shaped genetically several hundred thousand years ago, altering our neural hardware and radically extending our cognitive powers. If spoken language widened our cognitive powers biologically, didn’t reading and writing widen them technologically in much the same way? Language As Distributed Cognition? Is language itself a form of distributed cognition? How does the knowledge in other people’s heads, conveyed to us auditorily, differ from the knowledge in books, conveyed to us visually? Both allow us to access information without needing to gather it the hard way, through our own direct, time-consuming, risky and uncertain sensorimotor experience. Writing and speaking also allow us to offload our knowledge and memory outside our own narrow bodies, rather than having to store it all internally. Individual cognizers write books, but Wikipedia, for example, seems to be growing spontaneously Offloading Cognition onto Cognitive Technology / Page 20 according to an independent, collective agenda of its own, more like the joint activity of a colony of ants. Computers, distributed digital databases and automated algorithms have augmented both the speed and the computing power of our brains, and that newfound speed and power is capable of inducing changes in our mental self-image not unlike the ones that sensorimotor technology can induce in our body image: If being deprived of one’s spectacles or one’s automobile feels rather like the loss of eyes or limbs, being deprived of one’s computer or cell-phone feels like the loss of one’s intrinsic cognitive and communicative capacity. Interactive Cognition. Human discourse is certainly interactive cognition, indeed collaborative cognition, and the speed and distance at which we could speak, and understand our interlocutors, set biological limits on the rate and scope of that collaborative cognition, hundreds of thousands of years ago. The speed of verbal thought probably co-evolved with language and is probably of the same order of magnitude as the speed of oral speech. Although reading speed is much faster than listening speed, writing (and typing) speed is not as fast as speaking (and the turn- around time of letter delivery is certainly slower than conversational speed). So in real-time interactions, at the speed of thought, we still prefer to talk rather than write. It is only recently that cognitive technology (in this case, email and texting) has accelerated the potential speed of written interactions in almost real-time to something closer to the speed of thought. Web-based threaded discussion lists, and especially their quote/commentary capability, not only accelerate this interaction still further – allowing individual cognizers to interact with the text itself in real time. They also increase the scope of this almost-real-time interaction among distributed minds and distributed texts; and global posting and immediate accessibility potentially make the collaboration almost instantaneous (Harnad 2004). If the human brain was biologically optimized for interactive cognition at speaking speed, and writing technology slowed down that interactive cycle (in exchange for the other benefits of the transmission and archiving of a written record) for thousands of years, then digital online technology has now once again accelerated the interaction to the speed of thought, increasing its power and productivity by orders of magnitude, and distributing it globally and instantaneously. It is this newfound interactivity (not passive radio, television or film) that is at last truly turning Gaia into McLuhan’s (1962) “global village.” Cognizers and Tools. So where does this leave the question of distributed cognition? It is still cognizers who cognize -- the tool-users, not the tools.9 Yet there 9 Did some of the ambiguity arise from the fact that we fell into the habit (perhaps because of funding agency contingencies) of overusing (for funding purposes) a rather vague and equivocal noun and adjective – “cognition” and “cognitive” – instead of a less impressive verb and gerund – “cognize” and “cognizing” – to ask these questions that are basically about thinking and knowing? Would we have Offloading Cognition onto Cognitive Technology / Page 21 is no doubt that cognitive technology has radically widened the scope of human cognizing10. Could “cognitive technology” be the brain’s way of off-loading some of its otherwise far greater encoding and processing burden? If so, then the worldwide web, a distributed network of cognizers, digital databases and software agents, has effectively become our “Cognitive Commons,” in which distributed cognizers and cognitive technology can interoperate globally with a speed, scope and degree of interactivity that generate cognitive performance powers that would be inconceivable within the scope of individual local cognition alone. Cognitive Technology and the Human Mind. Is cognitive technology limited to increasing the cognitive performance capacity of its users? No. We have argued that cognitive tools are not themselves cognizers, nor do they have -- or serve as distributed substrates of -- mental states. But their effects go well beyond making human cognition more efficient and productive. Just as noncognitive technology (cars, planes, machinery) transformed our somatic lives, so the offloading of brain function onto cognitive technology is now transforming our cerebral lives. Physical technology altered the frequency, intensity, and manner of our muscle use, altering our muscular development (even introducing new ‘technological diseases’, such as carpal tunnel syndrome). Cognitive technology will do likewise, but instead of affecting our muscles it will affect our brain development, organization and capacities. Changing how we think, learn, and communicate, our cognitive tools are reshaping our minds. been ready to say that a library was doing “distributed knowing,” or that it was part of a “thinking state” distributed across brains and book-shelves? Or that “collaborative cognizing” was any more “distributed” than collaborative thinking or knowing (or worrying)? 10 Epigenetics is perhaps a biological precedent for this (Waddington 1942): Not every trait of an organism needs to be genetically encoded in its (“narrow”) DNA. If there are stable environmental influences that can be relied upon to “canalize” the expression of genes without having to be written into the blueprint, that takes a needless load off the narrow code, and even allows it to be more flexible toward wider environmental contingencies. (Perhaps the neural counterpart of Eprigenetics should be called “Epinoetics.”) Offloading Cognition onto Cognitive Technology / Page 22 References Cangelosi, A. and Harnad, S. (2001) The Adaptive Advantage of Symbolic Theft Over Sensorimotor Toil: Grounding Language in Perceptual Categories. Evolution of Communication 4: 117-142. Clark, A. & Chalmers, DJ. (1998) The Extended Mind. Analysis 58(1): 7-19 Dascal, M. 2004. Language as a cognitive technology. In B. Gorayska & J.L. Mey (eds.), Cognition and Technology: Co-existence, Convergence, and Evolution (pp. 37-62). Amsterdam: John Benjamins. Dascal, M. & Dror, I. E. (2005). The impact of cognitive technologies: Towards a pragmatic approach. Pragmatics & Cognition, 13 (3), 451-457. Dennett, D. (1981) Where am I? In D. Dennett, Brainstorms: Philosophical Essays on Mind and Psychology (pp. 310-323). Cambridge, MA: MIT Press. Dror, I. E. (2007). Land mines and gold mines in cognitive technologies. In I. E. Dror (ed.), Cognitive Technologies and the Pragmatics of Cognition (pp1-7). Amsterdam: John Benjamins. Epstein, R, Roberts, G & Beber, G. (2008) (Eds) Parsing the Turing Test: Philosophical and Methodological Issues in the Quest for the Thinking Computer Springer Gallese, V & Goldman, A. (1998) Mirror neurons and the simulation theory of mind- reading. Trends in Cognitive Sciences 2(12): 493-501 Gibson, JJ. (1966) The Senses Considered as Perceptual Systems. Greenwood Publishing Group Harnad, S. (2004) Back to the Oral Tradition Through Skywriting at the Speed of Thought. In: Salaun, J-M & Vendendorpe, C. (Eds.). Le défi de la publication sur le web: hyperlectures, cybertextes et méta-éditions. Presses de l'enssib. Harnad, S. and Dror, I. (2006) Distributed Cognition: Cognizing, Autonomy and the Turing Test. Pragmatics & Cognition, 14 (2), 209-123. Hollan, J, Hutchins, E & Kirsh D (2000) Distributed cognition: toward a new foundation for human-computer interaction research. ACM Transactions on Computer-Human Interaction 7(2): 174-1962 Hull, DL (1976) Are Species Really Individuals? Systematic Zoology 25 (2): 174-191 Offloading Cognition onto Cognitive Technology / Page 23 Libet, B. 1985. Unconscious cerebral initiative and the role of conscious will in voluntary action. Behavioral and Brain Sciences 8: 529-566. Lovelock, James (2000). Gaia: A New Look at Life on Earth. Oxford University Press McLuhan, M. (1962) The Gutenberg Galaxy: The Making of Typographic Man. University of Toronto Press Turing, A.M. (1950) Computing Machinery and Intelligence. Mind 49 433-460 Waddington, CH. (1942), The epigenotype. Endeavour 1, 18–20. Whiten, A. (Ed.) (1991). Natural theories of mind: Evolution, development, and simulation of everyday mindreading. Oxford: Blackwell Wilson, R. A. (2004) Boundaries of the Mind: The Individual in the Fragile Sciences - Cognition. Cambridge University Press
1004.4454
1
1004
2010-04-26T09:43:28
Crowd simulation influenced by agent's socio-psychological state
[ "cs.MA" ]
The aim our work is to create virtual humans as intelligent entities, which includes approximate the maximum as possible the virtual agent animation to the natural human behavior. In order to accomplish this task, our agent must be capable to interact with the environment, interacting with objects and other agents. The virtual agent needs to act as real person, so he should be capable to extract semantic information from the geometric model of the world where he is inserted, based on his own perception, and he realizes his own decision. The movement of the individuals is representing by the combination of two approaches of movement which are, the social force model and the based-rule model. These movements are influenced by a set of socio-psychological rules to give a more realistic result.
cs.MA
cs
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ Crowd simulation influenced by agent’s socio- psychological state F. Cher if, and R. Ch ighoub 48 Abstract — The aim our work is to create virtual humans as intelligent entities, which includes approximate the maximum as possible the virtual agent animation to the natural human behavior. In order to accomplish this task, our agent must be capable to interact with the environment, interacting with objects and other agents. The virtual agent needs to act as real person, so he should be capable to extract semantic information from the geometric model of the world where he is inserted, based on his own perception, and he realizes his own decision. The movement of the individuals is representing by the combination of two approaches of movement which are, the social force model and the based-rule model. These movements are influenced by a set of socio-psychological rules to give a more realistic result. Index Terms—Intelligent Agent, virtual crowd, cognitive map, social force, based-rule model ——————————  —————————— V 1 INTRODUCTION IRTUAL human simulations are becoming each time more popular, and many systems are availa- ble targeting several domains, as autonomous agents, humans factors analysis, training, education, vir- tual prototype simulation-based design, and entertain- ment simulations with autonomous virtual humans, or actors, may use different techniques for the behavioral programming. Most common approaches are based on scripts and hierarchical finite state machines, but many other techniques exist, as the parallel transitions network. Some constraints arise when we deal with crowds of vir- tual actors different from the modeling of virtual individ- uals; crowds are ubiquitous feature of everyday life. Hu- man crowds are ubiquitous in the real word, making their simulation a necessity for realistic interactive environ- ments, physically correct crowd models also have appli- cations outside of computer graphics in psychology, transportation research, and architecture. People have long assembled collectively to observe, to celebrate, or to protest at various happenings. The collec- tive assemblages or gatherings called crowds have been the object of scientific inquiry since the end of 19th century. With computers it becomes possible not only to observe human crowds in the real world, but also to simulate vari- ous phenomena from the domain of collective behavior in the virtual environments. Collective behaviors have been studied and modeled with very different purposes. Besides single work concerned with generic crowd simulation, most approaches were application specific, focusing on different aspects of the crowd behavior. As a consequence they employ different modeling techniques ranging from those that do not distinguish individuals such as flow and network models, to those that represent each individual as being controlled by rules based on physical laws or beha- vioral models. Applications include animation production systems used in entertainment industry, crowd behavior models used in training of military personnel or policemen, crowd motion simulations to support architectural design both for everyday use and for emergency evacuation con- ditions, simulations of physical aspects of crowd dynamics and finally sociological and behavioral simulations. Within the framework of our work, we propose a mi- croscopic model of simulation of a virtual crowd with high density in a dynamic and more complex environment. In order to navigate in a complex environment, we need to have an efficient abstract representation of the virtual envi- ronment [4] where the agents can rapidly perform way- finding. For this reason, we use two different approaches for represent our space, which are cell graphs and portal graph. These two approaches of abstract representation can also be used to store some pre-computed information about the environment that will speed up the naviga- tion and also be helpful to achieve fast perception for local motion computation. This virtual environment is similar to our real world, filled with an important number of intelligent entities (e.g. virtual agents, autonomous agents, intelligent objects). The aim of our work is to create virtual humans as intelligent entities in these space, which includes approximate the maximum as possible the virtual agent animation to the natural human beha- vior. In order to accomplish this task, our agent must be capable to interact with the environment, interacting with objects and other agents. The virtual agent needs to act as real person, so he should be capable to extract se- mantic information from the geometric model of the world where he is inserted, based on his own perception, and he realizes his own decision. The movement of the individuals is representing by the combination of two approaches of movement which are, the force social model and the rule- based model. These movements are influenced by a set of socio-psychological rules to give a more realistic result. 2 RELATED WORK ————————————————  Chighoub Rabiaa, Computer science department, LESIA, Biska University, BP 145, Biskra 07000.  Cherif Foudil, Computer science department, LESIA, Biska University, BP 145, Biskra 07000. JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ Computers power increase recently allowed to populate interactive virtual worlds [9] with numerous inhabitants [8]. Crowds are now common in movies and more and more in video games, especially in real-time strategy games. Simulation of real-time virtual crowds is still a difficult challenge given that available computation-time is mainly dedicated to rendering; a need for fast simulation techniques exists. The topic of modeling of pedestrian streams is not new and has been done for many years. The previous focus was on modeling pedestrian streams in urban environments. In these earlier studies, the aim was to determine the dimension of the parameters of walk- ways. Later the scope was extended to the field of emer- gency. In the 90’s the simulation of pedestrian streams was integrated in the simulation of intermodal transport facili- ties. Nowadays, there exist quite a three different ap- proaches for modeling pedestrian streams. 1. Macroscopic simulation: Models of this category are field-based simulation models that only deal with densities and flux. The approach describes pedestrian flows with differential equations, and is based on the idea that the movement of pede- strians can be handled analogous to fluids and gases. 2. Microscopic simulations: these models consider the movement of pedestrians at the individual lev- el [1]. They treat pedestrians as individuals and model the individual’s behavior with the expecta- tion that dynamic crowd behaviors will emerge from the interactions between individuals and the environment. 3. Mesoscopic simulation: Models of this approach are a mixture of macroscopic and microscopic models, simulating not individual entities but groups of similar entities, The idea of grouping individuals was transformed to mesoscopic pede- strian flow model. That means we do not model a single pedestrian but we use groups of pedestrians and every group has its own rules of behavior. The flow of a single pedestrian is integrated into a flow of pedestrian groups. This simplification is valid because one of the main interesting results from the simulation model is not the state of a single person but the number of persons in a particular area at time t. Figure 1 shows the classification of the mesoscopic approach in relation to the other approaches. In our work, we interest with microscopic approach, many microscopic simulations already exist, and one way to group them is to divide them into cellular automata models, behavioral force models, and rule-based models. The key difference between these techniques is the me- thod in which the entity is represented, how the entity is controlled, and how it interacts with other entities. The social forces model [5, 6] calculates forces acting on agents to determine movement, with excessive forces leading to agent injuries. The model considers the effect that each agent has upon all the other agents, almost as if the model were a simulation of an n-body problem in astrophysics. Physical forces (e.g. friction encountered 49 Fig. 1. Relations of three approaches of modeling pedestrian when brushing past another person, or elastic force due to body compressions) are modeled, as are social forces (desire to change direction to avoid another). One problem with Helbing’s model is that of computa- tional complexity. Simulation update is O(n2) due to the calculation of the effect that each agent (and obstacle) has on all the other agents. This may limit the model’s ability to simulate many agents. Braun et al [2] expand Helbing’s social force model. In their model, each pede- strian is assigned a ‘family’ identifier and an ‘altruism’ level. These acts as forces in the model to tend to make some of the pedestrians form groups with others. Reynolds [15] described a distributed behavior model for simulating flocks of birds formed by actors en- dowed with perception skills. In fact, the birds (or ‘boids’) maintain proper position and orientation within the flock by balancing their desire to avoid collisions with neighbors, to match the velocity of neighbors and to move towards the center of the flock. Reynolds’s work shows realistic animation of groups by applying simple local rules within the flock structure. Following this ap- proach, Terzopoulos et al. [20] presented the simulation of virtual fish groups, where each fish is endowed with perception (artificial vision), locomotion control (based on a mass-spring system used to propel the fish in the water) and with behaviors (based on a group of parameters, such as hunger degree and predators fear). 3 ARCHITECTURE OVERVIEW We have developed a realistic simulator of high-density crowds of autonomous virtual agents composing of an important number of pedestrians autonomous in recon- structed large environments, demonstrating realistic hu- man activity. In this context, a microscopic architecture has been proposed for handling high-density crowds of auto- nomous agents moving in a natural manner in dynamically changing virtual environments filled with obstacles. JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ Model of environment 50 A g e n t ’ s S o c i o - P s y c h o l o g i c a l s t a t e Agent n Agent 1 Group 1 Group L Virtual Interaction Emergent bihavior Agent2 Agent K C o l l e c v t i i v o e r b e h a - I n d i v i d v u i o a r l B e h a - Agent Agent2 Agent m Agent 1 Fig. 2. Our system architecture In this architecture (proposal), a virtual agent can be de- fined as an autonomous entity in a virtual environment. It should not only look like, but also behave as a living organ- ism in a synthetic 3D world, and be able to interact with the world and its inhabitants. The virtual agent must re- ceive its environment through sensors or perception, it receives from the environment the list of entities (agents, obstacles…) that are in its field of view, so he should be capable to extract semantic information from the geometric model of the world where he is inserted, and based on his own perception, he decides its decision and acts as real people. The complexity of pedestrian behavior comes from the presence of collective behavioral patterns (as clustering, lanes and queues) evolving from the interactions among a large number of individuals. This empirical evidence leads to consider two different approaches: pedestrians as a flow and pedestrians as a set of individuals or agents. 3.1 Model of environment In any location, and particularly in a city, virtual humans need to be aware of their environment in order for them to avoid any collision, know where their goals are, and how to reach them. Many different approaches have been de- veloped to tag an environment with information. Our sys- tem can handle two approaches of environment represen- tation, grid and topological graph, by combining both pa- radigms – grid-based and topological—the approach pre- sented here gains the best of both worlds: accura- cy/consistency and efficiency. 1. Grid-based approach, represent environments by evenly spaced grids [18, 17]. Each grid cell may, for example, indicate the presence of an obstacle in the corresponding region of the environment. This approach must be fine enough to capture every important detail of the world [7, 19]. 2. Topological approaches represent environments by graphs. Nodes in such graphs correspond to distinct situations, places, or landmarks (such as doorways) [19]. They are connected by arcs if there are direct paths between them. [18, 17]. Conse- quently, they permit fast planning. The process of representation of the environment needs: 1. Our system receives as an input an arbitrary build- ing model in 3 dimensions and creates grid map. To build the grid graph, by cutting out the envi- ronment a unit of cells, then; one encapsulates all information (static) necessary to the process of na- vigation. 2. Once we have the grid decomposition, we start an iterative conquering process starting from the top left corner cell that is empty. We assign a positive number to this cell that will represent the room ID in the cell and portal graph, and then this ID is propagated using a breadth-first traversal. The propagation of the cell ID continues until the en- tire room is bounded by cells having either 0 (wall) or -1 (door) [10]. Fig. 3. Model of environment Association of information Extraction of a structure in 2d Informed Topological map Informed Grid-map Topological map Environment in 3D Grid-map 3. Once all the cells have been identified, we need to generate the cell and portal graph by joining the rooms through the doors. This is car- ried out by traversing the grid representation from left to right, top to bottom, looking for doors. When a door is found, a portal is created that will join the two cells appearing at both sides of the door [11]. In the last step, points of attraction will be asso- ciated at each door and at each painting. In order to perform global navigation, we also need to store information about paths within the building from each cell to each of the exits in the building. 4. JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 51 Model of representation of environnement Each cell will contain one or more alternative paths to each exit [11]. 3.2 Model of agent Our simulation consists of high-density crowd of auto- nomous virtual human agents existing in dynamic, com- plex, virtual 3d environment. In order to behave in be- lievable way these agents must act in accordance with their surrounding environment, be able to react to its changes, to the other agents and also to the actions of real humans interacting with the virtual world. Figure 4 gives overview of the agent model, this model of the agent follow the Sense-Decide-Act (SDA) cycle, where it can be broken up into subsystems, each one associated in turn with more specific routines. From the perception sub- module, the individual perceive the environment accord- ing to its position, personality and knowledge, and he obtains the environment information on a semicircular front region of the agent, it detects the positions, orienta- tions and speeds of other agents, and obstacles. Moreo- ver, the agent cans predicted future positions changes in speed and orientation of each character and of objects in the VE. Fig.4. Model of agent Based on information perceived, the internal state and the socio-psychological traits of the agent (current beha- vior, panic, role, impatience…), the Decision sub-model calculates the orientation, the velocity and next position of the agent, finally the Motion sub-model execute and realize this decision. 3.2.1 Perception Humans can perceive a field of view (FOV) from 120° to 180°, the latter being the most common we can simulate human perception by having the virtual agents be only aware of those objects falling within a specified angle from their direction of movement (assuming the head is oriented in the same direction). This is calculated from the dot Position of obstacles, and position of agents, orientation of agents, distance between goals, others agents, obstacles and points of attraction. A g e n t ’ s S o c i o - P s y c h o l o g i c a l s t a t e Perception Motion New position, velocity and orientation Decision product between the direction of movement vector and the vector joining the current position with each object in the room. Since the dot product gives us the cosi that value is bigger than 0 it means the object falls within the agent’s FOV [21]. In figure 5, the agent perceives its environment; and determines which object exists in its zone of vision, wall, the obstacle and another agent J. 3.2.2 Motion The main motivation for this model is the fact that differ- ent people can react in different ways depending on their individual characteristics and on their psychological traits. Pedestrian movement shows the characteristics of a pedestrian compared to cars or other vehicles such as a bicycle, a pedestrian has more flexibility to move in two dimensions continue space, a pedestrian also has more flexibility to stop and go and a pedestrian also has the smallest velocity and the highest fluctuation in accelera- tion and velocity compared to vehicles. In our system, which consists in simulating a dense human crowd, the local movements of agents are inspired by the combina- tion of two approaches which are the approach based- rules and the approach of social force. Reynolds [15, 16] described a distributed behavioral model for simulating flocks of birds formed by actors endowed with perception skills with many purposes. In fact, the birds (or boids) maintain proper position and orientation within the flock by balancing their desire to avoid collisions with neigh- bors, to match the velocity of neighbors and to move toward the center of the flock. Reynolds work shows realistic animation of groups by applying simple local rules within the flock structure. This model gives results realize for a crowd with low density. To mitigate the insufficiencies of the approach containing rules, we com- bined this approach with the approach of social force inspired of the model of Helbing [5]. It is based on phys- ics and the socio-psychological forces in order to describe the human behavior of crowd in situations of panic, this model can simulate a crowd with high density but does not give realistic results. The displacement of the agents is modeled by a whole of social forces, and then Nuria [12, 13] hears this model by the incorporation of psycho- logical and geometrical rules. Therefore the module of movement of our pedestrian consists in calculating the new position and the new for each agent by using a certain force of attraction and re- pulsion, these forces make it possible the agent to show a broad variety of behaviors in an individual or collective way. 1. Advance Force: in the normal situation and in the absence of other pedestrians, the movement of a pedestrian should be directed from the current lo- cation P(t) toward the destination point E(t), there should be a “advance force” that directs the pede- strian to move, the advance force makes the pede- strian path almost in a straight line. So the agent perceives the environment and if its zone of vision does not contain obstacles or pedestrians, then it advances easily towards its goal by using its stable speed. Agent i Agent j Wall Agen t H JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ Fig.5. Process of perception 2. Acceleration Force: this behavior is influenced by the existence of panic, in this case if the zone of vi- sion of our agent is empty, contains neither ob- stacles nor other virtual humans, the agent aug- ments its speed, and is directed towards the door by using a maximum speed. V Obstacle Vi Agen Vi Agent Point of attraction Point of attraction (goal or door) Fig.6.The Goal-attractive Force 3. The Occupant-attractive Force: because of the complex relationship among people, the cluster phenomena are observed, otherwise, people in danger tend to move towards the area with a large population, when the “follow” phenomena are of- ten observed, which means occupants tend to fol- low the movement of majority. In the model, the occupant-attractive force is considered between some specified occupants when they are sufficient- ly far from each other (the distance between any two of them is no less than r1, and occupants may choose the same moving direction as most people have been taken around him (within a distance r2). 4. The Goal-attractive Force: In normal situation, pe- destrians are sometimes attracted by window dis- plays, sights, special performances (street artists), or unusual events at specified places (in certain area), otherwise, in the process of evacuation, oc- cupants are attracted by the doors (in our model, the doors are marked by points of attractions). Both situations can be modeled by (often tempo- rally decaying) attractive forces, in a similar way like effects repulsive, but with an opposite sign and a longer range of the interactions, it is general- ly assigned according to exits' quite selected in the 52 building. The magnitude of attraction force is in- fluenced by the type of situation (panic or normal), and the distance between the agent and the door (point of attraction), if this distance is short, the force is large. V Vi Agent i Agent j Agent j Personal S Fig.7.The Occupant-Repulsive Force 5. The Occupant-Repulsive Force: This repelling power works to avoid the collision between the pedestrians. To avoid the collision, it is supposed that each pedestrian has a ray of influence which represents its conscience of safety. The force is produced when the rays of influences of pede- strians overlap 6. The Obstacle-Repulsive Force: The response of col- lision, which is ensured by the repulsive forces, against the obstacles and the walls applies when the personal space of an agent covers with their zones. The covering of wall occurs when the dis- tance between the center of the agent and the cen- ter of the wall is smaller than the personal space of the agent. Repulsive Force Agent i Vi Vj 4 RESULTS AND PERFORMANCES We have chosen the museum like an example of applica- tion of our system, the museum is regarded as a closed environment that its structure topology is represented by a unit of room of different size, connected between them by doors and passageways. Each room is generally to contain obstacles distributed on its surface, and it is deco- rated by a unit with the images suspended on the walls and by trimmings positioned in various localizations, in this environment our virtual agents, the normal situation, can move and see a number preset of the images and the trimmings which decorate the museum, but if the situa- JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ tion changes, i.e. an alarm announces the event of panic, all the human virtual ones try to find the best way to leave the environment. Generally the pedestrian move- ments are influenced by a set of psychological and socio- logical rules which play a role of balancing of rationality in the behavior and the decision-making that we use to illustrate a broad more realistic variety of behaviors. Sev- eral situations have been studied to present the influence of socio-psychological rules in the realism of the beha- viors human; we can resume the following situations: 1. The behavior of avoidance of collision and the avoidance of obstacles, these two behaviors are af- fected by the type of situation (normal and of pan- ic), the personal space of the agent (broad, aver- age, and narrow), and finally the level of patience of agent (patient and impatient). 2. Attractions forces, the agent are guided by three gravitational attractions which are Attraction force towards a point of attraction representing an un- der-goal (painting), Attraction force towards an exit (door), Attraction force towards another indi- vidual. This force is influenced by the distance be- tween the individual and the goal (painting, doors or another agent), the distance which must respect between the agent and its goal, the situation (nor- mal or of panic), knowledge of pedestrian (com- plete or partial), and the role of pedestrian (guide, or follower). L’espace personnel The agent changes its direction to avoid the collision The agent advances in its new direction, the change is rather fine since personal space is narrow (a) The avoidance of normal collision in case, such as personal space is narrow, and the impatient agent. 53 Personnel Space Advance in the new direction Change of direction to avoid the collision (b) The avoidance of collision, such as personal space is average, and the impatient agent, the collision is treated with a broad distance (2 meter). The patient agent changes its direction at a short distance, and it advances in its new direction (c) The avoidance of collision, such as personal space is narrow, and the patient agent, the collision is treated with a short distance (1 meter). Fig. 8. The behavior of avoidance of collision influenced by socio-psychological state A patient agent detects the collision, but it advances does not avoid it Personnel Space JOURNAL OF COMPUTING, VOLUME 2, ISSUE 4, APRIL 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 54 5 CONCLUSION We have proposed a microscopic model of simulation of a crowd with high density of human vrtuels in a dynamic environment. We started with the description of an envi- ronment of simulation, not only from point of view topo- graphic, but also from the semantic aspect. For this, we used the two approaches of representation of the envi- ronment knowing, the graph of grid and the topological graph. The originality of our work is the introduction of a number of socio-psychological rules influencing the be- havior of crowd. The integration of these rules in our model and the combination of the approach based rules and the approach of social force have conducted to realis- tic simulations. Our system gives acceptable results, but optimizations and a whole of prospect remain to be supplemented like: 1. The addition of a cognitive layer in the human be- haviors, the training in its process of navigation and the reasoning. 2. To integrate a responsible module to produce movements realistic, like walk, to run it, etc.... 3. One can also introduce the concept of group and the behaviors collective, the agents that are very close can build groups and these groups are stu- died like only one entity, to minimize the compu- ting time. REFERENCES [1] V.J. Blue and J.L. Adler, “Cellular automata microsimulation of bi- directional pedestrian flows”, Transportation Research Record, Journal of the Transportation Research Board, pp. 135—14, 2000. [2] A. Braun, S.R. Musse, L.P.L de Oliveira, and B.E.J. Bodmann, “Model- ing individual behaviors in crowd simulation.”, CASA2003, 16th Inter- national Conference on Computer Animation and Social Agents., Rutgers University, New Brunswick, New Jersey, USA, pp. 143–148. Mai 2003. [3] S. Bandi and D. Thalmann, “Space Discretization for Efficient Human Navigation”, Computer Graphics Forum, 17(3), pp. 195-206, 1998. [4] N. Farenc., R. Boulic and D. Thalman, “An informed environment dedicated to the simulation of virtual humans in urban contex”, In Pro- ceedings of EUROGRAPHICS1999, Annual Conference Series, pp 309- 318, 1999. [5] D. Helbing, I. Farkas and T. Vicsek, “Simulating dynamical features of escape panic”. Nature, 407(1), pp 487–490, 2000. [6] D. Helbing, I. Farkas, P. Molnar and T. Vicsek, “Simulating of Pede- strian Crowds in Normal and Evacuation Situations”, M.Schreckenberg, S.D. Sharma (ed.) Pedestrian and Evacuation Dy- namics. Springer Verlag Berlin and Heidelberg, pp 21-58, 2001. J.J. Kuffner, “Goal-directed navigation for animated characters using real-time path planning and control”. Lecture Notes in Computer Science, 1537, pp 171–179, 1998. [8] F. Lamarche, and S. Donikian, “Crowd of Virtual Humans: a New Approach for Real Time Navigation in Complex and Structured Envi- ronments”, Computer Graphics Forum 23(3): pp 509-518, 2004. [7] [9] S.R. Musse and D. Thalmann, “Hierarchical Model for Real Time Simulation of Virtual Human Crowds”, IEEE Transactions on Visuali- sation and Computer Graphics, vol. 7, n.2, pp 152-164. April-June, 2001. [10] S. Paris,, “ Caractérisation des niveaux de services et modélisation des circulations de personnes dans les lieux d’échanges” , PhD disserta- tion, Dept. of, Rennes I Univ., 10 octobre 2007. [11] N. Pelechano, “Modeling Realistic High Density Autonomous Agent Crowd Movement: Social Forces, Communication, Roles And Psycho- logical Influences”, PhD dissertation, Dept. of, Pennsylvania Univ., 2006. [12] N. Pelechano, K. O'Brien, B. Silverman, and N. Badler, “Crowd simula- tion incorporating agent psychological models, roles and communica- tion”. First Int. Workshop on Crowd Simulation, pp 21-30, 2005. [13] N. Pelechano, K. O'Brien, B. Silverman, and N. Badler, “Controlling Individual Agents in High-Density Crowd Simulation”. University of Pennsylvania, Eurographics/ACM SIGGRAPH Symposium on com- puter Animation, 2006. [14] S. Paris, J. Pettré, and S. Donikian, “Pedestrian Reactive Navigation for Crowd Simulation: a Predictive Approach”, EUROGRAPHICS 2007 / D. Cohen-Or and P. Slavík, 2007. [15] C.W. Reynolds, “Flocks, herds and schools: a distributed behavioural model”, SIGGRAPH’87, Vol. 21(4) of Computer Graphics, ACM Press, Anaheim (USA), pp 25-34 1987. [16] C.W. Reynolds, “Steering Behaviors For Autonomous Characters”, GDC 99. A. Yu (Ed.) Miller Freeman, San Fransisco, Pp 763-782 1999. [17] W. Shao, “Animating Autonomous Pedestrians”, PhD dissertation, Dept. of, New York Univ. 2006. [18] W. Shao and D. Terzopoulos, “Environmental modeling for autonom- ous virtual pedestrians”. 2005 SAE Symposium on Digital Human Modeling for Design and Engineering, 2005. [19] S. Thrun and A. Bücken, “Integrating grid-based and topological maps for mobile robot navigation”. Proc. of the AAAI Thirteenth National Conference on Artificial Intelligence, pp 944–951. AAAI Press / MIT Press, 1996. [20] X. Tu and D. Terzopoulos, “Artificial Fishes: physics, locomotion, perception, behavior”, SIGGRAPH 94 Conference Proceedings, pp 43- 50, Orlando, FL, USA, 1994. [21] M. Villamil, S. Musse, and L. Luna, “A model for Generating and Animating Groups of Virtual Agents”, IVA, Kloster-Irsee, Allmend, 2003. Dr. Cherif Foudil. is currently working as an Associate Professor of computer science at Computer Science Department, Biskra Uni- versity, Algeria. Dr. Cherif holds PhD degree in computer science. The topic of his doctoral dissertation was Behavioral Animation: simulation of a crowd of virtual humans. He also possesses B. Sc. (engineer) in computer science from Constantine University 1985, M. Sc. in computer science from Bristol University, UK 1989. He is currently the head of “animation and artificial life” team in LESIA laboratory. His current research interest is in artificial intelligence, artificial life, crowd simulation, behavioural animation Chighoub Rabiaa. A Phd candidate in computer science, her cur- rent research interest is crowd simulation. © 2010 Journal of Computing http://sites.google.com/site/journalofcomputing/
0708.3220
1
0708
2007-08-23T17:53:54
Optimal strategies in the average consensus problem
[ "cs.MA", "cs.NI", "math.OC" ]
We prove that for a set of communicating agents to compute the average of their initial positions (average consensus problem), the optimal topology of communication is given by a de Bruijn's graph. Consensus is then reached in a finitely many steps. A more general family of strategies, constructed by block Kronecker products, is investigated and compared to Cayley strategies.
cs.MA
cs
Optimal strategies in the average consensus problem Jean-Charles Delvenne Ruggero Carli Sandro Zampieri 7 0 0 2 g u A 3 2 ] A M . s c [ 1 v 0 2 2 3 . 8 0 7 0 : v i X r a Abstract- We prove that for a set of communicating agents to compute the average of their initial positions (average consensus problem), the optimal topology of communication is given by a de Bruijn's graph. Consensus is then reached in a finitely many steps. A more general family of strategies, constructed by block Kronecker products, is investigated and compared to Cayley strategies. I. INTRODUCTION Coordination algorithms for multiple autonomous vehicles and decentralized estimation techniques for handling data coming from distributed sensor networks have attracted large attention in recent years. This is mainly motivated by that both coordinated control and distributed estimation have applications in many areas, such as coordinated flocking of mobile vehicles [26], [27], cooperative control of unmanned air and underwater vehicles [4], [3], multi-vehicle tracking with limited sensor information [19], monitoring very large scale areas with fine resolution and collaborative estimation over wireless sensor networks [24]. Typically, both in coordinated control and in distributed estimation the agents need to communicate data in order to execute a task. In particular they may need to agree on the value of certain coordination state variables. One expects that, in order to achieve coordination, the variables shared by the agents, converge to a common value, asymptotically. The problem of designing controllers that lead to such asymptotic coordination is called coordinated consensus, see for exam- ple [12], [20], [15] and references therein. Generalisation to high order consensus [22] and nonholonomic agents [18], [11], [28] have also been explored. One of the simplest consensus problems that has been mostly studied consists in starting from systems described by an integrator and in finding a feedback control yielding consensus, namely driving all the states to the same value [20]. The informa- tion exchange is modeled by a directed graph describing in which pair of agents the data transmission is allowed. The situation mostly treated in the literature is when each agent has the possibility of communicate its state to the other agents that are positioned inside a neighborhood [26], [15] and the communication network is time-varying [27], [15]. Robustness to communication link failure [8] and the effects of time delays [20] has been considered recently. Randomly time-varying networks have also been analyzed in [14]. Moreover, a first analysis involving quantized data J.-C. Delvenne is with the Institute for Mathematical Sciences, 53 Prince's Gate, London SW7 2PG, United and Information Engineering, Italy Imperial College, Kingdom, [email protected]. R. Carli S. Zampieri are with the Department of Universit`a 6/a, {carlirugzampi}@dei.unipd.it. di Padova, Via Gradenigo 35131 Padova, transmission has been proposed in [7], [16]. In this paper we consider the consensus problem from a different perspective. We are interested to characterize the relationship between the amount of information exchanged by the agents and the achievable control performance. More precisely we assume that N agents are given initial positions in the euclidean space, and move in discrete-time in order to reach the average of their initial positions. This problem is also called average coordinated consensus. Every agent asks several agents their position before taking a decision to modify its own position. We impose that, in order to limit costs of communication, every agent communicates with only ν agents (including itself), where ν < N . This means that in the graph describing the communications between agents, the max in-degree is at most ν. In this paper, we exhibit a family of strategies for solving this problem based on de Bruijn's graphs and we prove that according to a suitable criteria this is the best that one can do. Precisely we compute its performances according two criteria: rate of convergence to the average of their initial positions and an LQR criterion. We find that a deadbeat strategy is optimal according to the rate of convergence, and nearly optimal according to the LQR criterion. Finally, we compare it with an another strategy having limited communication and exhibiting symmetries: the Cayley strategies [6], [5]. It should be noted however that our strategy is limited to the case where the number of agents is an exact power of ν. Whether it is possible to build a linear time-invariant deadbeat strategy for any number of agents (for a given ν) remains an open problem. The paper is organized as follows. In Section II we provide some basic notions of graph theory and some notational conventions. In Section III we formally define the average consensus problem. In Section IV we introduce the block Kronecker strategy. In Section V we show that the block Kronecker strategy is the quickest possible strategy and we compare it with the Cayley strategy. In section VI we evaluate the performance of the block Kronecker strategy according to suitable quadratic criteria. Finally we gather our conclusions in Section VII. II. PRELIMINARIES ON GRAPH THEORY Before defining the problem we want to solve, we sum- marize some notions on graph theory that will be useful throughout the rest of the paper. Let G = (V,E) be a directed graph where V = (1, . . . , N ) is the set of vertices and E ⊂ V × V is the set of arcs or edges. If (i, j) ∈ E we say that the arc (i, j) is outgoing from i and incoming in j. The adjacency matrix A is a {0, 1}-valued square matrix indexed by the elements in V defined by letting Aij = 1 if and only if (i, j) ∈ E. Define the in-degree of a vertex j as Pi Aij and the out-degree of a vertex i as Pj Aij . In our setup we admit the presence of self-loops. A graph is called in-regular (out-regular) of degree k if each vertex has in-degree (out-degree) equal to k. A path in G consists of a sequence of vertices i1i2 . . . . . . ir such that (iℓ, iℓ+1) ∈ E for every ℓ = 1, . . . , r − 1; i1 (resp. ir) is said to be the initial (resp. terminal) vertex of the path. A cycle is a path in which the initial and the terminal vertices coincide. A vertex i is said to be connected to a vertex j if there exists a path with initial vertex i and terminal vertex j. A directed graph is said to be connected if, given any pair of vertices i and j, either i is connected to j or j is connected to i. A directed graph is said to be strongly connected if, given any pair of vertices i and j, i is connected to j. Finally some notational conventions. Let A any matrix belonging to RN ×N . With Tr A we denote the trace of A, i.e. the sum of the diagonal entries. We say that A is nonnegative, denoted A ≥ 0, or positive, denoted A > 0, if the entries of A are respectively nonnegative or positive. III. PROBLEM FORMULATION We suppose that the positions of all N agents are listed into one vector of dimension N . If the agents move, say, in R3, it seems that we would need a 3N -dimensional vector. However we will suppose that the positions are scalar, as every linear strategy on scalar positions, if applied separately on every component of the position, trivially extends to strategies for higher dimensions. More precisely the problem of our interest can be formal- ized in the following way. Consider N > 1 identical systems whose dynamics are described by the following discrete time state equations x+ i = xi + ui i = 1, . . . , N where xi ∈ R is the state of the i-th system, x+ represents the updated state and ui ∈ R is the control input. More compactly we can write i (1) where x, u ∈ RN . The goal is to design a feedback control law x+ = x + u u = Kx, K ∈ RN ×N yielding the average consensus, namely a control such that all the xi's become asymptotically equal to the average of the initial condition. More precisely, our objective is to obtain K such that, for any initial condition x(0) ∈ RN , the closed loop system yields x+ = (I + K)x, lim t→∞ x(t) = α1 where 1 := [1, . . . , 1]T and α = 1 N 1T x(0). (2) (3) Writing x(t) as a linear combination of the eigenvectors of I + K, it is almost immediate to see that the average consensus problem is solved if and only if the following three conditions hold: (A) Every row and every column of I + K sums to one. Hence it has eigenvalue 1 with 1 as left and right eigenvector. (B) The eigenvalue 1 of I + K has algebraic multiplicity one (namely it is a simple root of the characteristic polynomial of I + K). (C) All the other eigenvalues are strictly inside the unit circle. For nonnegative matrices, namely for matrices having all the components nonnegative, condition (A) is called double stochasticity, condition (B) is ergodicity and condition (C) is a consequence of double stochasticity. We do not require our matrices to be nonnegative, even though it will appear that the optimal matrices are. Observe now that the fact that the element in position i, j of the matrix I + K is different from zero, means that the system i needs to know exactly the state of the system j in order to compute its feedback action. This implies that the j-th agent must communicate his state xj to i-th agent. In this context a good description of the communication effort required by a specific feedback K is given by the directed graph GI+K with set of vertices {1, . . . , N} in which there is an arc from j to i whenever in the feedback matrix K the element (I + K)ij 6= 0. The graph GK is said to be the communication graph associated with K. Conversely, given any directed graph G with set of vertices {1, . . . , N}, a feedback K is said to be compatible with G if GI+K is a subgraph of G (we will use the notation GI+K ⊆ G). In the sequel, we will impose the following constraint on the communication graph: the max in-degree of the nodes is ν. This models the fact that communication lines are costly to establish or operate, and every agent has the right to talk to a limited number of other agents. Note that for compatibility with usual conventions we consider that ν counts all arcs entering a node, including self-loops (which could be considered as 'free communication' in most technological situations). Without this constraint, the problem becomes trivial: choose the complete graph, and the consensus is reached in one step. We therefore add the following constraint on I + K: (D) Every row of I + K contains at most ν non-zero elements. From this point of view we would like to obtain a matrix I + K satisfying (A),(B),(C),(D) and minimizing a suitable performance index. The simplest control performance in- dex is the exponential rate of convergence to the average consensus. When we are dealing with average consensus controllers it is meaningful to consider the displacement from the average of the initial condition ∆(t) := x(t) −(cid:18) 1 N 1T x(0)(cid:19) 1 . It is immediate to check that, ∆(t) = x(t) −(cid:0) 1 (since the average position 1 N t) and that it satisfies the closed loop equation N 1T x(t) is the same at all times 1T x(t)(cid:1) 1 ∆+ = (I + K)∆ . (4) Notice moreover that the initial conditions ∆(0) are such that 1T ∆(0) = 0 . (5) Hence the asymptotic behavior of our consensus problem can equivalently be studied by looking at the evolution (4) on the hyperplane characterized by the condition (5). The speed of convergence toward the average of the initial condition can be defined as follows. Let P any matrix satisfying conditions (A),(B),(C). Define ρ(P ) = (cid:26) 1 maxλ∈σ(P )\{1} λ if dim ker(P − I) > 1 if dim ker(P − I) = 1 , which is called the essential spectral radius of P . As the dominant eigenvalues of P t is one and the others are smaller in magnitude than ρ(P )t, the essential spectral radius says how quickly P t converges to the rank-one matrix 1/N 11T , where N is the dimension of P . In this context the index ρ(I + K) seems quite appropriate for analyzing how per- formance is related to the communication effort associated with a graph. The smaller the essential spectral radius, the quicker the system will converge to the average of the initial condition. However in control theory, strategies that converge in finite time or very quickly are sometimes dismissed on the ground that they lead to large values of update values u(t) = x(t + 1) − x(t), that can be physically impossible or very costly to implement. Hence a strategy is often required to optimize an LQR cost, taking into account both the quickness convergence and the norm of updates values. Therefore another suitable measure of performance could be the following quantity: J = E(Xt≥0 x(t) − x(∞)2 + γu(t)2), (6) where x(t) is the vector of positions at time t, x(∞) = lim∞ x(t) is the vector whose every entry is the average of initial positions, u(t) = x(t + 1) − x(t) is the update vector at time t, the initial positions are supposed to be uncorrelated random variables with unit variance, E denotes the expectation, x2 = xT x is the euclidean norm and γ is a nonnegative real. We will prove that the optimal topology of communication (in the meaning of speed of convergence) is given by a de Brujin's graph. We will call the control strategies based on such graph block Kronecker strategies, as explained in the next section. For these strategies we will evaluated (6) and we will compare them to another family of strategies based on a regular communication graph having the same degree ν: the Cayley strategies [6], [5]. IV. BLOCK KRONECKER STRATEGIES In this section, we define block Kronecker strategies. Let A be a n × n matrix satisfying (A),(B),(C),(D) and k be a nonnegative integer. Note that if A is full then n ≤ ν (since the number of non-zero elements cannot exceed ν). Then we build an nk × nk matrix M in the following way. Let A =   a0 a1 ... an−1   be a row-partition of the matrix A, where ai ∈ R1×n. Then M is the matrix M = For example, if .   (7) ... Ink−1 ⊗ a0 Ink−1 ⊗ a1   Ink−1 ⊗ an−1 A = (cid:18)α β β α(cid:19) (with α + β = 1) and k = 3, then M =   α β α β α β α β β α β α β α β α   This is a kind of block Kronecker product. A general theory of block Kronecker product is built in [17]. We only need a more restricted definition, detailed below. The new matrix M is a matrix of larger dimension than A and satisfying conditions (A),(B),(C),(D): (A) and (D) follow from the definition, while (B) and (C) are proved below. Hence it can play the role of the matrix I + K in Section III.We start by some reminders on Kronecker product, define the block Kronecker product and explore the properties of the latter. A. Kronecker product We recall that the Kronecker product A⊗B of the matrices A and B is the matrix [aijB]i,j, whose dimensions are the product of dimensions of A and B. Some useful properties of the Kronecker product are the following: • AB ⊗ CD = (A ⊗ C)(B ⊗ D); • Tr A ⊗ B = Tr ATr B; • the eigenvalues of A ⊗ B are all possible products of • the eigenvectors of A ⊗ B are all possible Kronecker products of an eigenvector of A with an eigenvector of B. an eigenvalue of A with an eigenvalue of B; The Kronecker product is sometimes called tensor product. Let us see why. For instance consider the matrices B, C, D of sizes mB × nB, mC × nC, mD × nD. The Kronecker product has size mBmC mD × nBnCnD, and an arbitrary element of B⊗ C⊗ D can be denoted (B⊗ C⊗ D)abc,def = BadCbeDcf , where the index written as abc denotes the number c + bmD + amCmD and the index def is the number f + enD + dnCnD; we suppose that the indices start form zero: a = 0, . . . , mB − 1, etc. If B, C, D happen to be square matrices of size n, this notation coincides with the usual notation in base n of an index running from 0 to n3 − 1. This notation of the Kronecker product is very close to the tensor product used in algebra and differential geometry. The only difference is that B ⊗ C ⊗ D, viewed as a tensor product, is considered as a 6-dimensional array with a, b, c, d, e, f as separate indices, instead of a matrix (i.e., a 2-dimensional array). All this immediately extends to more than three matrices. B. Block Kronecker product Let us now consider the following variant of Kronecker product, that we call block Kronecker product. Consider for instance two matrices B (of size n3 × n3) and C (of size n2×n2). The block Kronecker product of B and C is defined as follows: its element of index abcde, ghijk is the element Bcde,ghiCab,jk (notice the shift of the first indices by two places). We will denote this matrix by B⊙C. This definition applies to any two square matrices whose dimensions are powers of n. In general, we can write (B ⊙ C)p,q = (B ⊗ C)σt(p),q, where σ operates a cyclic permutation by one place to the left on the digits of p in base n, and C is of size nt. The matrix M defined by Equation (7) can be expressed as M = (I ⊗ ··· ⊗ I) ⊙ A (where the n × n identity matrix I is repeated k − 1 times). If we write the index of M in base n, then Mi1...ik,j1...jk = Ii2,j1 Ii3,j2 . . . Iik−1,jk Ai1,j0. This form is particularly useful to compute the behavior of M from the properties of the block Kronecker product, which we now explore. As a first property, we can easily see that (B ⊙ C)T = CT ⊙ BT . We can also prove the following lemma. (8) Lemma 4.1: For any matrices A, B, C, D, E, F for which all the products below are meaningful, we have ((A ⊗ B) ⊙ C)((D ⊗ E) ⊙ F ) = BD ⊙ (CE ⊗ AF ). (9) Proof: We write, using Einstein's convention (indices repeated twice in an expression are implicitly summed over), [((A ⊗ B) ⊙ C)((D ⊗ E) ⊙ F )]u,w = = ((A ⊗ B) ⊙ C)u,v((D ⊗ E) ⊙ F )v,w = Au2,v1 Bu3,v2 Cu1,v3Dv2,w1Ev3,w2Fv1,w3, where u, v, and w, interpreted as sequences of digits in base n, have been partitioned into u1u2u3, v1v2v3, and w1w2w3 in an appropriate way. This is possible if B and D have same size, as well as C and E, and A and F . Then the expression above can be regrouped as (BD)u3,w1(CE)u1,w2(AF )u2,w3 = = (BD ⊙ (CE ⊗ AF ))u,w, which ends the proof. In particular, if B = D = 1 we have (A ⊙ C)(E ⊙ F ) = (CE ⊗ AF ). If we choose C = E = 1 instead, we have (10) (11) (A ⊗ B)(D ⊙ F ) = BD ⊙ AF. The following proposition provides an interesting charac- terization of the powers of any order of the matrix M . Proposition 4.1: For A a square matrix, M defined by s k−s {z {z Equation (7), and any integers r ≥ 0 and 0 ≤ s < k, ⊙ (Ar+1 ⊗ ··· ⊗ Ar+1) , } M rk+s = (Ar ⊗ ··· ⊗ Ar) } where the exponents in the right-hand side sum to rk + s. Proof: We prove the claim by induction on rk + s. It is true by definition for rk + s = 1. The induction step is easily proved by applying Equation (9). Indeed, [(Ar ⊗ (Ar ⊗···⊗ Ar))⊙(Ar+1⊗···⊗Ar+1)][((I⊗···⊗I)⊗(I⊗···⊗I))⊙A)] can be written as (Ar ⊗ ··· ⊗ Ar) ⊙ (Ar+1 ⊗ ··· ⊗ Ar+1 ⊗ (ArA)). The argument is correct also for limit cases s = 0 and s = k − 1. In particular we have the following. Corollary 4.1: For A a square matrix and M defined by Equation (7), M k = A ⊗ ··· ⊗ A. Moreover, if A satisfies (A),(B),(C) the essential spectral radius of M is the kth root of the essential spectral radius of A. Proof: The first part is a particular case of Proposition 4.1. From the properties of Kronecker product, we know the spectrum of M k is composed of all possible products of k eigenvalues of A. Hence the largest eigenvalue in absolute value, different from 1, of the matrix M k results to be 1k−1λ, where λ denotes the largest eigenvalue in absolute value, different from 1, of the matrix A. This also proves also that conditions (B) and (C) are verified for M when they are for A. If we take A = 1/n11T , (12) of size n, then M k is the matrix 1/nk11T of size nk with all identical elements. Thus we have a strategy converging exactly in k steps. We comment further on this example in the next section. Another property of M that will prove useful is stated in the next proposition. Proposition 4.2: For A a square matrix, M defined by Equation (7), and any integers r ≥ 0 and 0 ≤ s < k, M T rk+s Ar M rk+s = AT r k−s ⊗ Ar ⊗ ··· ⊗ AT r {z ⊗ AT r+1 Ar+1 ⊗ ··· ⊗ AT r+1 } {z s Ar+1 , } where the sums of exponents is rk + s. D. Design decentralisation Proof: From Proposition 4.1, we know that M rk+s = (Ar ⊗···⊗ Ar)⊙ (Ar+1 ⊗···⊗ Ar+1). Hence, by Equation (8), M T rk+s ) ⊙ (Ar ⊗ ··· ⊗ Ar). These two expressions are multiplied using Equation (10). ⊗ ··· ⊗ AT r+1 = (AT r+1 Now we would like to compute Tr M T t M t+1. This will be useful later when we will evaluate the performance of the block Kronecker strategy. We first need the following lemma. Lemma 4.2: Let B0, B1, . . . , Bk−1 be k square matrices of same dimensions. If l ≤ k is relatively prime to k, then Tr (B0 ⊗ B1 ⊗ ··· ⊗ Bl−1) ⊙ (Bl ⊗ ··· ⊗ Bk−1) = Tr B0BlB2lB3l ··· B(k−1)l, where the indices are understood modulo k. Proof: If we use Einstein's convention (repeated indices are summed over), we can write Tr (B0 ⊗ B1 ⊗ ··· ⊗ Bl−1) ⊙ (Bl ⊗ . . . ⊗ Bk−1) = [(B0 ⊗ B1 ⊗ ··· ⊗ Bl−1) ⊙ (Bl ⊗ ··· ⊗ Bk−1)]p,p = (B0)pk−l,p0(B1)pk−l+1,p1 ··· (Bl−1)pk−1,pl−1 (Bl)p0,pl ··· (Bk)pk−l−1,k = (B0)pk−l,p0(Bl)p0,pl(B2l)pl,p2l (B3l)p2l,pl ··· (B(k−1)l)p(k−2)l ,p(k−1)l = Tr B0BlB2l . . . B(k−1)l, where p = p0p1 . . . pk−1. Proposition 4.3: For A and M as defined above, if A is normal (i.e., AT A = AAT ) then Tr M T t M t+1 = Tr AT t At+1. AT r+1 Proof: We know that M T t Ar+1, if t = rk + s for some 0 ≤ s < k. Hence M t+1 = (AT r M t = AT r Ar ⊗ . . . ⊗ M T t Ar⊗···⊗AT r+1 is equal which by Equation (11) Ar+1) ⊙ AT r AT r+1 the same trace as AT r Ar+1AT r and A commute, this is also the trace of AT t Ar+1)((I⊗···⊗I)⊙A), to (AT r Ar ⊗ ··· ⊗ Ar+1. By Lemma 4.2, this matrix has Ar+1. As AT At+1. Ar . . . AT r+1 C. De Bruijn's graph The communication graph of M is (a subgraph of) a de Bruijn graph, which has nk vertices and arcs from any i to ni, ni + 1, ni + 2, . . . and ni + k − 1 (all modulo nk). In particular, if A is given by Equation (12), then M is the adjacency matrix of a de Bruijn graph, normalized so as for every row to sum to one. This graph was introduced by de Bruijn [10] in 1946 and has been considered for efficient distribution of information in different context such as in parallel computing [23] and peer-to-peer networks [13]. This paper can be seen as an extension of this idea to consensus problems. The process itself of convergence to consensus is de- centralised, in the sense that every agent acts on its own. However the communication strategy (who talks to whom?) must be designed once for all beforehand. This can be done in centralised way, where a new external agent dispatch to every other agent their own strategy. This can also be done in a decentralised way, where every agent is attributed a number i between 0 and N − 1 and then finds the agents of number νi, νi + 1,. . . , νi + ν− 1. Achieving this in the most effective way is a problem of its own, and is not treated in this paper. V. THE QUICKEST POSSIBLE STRATEGY We have seen that starting from A with all identical entries, we get arbitrarily large matrices M converging in finite time k. If we write N = nk the dimension of M , this convergence time is log N/ log n = log N/ log ν, where ν is the maximal in-degree of the graph of communication for M . We can see that no strategy, whether linear or not, whether time- invariant or not, can converge more rapidly. Indeed, to reach the average of the initial conditions, every agent must have information about all other agents, but it can only know ν other positions in one step of time, ν2 in two steps of time, etc. Hence the propagation of information needs around log N/ log ν steps to connect all agents. This reasoning is made rigorous in the following proposition. Proposition 5.1: Let M ∈ RN ×N such that M ≥ 0. Let ν be defined as above. Then M k > 0 implies νk ≥ N. Proof: The fact M k > 0 implies that for any pair of nodes (i, j) there exists in the graph GM a path connecting i to j of length k. Hence there are at least N 2 paths of length k. Let now Pi denote the number of paths having length i. The previous consideration implies that Pk ≥ N 2. On the other hand it is easy to see that P1 ≤ νN and in general that Pi ≤ νiN from which we get that Pk ≤ νkN . Hence νkN ≥ N 2 from which it results that νk ≥ N . The above proposition considers only the time-invariant case. An identical result can be found for the time-varying case, showing that there is no difference, in terms of speed of convergence toward the meeting point, between the time- invariant and the time-varying cases. This can be seen an a posteriori justification of our interest in the class of the time-invariant strategies. A linear time-invariant strategy converges in finite time iff its essential spectral radius is 0. For a strategy converging in infinite time, the essential spectral radius is a good measure of the convergence to the average of the initial conditions, as already mentioned. A. Comparison between block Kronecker strategy and Cay- ley strategy In this subsection we propose a comparison of the block Kronecker strategy with another strategy whose underlying communication graph has limited max in-degree and exhibits strong symmetries: the Cayley strategy. First we recall the concept of Cayley graph defined on Abelian groups [2], [1]. Let G be any finite Abelian group (internal operation will always be denoted +) of order G = N , and let S be a subset of G containing zero. The Cayley graph G(G, S) is the directed graph with vertex set G and arc set E = {(g, h) : h − g ∈ S} . Notice that a Cayley graph is always in-regular, namely the in-degree of each vertex is equal to S. Notice also that strong connectivity can be checked algebraically. Indeed, it can be seen that a Cayley graph G(G, S) is strongly connected if and only if the set S generates the group G, which means that any element in G can be expressed as a finite sum of (not necessarily distinct) elements in S. If S is such that −S = S we say that S is inverse-closed. In this case the graph obtained is undirected. A notion of Cayley structure can also be introduced for matrices. Let G be any finite Abelian group of order G = N . A matrix P ∈ RG×G is said to be a Cayley matrix over the group G if Pi,j = Pi+h,j+h ∀ i, j, h ∈ G . It is clear that for a Cayley matrix P there exists a π : G → R such that Pi,j = π(i − j). The function π is called the generator of the Cayley matrix P . Notice how, if P is a Cayley matrix generated by π, then GP is a Cayley graph with S = {h ∈ G : π(h) 6= 0}. Moreover, it is easy to see that for any Cayley matrix P we have that P 1 = 1 if and only if 1T P = 1T . This implies that a Cayley stochastic matrix is automatically doubly stochastic. In this case the function π associated with the matrix P is a probability distribution on the group G. Among the multiple possible choices of the probability distribution π, one is particularly simple, namely π(g) = 1/S for every g ∈ S. Example 1: Let us consider the group ZN of integers modulo N and the Cayley graph G(ZN , S) where S = in this case S is inverse-closed. {−1, 0, 1}. Notice that Consider the uniform probability distribution π(0) = π(1) = π(−1) = 1/3 The corresponding Cayley stochastic matrix is given by P =   1/3 1/3 1/3 1/3 1/3 0 0 0 ··· ··· 1/3 1/3 1/3 ··· ... ··· 0 ··· ... 0 ... 0 0 ... 1/3 0 1/3 0 0 0 0 ... ... 1/3 1/3   . (13) Notice that in this case we have two symmetries. The first is that the graph is undirected and the second that the graph is circulant. These symmetries can be seen in the structure of the transition matrix P that, indeed, turns out to be both symmetric and circulant [9]. Example 2: Let us now consider the group ZN × ZN and the Cayley graph G(ZN × ZN , S) where S = {(1, 0); (0, 0); (0, 1)}. Again consider the uniform probabil- ity distribution π((0, 0)) = π((1, 0)) = π((0, 1)) = 1/3 The corresponding Cayley stochastic matrix is given by the following block circulant matrix belonging to RN 2×N 2 0 0 0 0 0 0 0 0 0 ... ... ... 0 0 P1   (14) , P2 = 1 3 I. (15)  P = 0 P1 P2 0 ... 0 0 0 P1 P2 ... ... 0 0 P1 P2 0 0 ... P2 ··· ··· ··· ··· ··· where P1, P2 ∈ RN ×N are such that  P1 = 1/3 1/3   0 ... 1/3 0 ··· 1/3 1/3 ··· ... ··· 0 ··· ... 0 0 0 ... 0 0 0 ... 1/3   This example can be generalized to the more general case of the discrete d-dimensional tori Zd N , extensively studied in the literature regarding the peer-to-peer networks [21], [25]. Now we recall an interesting result regarding the essential spectral radius of the Cayley stochastic matrices. Assume that P ∈ RN ×N is a Cayley stochastic matrix generated by a suitable π and assume that S = ν, where S is as previously defined. Moreover assume that 0 ∈ S. Notice that this last fact implies that Pii > 0, ∀ i : 1 ≤ i ≤ N. Then it follows that ρ ≥ 1 − C/N 2/(ν−1), where C > 0 is a constant independent of S and N the number of agents. This result was proved in [6]. On the other side, the block Kronecker strategy con- structed from any matrix A has essential spectral radius λ1/k, where λ is the essential spectral radius of A, as stated in Corollary 4.1. If 0 < λ < 1, then λ1/k behaves like 1 − µ/k for large k and some µ. Recall that k is log N/ log n. Hence this is better than abelian Cayley strategies. In conclusion, block Kronecker strategies have a better essential spectral radius, hence a quicker convergence speed, than Cayley strategies. For the particular choice given by Equation (12), we converge in finite time, and this time is the smallest possible over all linear strategies with the same constrained degree. B. Simulation result As an illustration, we present a simulative comparison between the Cayley strategy and the block Kronecker strat- egy. The network considered consists of N = 81 agents. The matrix P for the Cayley strategy is the matrix (13), whereas the matrix M for the block Kronecker strategy is built starting from A =   1/3 1/3 1/3 1/3 1/3 1/3 1/3 1/3 1/3   with n = 3 and k = 4. The initial conditions has been chosen randomly inside the interval [−50, 50]. In both cases the in-degree is 3. Notice that, as depicted in Figure 1, the block Kronecker strategy reaches the average of the initial conditions in a finite number of steps whereas, the Cayley strategy, after the same numbers of steps, is still far from converging toward the meeting point. We get a lower bound on J1 by summing only the first k terms: Block Kronecker Strategy Cayley Strategy 50 40 30 20 10 0 −10 −20 −30 −40 −50 1 50 40 30 20 10 0 −10 −20 −30 −40 −50 1 2 3 4 5 6 7 8 9 10 2 3 4 5 6 7 8 9 10 Fig. 1. The block Kronecker strategy (left) converges in finite time, while the Cayley strategy (right) has a relatively slow convergence VI. LQR COST In this section we want to evaluate the performance of the block Kronecker strategy according to the quadratic cost J = J1 + γJ2, where J1 = EPt≥0(x(t) − x(∞))T (x(t) − x(∞)) accounts for the quickness of convergence, J2 = EPt≥0(x(t+1)−x(t))T (x(t+1)−x(t)) limits the norm of the updates, and γ weights the respective importance of those two factors. Precisely we evaluate J for any block Kronecker strategy derived from a normal matrix A. Remember that the initial state x(0) is supposed to be characterized by a identity covariance matrix. We start with a lemma which provides an upper and a lower bound for J1. Lemma 6.1: If A is a normal n × n matrix satisfying conditions (A),(B),(C), and ρ is the essential spectral radius of A, then the J1 cost of the corresponding block Kronecker strategy of size nk satisfies: JL ≤ J ≤ JU , 1−Tr (AT A)/n − k and JU = JL + k Proof: Classical arguments lead to write: where JL = N 1−(Tr (AT A)/n)k 1−ρ2 (Tr AT A − 1). J1 = EXt≥0 = Xt≥0 = Xt≥0 = Xt≥0 = Xt≥0 = Xt≥0 (x(t) − x(∞))T (x(t) − x(∞)) E (x(t) − x(∞))T (x(t) − x(∞)) E Tr (x(t) − x(∞))T (x(t) − x(∞)) E Tr (x(t) − x(∞))(x(t) − x(∞))T Tr (M t − E)E(x(0)x(0)T )(M t − E)T Tr (M t − E)(M t − E)T with E = 1/nk11T . Now, Tr (M t − E)(M t − E)T = Tr M tM tT − Tr E = Tr M tM tT − 1. When M is derived by block Kronecker product from a normal matrix A, this is equal to (Tr (AT A)r)k−s(Tr (AT A)r+1)s if t = rk + s, according to Proposition 4.2. k−1 J1 = Xr≥0 Xs=0 Xs=0 ≥ k−1 = k−1 ((Tr (AT A)r)k−s(Tr (AT A)r+1)s − 1) Xs=0 (Tr (AT A)0)k−s(Tr (AT A)1)s − k (16) nk−s(Tr AT A)s − k, The last summation is a geometric series that can be evalu- ated, leading to the bound J1 ≥ N 1 − (Tr AT A/n)k 1 − Tr AT A/n − k This proves the left inequality in the claim. For the right inequality, we find an upper bound on the terms neglected in the lower bound (16). As normal matrices can be diagonalized by a unitary transformation, the eigenvalues of AT A, which we denote 1, λ1, λ2, . . . , λn−1, are precisely the squared module of the eigenvalues of A. In i. particular, ρ2 = λ1, and the trace of (AT A)t is 1 +P λt The terms neglected in the lower bound (16) are Xr≥1 k−1 Xs=0 ((1 +Xi λr i )k−s(1 +Xi λr+1 i )s. For every r, we bound every of the k terms by the highest (for which s = 0). Hence the neglected terms are bounded from above by: Xr≥1 ((1 +Xi λr i )k − 1) = kXr≥1 P (λr 1, . . . , λr n−1), where P is a polynomial in the variables λ1, . . . , , λn−1 with no independent term: all monomials have degree at least one. Now we can sum all corresponding monomials this is a geometric series of progres- for r = 1, 2, . . .: k) is at most sion at most λ1. Hence Pr≥1 P (λr 1 Hence J1 differs from our lower bound by at most (Tr AT A − 1). P (λ1, . . . , λk) = 1 1, . . . , λr 1−λ1 1−λ1 k 1 (Tr AT A − 1). 1−λ1 Thus J1 = N 1−(Tr (AT A)/n)k 1−Tr (AT A)/n + O(log N ). Now we Lemma 6.2: Under the assumptions of Lemma 6.1, if ρi estimate J2. denote the eigenvalues of A different from one, 2J1 − N −Xi 1 1 − ρi2 ≤ J2 ≤ 2J1 − N. Proof: First we notice, adapting the first steps of the proof of the preceding proposition, that J2 = P Tr (M − I)T (M T )tM t(M − I), with I the identity. This involves terms of the form (M T )t+1M t. More precisely, J2 = Xt≥0 Tr (M T t+1 M t− M t+1 − M T t+1 M t+1 + M T t M t) M t − 1) − N− (Tr M T t M t+1 − 1) = 2Xt≥0 − M T t (Tr M T t − 2Xt≥0 1 1−λi At. The first term of the last member is precisely 2J1, the last At+1−1). From Cauchy-Schwartz inequality applied to Frobenius At+1 ≤ pTr AT t+1At+1Tr AT tAt ≤ term is, thanks to Proposition 4.3, 2Pt≥0(Tr AT t norm, Tr AT t Tr AT t Hence Pt≥0(Tr AT t Pi λi = ρi2. Hence, J = N(cid:16)(1 + 2γ) 1 − (Tr (AT A)/n)k 1 − Tr (AT A)/n − γ + O(log N/N )(cid:17). i = , where, as argued in the proof of Lemma 6.1, At+1 − 1) ≤ Pt≥0Pi λt Since the trace of AT A is the sum of squares of ele- ments of A, we see that the coefficient of N (neglecting the O(log N/N )) term) is optimized by the matrix A = 1/n11T , whatever the value of γ is. In this case, the lower bound obtained on J1 is exact, since only k terms are non- zero. The optimal cost is then 1 − 1/n − γ + O(log N/N )(cid:17), 1 − 1/N J = N(cid:16)(1 + 2γ) with ν = n. Hence there is here no trade-off between J1 and J2 among the family of block Kronecker strategies, in contrast with the general LQR theory. Note that the optimal control strategy for unconstrained degree (every agent knows every position) is easily solved by a scalar algebraic Riccati equation, leading to the optimal cost J = N (1+√1 + 4γ)/2. If γ is small and n is large, then the optimal finite-time block Kronecker approaches the un- bounded degree optimal solution with a cost approximately equal to (1 + γ)N . VII. CONCLUSIONS We have introduced a family of strategies for a consensus problem, whose graph of communication is de Bruijn's graph. We have shown that they can converge in finite logarithmic time, which is optimal. We have evaluated the LQR cost of these strategies, proving their quasi-optimality if the cost of update is small and the degree of the graph not too low. This work can be extended in several directions, including: • designing strategies valid for any N , not only exact powers of n; • tackling the continuous-time case, where no deadbeat strategy can exist; • estimating the LQR cost for Cayley strategies; • finding strategies that minimize the LQR cost for any cost γ of the update; VIII. ACKNOWLEDGEMENTS This work was partly developed during the stay of one of the authors (J.-C. D.) at Department of Information Engineering of Universit`a di Padova. Stimulating discussions with J. Hendrickx are gratefully acknowledged. REFERENCES [1] N. Alon and Y. Roichman. Random Cayley graphs and expanders. Random Structures and Algorithms, 5:271–284, 1994. [2] L. Babai. Spectra of Cayley graphs. Journal of Combinatorial Theory, Series B, 27:180–189, 1979. [3] R. W. Beard, J. Lawton, and F. Y. Hadaegh. A coordination architec- IEEE Transaction on Control ture for spacecraft formation control. Systems Technology, 9:777–790, 2001. [4] P. Bhatta and N. E. Leonard. Stabilization and coordination of underwater gliders. In 41st IEEE Conference on Decision and Control, 2002. [5] R. Carli, F. Fagnani, A. Speranzon, and S.Zampieri. Communication In American Control constraints in coordinated consensus problem. Conference (ACC '06), June 2006. [6] R. Carli, F. Fagnani, A. Speranzon, and S. Zampieri. Communication constraints in the average consensus problem. Accepted for publication to Automatica. [7] R. Carli, F. Fagnani, and S. Zampieri. On the state agreement with quantized information. In Proceedings of the 17th International Sym- posium on Mathematical Theory of Networks and Systems (MTNS), Kyoto, Japan, pages 1500–1508, July 2006. [8] J. Cortes, S. Martinez, and F. Bullo. Robust rendezvous for mobile autonomous agents via proximity graphs in arbitrary dimensions. IEEE Trans. Automat. Control. [9] P. J. Davis. Circulant matrices. A Wiley-Interscience Publication, Pure and Applied Mathematics. John Wiley & Sons, New York-Chichester- Brisbane, 1979. [10] N. G. de Bruijn. A combinatorial problem. Koninklijke Nederlandse Akademie v. Wetenschappen, 49:758–764, 1946. [11] D. V. Dimarogonas and K. J. Kyriakopoulos. On the rendezvous IEEE Transactions on problem for multiple nonholonomic agents. automatic control, 52(5):916–922, 2007. [12] J. A. Fax and R. M. Murray. Information flow and cooperative control IEEE Trans. Automat. Control, 49(9):1465– of vehicle formations. 1476, 2004. [13] P. Fraigniaud and P. Gauron. D2b: A de Bruijn based content- addressable network. Theor. Comput. Sci., 355(1):65–79, 2006. [14] Y. Hatano and M. Meshabi. Agreement of random networks. In IEEE Conference on Decision and Control, 2004. [15] A. Jadbabaie, J. Lin, and A. S. Morse. Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Trans. Automat. Control, 48(6):988–1001, 2003. [16] A. Kashyap, T. Basar, and R. Srikant. Consensus with quantized information updates. In Proceedings of CDC Conference, san Diego, 2006. [17] R. H. Koning, H. Neudecker, and T. Wansbeek. Block kronecker products and the vecb operator. Linear algebra and its applications, 149:165–184, 1991. [18] Z. Lin, B. Francis, and M. Maggiore. Necessary and sufficient graph- ical conditions for formation control of unicycles. IEEE Transactions on automatic control, 50(1):121–127, 2005. [19] M. Mazo, A. Speranzon, K. H. Johansson, and X. Hu. Multi-robot tracking of a moving object using directional sensors. In Proceedings of the International Conference on Robotics and Automation (ICRA), 2004. [20] R. Olfati-Saber and R. M. Murray. Consensus problems in networks of agents with switching topology and time-delays. IEEE Trans. Automat. Control, 49(9):1520–1533, 2004. [21] S. Ratnasamy, P. Francis, M. Handley, R. M. Karp, and S. Shenker. A scalable content-addressable network. In SIGCOMM., pages 161–172, 2001. [22] W. Ren, K. L. Moore, and Y. Chen. Necessary and sufficient graphical conditions for formation control of unicycles. ASME Journal of Dynamic Systems, Measurement, and Control, to appear, 2007. [23] M. R. Samatham and D. K. Pradhan. The de Bruijn multiprocessor network: A versatile parallel processing and sorting network for vlsi. IEEE Trans. Comput., 38(4):567–581, 1989. [24] A. Speranzon, C. Fischione, and K. Johansson. Distributed and collaborative estimation over wireless sensor networks. In Proceedings of the IEEE Conference on Decision and Control (CDC'06), pages 1025–1030, December 2006. [25] I. Stoica, R. Morris, D. R. Karger, M. F. Kaashoek, and H. Balakr- ishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM., pages 161–172, 2001. [26] H. G. Tanner, A. Jadbabaie, and G. J. Pappas. Stable flocking of mobile agents, part i: fixed topology. In IEEE Conference on decision and control, 2003. [27] H. G. Tanner, A. Jadbabaie, and G. J. Pappas. Stable flocking of In IEEE Conference on mobile agents, part ii: dynamic topology. decision and control, 2003. [28] H. G. Tanner, S. G. Loizou, and K. J. Kyriakopoulos. Nonholonomic IEEE navigation and control of cooperating mobile manipulators. Transactions on robotics and automation, 19(1):53–64, 2003.
1908.10404
2
1908
2019-09-03T03:43:47
The Effectiveness of Managed Lane Strategies for the Near-term Deployment of Cooperative Adaptive Cruise Control
[ "cs.MA", "eess.SP" ]
Traffic simulation is a cost-effective way to test the deployment of Cooperative Adaptive Cruise Control (CACC) vehicles in a large-scale transportation network. By using a previously developed microscopic simulation testbed, this paper examines the impacts of four managed lane strategies for the near-term deployment of CACC vehicles under mixed traffic conditions. Network-wide performance measures are investigated from the perspectives of mobility, safety, equity, and environmental impacts. In addition, the platoon formation performance of CACC vehicles is evaluated with platoon-orientated measures, such as the percentage of platooned CACC vehicles, average platoon depth, and vehicle-hour-platooned that is proposed in this paper under the imperfect DSRC communication environment. Moreover, managed lane score matrices are developed to incorporate heterogeneous categories of performance measures, aiming to provide a more comprehensive picture for stakeholders. The results show that mixing CACC traffic along with non-CACC traffic across all travel lanes is an acceptable option when the market penetration (MP) is lower than 30% for roadways where a managed lane is absent. Providing CACC with priority access to an existing managed lane, if available, is also a good strategy for improving the overall traffic performance when the MP is lower than 40%. When the MP reaches above 40%, a dedicated lane for CACC vehicles is recommended, as it provides greater opportunity for CACC vehicles to form platoons. The facilitation of homogeneous CACC traffic flow could make further improvements possible in the future.
cs.MA
cs
The Effectiveness of Managed Lane Strategies for the Near-term Deployment of Cooperative Adaptive Cruise Control Zijia Zhonga,∗, Joyoung Leeb aDepartment of Civil and Environmental Engineering, University of Delaware bJohn A. Reif, Jr. Department of Civil and Environmental Engineering, New Jersey Institute of Technology 9 1 0 2 p e S 3 ] A M . s c [ 2 v 4 0 4 0 1 . 8 0 9 1 : v i X r a Abstract Traffic simulation is a cost-effective way to test the deployment of Cooperative Adaptive Cruise Control (CACC) vehicles in a large-scale transportation network. By using a previously developed microscopic simulation testbed, this paper examines the impacts of four managed lane strategies for the near-term deployment of CACC vehicles under mixed traffic conditions. Network-wide performance measures are investigated from the perspectives of mobility, safety, equity, and envi- ronmental impacts. In addition, the platoon formation performance of CACC vehicles is evaluated with platoon-orientated measures, such as the percentage of platooned CACC vehicles, average platoon depth, and vehicle-hour-platooned that is proposed in this paper under the imperfect DSRC communication environment. Moreover, managed lane score matrices are developed to incorpo- rate heterogeneous categories of performance measures, aiming to provide a more comprehensive picture for stakeholders. The results show that mixing CACC traffic along with non-CACC traffic across all travel lanes is an acceptable option when the market penetration (MP) is lower than 30% for roadways where a managed lane is absent. Providing CACC with priority access to an existing managed lane, if available, is also a good strategy for improving the overall traffic performance when the MP is lower than 40%. When the MP reaches above 40%, a dedicated lane for CACC vehicles is recommended, as it provides greater opportunity for CACC vehicles to form platoons. The facilitation of homogeneous CACC traffic flow could make further improvements possible in the future. Keywords: Managed Lane, Cooperative Adaptive Cruise Control, Microscopic Traffic Simulation, Platoon Formation, Mixed Traffic Conditions, Imperfect DSRC Communication 1. Introduction Connected and Automated Vehicle (CAV) technology will revolutionize the way vehicles are operated. Among its wide-ranging applications, Cooperative Adaptive Cruise Control (CACC) is identified as one of the thrust applications by governments, industries, and academia all around the world in improving mobility, environment, and more importantly safety. The field experiments of ∗Corresponding author: Zijia Zhong Email addresses: [email protected] (Zijia Zhong), [email protected] (Joyoung Lee) Preprint submitted to Elsevier September 4, 2019 CACC systems have been accelerated as the technology matures in recent years. The highlights of the deployments, to name a few, include the United State Department of Transportation (USDOT)- approved CAV test sites (Xiang et al., 2009), the California PATH's Automated Highway System (AHS) program (Bu et al., 2010; Milan´es et al., 2014; Rajamani and Shladover, 2001), the En- ergy ITS Project (Tsugawa et al., 2011), SARTRE (van Willigen et al., 2013), KONVOI (Wille et al., 2007), and the European Truck Challenging 2016 (Eckhardt, 2016). Despite policy en- couragement from government agencies and the progress made in academic research, large-scale field deployment, however, are still considered premature at the current stage, in terms of safety, technological, and budgetary concerns. Simulation is one of the best approaches to bridge the gap between prototype testing CACC technology and the large-scale real-world deployment by provid- ing a virtual environment. Simulation can also improve the quality of the testing by expanding the testing scope to a wide spectrum of scenarios without incurring a significant amount of additional cost. Managed lanes (MLs), as defined by the Federal Highway Administration (FHWA), are high- way lanes that are set aside and operated under a variety of fixed and/or real-time strategies in response to local goals and objectives (Kim et al., 2015), such as traffic operation improvement, emission reduction, safety enhancement etc. As solutions for efficient lane management, ML strategies have been implemented nationwide with various forms (e.g., high-occupancy vehicle (HOV) lane, high-occupancy toll (HOT) lane, exclusive bus lane (XBL)). Pairing ML strategies with CACC (designated as CACC-ML) becomes a logical step in promoting CACC, because of CACC's distinct operational characteristics in comparison to human-driven vehicles (HVs). Fur- thermore, the provision of CACC-ML can provide road users with stronger incentives either to purchase CACC vehicles that meet the minimum functional requirements or to factor in the option of retrofitting certified aftermarket CACC systems to a reasonable extent. In this paper, the effectiveness of deploying CACC-ML strategies is examined with the goal of deriving policy recommendations for the initial introduction of CACC vehicles into mixed traf- fic. The organization of the remainder of the paper is as follows. Relevant research regarding deploying CACC vehicles in mixed traffic is reviewed in Section 2, followed by the microscopic simulation framework in Section 3. The simulation results are presented and discussed in Section 4. Conclusions and future work are discussed in Section 5. 2. Literature Review Increasing practices of MLs have been observed over the years and case studies show that the desired travel patterns or behaviors can be incentivized by ML strategies. For instance, the California Clean Air Vehicle Decal program (Shewmake and Jarvis, 2014) was designed to pro- mote user adoption of energy-efficient and low-emission hybrid vehicles by allowing the owners to drive on HOV lanes without even meeting the occupancy requirement. It is believed that the adoption of CACC vehicles can be facilitated with policy alike. The CACC-ML provision is en- visioned to have three phases. First, the adoption of CACC vehicles is incentivized by allowing the use of the ML free of charge. At this stage, the following headway of CACC vehicles on the ML may be comparable to that has been observed from HVs for safety reason in mixed traffic. Then a shorter following headway for CACC vehicles could be implemented to further increase 2 the carrying capacity of the ML when the demand as well as the familiarity of road users to CACC increases. Lastly, when the CACC vehicles reach a critical level of MP, the transition to CACC- only lane could be eventually made. At this stage, high-performance driving enabled by CACC can be achieved because of a homogeneous CACC traffic on the ML (Zhong, 2018). The benefits of CACC for enhancing the performance of a freeway system have been reported. The capacity of 4,250 vph per lane was observed by Van Arem et al. (2006) on a 6-km segment with uniformly distributed ramps under full market penetration. Shladover et al. (2012) concluded the capacity of 3,600 vph per lane at 90% MP in the absence of on-ramp demand for a one- lane freeway. Arnaout and Arnaout (2014) evaluated CACC under moderate, saturated, and over- saturated demand on a hypothetical 4-lane highway under different market penetrations. They found that 9,400 vehicles (out of 10,000 vehicles) could be served in an hour when the CACC reached 40% MP. Lee et al. (2014) found the mobility benefits of CACC began to show at 30% MP. Songchitruksa et al. (2016) assessed the improvements of CACC on the 26-mile I-30 freeway in Dallas, TX and observed the highest throughput being 4,400 vph at 50% MP. Insofar, studies on MLs for CAVs are relatively scarce in the literature. Traditional lane man- agement experience may not be directly transferrable to CACC deployment because of the the difference in the underlying operational principles. There are two major approaches for study- ing CACC-ML: analytical modeling and computer simulation. Hussain et al. (2016) proposed an analytical ML model for determining the optimal lanes to be allocated for CAV traffic under single-lane and ML environment. Three types of CAV following headway (conservative, neu- tral, and aggressive) were assigned. The maximization of the overall system throughput could be computed under the assumption that both CAVs and HVs are randomly distributed in a freeway facility. From a macroscopic perspective, Qom et al. (2016) used simulation-based dynamic traffic assignment to study the diversion of CACC vehicles onto a ML with toll incentives from dynamic pricing. Using Vissim, Zhang et al. (2018) investigated the operational capacity of CACC-ML with dedicated CACC on/off ramps. It was discovered that the ramp density should be placed no less than 5 km (3 miles) apart to ensure a reasonable level of throughput. Liu et al. (2018) found that deploying the ML and vehicle awareness device (VAD)-equipped vehicles were proven to be helpful under low and medium market penetrations. The increase in the pipeline capacity (under the ideal condition with no lane changes, uniform desired speed, etc.) was estimated between 8% to 23%. On a subsequent test on an 18-km segment of the SR-99, they observed great improve- ment on traffic flow pattern when the MP was at 40% or higher on the corridor-level speed heat map. A CACC vehicle is able to operate in a safe manner with a much smaller following headway due to the V2V communication with its predecessor(s) (Nowakowski et al., 2011; Shladover et al., 2018; Tsugawa et al., 2016). Clustering CACC vehicles, therefore, becomes a crucial task in operation. Note that CACC "clustering" and "platooning" are used interchangeably. According to Shladover et al. (2015), three types of clustering strategies could be expected in operation: 1) ad hoc clustering, 2) local coordination, and 3) global coordination. Ad hoc clustering assumes that the CACC vehicles arrive in random sequence and the CACC vehicles do not actively seek clustering opportunities. Therefore, the probability of driving around other CACC vehicles is highly correlated to MP. The ad hoc clustering has been adopted in most of the previous studies thus far because of its simplicity on implementation. 3 Local coordination, commonly known as active platooning, could be employed to help with clustering. Under this concept, CACC vehicles actively identify and approach an existing CACC cluster or other free-agent CACC vehicles to form a new cluster. The local coordination has been discussed by Liang et al. (2013), D´avila (2012), and Lee et al. (2014). One of the main chal- lenges to local coordination is the determination of the relative position of a vehicle with sufficient accuracy and reliability. Solutions have been proposed to aid the localization of CACC vehi- cles (Shladover et al., 2015), for instance, 1) infrastructure lane identification by radio frequency identification (RFID), 2) vehicle-based lane identification by on-broad sensors (e.g., GPS, inertial measurement unit, and camera), 3) vehicle-based confirmation of the predecessor by using visual or infrared-camera-visible marking, and 4) visual confirmation by the drivers. Lastly, global coor- dination uses advance planning to coordinate vehicles traveling with the same origin-destination pair even before the CACC vehicles entering the highway (Larson et al., 2013). The most likely application for global coordination would be long-haul trucking or lengthy commute trip on con- gested highways. Equity issues is another crucial aspect for MLs, and it has to be properly addressed, due to its vital role in gaining public support. The perception of exclusivity for different road users could be a sensitive matter. The Victoria Transport Policy Institute (2018) conducted extensive research regarding the equity and social justice for the impact of a ML in CAV context. It identified that a dedicated lane for CACC could impact various social classes (Litman, 2017), since not too many people are able to afford CACC vehicles. The issue becomes more pronounced when speed limit privilege (e.g., higher speed limit) is assigned to CACC lane. Hence, the impacts of a CACC lane among users and non-users need to be quantified for further assessment. More mobility options could be provided (e.g., access to transit) in order to gain the benefits of CACC-ML for different user groups. Learned from existing MLs, additional considerations include: 1) cost incentives to make CACC accessible for all via tax deduction, subsidies, etc.; 2) possible shared mobility for CACC vehicles; and 3) availability of alternative routes for other road users. The CACC-ML strategy could provide technical accommodation, economic incentive, and mo- bility improvement for users who decide whether to purchase CACC-equipped vehicles. CACC- ML could be instrumental in the near-term deployment of CACC. The effectiveness of CACC-ML strategies can be evaluated systematically in a cost-efficient way with microscopic simulation. 3. Methodology 3.1. Simulation Framework A segment of a major commuter corridor, the Interstate Highway 66 (I-66) located in Fairfax County, Virginia, is used to evaluate the potential operation impacts for deploying CACC vehicles in the near term. The 8-km (5-mile) stretch of the roadway (shown in Fig. 1) is located outside of the Washington D.C. Beltway (I-495) with four lanes in each direction and two interchanges. Currently, an HOV lane is implemented in the leftmost lane in each direction. No physical barrier is in place between the General Purpose Lanes (GPLs) and the HOV lane. The I-66 network has been used in previous studies by Li et al. (2019), Transportation Research Board (2018), Zhong (2018), and Zhong and Lee (2018). The calibration was conducted with three independent data sources: INRIX travel time, remote traffic microwave sensor data (RTMS) flow data, and video 4 camera data to ensure a realistic representation of the real-world traffic conditions (Leidos, 2016; Li et al., 2019). The first two were the primary sources of fine-tuning the simulation network. An overview of the traffic condition for each origin is shown in Table 2. The demand is defined in a 15-min interval. Table 1: Independent Data Source for Calibration Data Source RTMS data INRIX data Video camera footage (cid:88) (cid:88) (cid:88) point segment point Volume Speed Occupancy Travel Time Measurement Type (cid:88) (cid:88) Fig. 1: Interstate highway 66 (I-66) segment Table 2: Network Traffic Demand Zone ID Description Peak/Avg. GP Demand, vph Peak/Avg. HOV Demand, vph Z1 Z2 Z3 Z4 I-66 East or I-495 Exit 62 Nutley St. Exit 60 SR 123 I-66 West 4197/3998 712/382 1411/1146 - 1885/1796 335/180 1411/1146 - The simulation framework is developed based on PTV Vissim (PTV AG, 2018b), Vissim Com- ponent Object Model (COM) interface (PTV AG, 2015), and the Vissim DriverModel.DLL appli- cation programming interface (PTV AG, 2017) (VEDM thereafter). The overall simulation frame- work is shown in Fig. 2. Vissim is a multimodal microscopic traffic simulation software, where each entity (e.g., car, train, or pedestrian) is simulated individually. Such capability is one of the most crucial elements for simulation of CACC vehicles. The VEDM is programmed to replace the default Wiedemann car-following model (Wiedemann, 1991) with the custom CACC behavioral model. The CACC vehicles are equipped with automated longitudinal control that is based on the Enhanced Intelligent Driver Model (E-IDM) (Kesting et al., 2010). The behavior model of the 5 Fig. 2: Vissim-based microscopic simulation testbed EIDM is expressed in Eq. 1, 2, and 3. )δ − ( s∗( x, xlead) )] s0 x = (1 − c) xIDM + c[ xCAH + b · tanh( xIDM− xCAH √ s∗( x, xlead) = s0 + xT + b )] x( x − xlead) if x = xIDM ≥ xCAH otherwise xdes a[1 − ( x  x2·min( xlead, x) (1) (2) (3) xCAH = lead−2x·min( xlead, x) x2 min( xlead, x) − ( x− xlead)2Θ( x− xlead) 2x 2 ab xlead( x − xlead) ≤ −2x min( xlead, x) otherwise where, a is the maximum acceleration; b is the desired deceleration; c is the coolness factor; δ is the free acceleration exponent; x is the current speed of the subject vehicle; xdes is the desired speed, xlead is the speed of the lead vehicle; s0 is the minimal distance; x is the acceleration of the subject vehicle; xlead is the acceleration of the lead vehicle; xIDM is the acceleration calculated by the original IDM model (Treiber et al., 2000). The minimal distance can be calculated by Eq.2 where T is the desired time gap; and xCAH is the acceleration calculated by the constant-acceleration heuristic (CAH) component as shown in Eq.3, where Θ is the Heaviside step function. The local coordination of CACC vehicles is incorporated into the VEDM as well, where a free-agent CACC vehicle (that is not in a platoon) detects its surrounding traffic, trying to join an existing platoon or form a platoon with other free-agent CACC vehicles. Thus far, three types of platoon formation have been used: front-, mid-, and rear- joining (Amoozadeh et al., 2015; Lee et al., 2014). In this study, only rear-joint is allowed for jointing a platoon in order to control the variables of the evaluation. The decision-making procedure for a free agent CACC vehicle is exhibited in Fig. 3. 6 Fig. 3: CACC clustering algorithm The Minimizing Overall Braking Induced by Lane Change model (MOBIL) (Kesting et al., 2007) as expressed in Eq.4 is adopted as the mechanism to prevent lane changing of a free-agent CACC vehicle that is potentially disruptive to the surrounding traffic. x − x + p( xn − xn + xo − xo) > ∆ xth (4) where p is the politeness factor; x is the new estimated acceleration for the subject vehicle; x is the current acceleration of the subject vehicle; xn is estimated acceleration of the new trailing vehicle; xn is the previous acceleration of the new trailing vehicle; xo is the new estimated acceleration for the old trailing vehicle; xo is the previous acceleration of the old trailing vehicle. Note that the estimated acceleration is calculated by the E-IDM model. When a potential platooning opportunity is identified via V2V communication, the CACC system estimates the impacts on the immediate vehicles based on MOBIL should the lane change 7 be initiated. A lane change is only executed when the expected negative impact is below the pre-determined threshold, ∆ xth. In the event of multiple clustering alternatives, the one with the smallest value (less impact) in the left hand side of the Eq.4 is chosen, as illustrated in Fig. 4. Fig. 4: MOBIL-based lane change decision The parameters for the E-IDM models are shown in table 3. Note that two types of headway are implemented in the longitudinal control. The Tintra represents the intra-platoon headway, which is typically smaller owing to the communication within a CACC platoon. The larger headway, Tinter, is used when a CACC vehicle follows a non-CACC vehicle. The minimum number of CACC vehicles for a platoon is set as three and the maximum number of CACC vehicles for a platoon is set as seven. Table 3: CACC Vehicle Control Parameters Parameter Tintra Tinter 1.2 s value 1 s a s0 1m 2m/s2 b c 2m/s2 0.99 θ 4 xdes 105 km/h p 0.9 ∆ xth 1m/s2 While the imperfect wireless communication is not the main focus in this paper, it is worth mentioning that an analytical probability module that was derived from a packet-level network simulator (i.e. ns-2 (Chen et al., 2007)) by Killat and Hartenstein (2009) was also incorporated into the VEDM. One-hop DSRC broadcast reception probability can be calculated during the sim- ulation based on transmission power, transmission distance, and communication channel loading. The outcomes of the communication have an influence on the CACC platoon operation. The de- tails regarding the implementation of this module in VEDM is available in Zhong and Lee (2018). The behaviors of a CACC vehicle in a platoon is dictated by the successful V2V communication. Here the CACC system is assumed with SAE Level 3 vehicle automation that requires a recep- tive fallback-ready driver(Society of Automotive Engineers International, 2014). Fig. 5 illustrates the system fallback in the event of automated driving system (ADS) failure, such as loss of DSRC packets. It is executed at each simulation time step on an individual vehicle basis, and it determines the transition of the control authority between the ADS and the human driver. 8 Fig. 5: CACC system fallback loop 3.2. Managed Lane Scenarios Eligibility, accessibility, and pricing are the three primary factors in designing a ML (Federal Highway Administration, 2008). In this study, only the first two factors are considered. A three- phase ML deployment for CACC is envisioned as covered in the literature review. Subsequently, four ML strategies, shown in table 4, are formulated for testing. • Base case (BASE): This scenario serves as the base condition of the I-66 segment for this study. As stated previously, an HOV lane is implemented in the leftmost lane of the roadway and the network has been calibrated. • Unmanaged lane (UML): In this strategy, the HOV lane was revoked, and current HOVs are treated as GP vehicles. CACC vehicles are not given priority use of any lane, and they operate along with general purpose (GP) vehicles/ HVs. • Mixed managed lane (MML): This strategy aims to utilize the current lane use configura- tion of the network and provide priority usage of HOV lane for CACC vehicles. It investi- gates the effectiveness of introducing CACC vehicle to an existing ML facility. 9 • Dedicated CACC lane (DL): The exclusive access to the leftmost lane for CACC vehicles is studied. A homogeneous CACC traffic is believed to be beneficial for the CACC operation. The merging impact of CACC vehicles toward the leftmost lane can be studied as well. Like in UML, the HOVs are treated as GP vehicles in this strategy. • Dedicated CACC lane with access control (DLA): This strategy is essentially a dedicated CACC lane mentioned above but with access control where CACC vehicles are only able to move in or out of the ML at designated locations. Therefore, the weaving activities are aggregated at certain locations of the segment. It is formulated to insulate the CACC vehicle platoons form the potential impacts of the weaving activities. Table 4: Scenario settings for two cases. XXXXXXXXXXXX Strategy Lane BASE UML MML DL DLA 4th(leftmost) H G+C C+H C C 3rd G 2nd G 1st G G+C G+C G+C G G G G G G G G G Access Control N N N N Y 1H-HOV, G-GP, C-CACC Since MLs are commonly designed to be left-lane concurrent with at-grade entry/exit, the weaving which requires crossing multiple GPLs could have a negative impact on mobility and safety of the overall traffic. Therefore, the weaving length of the incoming CACC vehicle to the leftmost managed lane has to be considered when it comes to a ML design. California Department of Transportation (2018) suggested the minimal distance of 800 ft (243 m) per lane; whereas Washington State Department of Transportation (2006) proposed the minimal distance of 500 ft (152m) between an access zone and immediate on- or off- ramp. The access control level is a trade-off among accessibility, efficiency, and safety. The optimal access control level was studied by Saad et al. (2018) and the weaving length of 1,000 ft (333m) per lane change was recommended. Cai et al. (2018) investigated the safety impact of weaving lengths for lane change maneuver using a driving simulator. The 1,000 ft (333 m) optimal length for each lane change is based on the three evaluative measures: speed standard deviation, minimum time to collision, and potential collision events. According to the aforementioned recommendations, 1,000-ft (333-m) weaving length per lane for the location of the ML entry is adopted in this study. 4. Simulation Result The effectiveness of CACC-ML is discussed from the perspectives of overall network per- formance, safety, environmental impact, equity, and platooning performance. To factor in the variability of simulation, five replications are run for each combination of strategy and MP. 10 4.1. Network Performance The network-wide improvement of CACC under the four ML strategies are evaluated. Being developed by Caltrans PeMS (Chen et al., 2001), the Q value is the ratio of vehicle mile traveled (VMT) and vehicle hour traveled (VHT). The VHT represents the input of a freeway system, whereas the VMT gauges the output of a freeway system. It can be also considered as the speed on an aggregated level. Hence, the higher the value of Q, the better performance or more productive of a highway system. As shown in Fig. 6, introducing CACC vehicles to the network helps to improve the network efficiency even when MP is below 15%. UML achieves the highest efficiency among all strategies across the MP range in terms of Q values. For low MP range (less than 30%), the implementation of DL or DLA seems to be premature, because it decreases the efficiency of the network drastically. Fig. 6: Network Q value Fig. 7: Planning time index 11 The Planning Time Index (PTI) is defined as the ratio of the 95-percentile peak period travel time to the free-flow travel time (Federal Highway Administration, 2006). It is used for evaluating the travel time reliability of the ML strategies. As shown in Fig. 7, the original PTI for traversing the network is 1.50, which indicate that a driver needs to allocate 1.5 times of the free-flow travel time in order to ensure a 95% on-time arrival. The PTIs for UML and MML exhibit a decreasing trend as more CACC vehicles are introduced into the network. At 40% MP, the lowest PTIs for UML and MML are observed as 1.14 and 1.15, respectively. Travelers in both DL and DLA experience higher PTIs than the BASE when MP is below 30%. With a decreasing trend, at 50% MP, the DL and DLA reach the same level of the PTIs as observed for UML and MML at 40% MP. 4.2. Safety The standard deviation of speed, as a Safety Surrogate Assessment Model (SSAM) (Lee et al., 2014; Li et al., 2017), has been used to assess the safety performance (Gettman and Head, 2003). Generally, a lower value in the standard deviation of speed represents a more stable traffic flow (Songchitruksa et al., 2016). In any of the ML strategy, the standard deviation of speed exhibits a decreasing trend as the MP goes up as shown in Fig. 8. The improvement in terms of the SSAM is observed in UML and MML even at low MP range. The DL and DLA start with higher values of standard deviation than that of the BASE. They both resumes to the baseline level at 30% MP. Between DL and DLA, the former display a marginally lower standard deviation at each MP level that is below 50%. Additionally, the speed standard deviation of UML is consistently lower than that of MML throughout all levels of MP. Fig. 8: Standard deviation of speed 4.3. Environmental Impact The VT-Micro model (Rakha et al., 2004) is implemented in the Vissim EmissionModel.DLL (PTV AG, 2018a) to collect second-by-second fuel consumption for each vehicle. The entire network is treated as a system and the average fuel consumption for each vehicle per second is 12 shown in Fig. 9. All the testing scenarios yield a lower fuel consumption with the exception of 20% and 25% MP for both DL and DLA. The higher the MP, the greater the reduction in fuel consumption is observed. Fig. 9: Average fuel consumption 4.4. Equity Equity refers to fairness when it comes to distributing impacts. Horizontal transportation eq- uity, in the context of CACC-ML, is the impact distribution among CACC users and non-CACC users. Traffic speed and roadway level-of-service can be used as indicators to measure impacts that affect equity (Litman, 2002). When the performance on GPLs is degraded, negative equity is distributed to GP users. To measure the equity distribution among all four ML strategies, the segment travel time for traversing the entire segment on the mainline is compared. For each Violin plot shown in Fig. 10, the widths on either side are scaled by the number of observations. The quartiles of the distributions are also shown in the shade of the violin plot. Under UML, a narrower distribution of travel time is observed even at 5% MP, which means both CACC or GP vehicles do not experience negative equity. Across the rest of the MP levels, the distributions of GP travel time remain nearly unchanged but with fewer high values observed in the BASE. With the increase of CACC vehicles, it is also observed that the median values of the distributions remain the same in UML. For MML where HOVs are grouped into GP vehicles, improvement only shows when MP reaches 10% and the trend is maintained until MP reaches 50%. For DL and DLA, the travel times get worsen when MP is below 30% and the improvement only shows above 35% MP. Among all the scenarios, the CACC travel time distributions have lower variances and medians than GP vehicles that are operated in the prevailing traffic condition. 13 Fig. 10: Travel time comparison based on vehicle type 4.5. Platooning Performance In this section, a set of rarely-examined MOEs is introduced. They are related to CACC clus- tering and made possible by the high customizability of VEDM. One of the major benefits of CACC is the compact vehicle platoons with short intra-platoon following distance enabled by the V2V communication. As such, the number of vehicles within platoons is positively correlated to the improvement in throughput. The average percentage of CACC vehicles is shown in Fig. 11. With the CACC demand increases, the percentage of the number of platooned CACC vehicles de- creases in both UML and MML, which seems counterintuitive. In fact, this indicates the increased difficulties for additional CACC vehicles to form platoons. When the slope of a curve is positive as shown in DL, the platooning opportunity increases as the presence of CACC vehicles increases. If a curve linearly increases at a 45-degree slope, it is an indication that all the additional CACC vehicles get the same likelihood of forming platoons. For a negative slope of the curve, the cor- responding ML strategy is not able to offer clustering opportunity at the same level as MP grows. Between 20% and 50% MP, DLA outperforms other strategies and it is only marginally surpassed 14 by DL at 55 % MP. Fig. 11: Percentage of CACC vehicle in platoons During the simulation run, each CACC vehicle registers its sequence in a platoon. Due to the decentralized execution for each CACC vehicle in VEDM, the mean platoon depth (Amoozadeh et al., 2015) is calculated. The mean platoon depth represents the mean platoon position reported by each CACC vehicle and it is a good indicator of the average size of platoons in the network. As shown in Fig. 12, there is a major distinction between the two types of ML strategies: the type with dedicated CACC lane (i.e. DL and DLA) and the type without. The smallest and greatest gaps observed between these two types of ML strategies are 0.16 at 25% MP and 0.25 at 35%, respectively. Fig. 12: Average platoon position The formation and dissolution of CACC platoons occur dynamically under mixed traffic con- ditions due to various reasons (e.g. vehicles exiting a freeway, non-CACC vehicles cutting in, or 15 communication disruption). At certain timeframe, there is a percentage of CACC vehicles that are in platoons, utilizing the intra-platoon, short following distance. On the other hand, there is the duration of the CACC vehicles in platoons. The dynamic changing of the two aforementioned measures during operation makes it difficult to spatially and temporally measure the effectiveness of forming CACC platoons. To account for this phenomenon, the vehicle hour platooned (VHP) is proposed in this study to quantify the temporospatial platooning performance for the entire net- work. The VHP is the accumulation of the number of CACC vehicles that are in platoons within an hour. In Fig. 13, the convex shape in UML and MML curves indicate that a non-linear growth of VHP as the MP increases. Compared to UML and MML, DL and DLA yield consistently higher values of VHP. The increasing trends in DL and DLA exhibit a linear pattern. Fig. 13: Vehicle hour platooned A score matrix system that factors in all the aforementioned performance measures is de- veloped. Table 5 summarizes the score assignment rule. The first four heterogeneous types of performance measures (i.e. mobility, safety, equity, and environmental impact) are determined based on the comparison with the BASE, whereas the CACC platooning score is determined by the comparisons among the four tested strategies at each level of MP. Table 5: Vehicle Control Parameters Parameter Traditional performance measure (mobility, safety, equity, and environmental impact) Evaluation Score improvement: 1 neutral: 0 degradation:-1 CACC platoon formation ranked among 4 strategies 1st: 4, 2nd: 3, 3rd: 2, 4th: 1 Fig. 14(a) and (b) show the evaluation scores for the network performance and platooning performance, respectively. Since the calculation of the two score categories is different, normal- 16 ization is performed before summation to obtain the scores in Fig. 14(c) that represent the overall evaluation scores between the critical MP range. When MP is below 25%, both UML and MML strategies are suitable options for CACC deployment, depending on whether an existing ML strat- egy is already in place. When the MR reaches above 30%, both MML and DLA strategies are viable options. Either DL or DLA is able to create homogeneous CACC traffic; however, DLA is able to provide better operational accommodation for CACC. The recommendations are summa- rized in Fig. 15. (a) traffic performance score (b) platooning performance score (c) normalized sum of score Fig. 14: Managed lane evaluation score Fig. 15: Managed lane policy recommendations 5. Conclusions This study focuses on assessing the effectiveness of four managed lane (ML) strategies for the near-term deployment of CACC under mixed traffic conditions. An integrated microscopic simulation testbed is employed to conduct the large-scale traffic simulation on the calibrated I-66 segment in Fairfax County, Virginia. Note that the types of the ML strategies tested in this study are not intended to be exhaustive. Additionally, the control parameters for CACC vehicles could vary when it comes to implementation. The desired time gaps used in this study are relatively con- servative (i.e., 1 s and 1.2 s), and it would become even shorter as the MP grows. The powertrain parameters used in this study could also be different in the future as lighter vehicles (without the 17 heavy safety frame) become viable due to drastically fewer crashes. Nevertheless, the simulations reveal several important aspects of deploying CACC in mixed traffic, most of which have rarely been discussed and yet the stakeholders have to take into account. Besides the traditional network- wide performance measures, a set of platoon performance measures are put forward to evaluate the platoon formation of CACC vehicles. Additionally, the evaluation score matrices considering various aspects of CACC deployment were proposed to demonstrate the overall suitability for each ML strategy. For locations without existing managed lane policy, mixing CACC traffic across all travel lanes is an acceptable option when the market penetration rate is below 30%. Mixed managed lane (e.g., HOV + CACC, HOT + CACC) is a versatile option for providing priority lane usage for CACC vehicles, especially in the locations where ML strategies have already been implemented. It is premature to implement CACC lane when market penetration (MP) is below 30%, due to the degradation of the traffic condition on the general purpose lanes. When the mid-range MP (30% to 55%) is reached, CACC lane begins to show its advantages for facilitating CACC clustering and forming homogeneous CACC traffic that is ultimately necessary for the further harness of the benefits of CACC (e.g., higher speed limit and short headway intra-platoon car following). Further exploration of the operation of CACC-ML is very much needed, including the ways to optimize the operational efficiency for the managed lane in conjunction with other CAV-based systems, such as speed harmonization, automated merging assistance, one-way vehicle communi- cation devices, etc. In addition, the clustering strategy for CACC-ML in mixed traffic conditions is an under-explored area at the current stage. Such operation should be performed at a tactical driving level beyond the basic operational level as defined by Society of Automotive Engineers In- ternational (2014). Moreover, the interactions between CAVs and HVs is another area that deserve more attentions. Thus far, the majority of the studies have been focusing on CAVs. The potential impacts on HVs from CAVs (e.g., platoon blockage, induced weaving) should not be overlooked, especially when active clustering strategy is employed. 18 Appendix A. Definitions for the abbreviations used Abbreviation V2V DOT CACC CAV DSRC MP HOV HOT XBL GP HV AHS ADS SARTRE PATH ML RFID GPS COM VEDM E-IDM CAH MOBIL UML MML DL DAL VMT VHT PTI SSAM MOE VHP DDT ODD Definition vehicle-to-vehicle department of transportation cooperative adaptive cruise control connected and automated vehicle dedicated short-range communication market penetration high occupancy vehicle high-occupancy toll exclusive bus lane general purpose vehicle human-driven vehicle automated highway system automated driving system Safe Road Trains for the Environment project Partners for Advanced Transportation Technology managed lane radio frequency identification global positioning system component object model Vissim external driver model enhanced intelligent driver model constant-acceleration heuristic minimizing overall braking induced by lane change unmanaged lane mixed managed lane dedicated lane dedicated lane with access control vehicle mile traveled vehicle hour traveled planning time index safety surrogate assessment model measure of effectiveness vehicle hour platooned dynamic driving task operational design domain 19 References Amoozadeh, M., Deng, H., Chuah, C.-N., Zhang, H. M., Ghosal, D., apr 2015. Platoon management with cooperative adaptive cruise control enabled by VANET. Vehicular Communications 2 (2), 110 -- 123. URL https://www.sciencedirect.com/science/article/pii/S2214209615000145 Arnaout, G., Arnaout, J.-P., 2014. Exploring the effects of cooperative adaptive cruise control on highway traffic flow using microscopic traffic simulation. Transportation Planning and Technology. Bu, F., Tan, H.-S., Huang, J., 2010. Design and field testing of a cooperative adaptive cruise control system. In: American Control Conference (ACC), 2010. IEEE, pp. 4616 -- 4621. Cai, Q., Saad, M., Abdel-Aty, M., Yuan, J., Lee, J., 2018. Safety impact of weaving distance on freeway facili- ties with managed lanes using both microscopic traffic and driving simulations. Transportation Research Record, 0361198118780884. California Department of Transportation, 2018. High-occupancy vehicle guidelines. Tech. rep. http://www.dot.ca.gov/trafficops/tm/docs/HOV_Guidelines-English-Edition-Jan2018. URL pdf Chen, C., Petty, K., Skabardonis, A., Varaiya, P., Jia, Z., 2001. Freeway performance measurement system: mining loop detector data. Transportation Research Record: Journal of the Transportation Research Board (1748), 96 -- 102. Chen, Q., Schmidt-Eisenlohr, F., Jiang, D., Torrent-Moreno, M., Delgrossi, L., Hartenstein, H., 2007. Overhaul of ieee 802.11 modeling and simulation in ns-2. In: Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems. ACM, pp. 159 -- 168. D´avila, A., 2012. Sartre report on infrastructure and environment. Tech. rep., Technical Report for European Commis- sion under the Framework 7 Programme Project 233683 Deliverable 5.2). Cambridge, UK: Ricardo UK Limited, 2012. http://www. sartre-project. eu/en/publications/Documents/SARTRE 5 002 PU. pdf. Eckhardt, J., 2016. European truck platooning challenge 2016. The Hague, Delta3. Federal Highway Administration, 2006. Making it there on time, all the time. Federal Highway Administration, 2008. Managed Lanes: A Primer. Tech. rep., Washington DC, United States. Gettman, D., Head, L., 2003. Surrogate safety measures from traffic simulation models. Transportation Research Record: Journal of the Transportation Research Board (1840), 104 -- 115. Hussain, O., Ghiasi, A., Li, X., 2016. Freeway lane management approach in mixed traffic environment with connected autonomous vehicles. arXiv preprint arXiv:1609.02946. Kesting, A., Treiber, M., Helbing, D., 2007. General lane-changing model mobil for car-following models. Trans- portation Research Record 1999 (1), 86 -- 94. Kesting, A., Treiber, M., Helbing, D., 2010. Enhanced intelligent driver model to access the impact of driving strate- gies on traffic capacity. Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences 368 (1928), 4585 -- 4605. Killat, M., Hartenstein, H., 2009. An empirical model for probability of packet reception in vehicular ad hoc networks. EURASIP Journal on Wireless Communications and Networking 2009, 4. Kim, J., Park, S., Na, S., Lee, S., 2015. Sustainable highway operations: High occupancy lane and movable lane. International Journal of Transportation 3 (3), 1 -- 10. Larson, J., Kammer, C., Liang, K.-Y., Johansson, K. H., 2013. Coordinated route optimization for heavy-duty vehicle platoons. In: Intelligent Transportation Systems-(ITSC), 2013 16th International IEEE Conference on. IEEE, pp. 1196 -- 1202. Lee, J., Bared, J., Park, B., 2014. Mobility impacts of cooperative adaptive cruise control (cacc) under mixed traffic conditions. In: 93rd Annual Meeting of the Transportation Research Board, Washington, DC. Leidos, 2016. Simulation of evolutionary introduction of cooperative adaptive cruise control equipped vehicles into traffic. Tech. rep., Saxton Transportation Operations Laboratory. Li, T., Ma, J., Hale, D. K., 2019. High-occupancy vehicle lanes on the right: an alternative design for congestion reduction at freeway merge, diverge, and weaving areas. Transportation Letters 0 (0), 1 -- 13. URL https://doi.org/10.1080/19427867.2019.1584347 Li, Y., Wang, H., Wang, W., Xing, L., Liu, S., Wei, X., 2017. Evaluation of the impacts of cooperative adaptive cruise control on reducing rear-end collision risks on freeways. Accident Analysis & Prevention 98, 87 -- 95. 20 Liang, K.-Y., Mårtensson, J., Johansson, K. H., 2013. When is it fuel efficient for a heavy duty vehicle to catch up with a platoon? In: 7th IFAC Symposium on Advances in Automotive Control, Tokyo, Japan, September 4-7, 2013. Litman, T., 2002. Evaluating transportation equity. World Transport Policy & Practice 8 (2), 50 -- 65. Litman, T., 2017. Autonomous vehicle implementation predictions. Victoria Transport Policy Institute Victoria, Canada. Liu, H., Kan, X. D., Shladover, S. E., Lu, X.-Y., Ferlis, R. E., 2018. Modeling impacts of cooperative adaptive cruise control on mixed traffic flow in multi-lane freeway facilities. Transportation Research Part C: Emerging Technologies 95, 261 -- 279. URL http://www.sciencedirect.com/science/article/pii/S0968090X18310313 Milan´es, V., Shladover, S. E., Spring, J., Nowakowski, C., Kawazoe, H., Nakamura, M., 2014. Cooperative adaptive cruise control in real traffic situations. IEEE Trans. Intelligent Transportation Systems 15 (1), 296 -- 305. Nowakowski, C., Shladover, S. E., Cody, D., 2011. Cooperative Adaptive Cruise Control : Testing Drivers' Choices of Following Distances (January). PTV AG, 2015. Introduction to the com api. PTV AG. D-76131 Karlsruhe, Germany. PTV AG, 2017. PTV Vissim Drivermodel DLL Interface Documentation. PTV Group, Karlsruhe, Germany. PTV AG, 2018a. Emission Modelling. http://vision-traffic.ptvgroup.com/en-us/products/ptv-vissim/use-cases/ PTV AG, 2018b. Ptv vissim. Retrieved from PTV Group: http://vision-traffic. ptvgroup. com/enus/products/ptv- URL emissions-modelling/ vissim/use-cases/junction-geometry. Qom, S. F., Xiao, Y., Hadi, M., 2016. Evaluation of cooperative adaptive cruise control (cacc) vehicles on managed lanes utilizing macroscopic and mesoscopic simulation. In: Transportation Research Board 95th Annual Meeting. No. 16-6384. Rajamani, R., Shladover, S. E., 2001. An experimental comparative study of autonomous and co-operative vehicle- follower control systems. Transportation Research Part C: Emerging Technologies 9 (1), 15 -- 31. Rakha, H., Ahn, K., Trani, A., 2004. Development of vt-micro model for estimating hot stabilized light duty vehicle and truck emissions. Transportation Research Part D: Transport and Environment 9 (1), 49 -- 74. Saad, M., Abdel-Aty, M., Lee, J., Wang, L., 2018. Access design safety analysis for managed lanes including acces- sibility level and weaving length. Tech. rep. Shewmake, S., Jarvis, L., 2014. Hybrid cars and hov lanes. Transportation Research Part A: Policy and Practice 67, 304 -- 319. Shladover, S. E., Nowakowski, C., Lu, X.-Y., 2018. Using Cooperative Adaptive Cruise Control ( CACC ) to Form High-Performance Vehicle Streams Definitions , Literature Review and Operational Concept Alternatives. Tech. rep., University of California Berkeley: California Partners for Advanced Transportation Technology. URL https://escholarship.org/uc/item/3w6920wz Shladover, S. E., Nowakowski, C., Lu, X.-Y., Ferlis, R., 2015. Cooperative adaptive cruise control: Definitions and operating concepts. Transportation Research Record: Journal of the Transportation Research Board (2489), 145 -- 152. Shladover, S. E., Su, D., Lu, X.-Y., 2012. Impacts of cooperative adaptive cruise control on freeway traffic flow. Transportation Research Record 2324 (1), 63 -- 70. Society of Automotive Engineers International, 2014. Surface Vehicle Recommended Practice. Taxonomy and Defi- nitions for Terms Related to Driving Automation Systems for On-Road Motor Vehicles 4970, 724 -- 776. Songchitruksa, P., Bibeka, A., Lin, L. I., Zhang, Y., et al., 2016. Incorporating driver behaviors into connected and automated vehicle simulation. Tech. rep., Center for Advancing Transportation Leadership and Safety (ATLAS Center). The Victoria Transport Policy Institute, 2018. The victoria transport policy institute. URL http://www.vtpi.org/ Transportation Research Board, 2018. Dedicating Lanes for Priority or Exclusive Use by Connected and Automated Vehicles. The National Academies Press, Washington, DC. URL https://www.nap.edu/catalog/25366 Treiber, M., Hennecke, A., Helbing, D., 2000. Congested Traffic States in Empirical Observations and Microscopic 21 http://link.aps.org/doi/10.1103/PhysRevE.62.1805http://www.theo2.physik. Tsugawa, S., Jeschke, S., Shladover, S. E., 2016. A review of truck platooning projects for energy savings. IEEE Simulations. Physical Review E 62 (2), 1805. URL uni-stuttgart.de/treiber/ Trans. Intelligent Vehicles 1 (1), 68 -- 77. Tsugawa, S., Kato, S., Aoki, K., 2011. An automated truck platoon for energy saving. In: Intelligent Robots and Systems (IROS), 2011 IEEE/RSJ International Conference on. IEEE, pp. 4109 -- 4114. Van Arem, B., Van Driel, C. J., Visser, R., 2006. The impact of cooperative adaptive cruise control on traffic-flow characteristics. IEEE Transactions on intelligent transportation systems 7 (4), 429 -- 436. van Willigen, W., Haasdijk, E., Kester, L., 2013. A multi-objective approach to evolving platooning strategies in intelligent transportation systems. In: Proceedings of the 15th annual conference on Genetic and evolutionary computation. ACM, pp. 1397 -- 1404. Washington State Department of Transportation, 2006. Hot lane buffer and mid-point access design review. Tech. rep. URL https://www.wsdot.wa.gov/research/reports/fullreports/651.1.pdf Wiedemann, R., 1991. Modelling of rti-elements on multi-lane roads. In: Drive Conference (1991: Brussels, Bel- Wille, M., Rowenstrunk, M., Debus, G., 2007. Konvoi: Electronically coupled truck convoys. Human Factors for gium). Vol. 2. assistance and automation, 243. Xiang, W., Gozalvez, J., Niu, Z., Altintas, O., Ekici, E., 2009. Wireless access in vehicular environments. Zhang, X., Ma, J., Smith, B., Liu, J., 2018. Operational performance evaluation of the managed lane strategy for early deployment of cooperative adaptive cruise control. Tech. rep. Zhong, Z., 2018. Assessing the effectiveness of managed lane strategies for the rapid deployment of cooperative adaptive cruise control technology. Ph.D. thesis, Newark, NJ. URL pdf http://archives.njit.edu/vol01/etd/2010s/2018/njit-etd2018-033/njit-etd2018-033. Zhong, Z., Lee, J., 2018. Simulation Framework for Cooperative Adaptive Cruise Control with Empirical DSRC Module (forthcoming). The 44th Annual Conference of the IEEE Industrial Electronics Society. URL http://arxiv.org/abs/1810.06510 22
1209.5331
1
1209
2012-09-24T16:53:41
Reliability of swarming algorithms for mobile sensor network applications
[ "cs.MA" ]
There are many well-studied swarming algorithms which are often suited to very specific purposes. As mobile sensor networks become increasingly complex, and are comprised of more and more agents, it makes sense to consider swarming algorithms for movement control. We introduce a natural way to measure the reliability of various swarming algorithms so a balance can be struck between algorithmic complexity and sampling accuracy.
cs.MA
cs
Reliability of swarming algorithms for mobile sensor network applications Poster Summary for FFT 2012 Steven Senger University of Delaware [email protected] 1 Abstract There are many well-studied swarming algorithms (for example, [2], [4], [5], [6], [7], [8], and [9]) which are often suited to very specific purposes. As mobile sensor networks become increasingly complex, and are comprised of more and more agents, it makes sense to consider swarming algorithms for movement control. We introduce a natural way to measure the reliability of various swarming algorithms so a balance can be struck between algorithmic complexity and sampling accuracy. The main idea is to utilize relatively well-developed tools (see [1]) from areas like frame theory to provide theoretical guidance for algorithm selec- tion. 1 2 Frames, frame potential, and energy Frames were first introduced in [3]. A frame is a set of vectors which, like a basis of a vector space, span a certain space of interest, but with perhaps (many) more vectors than necessary to span the space. This theory is imme- diately relevant for transmitting complex information through noisy or lossy media. More precisely, let Hd be a d-dimensional Hilbert space, then the set of vectors F = {fj}n j=1 ⊂ Hd, is a frame if there exist constants A and B, called frame bounds, such that for any y ∈ Hd, the following holds: Akyk2 ≤ X hy, fji2 ≤ Bkyk2, j where h·, ·i denotes the inner product associated to the Hilbert space. The more control one has on the frame bounds, the more "well-behaved" a given frame is. One useful measure of how well a given frame behaves is the so-called frame potential, introduced in [1]. The lower the frame potential, the better the frame is suited to many tasks. Retaining the notation above, the frame potential of a given frame is defined to be F P (F ) = n n X X i=1 j=1 hfi, fji2. The frame potential is related to a very physically motivated quantity used in many areas of mathematics called energy. Again, using the same notation as above, the energy of a collection of vectors is defined to be E(F ) = 1 (cid:0)n 2(cid:1) n n X X k i=1 j>i 1 fi − fjk2 . 2 3 Mobile sensor networks As the number of agents in mobile sensor networks increases, it will be nec- essary to consider asymptotic analysis of the algorithms which control them. It stands to reason that tools from frame theory could be usefully employed to study mobile sensor networks by viewing them as frames with dynamic vectors. Here is an example of such a result. An excellent example would be a swarm of drones flying just above a forest fire, regularly measuring quantities like temperature and humidity. This swarm of sensors is moving coherently in a some direction. Each agent of the swarm is taking samples of some quantity at regular intervals along the way. The agents should be well-distributed, so that the the region under consideration is sampled with minimum bias. Also, whatever quantities are being sampled will be assumed to not change too much, on average, over some small, fixed distance. Notice that the complexity of a given algorithm can strongly influence the possible velocity for such applications. Theorem 1. Let X (t) = {xj(t)}n j=1 ⊂ Rd be the positions of agents in a swarm at time t. Let vj(t) denote the velocity of the agent at position xj at time t, and let vavg = 1 n n X j=1 vj. Suppose further that the desired resolution in space of the sampling is such that each agent has a minimum separation of δ > 0 from each other agent, and that vj(t) − vavg < cδ, for some small constant c, independent of n. Fi- nally, let ρ(t) denote the ratio of the area which is covered by δ-balls centered at the agents to the area of the smallest cube containing the swarm at time t. Then for all times t such that E(X (t)) = 1 (cid:0)n 2(cid:1) n n X X i=1 j>i 1 kxi(t) − xj(t)k2 ≤ C, for some value C, independent of n, ρ(t) ≥ C ′, for some other value C ′, which is also independent of n. 3 4 Conclusion Energy can be determined by simulation before any swarm is given a navi- gation algorithm, so that various parameter sets can be tested cheaply. If a given algorithm or parameter set has energy which depends on the number of agents, there could be an uneven distribution of sensors. However, the theo- rem above guarantees that the distribution of sensors will be asymptotically robust. References [1] Benedetto and Fickus, Finite normalized tight frames, Adv. Comput. Math. 18, pp. 357 -- 385 (2003). [2] Cui, Hardin, Ragade, Elmaghraby, A Swarm-based Fuzzy Logic Control Mobile Sen- sor Network for Hazardous Contaminants Localization, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (2004). [3] Duffin and Schaeffer, A class of nonharmonic Fourier series, Trans. Amer. Math. Soc. 72 (1952) pp. 341 -- 366. [4] Kadrovach and Lamont, A Particle Swarm Model for Swarm-based Networked Sensor Systems, Proceedings of the 2002 ACM symposium on Applied computing, New York, NY, (2002). [5] Leonard, Paley, Lekien, Sepulchre, Fratantoni, and Davis, Collective Motion, Sensor Networks, and Ocean Sampling, Proceedings of the IEEE, Vol. 95, No. 1, January 2007. [6] Miller, Kolpas, Juchem Neto, and Rossi, A continuum three-zone model for swarms, Bull Math Biol. 2012 Mar; 74(3):536 -- 61. Epub 2011 Jul 29. [7] Smith, Chao, Li, Caron, Jones, and Sukhatme, Planning and Implementing Trajecto- ries for Autonomous Underwater Vehicles to Track Evolving Ocean Processes Based on Predictions from a Regional Ocean Model, International Journal of Robotics Re- search, 29(12) 1475 -- 1497, (2010). [8] Tillet, Rao, and Sahin, Cluster-Head Identification in Ad Hoc Sensor Networks us- ing Particle Swarm Optimization, 2002 IEEE International Conference on Personal Wireless Communications (2002). [9] Wang, Wang, Ma, An Improved Co-evolutionary Particle Swarm Optimization for Wireless Sensor Networks with Dynamic Deployment, Sensors 2007, 7, pp. 354 -- 370. 4
1212.0023
1
1212
2012-11-30T22:00:56
Emergence of Self-Organized Amoeboid Movement in a Multi-Agent Approximation of Physarum polycephalum
[ "cs.MA", "q-bio.CB" ]
The giant single-celled slime mould Physarum polycephalum exhibits complex morphological adaptation and amoeboid movement as it forages for food and may be seen as a minimal example of complex robotic behaviour. Swarm computation has previously been used to explore how spatiotemporal complexity can emerge from, and be distributed within, simple component parts and their interactions. Using a particle based swarm approach we explore the question of how to generate collective amoeboid movement from simple non-oscillatory component parts in a model of P. polycephalum. The model collective behaves as a cohesive and deformable virtual material, approximating the local coupling within the plasmodium matrix. The collective generates de-novo and complex oscillatory patterns from simple local interactions. The origin of this motor behaviour is distributed within the collective rendering is morphologically adaptive, amenable to external influence, and robust to simulated environmental insult. We show how to gain external influence over the collective movement by simulated chemo-attraction (pulling towards nutrient stimuli) and simulated light irradiation hazards (pushing from stimuli). The amorphous and distributed properties of the collective are demonstrated by cleaving it into two independent entities and fusing two separate entities to form a single device, thus enabling it to traverse narrow, separate or tortuous paths. We conclude by summarising the contribution of the model to swarm based robotics and soft-bodied modular robotics and discuss the future potential of such material approaches to the field.
cs.MA
cs
Emergence of Self-Organized Amoeboid Movement in a Multi-Agent Approximation of Physarum polycephalum Jeff Jones and Andrew Adamatzky Centre for Unconventional Computing, University of the West of England, Coldharbour Lane, Bristol BS16 1QY, UK. [email protected], [email protected] Abstract: The giant single-celled slime mould Physarum polycephalum exhibits complex morphological adaptation and amoeboid movement as it forages for food and may be seen as a minimal example of complex robotic behaviour. Swarm computation has previously been used to explore how spatio- temporal complexity can emerge from, and be distributed within, simple component parts and their interactions. Using a particle based swarm approach we explore the question of how to generate collective amoeboid movement from simple non-oscillatory component parts in a model of P. polycephalum. The model collective behaves as a cohesive and deformable virtual material, approximating the local coupling within the plasmodium matrix. The collective generates de-novo and complex oscillatory patterns from simple local interactions. The origin of this motor behaviour is distributed within the collective rendering is morphologically adaptive, amenable to external influence, and robust to simulated environmental insult. We show how to gain external influence over the collective movement by simulated chemo-attraction (pulling towards nutrient stimuli) and simulated light irradiation hazards (pushing from stimuli). The amorphous and distributed properties of the collective are demonstrated by cleaving it into two independent entities and fusing two separate entities to form a single device, thus enabling it to traverse narrow, separate or tortuous paths. We conclude by summarising the contribution of the model to swarm based robotics and soft-bodied modular robotics and discuss the future potential of such material approaches to the field. Keywords: amoeboid movement, swarm intelligence, distributed computation, collective behaviour, Physarum polycephalum Introduction: Classical robotics approaches typically connect separate sensory, control, and locomotion systems, using complex parts with little redundancy. Nature inspired robotics takes inspiration from aggregate populations, collective transport, segmentation of component parts, and soft-bodied motion in living systems. Swarm approaches to nature inspired computing seek to elucidate the sensory mechanisms and individual interactions which generate the complexity patterning and movement seen at very different scales in natural systems including car traffic dynamics (Helbing, 2001), human walking patterns (Helbing et al., 1998), (Helbing et al., 2001), flocking and schooling (Reynolds, 1987), collective insect movement (Buhl et al., 2006), (Kube and Bonabeau, 2000), and bacterial patterning (Matsushita et al., 1999), (Ben-Jacob, 2003). In all these examples there is a population of entities in space, coupled by sensory information. The different sensory coupling mechanisms between individuals in these apparently disparate systems has also been abstracted at a minimal level of self-propelled particles to find common mechanisms (Vicsek et al., 1995). Swarm approaches typically approximate collective movement at the population level. Distributed generation and control of movement also occurs at the individual level (Kennedy et al., 2001). Specific examples include flagellated movement of bacteria (Zhang et al., 2009), eukaryotes (Dreyfus et al., 2005), ciliated transport (Suh et al., 2000), peristaltic propulsion (Trimmer et al., 2006), (Saga and Nakamura, 2004), and amoeboid movement (Yokoi et al., 2003), (Umedachi et al., 2009). Many organisms make use of segmentation, employing identical or similar sub-units to form their body plan and generate structure and movement. Such modularity is attractive to computer science and robotics but presents challenges in terms of how to configure, communicate between, and control the devices. Population based approaches have also proved useful in tackling some of these issues. Internal propagation of simulated hormone signals was used to control gait patterns in simulated caterpillar-like modular robots (Salemi et al., 2001). Reconfiguration stimulated by crystalline mechanical transformation within a population of automata was demonstrated in (Rus and Vona, 2000) and future possibilities (and difficulties) in communicating between entities at larger scales with massive populations were discussed in (Goldstein et al., 2009). The exploitation of external environmental attractants (“seeds” and “scents”) was used to effect the reconfiguration of a simulated modular robotic system composed of simple finite state machines for the creation of specific manipulation structures (Bojinov et al., 2002), and pre-desired shapes (Stoy, 2006). Progress in biologically inspired robotics has also been made by considering the use of even simpler structures which straddle the boundary of non-living physical materials and living organisms including those acting as biological fibres and membranes (Zhang, 2003), lipid self assembly in terms of networks (Lobovkina et al., 2008), pseudopodium-like membrane extension (Lobovkina et al., 2009) and even those exhibiting simple chemotaxis responses (Lagzi et al.). Some engineering and biological insights have already been gained by studying the structure and function of what might be termed ‘semi-biological’ materials and the complex behaviour seen in such minimal examples raises questions about the lower bounds necessary for the emergence of apparently intelligent behaviour. An ideal hypothetical candidate for a biological machine would be an organism which is capable of the complex sensory integration, movement and adaptation of a living organism, yet which is also composed of a relatively simple material that is amenable to simple understanding and control of its properties. We suggest that the myxomycete organism, the true slime mould Physarum polycephalum, is a suitable candidate organism which meets both criteria; i.e. it is a complex organism, but which is composed of relatively simple materials. A giant single-celled organism, P. polycephalum is an attractive biological candidate medium for emergent motive force because the basic physical mechanism during the plasmodium stage of its life cycle is a self-organized system of oscillatory contractile activity which is used in the pumping and distribution of nutrients within its internal transport network. The organism is remarkable in that the control of the oscillatory behaviour is distributed throughout the almost homogeneous medium and is highly redundant, having no critical or unique components. The plasmodium is amorphous in shape and ranges from the microscopic scale to up to many square metres in size. It is a single cell syncytium formed by repeated nuclear division, comprised of a sponge-like actomyosin complex co-occurring in two physical phases. The gel phase is a dense matrix subject to spontaneous contraction and relaxation, under the influence of changing concentrations of intracellular chemicals. The protoplasmic sol phase is transported through the plasmodium by the force generated by the oscillatory contractions within the gel matrix. Protoplasmic flux, and thus the behaviour of the organism, is affected by changes in pressure, temperature, space availability, chemoattractant stimuli and illumination (Carlile, 1970; Durham and Ridgway, 1976; Kishimoto, 1958; Nakagaki et al., 1996; Nakagaki et al., 2000b; Takamatsu et al., 2000; Ueda et al., 1975). The P. polycephalum plasmodium can thus be regarded as a complex functional material capable of both sensory and motor behaviour. Indeed P. polycephalum has been described as a membrane bound reaction-diffusion system in reference to both the complex interactions within the plasmodium and the rich computational potential afforded by its material properties (Adamatzky et al., 2008). The study of the computational potential of the P. polycephalum plasmodium was initiated by Nakagaki et al. (Nakagaki et al., 2000a) who found that the plasmodium could solve simple maze puzzles. This research has been extended and the plasmodium has demonstrated its performance in, for example, path planning and plane division problems (Shirakawa and Gunji, 2010), (Shirakawa et al., 2009), spanning trees and proximity graphs (Adamatzky, 2007),(Adamatzky, 2008), simple memory effects (Saigusa et al., 2008), the implementation of individual logic gates (Tsuda et al., 2004) and P. polycephalum inspired models of simple adding circuits (Jones and Adamatzky, 2010). From a robotics perspective it was shown that by its adaptation to changing conditions within its environment, the plasmodium may be considered as a prototype micro-mechanical manipulation system, capable of simple and programmable robotic actions including the manipulation (pushing and pulling) of small scale objects (Adamatzky and Jones, 2008), transport and mixing of substances (Adamatzky, 2010c) and as a guidance mechanism in a biological—mechanical hybrid approach where the response of the plasmodium to light irradiation was used to provide feedback control to a robotic system (Tsuda et al., 2007). A P. polycephalum inspired approach to amoeboid robotics was demonstrated by Umedachi et. al. (Umedachi et al., 2009) in which an external ring of coupled oscillators, each connected to passive and tuneable springs was coupled to a fluid filled inner bladder. The compression of the peripheral springs mimicked the gel contractile phase and the flux of sol within the plasmodium was approximated by the coupled transmission of water pressure to inactive (softer) springs, thus deflecting the peripheral shape of the robot. The resulting movement exhibited flexible behaviour and amoeboid movement. This paper is also motivated by the complex sensory and foraging behaviour of P. polycephalum, however it takes a different approach from that of Umedachi et al. Instead of trying to build an amoeboid robot with pre-existing oscillatory components, we investigate how oscillatory behaviour may emerge from the local interactions between simple component parts to generate self-organized amoeboid movement. The method uses a swarm based, or multi-agent, population exploiting self-organization to behave as a collective virtual material. We demonstrate the emergence of the oscillatory phenomena within the material, its utilisation for collective, amorphous and controllable amoeboid movement, and mechanisms for external control of the material by simulated chemoattraction and repulsion by light hazards. We conclude by discussing some novel properties of the approach within the context of existing research into swarm robotics and modular robotics. Methods: To investigate the use of emergent oscillatory phenomena for collective movement we employ a simple extension to the particle approximation of P. polycephalum network adaptation in (Jones, 2010b) which was shown to generate dynamical emergent transport networks. In this approach a plasmodium is composed of a population of mobile particles with very simple behaviours, residing within a 2D diffusive environment. A discrete 2D lattice (where the features of the environment arena are mapped to greyscale values in a 2D image) stores particle positions and also the concentration of a local factor which we refer to generically as chemoattractant. The ‘chemoattractant’ factor actually represents the hypothetical flux of sol within the plasmodium. Free particle movement represents the sol phase of the plasmodium. Particle positions represent the fixed gel structure (i.e. global pattern) of the plasmodium. Particles act independently and iteration of the particle population is performed randomly to avoid introducing any artifacts from sequential ordering. Particle behaviour is divided into two distinct stages, the sensory stage and the motor stage. In the sensory stage, the particles sample their local environment using three forward biased sensors whose angle from the forward position (the sensor angle parameter, SA), and distance (sensor offset, SO) may be parametrically adjusted (Figure 1a). The offset sensors represent the overlapping and intertwining filaments within the transport networks and plasmodium, generating local coupling of sensory inputs and movement to form networks of particles (Figure 1c) and sheets of particles (Figure 1d). The SO distance is measured in pixels and a minimum distance of 3 pixels is required for strong local coupling to occur. The coupling effect increases as SO increases. [Sensory stage] - Sample chemoattractant map values - if (F > FL) && (F > FR) - Continue facing same direction - Else if (F < FL) && (F < FR) Rotate by RA towards larger of FL and FR - Else if (FL < FR) Rotate right by RA - Else if (FR < FL) Rotate left by RA - Else Continue facing same direction Figure 1: Agent particle morphology, algorithm, and aggregation types. a) Schematic illustration of agent particle showing central position and offset sensors. b) Pseudocode of agent sensory algorithm to align with strongest source from the forward biased sensors. c) Schematic illustration of agent particles in transport network configuration d) Schematic illustration of agent particles within simulated plasmodial sheet. During the sensory stage each particle changes its orientation to rotate (via the parameter rotation angle, RA) towards the strongest local source of chemoattractant (Figure 1b). After the sensory stage, each particle executes the motor stage and attempts to move forwards in its current orientation (an angle from 0—360) by a single pixel. Each lattice site may only store a single particle and—critically—particles deposit chemoattractant into the lattice only in the event of a successful forwards movement (Figure 2a). If the next chosen site is already occupied by another particle the default (non-oscillatory) behaviour is to abandon the move, remain in the current position, and select a new random direction (Figure 2b). Diffusion of the collective chemoattractant signal is achieved via a simple 3x3 mean filter kernel with a damping parameter (set to 0.07) to limit the diffusion distance of the chemoattractant. The low level particle interactions result in complex pattern formation. The population spontaneously forms dynamic transport networks showing complex evolution and quasi-physical emergent properties, including closure of network lacunae, apparent surface tension effects and network minimisation. An exploration of the possible patterning parameterisation was presented in (Jones, 2010a). Although the particle model is able to reproduce many of the network based behaviours seen in the P. polycephalum plasmodium such as spontaneous network formation, shuttle streaming and network minimisation, the default motor behaviour does not exhibit oscillatory phenomena and inertial surging movement, as seen in the organism. This is because the default action when a particle is blocked (i.e. when the chosen site is already occupied) is to randomly select a new orientation, resulting in very fluid network evolution resembling the relaxation evolution of soap films and the lipid nanotube networks seen in (Lobovkina et al., 2008). The oscillatory phenomena seen in the plasmodium are thought to be linked to the spontaneous assembly/disassembly of actomyosin and cytoskeletal filament structures within the plasmodium which generate contractile forces on the protoplasm within the plasmodium. The resulting shifts between gel and sol phases prevent (gel phase) and promote (sol phase) cytoplasmic streaming within the plasmodium. To mimic this behaviour in the particle model requires only a simple change to the motor stage. Instead of randomly selecting a new direction if a move forward is blocked, the particle increments separate internal co-ordinates until the nearest cell directly in front of the particle is free. When a cell becomes free, the particle occupies this new cell and deposits chemoattractant into the lattice (Figure 2c). The effect of this behaviour is to remove the fluidity of the default movement of the population. The result is a surging, inertial pattern of movement dependent on population density (the population density specifies the initial amount of free movement within the population). The strength of the inertial effect can be damped by a parameter (pID) which determines the probability of a particle resetting its internal position coordinates, lower values providing stronger inertial movement. When this simple change in motor behaviour is initiated surging movements are seen and oscillatory domains of chemoattractant flux spontaneously appear within the virtual plasmodium showing characteristic behaviours: temporary blockages of particles (gel phase) collapse into sudden localised movement (solation) and vice versa. The oscillatory domains themselves undergo complex evolution including competition, phase changes and entrainment. We utilise these dynamics below to investigate the possibility of generating useful patterns of regular oscillations which may be coupled to provide motive force. Figure 2: Particle motor behaviour in non-oscillatory and oscillatory conditions a) A particle moves forward to occupy a vacant cell and deposits chemoattractant at the new location. b) A non-oscillatory particle will select a new random location if the preferred cell is occupied. c) If the preferred cell is occupied, the oscillatory particle will maintain the direction until a cell in front is free. Model Setup The emergence of oscillatory behaviour in the model corresponds to differences in distribution of protoplasm within the plasmodium and subsequent changes in thickness of the plasmodium. In the P. polycephalum plasmodium, changes in thickness of the plasmodium membrane are used to provide impetus (pumping of material through the vein network, or bulk movement of the plasmodium). There is known to be a reciprocal relationship between the spontaneous contraction of the plasmodium and the subsequent transport of protoplasm away from that region (Takamatsu et al., 2000). Thus the region undergoing contraction becomes thinner (allowing more light transmission when illuminated) as protoplasm is being transported away from the contraction zone. Protoplasmic tubes connected to the contraction zone become thicker as more protoplasm is transported from the zone (thus allowing less light transmission). In the computational model the transport of particles represents the free flux of protoplasm within the material and a local increase in flux (particle movement) is indicated in the supplementary video recordings by a temporary increase in greyscale brightness at this location. A decrease in the bulk movement of particles represents local congestion (lack of transport) and is indicated by a decrease in greyscale brightness (since deposition of chemoattractant factor only occurs in the event of successful forward movement). Supplementary video recordings showing the initiation and entrainment of oscillatory phenomena, and recordings from specific figures in the paper text can be found at: http://uncomp.uwe.ac.uk/jeff/collectivemovement.htm. For visual clarity in the static images, the greyscale images are inverted (dark areas indicate greater flux). The particle population environment is a 2D lattice, represented by a digitised image configured to represent the habitat of the experimental plasmodium. The habitat is composed of ‘wall’ regions where particle occupancy and movement cannot occur, ‘vacant’ regions where occupancy and movement are possible and, where relevant, ‘stimulus’ regions which provide attraction stimuli, or repulsion stimuli, to the particle population. In the experiments there is an initial period where oscillatory behaviour is not initially activated and this results in self-organized regularly spaced domains within the collective. When oscillatory motor behaviour is induced these regular domains collapse and small domains of disorganized oscillators begin to emerge. The oscillation domains are composed of local areas of flux (brighter) and obstruction (darker). Over time these domains compete and coalesce, causing entrainment of the population into regular oscillation patterns, influenced by both the particle sensory parameters and also by the shape of the experimental arenas. Emergence of Amoeboid Movement P. polycephalum utilises internal protoplasmic transport to migrate towards nutrient sources and away from hazardous sources (Durham and Ridgway, 1976), and adapts its gross body plan to changing environments (Nakagaki et al., 2004; Nakagaki et al., 2007). Small plasmodia can shift the entire plasmodium away from unfavourable conditions such as bacterial or fungal contamination. The plasmodium is also notable for its ability to survive physical damage; fragments of plasmodium excised can survive independently and individual plasmodia may be fused to form a single organism. To utilise a vehicular analogy, P. polycephalum not only represents the internal mechanicals (motive force mechanism, transmission coupling), but also the moving vehicle itself, and is a vehicle which can survive the removal of parts, the introduction of new foreign parts and the repair of damaged parts. We set out to explore the behaviour of the particle collective to assess its behaviour when compared to a fragment of P. polycephalum plasmodium. When oscillatory motor behaviour is not used the particle collective condenses into a uniform circular shape as the initial transport network condenses (Figure 3a). The non-oscillatory blob shows regular vacancy domains (dark areas) and the fluid particle motion afforded by the non-oscillatory motor condition ensures that the blob is cohesive and takes a minimal shape. The non-oscillatory blob is also resilient to external perturbation. When excited by an externally applied source of chemoattractant (Figure 3a, mouse position in fourth image), the deformation of the collective induced by the stimulus as it is attracted to the stimuli is repaired when the stimulus is removed, the collective returning to its minimal shape. When oscillatory motor behaviour is initialised the regular domains collapse as the particle motion becomes less fluid (Figure 3b) and oscillations travel through the collective. Because the small collective is not constrained by any externally applied pattern the oscillations distort the shape of the collective. When the pID parameter is further reduced to 0.01 there is even greater restriction on the fluidity of individual particle movement and the oscillations become stronger and distort the collective’s boundary significantly. The large shift of a mass of particles causes the collective to move across its environment. The cohesion of the collective is maintained but other SA/RA parameter settings, combined with lower sensor interaction (SO) distance, can result in the fragmentation of the collective (see supplementary material for examples of oscillation patterns using different SA/RA combinations). a) b) c) Figure 3: Initiation of oscillatory behaviour and amoeboid movement in simulated plasmodium Images show flux within simulated plasmodium over time. Images anchored to fixed location. a) Condensation of blob material in non-oscillatory behaviour shows vacancy domains and resilience to deformation. Collective of 9380 particles, SA90, RA45, SO15 b) Initial non-oscillatory collective with regular vacancy domains (left) and onset of oscillatory behaviour at 1950, 2039, 2057, 2086 and 2122 scheduler steps. pID set to 0.05. All other parameters as in (a) c) Reduction of pID to 0.01 results in stronger oscillations and amoeboid movement at 4648, 4684. 4720, 4768 and 4836 scheduler steps. All other parameters as in (a) Persistent Movement in a Small Blob Fragment The amoeboid movement seen in Figure 3 occurs because the oscillation waves distort the boundary of the collective whilst it is still able to maintain a cohesive whole. Because the population maintains its cohesion, any distortion of the boundary on one side must result in a shift in population distribution from the opposite side (since the collective is non-compressible and occupies a fixed area). The diameter of the collective (a function of the number of pixel sized particles comprising it) must be large enough to for oscillations to emerge and to confine an oscillation pattern within it. When the collective is comprised of only a relatively small number of particles, the distortion of the boundary forms an approximately semicircular domed shape and the small number of particles ensures that the collective cannot maintain a fully circular shape. However the persistence of forward movement generated by the oscillatory motor behaviour at low pID values causes the dome shape itself to be maintained over time, and the small blob fragment is able to move forwards (Figure 4a). Movement of the fragment is relatively smooth and different from the pulsatile motion observed in larger collectives. Particles move towards the front of the domed profile (Figure 4b, dark pixels) and then, over time, move to the side. Particles at the sides of the fragment ultimately fall behind only to re-enter the dome at the centre. Higher pID values result in more frequent changes of direction of the fragment as the dome shaped front profile cannot be maintained. If the population size is increased, the single sided dome shape cannot be maintained and the resultant motion becomes pulsatile and chaotic. The movement of small blob fragments in the particle collective mimics amoeboid motion observed in P. polycephalum on a non-nutrient substrate (Figure 4c) which has been shown to be equivalent to the propagation of wave fragments in sub-excitable media (Adamatzky et al., 2008; Adamatzky, 2010b). Both artificial and real blobs exhibit reflection (reversion of direction) when encountering the boundary of their environment and can both be directionally guided by the placement of attractants and repellents (Adamatzky, 2010a). a) Figure 4: Persistent forward movement of blob fragments in small simulated plasmodia b) c) Images show flux within simulated plasmodium fragments over time. Images anchored to fixed location. a) Non-oscillatory condition, initiation of oscillatory behaviour and (final 3 images) self perpetuating transport of blob fragment. Chemoattractant flux concentration is greatest at the front of the dome shape b) Enlargement showing particle composition of the moving blob fragment. The persistent shape is maintained despite repeated turnover of component parts. Population size 900 particles, SA90, RA45, SO9, pID 0.001 c) Independently moving small plasmodial fragment of Physarum polycephalum External Influence of Collective Movement – Attraction and Repulsion Movement of the P. polycephalum plasmodium is strongly affected by local environmental conditions. Attractant sources (such as increasing temperature gradients and chemoattractant nutrients) cause the plasmodium to move and grow towards the attractants whereas repulsive sources (salts, dry regions) cause the plasmodium to try to avoid such regions (Durham and Ridgway, 1976). The plasmodium is able to integrate many separate localised inputs to compute its response to the environment. One method in which this is achieved is by the modulation of local oscillation patterns in response to attractants or hazards – attractants tend to increase localised oscillation strength and hazards decrease oscillation strength. We set out to see if a localised response to external influences could be used to govern the collective movement of the particle population. Attractant sources were previously used as a method to confine the collective to a region by pinning it down. By externally presenting an attractant source (effectively a simulated nutrient source) near to a cohesive blob of virtual material (circle in Figure 5a) a concentration gradient emerged from the source (Figure 5b). When the diffusion gradient reached the sensors of the closest particles at the front of the collective it provoked local movement towards the source. The cohesion within the collective resulted in a pseudopodium-like extension of the border region which extended towards the source (Figure 5c), ultimately engulfing it. Travelling waves spontaneously emerged within the collective which were directed at the source, causing the collective to shift its position towards the source (Figure 5d). Consumption of the source was simulated by simply decrementing the value projected to the diffusion field when the source was covered by a particle. When the source was consumed by the population, the collective regained its previous approximately circular shape. Figure 5: Control of amoeboid movement by attraction b) a) c) d) Images show flux within simulated plasmodium over time. Images anchored to fixed location. a) A persistent source of chemoattractant is placed into the diffusion field which provokes the extension of the collective. The collective engulfs the source by moving via travelling waves towards the source. When the source is exhausted the collective re-adopts its original approximately circular shape. b) Schematic illustration of attraction of the collective by the nutrient source (c) Migration of leading particles towards the source (d) Emergence of travelling waves pulling the collective to engulf the source. To approximate the repulsion of the collective to hazardous sources such as the simulated response to irradiation by visible light we added a condition to the sensory stage of the algorithm to the effect that if any particles of the collective were in a region exposed to ‘light’ (a defined area within the arena), those particles would have their sensitivity to chemoattractant diminished whilst they remained in this region (this achieved by multiplying the sampled sensor values with a weighting factor less than 1, lower values generating a stronger response to irradiation). The effect of exposing regions of the collective to simulated light damage was that the collective immediately started to move away from the irradiated region (Figure 6a). Specifically, oscillation waves moved from the irradiated region towards the unexposed regions. The shift of particles from the irradiated region eventually moved the collective away from the stimulus. The a) cause of movement away from the light can be found at the interface between irradiated and unexposed areas. Before irradiation (Figure 6b) all regions of the collective are equally attractive to the particles (subject to fluctuations caused by discrepancies in particle movement and intrinsic oscillations within the collective). There is a strong coupling between the particles in the collective caused by the offset sensor distance. Some of the particles at the interface of the irradiated region will receive input from the unexposed region and will be attracted to that area because the chemoattractant concentration in unexposed areas is perceived as greater due to the damping in irradiated regions (Figure 6c). The movement of particles near the interface towards unexposed regions causes both new vacant spaces (Figure 6d) and also an increase in chemoattractant concentration (because only mobile particles deposit chemoattractant). This results in a further increased attraction to the interface region, until eventually the entire collective has migrated from the irradiated region. Figure 6: Avoidance of simulated light irradiation by particle collective b) c) d) Images show flux within simulated plasmodium over time. Images anchored to fixed location. a) Area within dashed box is stimulated with simulated light irradiation. Particle collective oscillates sending travelling waves towards the region which is unexposed, moving the collective away from the irradiated region. b) Schematic illustration of condition before irradiation – all particles sense equal concentration of chemoattractant c) Irradiated areas (top) are perceived as weaker concentration d) Particles at the irradiation interface are more attracted to unexposed areas. Migration across interface causes chemoattractant deposition, causing further attraction to region and vacant space. Morphological Adaptation of the Collective The previous results demonstrated that the collective changes its shape during self-oscillatory behaviour and also in response to simulated attractants and hazards. The collective retains its typically circular shape due to the cohesion of the individual particles making up the population. When the morphology of the collective is disturbed by its movement towards, or away from, externally applied stimuli it can reform the original shape when the stimulus is removed. An adaptive morphology is a very desirable property in robotic devices since it imbues the robot with great flexibility of size and movement, enabling it to traverse environments which traditionally are difficult to navigate (for example narrow spaces, gratings etc.). This feature is only possible because the properties of the movement and guidance of the collective are distributed throughout the collective and not located in fixed sized and inflexible units as is the case with conventional robotic systems. This is also the case with the P. polycephalum plasmodium which adapts its shape and growth patterns in response to its environment. One of the most remarkable properties of the plasmodium is the ability to survive external damage beyond simple attraction and repulsion. A piece of plasmodium excised from the growing tip can survive, and indeed continue to move and grow as an independent entity. Furthermore two independent plasmodia can fuse to form a single plasmodium when placed in close proximity. These phenomena are not only desirable from a robotics perspective in terms of resilience and damage repair, but offer new and as yet little explored opportunities in robotic movement and control. We set out to find if the particle collective could also replicate these highly desirable features as seen in the real plasmodium. We took a large single oscillating collective (5000 particles) and applied a narrow band of hazardous simulated light irradiation through its centre (Figure 7a, dashed box represents irradiated area). Particles immediately began to surge away from the irradiated region on both sides and the collective narrowed in diameter and became further pinched in shape until the collective was cleaved into two independently controllable blobs. The cleavage mechanism can be applied in different ways. For example both resulting blobs can be of equal size and have similar oscillatory properties. Alternately it is possible to cleave the collective in such a way to have one large stationary blob and one smaller mobile blob (recall that a blob which is small enough will be able to move spontaneously in a persistent direction). It is possible to guide each blob independently using either a pulling type mechanism (externally applied attractants) or a pushing type mechanism (simulated irradiation). In Figure 7b we guide the lower right blob (arrowed) towards the larger blob by pushing it from its opposite side with simulated irradiated light. As the blobs become closer (specifically, to a separation distance which is sufficient for the border particles in each blob to sense the chemoattractant flux in the other blob) the closest border regions of each blob surge towards each other and a single larger collective is formed by the fusion. Cleavage and guidance of the particle collective by simulated hazards reproduces the control of P. polycephalum plasmodial migration (Figure 7c) by repellents (Adamatzky, 2010a). a) b) Figure 7: Controlling blob morphology by splitting and fusion. c) Images show flux within simulated plasmodium over time. Images anchored to fixed location. a) ‘Blob’ of aggregate particles is split by applying simulated light irradiation (dashed box), disrupting particle flux in that region. The single blob separates into two smaller blobs, each capable of individual oscillation and external control. b) Fusion of two independent particle aggregates. The blob on the lower right is guided diagonally upwards in the direction of the arrow towards the larger blob. The two independent blobs fuse forming a single aggregate. c) Cleavage of plasmodium of P. polycephalum. Fragment of plasmodium initialised at triangular region. Crystal of potassium chloride placed at circular region. Diffusion of potassium chloride cleaves the plasmodium into two independent fragments. As an example of the robotic flexibility endowed by the adaptive morphology of the collective, and the guidance mechanisms enabled by its external control, we show in Figure 8 three examples of how a blob can be guided externally (in this case a repulsive pushing by simulated irradiation) in order to traverse narrow, separated or tortuous paths where the path may be much narrower than the diameter of the collective itself. In Figure 8a, the blob has a diameter of approximately 52 pixels and is guided through a channel of width 30 pixels by automatically reconfiguring its morphology. In Figure 8b, the blob is split into two parts by irradiating a rectangular region at the entrance of the channel. The two separated blobs may be guided separately by simulated radiation and are re-fused near the exit of the channels. Finally, in Figure 8c, the blob automatically separates its structure in response to the different obstacles and re-forms its shape by mutual attraction and cohesion of the particles. No fine control of the individual components, nor complex pre-determinism of path choice, is necessary; the collective is guided by simple avoidance of the simulated irradiation (the irradiation location is not shown, but follows the previous examples of simply exposing the rearward part of the collective to push it forwards). When clear of the obstacles, the original circular shape is reformed. If the blob is returned backwards through the obstacle path again the path chosen can be somewhat different to the original path with the same result. a) b) Figure 8: Exploiting the adaptive morphology of the collective. c) Aggregate blob of simulated plasmodium is pushed by the application of external simulated light irradiation (illuminated at the left side of the aggregate, not shown). a) Large aggregate moves through a channel narrower than the aggregate diameter b) Aggregate is cleaved by hazard irradiation (boxed) and guided separately before being refused into original size c) Aggregate is pushed through tortuous narrow grating and reforms original aggregate shape. Conclusion and Discussion: We have examined the problem of generating collective amoeboid movement in a multi-agent approximation of the plasmodium of true slime mould Physarum polycephalum using self-organization between simple non-oscillatory component parts. P. polycephalum is attractive because it satisfies many physical and computational properties which are desirable in robotics applications (self-oscillatory, simple components, distributed sensory and motor control, integration of multiple sensory stimuli, amorphous and adaptive shape, amenable to external influence, resilience to damage, self repair) and can be regarded as a living example of a so-called smart material because of the way in which it combines robotic and control functions in a distributed manner throughout its constituent material. How can such complex behaviour emerge from the interactions between simple component parts? Answering this question may provide insights into the development of non-living smart materials which would have the advantages demonstrated by the P. polycephalum plasmodium, but without some of its limitations, such as slow speed, fragility and unpredictability. Because of its simple components and structure, any search for a ‘secret source’ of the plasmodium’s complexity would be fruitless. Instead we set about answering the question by posing in reverse: rather than try to find out how the organism produces such complex behaviour from simple parts, is it possible to artificially generate similarly complex behaviour from simple parts and interactions? We utilised a previous particle model of emergent transport networks where a collective of identical particles with identical behaviour was used to construct and minimise synthetic and emergent transport networks. We modified its motor algorithm in a very simple way so that, instead of smooth network flow, we obtained a more resistant flow of particles. The addition of transient resistance to particle flux was sufficient to generate complex oscillatory behaviour strongly similar to that observed in the plasmodium itself. The condensation of the collective in its virtual environment resulted in cohesive blob-like sheets of virtual material held together by cohesion which exhibited spontaneous internal oscillations. The oscillations were composed of regular spatial domains of mobile particles and temporarily restricted particles. The wave-like propagation of the oscillatory domains resulted in a collective amoeboid movement as the perimeter of the particle collective was deformed by the internal oscillations. External control of the blob sheets was achieved by stimulating the collective with simulated attractants (pulling the collective towards the source) and repellents (‘pushing’ the collective away from simulated light irradiation). We were also able to reproduce the resilience of the P. polycephalum plasmodium to damage by cleaving the collective into two separate and independent blobs and fusing two independent blobs to form a single functional blob. Finally the adaptive morphology of the collective was demonstrated by guiding the collective through an obstacle field narrower than the diameter of the collective itself. The flexible modularity and morphology seen in this approach builds upon previous work on the external influence and control of robotic devices (Bojinov et al., 2002; Salemi et al., 2001) by enabling separate and functional modules of arbitrary size to be created and re-formed from a single collective. The results demonstrate how very simple and local low-level interactions within a simple material can generate complex and emergent behaviour which appear to transcend the capabilities of the simple matter of which they are composed. As noted by previous swarm approaches, there need not be anything magical or special about the properties of these materials; the complexity emerges merely from their interactions (Buhl et al., 2006; Reynolds, 1987; Vicsek et al., 1995). This complex behaviour is harnessed effortlessly by organisms such as P. polycephalum as part of a parsimonious survival strategy, enabling their persistence in unpredictable, changeable and hazardous environmental conditions. By understanding the generative mechanisms underlying the complex behaviour it may be possible to incorporate these features within real physical materials for small scale robotic devices. By utilising the robotic substrate material itself for distributed computation, transport and movement it may be possible to reduce the total number of component parts and also reduce the number of different types of components, thus further simplifying the production of the devices. Acknowledgements: The work was partially supported by the Leverhulme Trust research grant F/00577/1 “Mould intelligence: biological amorphous robots”. References: Adamatzky, A., 2007. Physarum machines: encapsulating reaction–diffusion to compute spanning tree. Naturwissenschaften. 94, 975-980. Adamatzky, A., 2008. Developing proximity graphs by Physarum Polycephalum: Does the plasmodium follow Toussaint hierarchy? Parallel Processing Letters. 19, 105-127. Adamatzky, A., De Lacy Costello, B., Shirakawa, T., 2008. Universal computation with limited resources: Belousov-Zhabotinsky and Physarum Computers. International Journal of Bifurcation and Chaos. 18, 2373-2389. Adamatzky, A., Jones, J., 2008. Towards Physarum robots: computing and manipulating on water surface. Journal of Bionic Engineering. 5, 348-357. Adamatzky, A., 2010a. Routing Physarum with repellents. The European Physical Journal E: Soft Matter and Biological Physics. 31, 403-410. Adamatzky, A., 2010b. If BZ medium did spanning trees these would be the same trees as Physarum built. Physics Letters A. 373, 952-956. Adamatzky, A., 2010c. Manipulating substances with Physarum polycephalum. Materials Science and Engineering: C. 30, 1211-1220. Ben-Jacob, E., 2003. Bacterial self-organization: co-enhancement of complexification and adaptability in a dynamic environment. Philosophical Transactions: Mathematical, Physical and Engineering Sciences. 361, 1283-1312. Bojinov, H., Casal, A., Hogg, T., 2002. Multiagent control of self-reconfigurable robots. Artificial Intelligence. 142, 99-120. Buhl, J., Sumpter, D.J.T., Couzin, I.D., Hale, J.J., Despland, E., Miller, E.R., Simpson, S.J., 2006. From disorder to order in marching locusts. Science. 312, 1402. Carlile, M.J., 1970. Nutrition and chemotaxis in the myxomycete Physarum polycephalum: the effect of carbohydrates on the plasmodium. Journal of General Microbiology. 63, 221. Dreyfus, R., Baudry, J., Roper, M.L., Fermigier, M., Stone, H.A., Bibette, J., 2005. Microscopic artificial swimmers. NATURE-LONDON-. 7060, 862. Durham, A.C., Ridgway, E.B., 1976. Control of chemotaxis in Physarum polycephalum. Journal of Cell Biology. 69, 218-223. Goldstein, S.C., Mowry, T.C., Campbell, J.D., Ashley-Rollman, M.P., De Rosa, M., Funiak, S., Hoburg, J.F., Karagozler, M.E., Kirby, B., Lee, P., 2009. Beyond audio and video: Using claytronics to enable pario. AI Magazine. 30, 29. Helbing, D., Molnár, P., Schweitzer, F., 1998. Computer simulations of pedestrian dynamics and trail formation. Arxiv preprint cond-mat/9805074. Helbing, D., 2001. Traffic and related self-driven many-particle systems. Reviews of Modern Physics. 73, 1067-1141. Helbing, D., Molnar, P., Farkas, I.J., Bolay, K., 2001. Self-organizing pedestrian movement. Environment and planning B. 28, 361-384. Jones, J., 2010a. Characteristics of Pattern Formation and Evolution in Approximations of Physarum Transport Networks. Artificial Life. 16, 127-153. Jones, J., 2010b. The Emergence and Dynamical Evolution of Complex Transport Networks from Simple Low-Level Behaviours. International journal of Unconventional Computing. 6, 125-144. Jones, J., Adamatzky, A., 2010. Towards Physarum Adders. BioSystems. 101, 51-58. Kennedy, B., Melhuish, C., Adamatzky, A. Eds.), 2001. Biologically Inspired Robots. SPIE Press. Kishimoto, U., 1958. Rhythmicity in the protoplasmic streaming of a slime mould, Physarum polycephalum. The Journal of General Physiology. 41, 1223-1244. Kube, C.R., Bonabeau, E., 2000. Cooperative transport by ants and robots. Robotics and Autonomous Systems. 30, 85-101. Lagzi, I., Soh, S., Wesson, P.J., Browne, K.P., Grzybowski, B.A., Maze solving by chemotactic droplets. Journal of the American Chemical Society. 132, 1198-1199. Lobovkina, T., Dommersnes, P.G., Tiourine, S., Joanny, J.F., Orwar, O., 2008. Shape optimization in lipid nanotube networks. The European Physical Journal E-Soft Matter. 26, 295-300. Lobovkina, T., Gözen, I., Erkan, Y., Olofsson, J., Weber, S.G., Orwar, O., 2009. Protrusive growth and periodic contractile motion in surface-adhered vesicles induced by Ca2+-gradients. Soft Matter. 6, 268-272. Matsushita, M., Wakita, J., Itoh, H., Watanabe, K., Arai, T., Matsuyama, T., 1999. Formation of colony patterns by a bacterial cell population. Physica A: Statistical Mechanics and its Applications. 274. Nakagaki, T., Umemura, S., Kakiuchi, Y., Ueda, T., 1996. Action spectrum for sporulation and photoavoidance in the plasmodium of Physarum polycephalum, as modified differentially by temperature and starvation. Photochemistry and photobiology. 64, 859-862. Nakagaki, T., Yamada, H., Toth, A., 2000a. Maze-solving by an Amoeboid Organism. Nature. 407. Nakagaki, T., Yamada, H., Ueda, T., 2000b. Interaction between cell shape and contraction pattern in the Physarum plasmodium. Biophysical Chemistry. 84, 195-204. Nakagaki, T., Kobayashi, R., Nishiura, Y., Ueda, T., 2004. Obtaining multiple separate food sources: behavioural intelligence in the Physarum plasmodium. Proceedings of the Royal Society B: Biological Sciences. 271, 2305-2310. Nakagaki, T., Saigusa, T., Tero, A., Kobayashi, R., 2007. Effects of amount of food on path selection in the transport network of an amoeboid organism. Vol., ed.^eds. World Scientific Pub Co Inc, pp. 94. Reynolds, C., 1987. Flocks, herds and schools: A distributed behavioral model. ACM SIGGRAPH Computer Graphics. 21, 25-34. Rus, D., Vona, M., 2000. A physical implementation of the self-reconfiguring crystalline robot. Vol. 2, ed.^eds. IEEE, pp. 1726-1733 vol. 2. Saga, N., Nakamura, T., 2004. Development of a peristaltic crawling robot using magnetic fluid on the basis of the locomotion mechanism of the earthworm. Smart materials and structures. 13, 566. Saigusa, T., Tero, A., Nakagaki, T., Kuramoto, Y., 2008. Amoebae anticipate periodic events. Physical Review Letters. 100, 18101. Salemi, B., Shen, W.M., Will, P., 2001. Hormone-controlled metamorphic robots. Vol. 4, ed.^eds. IEEE, pp. 4194-4199. Shirakawa, T., Adamatzky, A., Gunji, Y., Miyake, Y., 2009. On simultaneous construction of Voronoi diagram and Delaunay triangulation by Physarum polycephalum. International Journal of Bifurcation and Chaos. 19, 3109-3117. Shirakawa, T., Gunji, Y., 2010. Computation of Voronoi diagram and collision-free path using the plasmodium of Physarum polycephalum. International journal of Unconventional Computing. 6, 79-89. Stoy, K., 2006. Using cellular automata and gradients to control self-reconfiguration. Robotics and Autonomous Systems. 54, 135-141. Suh, J.W., Darling, R.B., Bohringer, K.F., Donald, B.R., Baltes, H., Kovacs, G.T., 2000. Fully programmable MEMS ciliary actuator arrays for micromanipulation tasks. Vol. 2, ed.^eds. IEEE, pp. 1101-1108 vol. 2. Takamatsu, A., Fujii, T., Endo, I., 2000. Control of interaction strength in a network of the true slime mold by a microfabricated structure. BioSystems. 55, 33-38. Trimmer, B.A., Takesian, A.E., Sweet, B.M., Rogers, C.B., Hake, D.C., Rogers, D.J., 2006. Caterpillar locomotion: A new model for soft-bodied climbing and burrowing robots. Vol. 1, ed.^eds. Citeseer, pp. 1–10. Tsuda, S., Aono, M., Gunji, Y., 2004. Robust and emergent Physarum logical-computing. BioSystems. 73, 45-55. Tsuda, S., Zauner, K., Gunji, Y., 2007. Robot control with biological cells. BioSystems. 87, 215-223. Ueda, T., Terayama, K., Kurihara, K., Kobatake, Y., 1975. Threshold phenomena in chemoreception and taxis in slime mold Physarum polycephalum. The Journal of General Physiology. 65, 223. Umedachi, T., Kitamura, T., Takeda, K., Nakagaki, T., Kobayashi, R., Ishiguro, A., 2009. A Modular Robot Driven by Protoplasmic Streaming. Distributed Autonomous Robotic Systems 8. 193-202. Vicsek, T.s., Czirók, A.s., Ben-Jacob, E., Cohen, I., Shochet, O., 1995. Novel Type of Phase Transition in a System of Self-Driven Particles. Physical Review Letters. 75, 1226-1229. Yokoi, H., Nagai, T., Ishida, T., Fujii, M., Iida, T., 2003. Amoeba-like robots in the perspective of control architecture and morphology/materials. Morpho-Functional Machines: The New Species, Springer-Verlag, Tokyo. 99-129. Zhang, L., Abbott, J.J., Dong, L., Kratochvil, B.E., Bell, D., Nelson, B.J., 2009. Artificial bacterial flagella: Fabrication and magnetic control. Applied Physics Letters. 94, 064107. Zhang, S., 2003. Fabrication of novel biomaterials through molecular self-assembly. Nature biotechnology. 21, 1171-1178.
1801.07579
1
1801
2018-01-20T01:27:45
A Work Zone Simulation Model for Travel Time Prediction in a Connected Vehicle Environment
[ "cs.MA", "cs.LG" ]
A work zone bottleneck in a roadway network can cause traffic delays, emissions and safety issues. Accurate measurement and prediction of work zone travel time can help travelers make better routing decisions and therefore mitigate its impact. Historically, data used for travel time analyses comes from fixed loop detectors, which are expensive to install and maintain. With connected vehicle technology, such as Vehicle-to-Infrastructure, portable roadside unit (RSU) can be located in and around a work zone segment to communicate with the vehicles and collect traffic data. A PARAMICS simulation model for a prototypical freeway work zone in a connected vehicle environment was built to test this idea using traffic demand data from NY State Route 104. For the simulation, twelve RSUs were placed along the work zone segment and sixteen variables were extracted from the simulation results to explore travel time estimation and prediction. For the travel time analysis, four types of models were constructed, including linear regression, multivariate adaptive regression splines (MARS), stepwise regression and elastic net. The results show that the modeling approaches under consideration have similar performance in terms of the Root of Mean Square Error (RMSE), which provides an opportunity for model selection based on additional factors including the number and locations of the RSUs according to the significant variables identified in the various models. Among the four approaches, the stepwise regression model only needs variables from two RSUs: one placed sufficiently upstream of the work zone and one at the end of the work zone.
cs.MA
cs
A Work Zone Simulation Model for Travel Time Prediction in a Connected Vehicle Environment Xuejin Wen* Ohio State University * [email protected] Abstract A work zone bottleneck in a roadway network can cause traffic delays, emissions and safety issues. Accurate measurement and prediction of work zone travel time can help travelers make better routing decisions and therefore mitigate its impact. Historically, data used for travel time analyses comes from fixed loop detectors, which are expensive to install and maintain. With connected vehicle technology, such as Vehicle-to-Infrastructure, portable roadside unit (RSU) can be located in and around a work zone segment to communicate with the vehicles and collect traffic data. A PARAMICS simulation model for a prototypical freeway work zone in a connected vehicle environment was built to test this idea using traffic demand data from NY State Route 104. For the simulation, twelve RSUs were placed along the work zone segment and sixteen variables were extracted from the simulation results to explore travel time estimation and prediction. For the travel time analysis, four types of models were constructed, including linear regression, multivariate adaptive regression splines (MARS), stepwise regression and elastic net. The results show that the modeling approaches under consideration have similar performance in terms of the Root of Mean Square Error (RMSE), which provides an opportunity for model selection based on additional factors including the number and locations of the RSUs according to the significant variables identified in the various models. Among the four approaches, the stepwise regression model only needs variables from two RSUs: one placed sufficiently upstream of the work zone and one at the end of the work zone. KEYWORDS: Connected Vehicle, Road Side Unit, Work Zone Travel Time, PARAMICS 1 Introduction The ability to provide accurate traffic state predictions in real-time has long been identified as a critical need for Intelligent Transportation Systems (ITS), especially under abnormal conditions such as traffic accidents (1) and inclement weather (2). Work zone (WZ) is a main issue that may lead to abnormal traffic congestions. It typically requires one or two lanes of the freeway segment closed, resulting in temporary capacity reduction. Based on the report of Federal Highway Authority (FHWA), just in 2014 nearly 24 percent of non-recurring freeway delay, equivalent to about 888 million hours, is typically attributed to work zones (3). Work zone may also lead to safety issues. In 2015 New York State DOT (NYSDOT) reported 646 crashes in capital construction work zones on New York roads and bridges, resulting in six motorist fatalities and 147 injuries to motorists, contractor employees and NYSDOT staffs (4). A few studies have focused on providing current or predicted travel times through WZs in the freeway network. For example, the variable message signs (VMS) can display the travel time and distance to the end of the work zone to motorists (5). Lee and Kim (2006) designed and implemented an Automated Work Zone Information System (AWIS) to provide road users with real-time delay information during peak hours so that the traffic can be diverted to detour routes (6). Ghosh-Dastidar and Adeli (2006) built a neural network model using simulated data to predict the delay and queue length at freeway work zones (7). Bae et al. (2017) also applied a neural network model to predict the traffic volume and percentages of trucks at the upstream of the work zone, then they applied a BPR function to calculate the work zone travel time based on the ratio of volume and capacity (8). The estimation and prediction of travel times requires measurement of traffic states. Traditionally the traffic detectors are installed on freeways to record traffic characteristics such as flow, speed and occupancy, which are used as the data source for travel time prediction (9). For example, California Freeway Performance Measurement System (PeMS) has installed 43,426 detectors on freeways with a total distance of 30,599.4 miles by 2017. However, based on the latest statistics, 37.1% of PeMS detectors have been out of function (11). The installation and maintenance costs of these huge amounts of fixed detectors are therefore very high. On the other hand, if the deployment is not dense, there may not be enough detectors around the work zone segment to collect the necessary information. Connected vehicle is an emerging technology recently. It allows each vehicle to be fully connected to the other vehicles and to the infrastructures like traffic light and Variable Message Sign (VMS). The U.S. Department of Transportation has made the development of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication a major research priority to improve the safety and efficiency of the transportation system. Connected vehicles can store their vehicle activities such as speed, position, turn signal, brake status and so on with a frequency in On-board Units (OBUs). At the same time, there are roadside units (RSUs) installed at intersection, interchanges and other locations to provide communication interface to the vehicles. When a connected vehicle passes by the coverage area of a RSU, the vehicle activities data in OBU is transmitted to RSU and the OBU buffer will be cleared (9). In this study, we propose to utilize portable roadside unit (RSU) for freeway work zone travel time prediction in a V2I environment. Comparing with the fixed detectors, the locations and numbers of the reusable and portable RSUs can be adjusted based on work zone types, traffic demand and the connected vehicle penetration rates. Simulation is an important approach for this kind of experiments with advantages like safe, convenient and almost no cost (10). Here a real-world work zone simulation model in connected vehicle environment is built using PARAMICS®, microsimulation software by QuadstoneParamics. The work zone travel time prediction models are also built to identify candidate locations of RSUs and verify the connected vehicle techniques can improve the travel time prediction accuracy. The rest of the paper is organized as follows. The next section will introduce the PARAMICS work zone simulation model for NY State Route 104. Following that, the simulation results are processed and relevant variables are extracted. The work zone travel time prediction models are then built based on these variables. Conclusions and recommendations are given at last. Work Zone Simulation Model The configuration of the work zone simulation model is observed from NY State Route 104. As shown in Figure 1, it is a piece of two-lane freeway with no ramps and the traffic are from left to the right. The length of the 2 one-lane-closed segment is 2 miles. A warning arrow panel and a VMS sign are located at 0.1 miles and 0.7 miles from the work zone beginning separately. Start of Queue Figure 1. Layout of WZ from NY-104 After that, the simulation model was built using PARAMICS (12). Twelve portable RSUs were introduced in this model (Figure 1). RSU 1 is at the end of the work zone, the rest RSUs 2-12 are distributed every 0.2 miles from the beginning of work zone to 2 miles at the upstream of work zone. Including a dense set of RSUs in the simulation enables us to explore the impact of RSU location on travel time prediction. As will be discussed, through the development of work zone travel time prediction models, the significant variables as well as the RSUs that provide those information can be identified, and therefore the number and locations of the RSUs also become obvious. The hourly traffic volume data in 2014 for this freeway segment are acquired from NY Department of Transportation (13). As shown in Figure 2, for each month, we took the average by hour and got the typical traffic volumes. Then for the 24-hour traffic volumes of each month, we conducted 10 runs of simulations with different random seeds so that stochastic behaviour is considered. In this study, the market penetration rate of connected vehicles was set to 100%. The PARAMICS API was implemented in C++ to simulate the V2I applications and collect the data. 3000 2500 2000 1500 1000 500 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Jan July Feb Aug March Sep April Oct May Nov June Dec Figure 2. Hourly Traffic Volumes Averaged by Month 3 Simulation Data Processing In this connected vehicle simulation model, the RSU has the function to record the ID and timestamp when a vehicle passes by it. The vehicle will also transmit its previous trajectory data to the RSU. Finally, we extract the following variables from the simulation data. Note that all these variables are aggregated by five minutes. a) 𝑇𝑇𝑖,1, 𝑖 = 2,3, … , 12. Based on the vehicle ID and time stamp, we calculate the travel time from each of the upstream RSU to the one at the end of the work zone. For example, "𝑇𝑇2,1" is the travel time from RSU 2 to RSU 1. b) UpstreamFlow. The traffic volume at the upstream RSU 12. c) DownstreamFlow. The traffic volume at the downstream RSU 1. d) WorkZoneEndAcc. The acceleration rate at the end of work zone, which is based on the vehicle's trajectory collected by RSU 1. e) Qlength. The length of the queue at the upstream of the work zone. In this study, a queue is defined to satisfy three criteria: the speed is less than 10 miles/hour, the inter-vehicle distance is less than 0.01 miles and the number of vehicles is at least 5. The queue information can be extracted from the trajectory data stored in RSU 1. f) StartQueue. The location of the start of the queue as shown in Figure 1. g) 𝑇𝑇𝑤𝑧. The work zone travel time. Note that for most of the previous studies, they measured the work zone travel time from a fixed location at the upstream to the end of the work zone (5) (7) (8). Although this simplifies the problem, however, it is not accurate because the length and location of the upstream queues are changing. The approach we measure 𝑇𝑇𝑤𝑧 is as follows. If there was a queue, it is the time from the leftmost vehicle in the queue to the end of work zone. If there was no queue, it is the travel time through the exact work zone. With the five-minute aggregation, for 24-hour traffic volumes of each month, we can get 2,880 observations of variables a) - g) by running the simulation model 10 times. In total, 28,800 records from the first 10 months (January to October) are used for the training of the travel time prediction model, and the rest 5,760 records from November to December are used for the testing of the model performance. Work Zone Travel Time Prediction and RSU Location Let 𝑇𝑇𝑤𝑧(𝑡) denote the travel time through a work zone at time step t and Lahead be the "look ahead" time. In this study, Lahead is set at 5 time steps, which corresponds to predicting travel time through the work zone 25 minutes into the future (data is aggregated every 5 minutes, so 5 time steps equates to 25 minutes). To predict the future travel time, we use an autoregressive with exogenous input model structure as follows: 𝑇𝑇𝑤𝑧(𝑡 + 𝐿𝑎ℎ𝑒𝑎𝑑) = 𝐴(𝑞)𝑇𝑇𝑤𝑧(𝑡) + ∑ 𝐵𝑖(𝑞)𝑢𝑖(𝑡) ; 𝑛𝑢 𝑖=1 (1) where 𝐴(𝑞) = ∑ 𝑛𝑎 𝑗=1 𝑎𝑗𝑞−𝑗 , 𝐵𝑖(𝑞) = ∑ 𝑛𝑏𝑖 𝑗=1 𝑏𝑗𝑞−𝑗 ; 𝑢𝑖 refers to one of 16 variables (11 travel time variables 𝑻𝑻𝒊,𝟏, 𝑖 = 2,3, … , 12 , UpstreamFlow, DownstreamFlow; WorkZoneEndAcc, Qlength and StartQueue), 𝑛𝑢 = 16; 𝐴(𝑞) and 𝐵𝑖(𝑞) are the backshift operators, which operates on an element of a time series to produce the previous element; 𝑛𝑎 and 𝑛𝑏𝑖 are the backshift step lengths; 4 The coefficients 𝑎𝑗 and 𝑏𝑗 are derived using the algorithm that predicts travel times in the work zone. In this study, we applied the following four regression techniques: simple linear regression model; multivariate adaptive regression splines (MARS), with up to 2nd order nonlinear interactions in the input variables (14); a stepwise model with risk inflation criterion (15); and an elastic net model (16). All the experiments are conducted using statistical software R. Table 1 summarizes the significant variables selected by the four models. The root mean squared error (RMSE) between the real and predicted work zone travel times is also calculated for each model. Table 1. Significant Variables and RMSEs of the Four Models (* means that variable is significant for that model) Models Linear Regression MARS Stepwise Elastic Net 16 Variables 𝑇𝑇2,1 𝑇𝑇3,1 𝑇𝑇4,1 𝑇𝑇5,1 𝑇𝑇6,1 𝑇𝑇7,1 𝑇𝑇8,1 𝑇𝑇9,1 𝑇𝑇10,1 𝑇𝑇11,1 𝑇𝑇12,1 UpstreamFlow DownstreamFlow WorkZoneEndAcc Qlength StartQueue * * * * * * * * * * * * * * * * * * * * * * * RMSE (seconds) 31.46 28.37 34.64 30.82 As can be seen in Table 1, first for the variable selection, the linear regression model selects four significant variables, which are collected by three RSUs 1, 10 and 12; the MARS model identifies six significant variables from RSU 1, 8, 10, 12; the Elastic Net model is the most complicate one with 11 significant variables from all the other RSUs except 2 and 3; and the Stepwise model is the simplest one with only two significant variables from RSU 1 and 12. One interesting observation is that the variables from the RSU 10 and RSU 12 are the most significant ones, e.g. 𝑇𝑇10,1 is selected three times and 𝑇𝑇12,1 are included by all the four models. This tells that the location and length of the queues caused by the work zone are probably around RSU 10 and RSU 12. Second, for the travel time prediction performance, MARS model performs the best with a RMSE of 28.37 seconds. It's a little surprising that the Elastic Net model has a little worse RMSE of 30.82 seconds with the requirement of so many variables to build the model. The linear regression model ranks the third, its RMSE is 31.46 seconds. Finally the RMSE of the simplest Stepwise model with two variables is around 34.64 seconds. Third, we can also make the portable RSU location plans based on Table 1. The performance of Elastic Net model is not the best and it needs 10 RSUs, which is unrealistic. Therefore this plan can be discarded. For the other three models, there is a trade-off between the algorithm accuracy and the RSU resources. The MARS model has the smallest RMSE but it needs variables from 4 RSUs. Its performance is followed by the linear regression model which requires 3 RSUs. The RMSE of the stepwise model is only about 6 and 3 seconds higher than MARS and linear regression model, respectively. And it just requires two RSUs: RSU 12 and RSU 1, which, from a practical viewpoint might represent a reasonable trade-off between algorithm performance and sensing requirements. We are interested to further check the performance of the Stepwise Model. Figure 3 shows the real work 5 zone travel time (red) and the predicted one (blue) for the testing set using this Stepwise model. Figure 4 shows the histogram of the error between the real work zone travel time and the predictions. Figure 3. Real Travel Times and Stepwise Model Predictions for the Testing Dataset Figure 4. Histogram of Travel Time Difference between Real Values and Predictions Figure 3 shows that in general the Stepwise model can capture the trend of work zone travel times very well. However, it looks like that the predictions from Stepwise model (blue line) are lower than the real work zone travel times (red line) when the ground truth values are high. Figure 4 shows the distribution of the difference between the real travel times and the predictions. We can see that the frequency with the absolute difference less than 10 seconds is very high. Most of the time, the difference is within [-20, 20] interval. This once again shows the Stepwise model has a reasonable performance. Conclusion This paper focuses on travel time prediction for freeway work zones in a connected vehicle environment. A work zone segment motivated by NY State 104 was simulated using PARAMICS. The simulation model considered 6 a Vehicle-to-Infrastructure setting by using portable RSUs to communicate with connected vehicles and collect traffic data. Compared with loop detectors, the portable RSUs can save installation and maintenance cost, and their number and locations can be adjusted. To determine candidate RSU locations, twelve RSUs were put along the work zone segment in the simulation model and sixteen traffic variables were extracted from the V2I data. For travel time prediction and variable selection, four different modelling approaches were investigated, including linear regression, MARS, stepwise and elastic net. The results showed that the models have similar RSME performance, ranging from 28 seconds to 35 seconds. Through the comparison of the identified significant variables, a suggested number and locations of the portable RSUs were also determined. We found that the stepwise model provides a practical sensing plan in that only two RSUs are required: one sufficiently upstream from the work zone and one at the end of work zone. For our future study, more experiments are necessary. For example, we can explore more scenarios with different connected vehicle penetration rates and work zone types. We can also adjust the RSU location plans dynamically based on various traffic demands by peak-hour and non-peak-hour, weekday and weekend, inclement and clear weather and so on. References 1. Lin, L., Wang, Q., & Sadek, A. W. (2016). A combined M5P tree and hazard-based duration model for predicting urban freeway traffic accident durations. Accident Analysis & Prevention, 91, 114-126. 2. Lin, L., Ni, M., He, Q., Gao, J., & Sadek, A. W. (2015). Modeling the impacts of inclement weather on freeway traffic speed: exploratory study with social media data. Transportation Research Record: Journal of the Transportation Research Board, (2482), 82-89. 3. Federal Highway Administration. Facts and Statistics – Work Zone Mobility, http://www.ops.fhwa.dot.gov/wz/resources/facts_stats/mobility.htm, accessed on Jan 27, 2017. 4. New York State DOT. Work Zone Awareness. https://www.dot.ny.gov/news/press-releases/2016/2016-04-12, accessed on Jan 27, 2017. 5. Zwahlen, H., & Russ, A. (2002). Evaluation of the accuracy of a real-time travel time prediction system in a freeway construction work zone. Transportation Research Record: Journal of the Transportation Research Board, (1803), 87-93. 6. Lee, E. B., & Kim, C. (2006). Automated work zone information system on urban freeway rehabilitation: California implementation. Transportation Research Record: Journal of the Transportation Research Board, (1948), 77-85. 7. Ghosh-Dastidar, S., & Adeli, H. (2006). Neural network-wavelet microsimulation model for delay and queue length estimation at freeway work zones. Journal of Transportation Engineering, 132(4), 331-341. 8. Bae, J., Choi, K., and Oh, J.H. (2017). Multi-Contextual Machine-Learning Approach to Modeling Traffic Impact of Urban Highway Work Zones. Transportation Research Record: Journal of the Transportation Research Board, Transportation Research Board of the National Academies, accepted for publication by the Artificial Intelligence Committee of TRB, in press. 9. Kianfar, J., & Edara, P. (2013). Placement of roadside equipment in connected vehicle environment for travel time estimation. Transportation Research Record: Journal of the Transportation Research Board, (2381), 20- 27. 10. Lin, L., Wang, Q., & Sadek, A. W. (2014). Border crossing delay prediction using transient multi-server queueing models. Transportation Research Part A: Policy and Practice, 64, 65-91. 11. PeMs - Caltrans Performance Measurement. http://pems.dot.ca.gov/?dnode=State&content=detector_health&tab=dh_summary, accessed on Jan 27, 2017. 12. Quadstone PARAMICS. http://www.paramics-online.com/, accessed on Feb 3, 2016. 13. New York Department Transportation. of https://www.dot.ny.gov/divisions/engineering/technical- services/highway-data-services/hdsb, accessed on June 01, 2016. 14. Friedman, J. H. (1991). Multivariate Adaptive Regression Splines. The Annals of Statistics. 19: 1 15. Efroymson,M. A. (1960). Multiple regression analysis, Mathematical Methods for Digital Computers, Ralston A. and Wilf,H. S., (eds.), Wiley, New York. 16. Zou, Hui; Hastie, Trevor (2005). Regularization and Variable Selection via the Elastic Net. Journal of the Royal Statistical Society, Series B: 301–320. 7
1806.02578
1
1806
2018-06-07T09:27:57
Investigating Spatiotemporal Dynamics and Synchrony of Influenza Epidemics in Australia: An Agent-Based Modelling Approach
[ "cs.MA", "physics.soc-ph", "q-bio.PE" ]
In this paper we present ACEMod, an agent-based modelling framework for studying influenza epidemics in Australia. The simulator is designed to analyse the spatiotemporal spread of contagion and influenza spatial synchrony across the nation. The individual-based epidemiological model accounts for mobility (worker and student commuting) patterns and human interactions derived from the 2006 Australian census and other national data sources. The high-precision simulation comprises 19.8 million stochastically generated software agents and traces the dynamics of influenza viral infection and transmission at several scales. Using this approach, we are able to synthesise epidemics in Australia with varying outbreak locations and severity. For each scenario, we investigate the spatiotemporal profiles of these epidemics, both qualitatively and quantitatively, via incidence curves, prevalence choropleths, and epidemic synchrony. This analysis exemplifies the nature of influenza pandemics within Australia and facilitates future planning of effective intervention, mitigation and crisis management strategies.
cs.MA
cs
Investigating Spatiotemporal Dynamics and Synchrony of Influenza Epidemics in Australia: An Agent-Based Modelling Approach Oliver M. Cliff1, Nathan Harding1, Mahendra Piraveenan1, E. Yagmur Erten1,2, Manoj Gambhir3, and Mikhail Prokopenko1,4 1 Centre for Complex Systems, Faculty of Engineering and IT, University of Sydney, Sydney, NSW 2006, Australia 2 Department of Evolutionary Biology and Environmental Studies, University of Zurich, Winterthurerstrasse 190, 8057 4 Marie Bashir Institute for Infectious Diseases and Biosecurity, University of Sydney, Westmead, NSW 2145, Australia Zurich, Switzerland 3 IBM Research, Melbourne, Australia Abstract In this paper we present AceMod, an agent-based modelling framework for studying influenza epidemics in Australia. The simulator is designed to analyse the spatiotemporal spread of contagion and influenza spatial synchrony across the nation. The individual-based epidemiological model accounts for mobility (worker and student commuting) patterns and human interactions derived from the 2006 Australian census and other national data sources. The high-precision simulation comprises 19.8 million stochastically generated software agents and traces the dynamics of influenza viral infection and transmission at several scales. Using this approach, we are able to synthesise epidemics in Australia with varying outbreak locations and severity. For each scenario, we investigate the spatiotemporal profiles of these epidemics, both qualitatively and quantitatively, via incidence curves, prevalence choropleths, and epidemic synchrony. This analysis exemplifies the nature of influenza pandemics within Australia and facilitates future planning of effective intervention, mitigation and crisis management strategies. Keywords: computational epidemiology, agent-based modelling, discrete-time simulation, influenza, epidemics, synchrony, demographics 1. Introduction Early recognition and curtailing of outbreaks of infectious diseases is crucial to policy making and pub- lic health. Without efficient intervention, international travel can result in the spread of highly infectious pathogens around the globe within weeks of the initiation of the outbreak, as evidenced by the 2009 H1N1 (swine flu) pandemic. Moreover, infectious diseases are large burdens on the economy. For instance, a 2007 study estimated that the annual cost of seasonal influenza to the health system in Australia was AU$828-884 million [1]. Effective strategies for mitigating outbreaks should include a suitable combination of immunisation, vaccination, and palliative care [2, 3, 4] and planning these strategies requires reliable fore- casting through simulation of various "what if?" scenarios. Without efficient intervention, highly infectious pathogens, such as swine flu, result in international travel carrying the virus around the globe within weeks to months of the initiation of the outbreak, causing a worldwide public health emergency [5, 6, 7, 8]. Intergration of large-scale datasets and explicit simulations of entire populations down to the scale of single individuals has considerably improved the accuracy of epidemiological models [9]. Furthermore, an effective intervention requires not only an accurate modelling and surveillance of the disease dynamics, but also implementation of the underlying contact networks and their topologies. This requires a detailed theoretical and practical understanding of the interplay between epidemic processes, mobility patterns (es- pecially over long distances), and population data. By running multiple computer simulations while varying the sources of infection, we can then ascertain the average social and health impact, as well as "zoom in" on specific pathways and patterns of epidemics. Preprint submitted to Simulation Modelling Practice and Theory June 8, 2018 While there are currently many useful models and tools to assist in the analysis and prediction of con- tagion processes, none are adequate in terms of precise and integrated tracking, predicting and mitigating epidemics at the national-level for Australia. It remains a challenge to generate and simulate a realistic and dynamic contact network, accounting for both mobility and human interactions representing the de- mographics of Australia through an individual-based epidemiological model. Moreover, as evidenced by Cauchemez et al. [10], modeling the transmission of respiratory diseases must specifically account for struc- turing of schools, grades, and classes due to the "back-and-forth waves of transmission between the school, the community, and the household." These challenges are particularly important for investigating epidemics in Australia, where the population is concentrated mainly around urban areas. We have addressed this need by developing AceMod, the Australian Census-based Epidemic Model that employs a discrete-time and stochastic agent-based model to investigate complex outbreak scenarios at var- ious spatiotemporal levels. The simulator comprises 19.8 million software agents where each agent contains a set of attributes of an anonymous individual. The agents are generated such that the distributions at multiple scales concur with key demographic statistics of the 2006 Australian census data. The next layer of the model includes mobility patterns (with respect to work, study and other activities) in order to charac- terise potential interactions between spatially distributed agents. The final layer describes local transmission dynamics by combining agent health characteristics, such as susceptibility and immunity to diseases, with a natural history model for influenza. The simulation runs in 12 hour cycles ("day" and "night") over the course of an epidemic such that agents interact in different social mixing groups depending on the cycle. Given a surrogate population generated in this way, we run multiple instances of each scenario, varying the disease infectiousness and outbreak locations to give insight into the spread of influenza pandemics around Australia. The novel aspects of AceMod include (i) the spatial fidelity of the stochastically generated population, calibrated to Australian Census and the Australian Bureau of Statistics (ABS) datasets that utilise multi- scale distributions over school data and hierarchical mixing groups; (ii) its refined models for the transmission and natural history of the simulated infection, based on the latest available epidemiological studies; and (iii) the focus on measures of spatiotemporal complexity of influenza epidemics. We evaluate the spread of influenza in space and time through Australia via incidence curves, prevalence choropleths, and epidemic synchrony. Incidence curves characterise the disease by plotting the number of newly ill individuals (i.e., the incidence) at each time step. Here, ill refers to infected agents that are showing symptoms. This illustrates the severity of the disease over time and can be used to compare different pathogens or mitigation strategies. Then, in order to qualitatively study the evolving spatial distribution of the epidemic over time, we record the percentage of ill individuals (i.e., the prevalence) in each community at a given time step and give snapshots of this distribution through choropleths taken at key times of the epidemic. Finally, we examine spatial hierarchies in disease prevalence by analysing the variance in the timing of the epidemic peaks in each community (i.e., the synchrony). The spatiotemporal synchrony of disease spread between communities correlates to the size of the communities, suggesting the disease transmission is more associated with social connectivity rather than geographic distance. 2. Related work Well-established stochastic models of epidemics often use SIR and SEIR differential equations for the population dynamics of susceptible (S), exposed (E), infectious (I), and removed/recovered (R) individu- als [11]. While these models are suitable for analysing the general behaviour of an epidemic on larger scales, with a focus on global variables, they do not allow us to make accurate predictions at a finer resolution. In many scenarios it is beneficial to trace the dynamics in a more fine-grained way especially during the initial or final stages of an outbreak, when person-to-person transmission processes dominate [12]. As a result, stochastic agent-based discrete-time simulation models were developed to capture how the uncertainty in disease diffusion varies in different social groups and affects the overall analysis and predictions of epidemics [12, 5]. These models have been used to assess vaccination and antiviral prophylaxis strategies on a local level, highlighting importance of detailed modelling of contact patterns [13, 14, 12]. These models 2 further allow us to investigate strategies at large-scale regional and national levels for containing an emerging pandemic influenza strain at its source [5, 6]. Early efforts include an agent-based simulation by Elveback et al., where they modeled a small artificial population to represent a community and defined multiple contexts in which individuals interact, in order to explore the disease spread. Later works [5, 12] leveraged increased computational power to further this methodology, considering populations on a larger scale based on exact census data. A suite of scalable agent- based modelling software simulators was described in a series of papers[15, 16, 17, 18, 19]. Simdemics was designed as a general purpose simulation environment supporting 300 million agents, aimed at modelling pandemic planning and response to a range of crisis scenarios, such as H1N1/H5N1 pandemics and bio- terrorism events [18]. A number of simulators were built upon Simdemics framework. For example, a high- performance computing modelling environment, EpiSims, designed as a distributed discrete event simulator, modelled disease transmission via sub-groups of people in a given location. The location objects were distributed across CPUs and people objects moved among locations, using various census, land-use and population-mobility data. It has been successfully applied to modelling of smallpox [15] and pandemic influenza plan [20]. The EpiSimdemics algorithm [16, 19] was based on contagion diffusion across a person- location graph, a bipartite graph where the nodes represented people and locations, while the edges indicated a person's presence at a location. A person-location graph of the entire population of the United States included 300 million nodes (people) and 1.5 billion edges, and ran on the 352,000 core NCSA BlueWaters system, so that 120 days of an epidemic were simulated in 12 seconds. While EpiSimdemics built the graph implicitly, the next extension, Epifast [17], used an explicitly given network to simulate SEIR compartmental model in a distributed memory system with a master-slave computation, and run 10 times faster than EpiSimdemics for equivalent graphs. In order to inform policy at a national and state level, it is imperative for an epidemic model to have a high degree of spatial fidelity, which is the primary motivation and focus of our work. Due to the high concentration of the Australian population around urban areas, modelling Australian demographics provides a unique challenge. For instance, GLEAM [21] is a global-scale simulation based on a gridded population of the world. In order to capture global disease dynamics, GLEAM discretises the world into a grid of 25×25 km cells. While this method effectively captures global disease dynamics, it does not provide a resolution fine enough for modelling disease transmission at the individual level in Australia. A more recent simulator, FluTE [22], facilitates modelling epidemic scenarios in the United States but is not immediately suitable to address the Australian population, mobility, and school structure. Agent-based simulators rely on detailed models of the transmission and the natural history of the pathogen through a host individual [5]. Recent work by Cauchemez et. al. [10] emphasizes the importance of high precision disease parameters when high fidelity census data is being used. The authors recognised "a lack of detailed data on transmission outside the household setting" and quantified the parameters of disease spread within the school and home environment by observing an outbreak of H1N1(2009) in an elementary school in Pennsylvania. Longini et al. [5] provided a detailed description of the disease natural history for influenza, specifying the progression of a disease from pathological onset to its eventual resolution within a host. There is significant research into estimating the proportion of individuals who become symptomatic (and hence more infectious) [23, 24, 25, 26], informing our study. 3. Simulation model Our simulation model comprises two basic elements: (i) a surrogate Australian population based on real- world data for demographics and worker flow; and (ii) a stochastic agent-based model for disease spread. The demographics induce numerous statistical areas (social mixing groups) within which individuals associate and provide context for susceptible agents to contract an infectious disease. The model runs in cycles of two 12-hour periods ("day" and "night") and an agent is associated with a set of daytime and nighttime groups depending on the cycle. Given the census data, we are able to generate mobility networks via the reported worker flow between these mutually exclusive sets. The framework of developing contact networks from census data and integrating a transmission model is extensively used in literature to stochastically model influenza pandemics [14, 5, 12, 22, 21]. 3 Figure 1: Spatial distribution of the population of 19.8 million Australian residents according to 2006 Australian census data. The states and territories of Australia are (in order of population size): New South Wales (NSW), Victoria (VIC), Queensland (QLD), Western Australia (WA), South Australia (SA), Tasmania (TAS), Australian Capital Territory (ACT), Northern Territory (NT). Insets: distributions for SLAs based in and around Sydney (red) and Brisbane (green) on the same scale. 4 3.1. Demographics and mobility We utilise the 2006 Australian census data to distribute the model population of 19.8 million individuals into 1422 statistical local areas (SLAs). Figure 1 shows the spatial distribution of the Australian population among the SLAs. These areas are further subdivided into census collection districts (CDs) of approximately 225 dwellings each in metropolitan settings. The census provides population (e.g., age, sex, employment status) and housing (e.g., household size and composition) statistics at this geographic level. This data is then used to stochastically generate all households and individuals within each CD. Each individual in the population is a member of several mixing groups derived from census data and prior work [5, 12, 22]. The contact (and transmission) probability of any disease is, in general, decreasing with the group size, and numerous empirical studies report on these statistics for different contexts [5, 12, 10, 22]. During the daytime, the mixing groups comprise work groups for adults, and classrooms, grades, and schools for students. During the nighttime, individuals interact in households, household clusters, communities, and neighbourhoods. We first stochastically generate the population based on housing statistics and then subsequently assign social mixing groups by geographic locality. Specifically, the census contains the frequency distribution of household sizes in each CD. In addition, households are composed of either lone, group, or family types, and the distribution of these compositions are known for each CD. We further subdivide the family type into the following categories: single (S), couples with children (CWC), couples without children (CWOC), or single parent families (SPF). This yields a conditional distribution for family compositions, given household size, in each CD. We then generate agents for the adults and children living in every residence by sampling a family type conditioned on the household size. Households have the highest pairwise contact probability and four consecutive houses are assigned to a larger social group denoted a cluster. The communities (CDs) and neighbourhoods (SLAs) within which these residents live then provide context for unspecified and occasional person-to-person contact (e.g., supermarkets, theatres, etc.). In this study, the population is stochastically generated once, and used in all simulations. It is possible to run simulations over multiple stochastically generated populations; however, this did not produce significantly different results for the key variables investigated in this work. In the daytime, most working-age adults interact with other individuals in their immediate workplace, whereas students associate through local schools, grades, and classes. To establish working communities, the Australian census data subdivides SLAs into destination zones (DZNs). Although these geographic areas do not concord with CDs, the worker flow from CDs to DZNs can be used to accurately capture the short- to medium-distance population mobility important for disease spread [5]. Adults from each CD are randomly assigned a DZN based on this data, and the workers in each DZN are split into working groups of around 20 adults to represent the colleagues with whom an individual is likely to work with on a daily basis. The commute distance distribution of workers given by this approach is shown in the appendix in Fig. 8(a) and is distributed similarly to reports by the Australian Bureau of Infrastructure, Transport and Regional Economics (BITRE) [27]. Finally, accurate contact networks in schools, grades, and classes are paramount to the demographics given the close and frequent contact of students with one another [10]. Unfortunately, the census does not contain information about school attendance, nor spatial distribution of students. However, the Australian Bureau of Statistics (ABS) provides state-wide frequency distribution tables specifying the number of schools with (non-uniform) intervals of the school attendance. Due to the concentration of the Australian population around urban areas, we employ a biased sampling technique to place these schools within DZNs that have more students nearby, i.e., SLAs that are more populated are biased to have more schools (see Appendix B.2.1). Using this approach, the average commute distance of students is illustrated in Fig. 8(b) and is distributed according to reports by the BITRE [27]. 3.2. Transmission model At an individual level, we are concerned with the transition probability of a susceptible agent i becoming infected during a given time period (step) n. Let the random variable Xi(n) denote the state of the individual 5 (a) Natural history of the disease. (b) Simulated generation time. Figure 2: Natural history of the disease and corresponding simulated generation time. The disease dynamics are modelled as having a linear increase followed by a linear decrease, as illustrated in 2(a). In the figure, the area under the curve is shaded according to the proportion of people at least that infectious after disease onset (darker representing a higher proportion). If an agent becomes symptomatic, their infectiousness doubles (dashed blue line) from that day onward. Moreover, 67% of agents become symptomatic; of these agents, 30% start showing symptoms on day 1, 50% on day 2, and the remaining 20% on day 3. We obtain empirical generation times from simulations resulting from this model, shown in 2(b) for a number of R0 values. The confidence intervals range from 3.35 to 3.39 days (also shown on Fig. 2(a)), depending on R0 and, in general, the generation time has a slight downward trend as a function of disease severity. at time n. That is, we are interested in the infection transition probability: pi(n) = Pr{Xi(n) = latent Xi(n − 1) = susceptible} , (1) where latent is the state denoting exposure to the disease to that agent (see Sec. 3.3). Section 3.1 defined a number of mixing groups Gi(n) that each agent i interacts within where each group g ∈ Gi(n) is associated with a static set of agents Ag. The infection probability is thus computed as a product of all of the possible infectious contacts during that step: (2) pi(n) = 1 − (cid:89) g∈Gi(n) j∈Ag\i (cid:34) (cid:89) (cid:0)1 − pg j→i(n)(cid:1)(cid:35) , where pg g. Let nj denote the time agent j becomes infected, then j→i(n) denotes the instantaneous probability of transmission from agent j to agent i in contact group j→i(n) = κ f (n − nj j, i) qg pg j→i. (3) The scaling factor κ is a free parameter that allows variation in the contagiousness of the simulated epidemic, while keeping other parameters constant. Changing this parameter thus results in different values of the reproductive ratio R0; we investigate the precise dependence between these two variables in Sec. 4.1. The function f : N → [0, 1] characterises infectivity of case j over time; importantly, f (n − nj j, i) = 0 when n < nj. In this paper we assume infectivity linearly decreases over time. Finally, qg j→i is the probability of transmission from agent j to i at peak infectivity, which we discuss below. Each susceptible individual can become infected at the end of each step, which is determined by Bernoulli trial with transition probability pi(n). Note that the probabilities of transmission qg j→i are very low in practice, and so the instantaneous probabilities of transmission pg In this work, we derive qg j→i(n), scaled by κ, remain significantly below 1. j→i from two sources: (i) the recent study of H1N1 (2009) by Cauchemez et al. [10], in setting transmission probabilities for a number of relevant mixing groups (households and schools), as well as (ii) a recent study using contact probabilities for mixing groups [22]. The latter approach included mixing groups that were not considered by [10] (household clusters, neighbourhoods and working groups). Furthermore, as pointed out by Chao et al. [22], these contact probabilities are in agreement with other 6 00.511.52R03.343.353.363.373.383.39Generationtime agent-based models [20, 28]. Thus, the transmission between two agents qg is described by either a transmission probability βg j→i or a contact probability cg j→i. j→i within each contact group g The transmission probabilities contained in Table C.4 are obtained from a study of H1N1 (2009) by Cauchemez et al. [10] which determined the transition rates of infection βg j→i between an individual j and a susceptible individual i, using reverse jump Monte Carlo sampling methods, while fitting of the transition rates varied slightly depending on the mixing context j. We transform the rate of infection βg j→i into the daily probability of transmission from an infected individual j to a susceptible individual i as follows [10] j→i = 1 − exp(cid:0)βg qg j→i (cid:1) . (4) In addition, when the transition rates are not available in the study Cauchemez et al. [10] we utilise the contact probabilities given in Table C.3, reported by [22]. These probabilities represent the likelihood, within each daily period, of having a contact of sufficient duration and closeness for a transmission of the infection to be possible between the two individuals i and j in this social setting. Each contact probability cg j→i for a mixing group g is multiplied by a factor ρ scaling to the probability of transmission: qg j→i = ρ cg j→i. (5) The factor ρ allows us to calibrate the transmission probabilities set by Eq. (5) within mixing groups. This is achieved by matching the attack rates of the corresponding mixing groups to the values of the context- dependent rates reported in [10]. This ensures consistency between Eq. (4) and Eq. (5). 3.3. Natural history of disease The natural history model describes the course of a disease from onset to resolution [5]. Each state has associated properties (e.g., infectious or non-infectious) depending on the disease being modelled. In this paper, we define a few states for influenza: susceptible, latent, infectious symptomatic, infec- tious asymptomatic, and recovered. Similar models have been established in earlier work based on observations of influenza dynamics [5]. The model, illustrated in Fig. 2(a), includes states that account for nuances in influenza that make the pathogen highly transmissible. The latent period captures the time from the exposure to the acquisition of infectiousness, contributing to the spread of the disease. From the latent state, 67% of individuals develop symptoms (i.e., transition to symptomatic) [23], leaving the remainder as asymptomatic agents that are half as infectious [5]. More recent studies of the proportion of symptomatic cases suggest a wider range of estimates – within 25–67% [24, 26] – but, in general, this depends on the study design and definitions of infection and symptomatic illness (with estimates for asymptomatic cases ranging between 0–100%) [25]. Hence, we adopted the established estimates of [23] that have been used in various simulations [12, 29, 22]. An individual that will eventually show signs of illness will typically do so a number of days after contracting the disease. During the interim, these agents are considered as infectious as agents in the asymptomatic state. Specifically, out of the individuals that will become ill, 30% will start showing symptoms one day after disease onset, 50% after two days, and the remaining 20% on day three. These dynamics result in the generation times (i.e., the times between the infection of a primary case and one of its secondary cases) between 3.35 and 3.39 days, depending on the R0, as illustrated in Fig. 2(b). These results are in line with the literature on generation times in a number of empirical studies [6] and established simulations [5, 12, 22]. In this framework, the prevalence at a given time is the number of ill individuals in the symptomatic state. This is then used to compute the illness attack rate, R0, and many other quantities of interest. 3.4. Scenario description In order to sufficiently model the domestic spread of the disease, we assume that the Australian popu- lation is exposed to the strain once it is a global pandemic. The geographic isolation of Australia suggests that people arriving from all other countries are equally likely to be already carrying the disease. Hence, we follow the approach of [12] by introducing the disease at international airports, where the number infected is proportional to the air traffic inflow, obtained from BITRE [30]. 7 Airport code SYD MEL BNE PER OOL ADL CNS DRW TSV State NSW VIC QLD WA QLD SA QLD NT QLD City Sydney Melbourne Brisbane Perth Gold Coast Adelaide Cairns Darwin Townsville Passengers 40884 25859 14250 11449 3022 2214 1874 597 105 Figure 3: Daily incoming passengers per Australian international airport obtained from BITRE [30] along with a map detailing the airport locations. The AceMod simulation itself is dynamically seeded such that new individuals are randomly infected at every time step n instead of only at the beginning. There are 10 international airports in Australia and the number of "seeds" surrounding each airport is proportional to the average daily number of incoming passengers at that airport (see Tab. 3). Note that the simulation is a closed system such that only existing and susceptible agents can be infected. Moreover, only individuals living in SLAs with geographic centroids inside a given (seeding) radius of each airport are considered for infection. The number of agents infected within this region are binomially distributed B(P, N ) with P and N chosen such that, on average, 0.04% of incoming arrivals infect exactly one agent (in agreement with the previous studies of [12]). The epidemic characteristics are relatively insensitive to variations in the initial seeding, as has been shown before by [12] and further confirmed by our study. However, the outbreak scenario does affect community synchrony, which we explore in Sec. 4.2. 3.5. Calibrating the model Correct implementation of the transmission model requires calibrating a number of free parameters to known empirical results. That is, by rescaling the contact probabilities and transmission probabilities, we are able to match previously reported attack rates in schools, households, and other social mixing groups. The first problem with calibrating the model is that contact groups all vary in size. The contact prob- abilities, reported in Tab. C.3, are determined for communities of fixed size following the study of [12]. However, depending on the size of the community, these probabilities should be rescaled such that in larger communities people are less likely to be in contact with a lower proportion of the population. We do so by linearly rescaling these probabilities based on the number of agents in each stochastically generated group. The second issue we address is calibrating the likelihood that a susceptible individual will contract a disease, given contact with another infectious individual, i.e., tuning ρ from Eq. (5). This is done by matching the known proportion of transmissions within each different social group. That is, the fractions of influenza transmissions within households, school, and other settings (work, communities, etc.) have been estimated as 30–40%, 20%, and 40-50%, respectively [29, 10]. Using these calibration procedures, the illness attack rates within different mixing groups in our simulation were matched to these studies, validating the simulations. 4. Simulation results We illustrate the use of the model by studying influenza pandemics in Australia for a variety of simulated pathogens. We quantify the transmissibility of a strain by the reproductive ratio R0 and study the epidemic curves of the disease for a number of different R0 values. In addition to analysing the (national) epidemic curve, we study the spatial distribution of the pandemic by prevalence proportion choropleths and disease synchrony. 8 Figure 4: Reproductive ratio R0, attack rate and transmission scaling factor κ for simulated influenza epidemics in Australia. 4.1. Reproductive ratio and the epidemic curve In the study of disease transmission, R0 is defined by "the expected number of secondary cases produced by a typical infected individual during its entire period of infectiousness in a completely susceptible popu- lation" [31]. It is thus a key value that coarsely describes the rate of growth of an infection and whether it will spread in the population. We illustrate both analytically and empirically that we can approximate R0 by a linear function of κ for a biologically plausible range of values. A similar result was empirically shown by Chao et al. [22], who noted that R0 is linear in κ (from Eq. (3)). Using Eq. (3) and taking "typical" to mean "in expectation", we obtain the R0 from Eq. (2): R0 = E Xi(N ) = symptomatic XJ (0) = symptomatic (cid:17) (cid:17)(cid:17) (cid:16)(cid:88) (cid:16) (cid:16)(cid:89) (cid:89) (cid:88) (cid:88) E n i = E = pI (n) XJ (0) = symptomatic (cid:16) 1 − (cid:89) (cid:0)1 − pg j→i(n)(cid:1)(cid:17) g∈Gj (n) , (6) j i n g f (n−nj i, j)qg outer products in Eq. (6), we note that the dominant terms are the first-order components(cid:80) κ (cid:80) where Gi(n) = Gj(n) by the commutative property of the mixing groups. By expanding the inner and j→i(n) = j→i. Thus, we expect an approximately linear relationship of R0 for reasonable values of κ. In order to validate our conjecture, we compute the sample population R0 by performing local simulations for a given set of parameters. Within each simulation, one agent is seeded at random, the number of cases directly caused by this agent is counted, then R0 is computed as the average of this number. Using this approach, we evaluate R0 for a number of κ values, as shown in Fig. 4, where the result is a linear and homoscedastic function; the simulation results thus support our analytical reasoning. Figure D.10 in the appendix illustrates the frequency distribution of secondary cases for κ = {1.0, 2.0, 3.0, 4.0}. g pg For a given R0, we measure the severity of the epidemic via the prevalence, incidence, and infection attack rate of a disease. The prevalence and incidence are defined by the number of current and newly ill agents at each discrete time step. Both quantities are commonly used to characterise the time dependent global state of the population with respect to the epidemic [12, 22, 21]. Tracing the incidence proportion (normalised by population size) over time produces an epidemic curve. In addition, the infection attack rate captures the proportion of the population that became ill over the duration of the epidemic [32] and is quantified by cumulating the incidence proportion. The attack rate is thus an effective summary measure for the time independent disease spread. Figure 5 illustrates the global epidemic state for simulated pathogens. As expected, a simulated strain with a higher R0 is associated with higher attack rate and an earlier incidence peak. Table 1 gives corre- sponding key features of the incidence curve for the range of R0 values used. The reported illness attack rates match expected empirical and simulated results [12, 29, 22], validating our model. 9 00.511.52R001234Transmissionscalingfactor50.20.4AttackRate Figure 5: The epidemic curve illustrates the trajectory of the epidemic by tracing the incidence over time for each R0 value. This illustrates the behaviour of the simulated influenza epidemics in Australia with R0 = {1.0, 1.25, 1.5, 1.75, 2.0}. We performed 10 trial runs for each R0 value, then plot the mean (solid lines) and standard deviation (shaded area). Moreover, Tab. 2 collates the national and the community average attack rates for the different age groups. We compute the national rate as the cumulative number of ill individuals in the country, giving a weighted average of the attack rate depending on the SLA size. The community based measure is an unweighted average of each SLA attack rate, obtained by taking the mean of the attack rate in that com- munity. The table illustrates the significant impact on student-aged individuals, having approximately four times higher incidence than the other groups. Further, the community and national attack rates converge for all age groups for higher R0, indicating the attack rate saturates uniformly for all SLAs. This is further evidenced by the synchrony increasing with higher R0 in Tab. 1. 4.2. Spatial spread of the disease We demonstrate the spatiotemporal spread of the simulated pandemics qualitatively and quantitatively through prevalence proportion choropleths and epidemic synchrony. Both tools are employed at the com- munity (SLA) level in order to identify important hubs and turning points of the developing epidemic. In Fig. 6 we present the spatial distribution for a realisation of the simulated influenza pandemics for R0 = 1.5 and R0 = 2. The snapshots are taken from key days that were identified from the epidemic curve in Fig. 5: onset inflexion point1 (day 30); peak of R0 = 2.0 (day 50); peak of R0 = 1.5 (day 62); and intersection point (day 88). Due to the seeding of the pathogen at major airports and the contact network, the epidemic tends to spread primarily around the coast before it can be traced inland, where often entire SLAs are left unaffected in central Australia. Moreover, the incidence typically peaks first in dense urban communities, followed by sporadic outbreaks in the less populous areas. This further motivates quantifying this behaviour by analysing the synchrony of community-based epidemic curves. Epidemic synchrony is characterised by the phase coherence of incidence curves in specified geographic locations [33]. In this simulation, however, each SLA follows a relatively smooth transition, allowing us to simplify the definition. We denote asynchrony of a set of communities by the variance of their incidence peaks (in days) and, consequently, synchrony is the reciprocal of this quantity. Figure 7 gives results on the synchrony of incidence peaks in AceMod simulations. It has been established that more populous regions of the United States exhibit more synchronised epidemics, i.e., that there exists a "hierarchical spatial spread" 1The inflexion point is approximated to be between the two days. 10 (a) R0 = 1.5 (b) R0 = 2.0 Figure 6: Prevalence proportion choropleths illustrating the spatial distribution of simulated influenza pandemics in Australia for R0 = 1.5 and R0 = 2. For the colour scale, the minimum prevalence (green) is 5 × 10−3 and maximum prevalence (red) is 8 × 10−2. We plot the distribution for days 30, 50, 62, and 88, with time going down the page. The pandemic spreads from these urban hubs inwards toward central Australia. Both simulations are sample realisations comprising the same demographics (contact) and mobility networks, as well as identical seeding at the same rate at major international airports around Australia (see Tab. 3). The epidemic peaks at larger cities at similar times, whereas less populous areas are less likely to synchronise. 11 (a) (b) (c) Figure 7: Synchronisation of epidemic curves between the different communities (SLAs) in Australia illustrating spatial hier- archies. Figure 7(a) investigates how synchronisation is related to community (SLA) size, i.e., communities of similar size are grouped together and their peak incidence times are compared. Synchrony is computed for 10 partitions (bins), with around 142 SLAs per interval. Figure 7(b) traces the pairwise synchrony between all pairs of SLAs against the pairwise distance, averaged over 10 partitions (bins). Figure 7(c) illustrates the effect of different outbreak scenarios on the synchrony of each community. This is achieved by seeding the pathogen at a varying number of SLAs, whilst varying the proportion of those SLAs initially infected. To the right of the figure we illustrate example attack rates (cumulative number of ill individuals) for given datapoints in the contour plot. The bold black lines illustrate the attack rate for the most populous SLAs in each state, whereas grey lines are all other SLAs. We observe an increased synchrony if the infection starts in a larger number of SLAs and with a higher proportion of infected individuals within these SLAs. 12 Table 1: Characteristics of the incidence curves, averaged over 10 trials. Basic reproductive number R0 Rate of spread: 1K ill∗ 10K ill∗ 100K ill∗ 1M ill∗ Peak of epidemic∗ Daily number of new cases at peak activity 1.0 29 44 60 80 84 1.25 22 33 44 58 63 1.5 21 30 39 50 59 1.75 18 25 33 42 47 2.0 17 24 31 39 47 85.3 K 140 K 189 K 257 K 328 K Number of days with > 100K ill 44 55 52 51 48 Cumulative number of ill individuals 3.4 M 5.0 M 6.4 M 7.7 M 8.8 M Synchrony of community epidemic peaks (10−3) M – Million; K – Thousand. ∗ Days after initial introduction. 1.38 2.67 4.33 6.39 7.70 Table 2: Attack rates, per 10K individuals, at the community and national level for different age demographics, averaged over 10 trials. The attack rate is the proportion of the population which became ill. The community attack rate is calculated as the average of the attack rates of each SLA. Age Group R0 = 1.0 R0 = 1.25 R0 = 1.5 R0 = 1.75 R0 = 2.0 0-4 5-18 19-34 35-64 65+ Overall 0-4 5-18 19-34 35-64 65+ Overall 1164 4140 967 975 939 1552 1280 4520 1042 1082 1003 1734 1898 5080 1698 1710 1665 2320 2020 5400 1774 1824 1724 2500 2600 5560 2500 2500 2450 3050 2730 5880 2590 2630 2520 3230 3270 5860 3250 3250 3210 3710 3370 6140 3320 3360 3260 3870 3870 6070 3970 3950 3920 4320 3960 6310 4010 4060 3940 4450 Cumulative number of community illnesses per 10K∗ Cumulative number of national illnesses per 10K∗ ∗Compared to the number of agents in that age group (e.g., per 10K 19-34 year olds). of influenza [33]. We investigate this hypothesis for Australian demographics (that are most prominently characterised by concentration of the population around urban and coastal regions). In Fig. 7(a) we group communities of similar size together and their synchrony is computed. Using the synchrony measure, we study the phenomena of both hierarchical and wave-like spread. While the hierarchical spread is captured by the synchrony across SLAs of similar sizes, the wave-like spread is associated with pairwise geographical distance. That is, to investigate the hierarchical hypothesis, we partition all SLAs into groups according to their population size and calculate the synchrony across all peak times within each group. This is shown in Fig. 7(a), where we see an increase in synchrony as the SLA size grows. In contrast, in order to verify the wave-like hypothesis, we compute pairwise synchrony between all pairs of SLAs, and trace it against the pairwise distance. Fig. 7(b) shows the average pairwise synchrony for ten partitions (bins) of the pairwise distance. Crucially, the average pairwise synchrony does not grow with the increases in the pairwise distance. These results support the hypothesis of a hierarchical spatial spread, suggesting the regional movement of disease depends on the worker/student flow moreso than the geographic distance. 13 We also note that the synchrony with respect to SLA size, shown in Fig. 7(a), is particularly pronounced for two specific SLA sizes. This two-phase characteristic is also evident in incidence plots (cf. Fig. 4.1), suggesting a secondary phase of an epidemic. The precise dependency between such phases and a multi- modal character of the synchrony profiles is a subject of future research. Finally, we study the effect of outbreak scenarios on epidemic synchrony by varying the number of SLAs infected at the beginning of the simulation, as well as the proportion of individuals seeded within these SLAs. The number of SLAs initially infected ranges from 1 to 1422, and the proportion of each SLAs infected is logarithmically spaced between 10−5 and 1. We then compare the synchronisation between community incidence peaks when we vary these two parameters, as represented with the contour plot shown in Fig. 7(c). 5. Discussion and future work In this paper we present the AceMod simulator as an approach for modelling epidemics in Australia using census data. Specifically, we used the 2006 Australian Census data to construct a contact network and develop a stochastic agent-based model for disease spread. The detailed data on population demographics and mobility allowed us to generate specific dynamics of influenza viral infection and transmission. More- over, the transmission and disease natural history models were calibrated to empirical data on influenza transmission, allowing us to validate the model. The agent-based model facilitated fine-grained analysis of the spatiotemporal dynamics of influenza spread both qualitatively and quantitatively through incidence curves, prevalence choropleths, and epidemic synchrony. This study has highlighted several interesting dependencies in large-scale epidemics, calibrated for Aus- tralian demographics and connectivity. Firstly, we showed that the reproductive ratio R0 can be approxi- mated by a linear function of a simple factor that scales the probability of disease transmission. Secondly, the epidemic curves, produced in our simulations, over a typical range of reproductive ratios, concur with the general ranges of the community and national attack rates, and show, in addition, the presence of sec- ondary phases following the primary peaks. The spatiotemporal spread of the simulated pandemics was also illustrated using prevalence proportion choropleths, identifying important hubs and turning points of an epidemic. Most importantly, we verified the hypothesis that the modelled disease spreads in accordance with spatial hierarchies as opposed to a wave-like fashion. This has been achieved by measuring synchrony as a function of both population size and pairwise distance between SLAs. As the number of initially infected SLAs and the proportion of each infected SLAs are increased, the synchrony between communities increases, suggesting that spatial hierarchies disappear depending on how widespread the pandemic already is when it reaches Australia. There are several important assumptions behind the presented results: fidelity of the Australian census datasets, including mobility patterns; knowledge of the transmission rates in specific mixing groups; and understanding of the natural history of the disease. With census datasets improving in their overall quality and coverage, there is an increasing confidence in data-driven simulation studies. In parallel, empirical epidemiological studies continue to narrow down the uncertainty in key modelling parameters. One of the emerging trends is thus an integrated real-time tracking of epidemic spreads with rapid simulation of "what-if" scenarios. It is known that infectious disease dynamics are heavily influenced by social network characteristics. It is then crucial to better represent and characterise the various Australia social networks in order to both ameliorate our predictions and suggest appropriate mitigation strategies. For this, we first aim to leverage the 2011 and 2016 census data to generate surrogate populations. With this, we could also study how the changes in the social network over time affect our predictions under the same disease dynamics. This could in turn help us in tuning our model to account for the predicted future changes in the social network structure. Subsequently, our goal is to study the network characteristics to better understand the relationship between epidemic dynamics and different network properties. For instance, the critical value of the repro- ductive ratio R0 (and its relationship to attack rate) is influenced by the network topology, and various graph-theoretic techniques can be employed to reveal these dependencies [34, 35, 36, 37, 38]. 14 Directed information-theoretic measures, such as transfer entropy [39], are particularly suited to this task in real systems in either the time-averaged or local forms [40]. These quantities have been used previously to infer interaction networks in multi-agent systems [41] and are particularly suited to processes with attracting states [42, 43]. This would allow us to study contact networks in terms of both structural and functional connectivity [44, 45, 46, 47] and their dominant motifs [48, 49, 50]. We can also exploit the predictive power of transfer entropy in identifying critical regimes of network dynamics and epidemic processes in particular [51, 52]. Precursors of phase transitions, identifiable by information dynamics [53, 54, 55] promise to strongly impact on the quality of epidemic forecasting. Other future avenues of inquiry are aimed at developing a more versatile computational epidemiological framework by considering (i) more complicated outbreak scenarios, e.g., bio-terrorism attacks with targeted infections; (ii) different scales of modelling (fast and slow dynamics of disease diffusion); (iii) more diverse interaction types varying across demographic groups, professions, territories, seasons, and other contexts; and (v) compound intervention strategies, ranging from traditional vaccination to high-precision quarantine decisions. 6. Acknowledgments The Authors are grateful to Tim Germann, Joseph Lizier, Cameron Zachreson, Kristopher Fair, David Newth, Philippa Pattison, Stephen Leeder, Tania Sorrell, Alessandro Montalto, and especially Peter Wang, for numerous helpful discussions of various intricacies involved in agent-based modelling of influenza. The Authors were supported through the Australian Research Council grant DP160102742. Appendix A. Australian Census Data We are using data from the 2006 Australian Census obtained from the Australian Bureau of Statistics (ABS). All data contained in the this section can be obtained publicly, with the exception of the work travel data. It should be noted that some of the data needs to be processed using the TableBuilder. The census data has a hierarchical structure based on geography, described below. Appendix A.1. Hierarchical Structure of ABS data For the 2006 census, the ABS divided Australia using the Australian standard geographical classifica- tion (ASGC). The levels present in the ASGC include: census collection district (CD), local government area (LGA), postal area (POA), remoteness classification (RA), statistical division (SD), statistical local area (SLA), state suburb (SSC), statistical sub division (SSD), urban centre or locality (UCL), section of state (SOS), state electoral division (SED), commonwealth electoral division (CED), state or territory (STE). Some of these structures, such as RA and UCL, exist to express geographic concepts specific only to certain regions, such as remoteness and urbanity. Therefore these structures may not cover the entirety of Australia. In this work we use the following ASGC structures: CD, SLA, STE. In addition we also use the destination zone (DZN) classification. Each structure used in this work forms a complete partition of Australia. In addition, the census data in each CD is collected for each household, thus the household (HH) is also a de facto structure of the census data. State (STE). The STE is the highest level structure used by the ABS. This comprises the six states, two territories and one offshore territory. The offshore territory comprises any area which is not part of mainland Australia or Tasmania. Statistical local area (SLA). The SLA is the second highest level structure used in this work, however this is only the fourth highest structure of the ASGC. In the 2006 census there are 1422 SLA's. The SLA has on average 14,064 people. The SLA's aggregate to states, that is no SLA is contained within two states. 15 Census collection district (CD). The CD is the structure with the highest hierarchical level used exclusively for the 'home regions' (see below). Data from a CD is collected by a single ABS representative, hence the name. In total there are 38,200 CDs which have an average population of 523 people. The CD's aggregate to SLA's, that is no CD is contained within two SLA's. Destination zone (DZN). The working group is the structure with the highest hierarchical level used exclu- sively for the 'work regions' (see below). The DZN describes the location that individuals go to work. In the 2006 census there are 9,800 DZN's. The DZNs aggregate to SLAs, i.e., no DZN is contained within two SLAs. In addition, in our simulations we have defined and used some lower level structures which are relevant to the underlying infection dynamics, as described in the following section. These are the household cluster-HC and the working group (WG). Appendix A.2. Australian Bureau of Statistics (ABS) data structures The ABS data is presented in tables. There are a number of tables which can be directly accessed from the ABS database. In addition, ABS provides the TableBuilder tool which we have used to build certain It should be noted that the tables do not provide additional tables according to our simulation needs. any data which could be used to identify individuals or households. Instead they are aggregated at the aforementioned structural levels (CD, SLA, STE). For example, a table built at the CD level could provide the number of individuals within the CD between certain age brackets, the number of households with a given number of members or the number of households who have a particular type of internet connection. The lowest structural level for which a table can be retrieved or built is the CD level. In this work, we retrieved or built the following tables for schools, family, households, age, sex, airport, travel to work.2 School distribution. This was retrieved at the structural level of states (STE). This is the highest resolution at which the ABS offers data about schools. In this table, each row represents a state. Each column represents a range of the number of students attending the school. The states (rows) are NSW, VIC, QLD, SA, WA, TAS, NT, ACT. The ranges (columns) are 0-35, 36-100, 101-200, 201-300, 301-400, 401-600, 601-800, 801-1000, 1000+. Age distribution. This was obtained at the structural level of the CD. In this table each row represents a CD. Each column gives the number of individuals of a specific age group and gender. The columns contain the number of males/females in the given CD who are between 0-4, 5-18, 19-39, 40-65, 65+. Family distribution. This table is constructed from three distinct tables from the ABS. The first table is defined at the level of CD and gives the number of households of a given size. The second table is also defined on the level of CD describes the number of each of four distinct types of family as defined by the ABS-Couples with children (CWC), couples without children (CWOC), single parent families (SPF) and other (OTH). The third table is defined on the national level gives the proportion of households which are family units or non family units. Non family units constitute households of either a single person, or people sharing accommodation without a familial relationship. Household Composition.dat is defined at the structural level of the CD. In this table each row represents a CD. Each column corresponds to a particular combination of household attributes derived from the first, second and third tables. Therefore each cell corresponds to the proportion of households with a particular combination of attributes in a given CD. Worker flow. Each row corresponds to a (CD, DZ) pair which represents a worker flow from a CD (source) to a DZ (target). The first column gives the CD code of the worker flow. The second column gives the DZ code of the flow and the third column gives the number of individuals living in the CD and working in the DZ. 2The travel to work data is not publicly available and was purchased from the ABS. 16 Daily incoming passengers. This table lists all the international airports in Australia. Each row in this table corresponds to a particular international airport and the number of passengers entering that airport from overseas per month on average. This data is taken from The Bureau of Infrastructure, Transport and Regional Economics (BITRE) [30]. Appendix B. Simulated population structure Following [12, 5] in constructing our national simulation model, we use a discrete-time stochastic simu- lation model of disease spread within a structured SLA. The model population is stochastically generated to match CD attributes for gender, age structure, household size, employment status, and location of em- ployment among others. AceMod was implemented in C++11 and run on a High Performance Computing (HPC) service (Artemis at the University of Sydney), comprising 4264 cores of computing capacity, consisting of 136 standard compute nodes, two high memory nodes (512 GB), three very high memory nodes (6 TB), and five GPU compute nodes, under a "Fair Share" resource allocation model (e.g., no more than 288 cores). A typical run of 180 days of an epidemic is simulated on an HPC node in 42 minutes, so that each scenario covering 10 runs varying over infection "seeds" is complete and integrated within seven hours. However, the code is not optimised for performance and includes numerous debugging statistics; thus much lower run-times could be achieved with minimal effort. Each person in the population belongs to one of five age groups: preschool-age children (0–4 years), school-age children (5–18 years), young adults (19–29 years), adults (30–64 years), and older adults (64+ years). The individuals within the model are arranged into one of 4 family structures: singles; couples without children; couples with children; and single parent families. In general, households consist of a number of persons, matching the Australian census data, and are grouped randomly into clusters of four households each. Every person also belongs to a set of close and casual contact (also referred to as "mixing") groups, ranging from their household and household cluster (highest contact probabilities) to workplaces, collection districts, and to the SLA (with the lowest contact probabilities, representing occasional "long distance" interactions in supermarkets, shopping centres, theatres, libraries, mass gatherings, etc.). Depending on their age, school-age children attend primary school or high-school. In each case, children are arranged into 25 person groups referred to as 'classes'. According to the Australian Census data 98.7% of children 5-18 years old attend school, so we allow the remaining 1.3% to mix in the household, household cluster, and community during daytime. Working adults (restricted to those who are 19–64 years old) belong to a working group of a varying size determined by census data. We assume that workers make a contact of sufficient duration and/or closeness to transmit the disease with a subset of the entire workforce at that location. Appendix B.1. Assigning nighttime mixing groups In order to populate the nighttime (home) regions, our simulation iterates through CDs from the census data. For each CD, a cumulative density function (CDF) is constructed from the family distributions as described above. For a particular CD, we then create households one by one. Each household has attributes assigned to it probabilistically based on the CDF, including the number of people living in the household and the type of family living in that household. This process continues until the population of the CD is reached. After the household attributes are chosen, individuals are assigned their own attributes, e.g., a single parent family of size 3 requires one adult and two children. Therefore one person will be assigned as an adult, and two will be assigned as children. The age and gender of each individual is then randomly assigned using data from the age distribution. Appendix B.2. Assigning daytime mixing groups After home regions have been populated, the worker flow information is used to generate mobility data. This data gives the number of workers travelling between a CD and a DZN. This number of workers are then 17 (a) Workers (b) Students Figure B.8: Commute distance distributions. selected randomly from the CD and assigned as workers in the given DZN. Therefore for each (CD, DZN) pair, we randomly select the given number of unassigned, working aged individuals from the corresponding CD and assign them to the corresponding DZN. Figure B.8 shows the distribution of commute distances for working individuals, as well as school students (described in the next subsection), generated by AceMod. Appendix B.2.1. Populating schools Our simulation generates schools and assigns a maximum capacity to these schools according to the dis- tribution of school sizes available from ABS. The schools are then spatially assigned based on the availability of school staff in the relevant DZNs. The number of school staff in each DZN will determine the number of students able to go to school in that DZN based on a fixed staff to student ratio. Each school is randomly assigned to a DZN which has a sufficient number of potential students. The number of potential students in a DZN is then reduced by the size of the school. This continues until all potential schools have been allocated to a DZ. At this point, each DZN has a number of schools with unfilled student and staff places. In order to assign students to schools, we assume that students would go to a school if they live within the catchment zone of the school. This process mimics the process that students are likely to attend a schools within a short distance first, and if there are no places available they would search further afield. Similarly, schools are more likely to accept students from a greater distance if it is evident that there are no other closer options. If no school could be found within the maximum radius, it is assumed that the student does not attend a school. The catchment area of a school is defined by randomly selecting a radius from a distribution, which is a folded normal distribution converted from a normal distribution with mean and variance of 10km and 4km. If the student lives within the catchment zone of many schools, the algorithm will pick one school with probability proportional to the remaining available student places in the school. Once a student place is chosen, the total available student places in the given school are reduced by one. We do not distinguish between public and private schools for the allocation purposes of students. If a student does not live within a catchment zone of any school, the algorithm searches an area with double the original radius and again selects a school with probability proportional to the available places. If there is still no school within the doubled radius, the radius is doubled again. This process is repeated until the algorithm finds a school or reaches the maximum searching radius of 100 km. Once the students are all assigned to school places, we use the student to staff ratio (2:17) (extracted from historical ABS data) and the enrolment numbers of the schools to calculate the number of staff working in each school. These staff members are then selected randomly from the ensemble of people who work in that particular DZN. The remaining people who work in the DZN are assigned to non-school working groups, as follows. The number of remaining workers is divided by the maximum size of a working group (20) and the 18 Table C.3: Daily contact probabilities cg j→i for different contact groups g, reported by [22]. Mixing group g Infected individual j Susceptible individual i Contact probability cg j→i Household cluster Child (<19) Child (<19) Adult (>18) Adult (>18) Working Group Adult (19-64) Neighbourhood Community Any Any Any Any Any Any Any Any Child (<19) Adult (>18) Child (<19) Adult Adult (19-64) Child (0-4) Child (5-18) Adult (19-64) Adult (65+) Child (0-4) Child (5-18) Adult (19-64) Adult (65+) 0.08 0.035 0.025 0.04 0.05 0.0000435 0.0001305 0.000348 0.000696 0.0000109 0.0000326 0.000087 0.000174 Table C.4: Daily transmission probabilities qg by [10]. j→i for different contact groups g, obtained by Eq. (4) where βg j→i are reported Contact Group g Infected Individual j Susceptible Individual i Transmission Probability qg j→i Household size 2 Household size 3 Household size 4 Household size 5 Household size 6 Any Any Any Any Any Any Any Any Any Any School Grade Class Child (<19) Child (<19) Child (<19) Child (<19) Adult (>18) Child (<19) Adult (>18) Child (<19) Adult (>18) Child (<19) Adult (>18) Child (<19) Adult (>18) Child (<19) Child (<19) Child (<19) 0.0933 0.0393 0.0586 0.0244 0.0417 0.0173 0.0321 0.0133 0.0259 0.0107 0.000292 0.00158 0.035 ceiling of this number is the number of non school working groups within the particular DZN. Workers are then randomly assigned to these working groups such that none will exceed a size of 20. The results of this assignment algorithm are summarised in the following figures: • Figure B.9 shows school size distributions; • Figure B.8 show commute to school (gamma) distribution (mean distance to school). Appendix C. Transmission and contact probabilities The transmission probabilities (for Eq. (4)) and contact probabilities (for Eq. (3)) are given in Tab. C.3 and Tab. C.4, respectively. Appendix D. Supplementary results Figure D.10 illustrates the number of secondary cases from a typical outbreak. Figure D.11 shows the prevalence choropleth for the Greater Sydney Area. 19 (a) NSW (b) VIC (c) QLD (d) WA (e) NT (f) SA (g) TAS (h) ACT Figure B.9: School size distributions. 20 02004006000200400600Frequency050010001500200025003000School size (students)-100010002004000200400600Frequency050010001500200025003000School size (students)-200020001002003000100200300Frequency050010001500200025003000School size (students)-200020001002000100200300Frequency050010001500200025003000School size (students)-100010002040600204060Frequency050010001500200025003000School size (students)-20020050100150050100150Frequency050010001500200025003000School size (students)-500500204060050100Frequency050010001500200025003000School size (students)-1001001020300102030Frequency050010001500200025003000School size (students)-20020 (a) κ = 1.0 (b) κ = 2.0 (c) κ = 3.0 (d) κ = 4.0 Figure D.10: Number of secondary cases for simulations with κ = {1.0, 2.0, 3.0, 4.0}. 21 24681012141618Number of secondary cases100101102103104Frequency24681012141618Number of secondary cases100101102103104Frequency24681012141618Number of secondary cases101102103104Frequency24681012141618Number of secondary cases101102103104Frequency Figure D.11: Prevalence proportion choropleths of Sydney for R0 = 1.5 and R0 = 2. We plot the distribution for days 30, 50, 62, and 88, with time going down the page. Both simulations are realisations comprising the same demographics (contact) and mobility networks, as well as identical seeding at the same rate at major international airports around Australia (see Tab. 3). 22 References [1] A. T. Newall, P. A. Scuffham, B. Hodgkinson, Economic report into the cost of influenza to the Australian health system, Tech. rep. (2007). [2] T. M. Lanzieri, S. R. Bialek, I. R. Ortega-Sanchez, M. Gambhir, Modeling the potential impact of vaccination on the epidemiology of congenital cytomegalovirus infection, Vaccine 32 (30) (2014) 3780–3786. [3] B. A. Lopman, V. E. Pitzer, R. Sarkar, B. Gladstone, M. Patel, J. Glasser, M. Gambhir, C. Atchison, B. T. Grenfell, W. J. Edmunds, et al., Understanding reduced rotavirus vaccine efficacy in low socio-economic settings, PloS one 7 (8) (2012) e41720. [4] K. Simmons, M. Gambhir, J. Leon, B. Lopman, Duration of immunity to norovirus gastroenteritis, Emerging infectious diseases 19 (8) (2013) 1260. [5] I. M. Longini, A. Nizam, S. Xu, K. Ungchusak, W. Hanshaoworakul, D. A. Cummings, M. E. Halloran, Containing pandemic influenza at the source, Science (New York, N.Y.) 309 (5737) (2005) 1083–1087. [6] N. M. Ferguson, D. A. T. Cummings, S. Cauchemez, C. Fraser, S. Riley, A. Meeyai, S. Iamsirithaworn, D. S. Burke, Strategies for containing an emerging influenza pandemic in Southeast Asia, Nature 437 (8) (2005) 209–214. [7] E. O. Nsoesie, R. J. Beckman, M. V. Marathe, Sensitivity analysis of an individual-based model for simulation of influenza epidemics, PLOS ONE 7 (10) (2012) 0045414. [8] E. O. Nsoesie, J. S. Brownstein, N. Ramakrishnan, M. V. Marathe, A systematic review of studies on forecasting the dynamics of influenza outbreaks, Influenza and other respiratory viruses 8 (3) (2014) 309–316. [9] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, A. Vespignani, Epidemic processes in complex networks, arXiv:1408.2701 (2014). [10] S. Cauchemez, A. Bhattarai, T. L. Marchbanks, R. P. Fagan, S. Ostroff, N. M. Ferguson, D. Swerdlow, S. V. Sodha, M. E. Moll, F. J. Angulo, et al., Role of social networks in shaping disease transmission during a community outbreak of 2009 H1N1 pandemic influenza, Proceedings of the National Academy of Sciences 108 (7) (2011) 2825–2830. [11] M. J. Keeling, P. Rohani, Modeling infectious diseases in humans and animals, Princeton University Press, 2011. [12] T. C. Germann, K. Kadau, I. M. Longini, C. A. Macken, Mitigation strategies for pandemic influenza in the United States, Proceedings of the National Academy of Sciences 103 (15) (2006) 5935–5940. [13] M. E. Halloran, I. M. Longini, A. Nizam, Y. Yang, Containing bioterrorist smallpox, Science 298 (5597) (2002) 1428–1432. [14] I. M. Longini, M. E. Halloran, A. Nizam, Y. Yang, Containing pandemic influenza with antiviral agents, American Journal of Epidemiology 159 (7) (2004) 623–633. [15] S. Eubank, H. Guclu, V. A. Kumar, M. V. Marathe, A. Srinivasan, Z. Toroczkai, N. Wang, Modelling disease outbreaks in realistic urban social networks, Nature 429 (6988) (2004) 180. [16] C. L. Barrett, K. R. Bisset, S. G. Eubank, X. Feng, M. V. Marathe, Episimdemics: an efficient algorithm for simulating the spread of infectious disease over large realistic social networks, in: High Performance Computing, Networking, Storage and Analysis, 2008. SC 2008. International Conference for, IEEE, 2008, pp. 1–12. [17] K. R. Bisset, J. Chen, X. Feng, V. Kumar, M. V. Marathe, Epifast: a fast algorithm for large scale realistic epidemic simulations on distributed memory systems, in: Proceedings of the 23rd international conference on Supercomputing, ACM, 2009, pp. 430–439. [18] C. Barrett, K. Bisset, J. Leidig, A. Marathe, M. V. Marathe, An integrated modeling environment to study the co-evolution of networks, individual behavior and epidemics, AI Magazine 31 (1) (2010) 75–87. [19] K. R. Bisset, A. M. Aji, E. Bohm, L. V. Kale, T. Kamal, M. V. Marathe, J.-S. Yeom, Simulating the spread of infectious disease over large realistic social networks using charm++, in: Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International, IEEE, 2012, pp. 507–518. [20] M. E. Halloran, N. M. Ferguson, S. Eubank, I. M. Longini, D. A. Cummings, B. Lewis, S. Xu, C. Fraser, A. Vullikanti, T. C. Germann, et al., Modeling targeted layered containment of an influenza pandemic in the United States, Proceedings of the National Academy of Sciences 105 (12) (2008) 4639–4644. [21] D. Balcan, B. Gon¸calves, H. Hu, J. J. Ramasco, V. Colizza, A. Vespignani, Modeling the spatial spread of infectious diseases: The global epidemic and mobility computational model, Journal of computational science 1 (3) (2010) 132–145. [22] D. L. Chao, M. E. Halloran, V. J. Obenchain, I. M. Longini Jr, FluTE, a publicly available stochastic influenza epidemic simulation model, PLoS computational biology 6 (1) (2010) e1000656. [23] F. Carrat, E. Vergu, N. M. Ferguson, M. Lemaitre, S. Cauchemez, S. Leach, A.-J. Valleron, Time lines of infection and disease in human influenza: a review of volunteer challenge studies, American journal of epidemiology 167 (7) (2008) 775–785. [24] A. C. Hayward, E. B. Fragaszy, A. Bermingham, L. Wang, A. Copas, W. J. Edmunds, N. Ferguson, N. Goonetilleke, G. Harvey, J. Kovar, et al., Comparative community burden and severity of seasonal and pandemic influenza: results of the flu watch cohort study, The Lancet Respiratory Medicine 2 (6) (2014) 445–454. [25] N. H. Leung, C. Xu, D. K. Ip, B. J. Cowling, The fraction of influenza virus infections that are asymptomatic: a systematic review and meta-analysis, Epidemiology (Cambridge, Mass.) 26 (6) (2015) 862. [26] L. Feng, P. Yang, T. Zhang, J. Yang, C. Fu, Y. Qin, Y. Zhang, C. Ma, Z. Liu, Q. Wang, et al., Technical guidelines for the application of seasonal influenza vaccine in China (2014–2015), Human vaccines & immunotherapeutics 11 (8) (2015) 2077–2101. [27] Bureau of Infrastructure, Transport and Regional Economics (BITRE), Australia's commuting distance: cities and regions, BITRE (2015). [28] J. Mossong, N. Hens, M. Jit, P. Beutels, K. Auranen, R. Mikolajczyk, M. Massari, S. Salmaso, G. S. Tomba, J. Wallinga, et al., Social contacts and mixing patterns relevant to the spread of infectious diseases, PLoS medicine 5 (3) (2008) e74. 23 [29] Y. Yang, J. D. Sugimoto, M. E. Halloran, N. E. Basta, D. L. Chao, L. Matrajt, G. Potter, E. Kenah, I. M. Longini, The transmissibility and control of pandemic influenza a (H1N1) virus, Science 326 (5953) (2009) 729–733. [30] Bureau of Infrastructure, Transport and Regional Economics (BITRE), Airport traffic data, BITRE (2017). URL https://bitre.gov.au/publications/ongoing/airport_traffic_data.aspx [31] O. Diekmann, J. A. P. Heesterbeek, J. A. Metz, On the definition and the computation of the basic reproduction ratio r0 in models for infectious diseases in heterogeneous populations, Journal of mathematical biology 28 (4) (1990) 365–382. [32] M. Porta, A dictionary of epidemiology, Oxford University Press, 2014. [33] C. Viboud, O. N. Bjørnstad, D. L. Smith, L. Simonsen, M. A. Miller, B. T. Grenfell, Synchrony, waves, and spatial hierarchies in the spread of influenza, Science 312 (5772) (2006) 447–451. [34] M. Piraveenan, M. Prokopenko, A. Y. Zomaya, Assortativeness and information in scale-free networks, European Physical Journal B 67 (2009) 291–300. [35] M. Kitsak, L. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. Stanley, H. Makse, Identification of influential spreaders in complex networks, Nature Physics 6 (11) (2010) 888–893. [36] M. Piraveenan, M. Prokopenko, A. Y. Zomaya, Assortative mixing in directed biological networks, IEEE Transactions on computational biology and bioinformatics 9 (2012) 66–78. [37] G. Daraganova, P. Pattison, J. Koskinen, B. Mitchell, A. Bill, M. Watts, S. Baum, Networks and geography: Modelling community network structures as the outcome of both spatial and network processes, Social networks 34 (1) (2012) 6–17. [38] M. Piraveenan, M. Prokopenko, L. Hossain, Percolation Centrality: Quantifying Graph-Theoretic Impact of Nodes during Percolation in Networks, PLoS ONE 8 (1) (2013) e53095+. [39] T. Schreiber, Measuring information transfer, Physical Review Letters 85 (2000) 461. [40] J. T. Lizier, M. Prokopenko, A. Y. Zomaya, Local information transfer as a spatiotemporal filter for complex systems, Physical Review E 77 (2) (2008) 026110. [41] O. M. Cliff, J. T. Lizier, X. R. Wang, P. Wang, O. Obst, M. Prokopenko, Quantifying long-range interactions and coherent structure in multi-agent dynamics, Art. Life. [42] O. M. Cliff, M. Prokopenko, R. Fitch, An information criterion for inferring coupling of distributed dynamical systems, Frontiers in Robotics and AI 3 (2016) 71. [43] O. M. Cliff, M. Prokopenko, R. Fitch, Minimising the Kullback–Leibler divergence for model selection in distributed nonlinear systems, Entropy 20 (2) (2018) 51. [44] K. J. Friston, Functional and effective connectivity in neuroimaging: A synthesis, Human Brain Mapping 2 (1994) 56–78. [45] C. J. Honey, R. Kotter, M. Breakspear, O. Sporns, Network structure of cerebral cortex shapes functional connectivity on multiple time scales, Proceedings of the National Academy of Sciences 104 (24) (2007) 10240–10245. [46] L. M. A. Bettencourt, G. J. Stephens, M. I. Ham, G. W. Gross, Functional structure of cortical neuronal networks grown in vitro, Physical Review E 75 (2) (2007) 021915. [47] J. T. Lizier, M. Piraveenan, D. Pradhana, M. Prokopenko, L. S. Yaeger, Functional and structural topologies in evolved neural networks, in: Advances in Artificial Life: Tenth European Conference on Artificial Life (ECAL '09), Vol. 5777-5778 of LNCS/LNAI, Springer, 2009. [48] R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, U. Alon, Network motifs: simple building blocks of complex networks., Science 298 (5594) (2002) 824–827. [49] O. Sporns, R. Kotter, Motifs in brain networks, PLoS Biology 2 (11) (2004) e369. [50] M. Piraveenan, M. Prokopenko, A. Y. Zomaya, Local assortativeness in scale-free networks, Europhysics Letters 84 (2) 28002. [51] J. T. Lizier, S. Pritam, M. Prokopenko, Information dynamics in small-world Boolean networks, Artificial Life 17 (4) (2011) 293–314. [52] E. Y. Erten, J. T. Lizier, M. Piraveenan, M. Prokopenko, Criticality and information dynamics in epidemiological models, Entropy 19 (5). [53] X. R. Wang, J. T. Lizier, M. Prokopenko, Fisher information at the edge of chaos in random Boolean networks, Artificial Life 17 (4) (2011) 315–329. [54] M. Prokopenko, J. T. Lizier, O. Obst, X. R. Wang, Relating Fisher information to order parameters, Physical Review E 84 (4) (2011) 041116. [55] R. E. Spinney, M. Prokopenko, J. T. Lizier, Transfer entropy in continuous time, with applications to jump and neural spiking processes, Physical Review E 95 (3) (2017) 032319. 24
1905.11828
2
1905
2019-06-04T08:32:31
AsymDPOP: Complete Inference for Asymmetric Distributed Constraint Optimization Problems
[ "cs.MA" ]
Asymmetric distributed constraint optimization problems (ADCOPs) are an emerging model for coordinating agents with personal preferences. However, the existing inference-based complete algorithms which use local eliminations cannot be applied to ADCOPs, as the parent agents are required to transfer their private functions to their children. Rather than disclosing private functions explicitly to facilitate local eliminations, we solve the problem by enforcing delayed eliminations and propose AsymDPOP, the first inference-based complete algorithm for ADCOPs. To solve the severe scalability problems incurred by delayed eliminations, we propose to reduce the memory consumption by propagating a set of smaller utility tables instead of a joint utility table, and to reduce the computation efforts by sequential optimizations instead of joint optimizations. The empirical evaluation indicates that AsymDPOP significantly outperforms the state-of-the-arts, as well as the vanilla DPOP with PEAV formulation.
cs.MA
cs
AsymDPOP: Complete Inference for Asymmetric Distributed Constraint Optimization Problems Yanchen Deng , Ziyu Chen∗ , Dingding Chen , Wenxin Zhang and Xingqiong Jiang [email protected], {chenziyu,dingding}@cqu.edu.cn, [email protected], [email protected] College of Computer Science, Chongqing University 9 1 0 2 n u J 4 ] A M . s c [ 2 v 8 2 8 1 1 . 5 0 9 1 : v i X r a Abstract Asymmetric distributed constraint optimization problems (ADCOPs) are an emerging model for co- ordinating agents with personal preferences. How- ever, the existing inference-based complete algo- rithms which use local eliminations cannot be ap- plied to ADCOPs, as the parent agents are required to transfer their private functions to their children. Rather than disclosing private functions explicitly to facilitate local eliminations, we solve the prob- lem by enforcing delayed eliminations and propose AsymDPOP, the first inference-based complete al- gorithm for ADCOPs. To solve the severe scala- bility problems incurred by delayed eliminations, we propose to reduce the memory consumption by propagating a set of smaller utility tables instead of a joint utility table, and to reduce the computa- tion efforts by sequential optimizations instead of joint optimizations. The empirical evaluation in- dicates that AsymDPOP significantly outperforms the state-of-the-art, as well as the vanilla DPOP with PEAV formulation. 1 Introduction Distributed constraint optimization problems (DCOPs) [Modi et al., 2005; Fioretto et al., 2018] are a fundamental frame- work in multi-agent systems where agents coordinate their decisions to optimize a global objective. DCOPs have been adopted to model many real world problems including ra- dio frequency allocation [Monteiro et al., 2012], smart grid [Fioretto et al., 2017] and distributed scheduling [Mah- eswaran et al., 2004b; Li et al., 2016]. Most of complete algorithms for DCOPs employ either distributed search [Hirayama and Yokoo, 1997; Modi et al., 2005; Gershman et al., 2009; Yeoh et al., 2010] or inference [Petcu and Faltings, 2005b; Vinyals et al., 2011] to optimally solve DCOPs. However, since DCOPs are NP-hard, complete algorithms cannot scale up due to exponential overheads. incomplete algorithms [Maheswaran et al., 2004a; Thus, Zhang et al., 2005; Okamoto et al., 2016; Rogers et al., 2011; Zivan and Peled, 2012; Chen et al., 2018; Ottens et al., 2017; ∗Corresponding Author Fioretto et al., 2016] are proposed to trade optimality for smaller computational efforts. Unfortunately, DCOPs fail to capture the ubiquitous asym- metric structure [Burke et al., 2007; Maheswaran et al., 2004b; Ramchurn et al., 2011] since each constrained agent shares the same payoffs. PEAV [Maheswaran et al., 2004b] attempts to capture the asymmetric costs by introducing mir- ror variables and the consistency is enforced by hard con- straints. However, PEAV suffers from scalability problems since the number of variables significantly increases. More- over, many classical DCOP algorithms perform poorly when applied to the formulation due to the presence of hard con- straints [Grinshpoun et al., 2013]. On the other side, AD- COPs [Grinshpoun et al., 2013] are another framework that captures asymmetry by explicitly defining the exact payoff for each participant of a constraint without introducing any variables, which has been intensively investigated in recent years. Solving ADCOPs involves evaluating and aggregating the payoff for each constrained agent, which is challenging in asymmetric settings due to a privacy concern. SyncABB and ATWB [Grinshpoun et al., 2013] are asymmetric adaption of SyncBB [Hirayama and Yokoo, 1997] and AFB [Gershman et al., 2009], using an one-phase strategy to aggregate the in- dividual costs. That is, the algorithms systematically check each side of a constraint before reaching a complete assign- ment. Besides, AsymPT-FB [Litov and Meisels, 2017] is the first tree-based algorithm for ADCOPs, which uses forward bounding to compute lower bounds and back bounding to achieve one-phase check. Recently, PT-ISABB [Deng et al., 2019] was proposed to improve the tree-based search by im- plementing a non-local elimination version of ADPOP [Petcu and Faltings, 2005a] to provide much tighter lower bounds. However, since it relies on an exhaustive search to guaran- tee the optimality, the algorithm still suffers from exponential communication overheads. On the other hand, although com- plete inference algorithms (e.g., DPOP [Petcu and Faltings, 2005b]) only require a linear number of messages to solve DCOPs, they cannot be directly applied to ADCOPs with- out PEAV due to their requirement for complete knowledge of each constraint to facilitate variable elimination. Accord- ingly, the parents have to transfer their private cost functions to their children, which leaks at least a half of privacy. In this paper, we adapt DPOP for solving ADCOPs for the first time by deferring the eliminations of variables. Specif- ically, we contribute to the state-of-the-art in the following aspects. • We propose AsymDPOP, the first complete inference- based algorithm to solve ADCOPs, by generalizing non- local elimination [Deng et al., 2019]. That is, instead of eliminating variables at their parents, we postpone the eliminations until their highest neighbors in the pseudo tree. In other words, an agent in our algorithm may be responsible for eliminating several variables. • We theoretically analyze the complexity of our algo- rithm where the space complexity of an agent is not only exponential in the number of its separators but also the number of its non-eliminated descendants. • We scale up our algorithm by introducing a table-set propagation scheme to reduce the memory consumption and a mini-batch scheme to reduce the number of op- erations when performing eliminations. Our empirical evaluation indicates that our proposed algorithm signif- icantly outperforms the state-of-the-art, as well as the vanilla DPOP with PEAV formulation. 2 Backgrounds In this section we introduce the preliminaries including DCOPs, ADCOPs, pseudo tree, DPOP and non-local elim- ination. 2.1 Distributed Constraint Optimization Problems A distributed constraint optimization problem [Modi et al., 2005] is defined by a tuple (cid:104)A, X, D, F(cid:105) where • A = {a1, . . . , an} is the set of agents • X = {x1, . . . , xm} is the set of variables • D = {D1, . . . , Dm} is the set of domains. Variable xi takes values from Di • F = {f1, . . . , fq} is the set of constraint functions. Each function fi : Di1 × ··· × Dik → R≥0 specifies the cost assigned to each combination of xi1, . . . , xik. For the sake of simplicity, we assume that each agent con- trols a variable (and thus the term "agent" and "variable" could be used interchangeably) and all constraint functions are binary (i.e., fij : Di × Dj → R≥0). A solution to a DCOP is an assignment to all the variables such that the total cost is minimized. That is, (cid:88) fij∈F X∗ = arg min di∈Di,dj∈Dj fij(xi = di, xj = dj) 2.2 Asymmetric Distributed Constraint Optimization Problems While DCOPs assume an equal payoff for each participant of each constraint, asymmetric distributed constraint optimiza- tion problems (ADCOPs) [Grinshpoun et al., 2013] explicitly define the exact payoff for each constrained agent. In other words, a constraint function fi : Di1×···×Dik → Rk≥0 in an ADCOP specifies a cost vector for each possible combination Figure 1: An ADCOP with two variables and a constraint Figure 2: A pseudo tree of involved variables. And the goal is to find a solution which minimizes the aggregated cost. An ADCOP can be visualized by a constraint graph where the vertexes denote variables and the edges denote constraints. Fig. 1 presents an ADCOP with two variables and a constraint. Besides, for the constraint be- tween xi and xj, we denote the private function for xi and xj as fij and fji, respectively. 2.3 Pseudo Tree A pseudo tree [Freuder and Quinn, 1985] is an ordered ar- rangement to a constraint graph in which different branches are independent. A pseudo tree can be generated by a depth- first traverse to a constraint graph, categorizing constraints into tree edges and pseudo edges (i.e., non-tree edges). The neighbors of an agent ai are therefore categorized into its parent P (ai), pseudo parents P P (ai), children C(ai) and pseudo children P C(ai) according to their positions in the pseudo tree and the types of edges they connect through. We also denote its parent and pseudo parents as AP (ai) = P (ai) ∪ P P (ai), and its descendants as Desc(ai). Besides, we denote its separators, i.e., the set of ancestors which are constrained with ai and its descendants, as Sep(ai) [Petcu and Faltings, 2006]. Finally, we denote ai's interface de- scendants, the set of descendants which are constrained with Sep(ai), as ID(ai). Fig. 2 presents a pseudo tree in which the dotted edge is a pseudo edge. 2.4 DPOP and Non-local Elimination DPOP [Petcu and Faltings, 2005b] is an inference-based complete algorithm for DCOPs based on bucket elimination [Dechter, 1999]. Given a pseudo tree, it performs a bottom- up utility propagation phase to eliminate variables and a value propagation phase to assign the optimal assignment for each variable. More specifically, in the utility propagation phase, an agent ai eliminates its variables from the joint utility table by computing the optimal utility for each possible assignment to Sep(ai) after receiving the utility tables from its children, and sends the projected utility table to its parent. In the value propagation phase, ai computes the optimal assignments for its variables by considering the assignments received from its transfer their private functions to their children, which would lead to an unacceptable privacy loss. Inspired by non-local elimination, we consider an alterna- tive privacy-protecting approach to aggregate constraint func- tions. That is, instead of deferring to its parent, we postpone the elimination of a variable to its highest (pseudo) parent. In this way, all the functions involving the variables have been aggregated and the variable can be eliminated from the util- ity table optimally. Note that the utility table is a summation of the utility tables from children and local constraints. As a result, although the utility table which contains the variable's private functions is propagated to its ancestors without elim- ination, the ancestors can hardly infer the exact payoffs in these private functions. We refer the bottom-up utility propa- gation phase as generalized non-local elimination (GNLE). Before diving into the details of GNLE, let's first consider the following definitions. Definition 1 (dims). The dims(·) is a function which returns the set of dimensions of a utility table. Definition 2 (Slice). Let S be a set of key-value pairs. S[K] is a slice of S over K such that S[K] = {(k = v) ∈ Sk ∈ K} Definition 3 (Join [Vinyals et al., 2011]). Let U, U(cid:48) be two utility tables and DU = ×xi∈dims(U )Di, DU(cid:48) = ×xi∈dims(U(cid:48))Di be their joint domain spaces. U ⊗ U(cid:48) is the join of U and U(cid:48) over DU⊗U(cid:48) = ×xi∈dims(U )∪dims(U(cid:48))Di such that (U⊗U(cid:48))(V ) = U (V[dims(U )])+U(cid:48)(V[dims(U(cid:48))]),∀V ∈ DU⊗U(cid:48) Algorithm 1 presents the sketch of GNLE. The algorithm begins with leaf agents sending their utility tables to their par- ents via UTIL messages (line 2-3). When an agent ai receives a UTIL message from a child ac, it joins its private functions w.r.t. its (pseudo) children in branch ac (line 5-6), and elimi- nates all the belonging variables whose highest (pseudo) par- ents are ai from the utility table (line 7). Here, EV (ai, ac) is given by EV (ai, ac) = P C(ai) ∩ Desc(ac) ∪ {ac}\ID(ai) Then ai joins the eliminated utility table with its running util- ity table utili. It is worth mentioning that computing the set of elimination variables EV (ai, ac) does not require agents to exchange their relative positions in a pseudo tree. Specif- ically, each variable is associated with a counter which is initially set to the number of its parent and pseudo parents. When its (pseudo) parent receives the UTIL message con- taining it, the counter decreases. And the variable is added to the set of elimination variables as soon as its counter equals zero. After receiving all the UTIL messages from its children, ai propagates the utility table utili to its parent if it is not the root (line 12). Otherwise, the value propagation phase starts (line 10). 3.2 Value Propagation Phase In contrary to the one in vanilla DPOP which determines the optimal assignment locally for each variable, the value as- signment phase in AsymDPOP should be specialized to ac- commodate the non-local elimination. Specifically, since a parent, and propagates the joint assignment to its children. Although DPOP only requires a linear number of messages to solve a DCOP, its memory consumption is exponential in the induced width. Thus, several tradeoffs including ADPOP [Petcu and Faltings, 2005a], MB-DPOP [Petcu and Faltings, 2007] and ODPOP [Petcu and Faltings, 2006] have been pro- posed to improve its scalability. However, DPOP cannot be directly applied to asymmetric settings as it requires the total knowledge of each constraint to perform optimal elimination locally. PT-ISABB [Deng et al., 2019] applies (A)DPOP into solving ADCOPs by performing variable elimination only to a subset of constraints to build look-up tables for lower bounds, and uses a tree-based search to guarantee the optimality. The algorithm further reinforces the bounds by a non-local elimination scheme. That is, in- stead of performing elimination locally, the elimination of a variable is postponed to its parent to include the private func- tion enforced in the parent's side and increase the integrity of the utility table. 3 Asymmetric DPOP The existing complete algorithms for ADCOPs use complete search to exhaust the search space, which makes them un- suitable for large scale applications. In fact, as shown in our experimental results, these search-based algorithms can only solve the problems with the agent number less than 20. Hence, in this section, we propose a complete, privacy- protecting, and scalable inference-based algorithm for AD- COPs built upon generalized non-local elimination, called AsymDPOP. An execution example can be found in the ap- pendix (https://arxiv.org/abs/1905.11828). 3.1 Utility Propagation Phase In DPOP, a variable could be eliminated locally without loss of completeness after receiving all the utility messages from its children since all functions that involve the variable have been aggregated. However, the conclusion does not hold for ADCOPs. Taking Fig. 2 as an example, x4 cannot be elim- inated locally since the private functions f14 and f24 are not given. Thus, the local elimination to x4 w.r.t. f41 and f42 would lead to overestimate bias and offer no guarantee on the completeness. A naıve solution would be that x1 and x2 Algorithm1:GNLEforaiWhenInitialization:1utili←⊗aj∈AP(ai)fij2ifaiisaleafthen3sendUTIL(utili)toP(ai)WhenreceivedUTIL(utilc)fromac∈C(ai):4utilci←utilc5foreachaj∈(PC(ai)∩Desc(ac))∪{ac}do6utilci←utilci⊗fij7utili←utili⊗minEV(ai,ac)utilci8ifaihasreceivedallUTILfromC(ai)then9ifaiistherootthen10startValuePropagationphase11else12sendUTIL(utili)toP(ai) 4 Tradeoffs As shown in Section 3.3, AsymDPOP suffers serious scal- ability problems in both memory and computation. In this section, we propose two tradeoffs which make AsymDPOP a practical algorithm. 4.1 Table-Set Propagation Scheme: A Tradeoff between Memory and Privacy The utility propagation phase of AsymDPOP could be prob- lematic due to the unacceptable memory consumption when the pseudo tree is poor. Consider the pseudo tree shown in Fig. 3. Since every agent is constrained with the root agent, according to the GNLE all the variables can only be elim- inated at the root agent, which incurs a memory consump- tion of O(dn) due to the join operation in each agent. Here, d = maxi Di. Besides, a large utility table would also incur unacceptable computation overheads due to the join opera- tions and the elimination operation (line 5-7). We notice that utility tables are divisible before performing eliminations. Thus, instead of propagating a joint and high- dimension utility table to a parent agent, we propagate a set of small utility tables. In other words, we wish to reduce the unnecessary join operations (i.e., line 1 and line 7 in the case of EV (ai, ac) = ∅) which could cause a dimension increase during the utility propagation phase. On the other side, com- pletely discarding join operations would incur privacy leak- ages. For example, if an chooses to propagate both fn,n−1 and fn1 without performing the join operation to an−1, then an−1 would know the private functions of an directly. Thus, we propose to compromise the memory consumption and the privacy by a parameter kp controlling the the maximal num- ber of dimensions of each local utility table. We refer the tradeoff as a table-set propagation scheme (TSPS). Specifically, when an agent sends a UTIL message to its parent, it first joins its private functions w.r.t. its parents with the received utility tables whose dimensions contain the di- mensions of these private functions. Notice that the first step does not incur a dimension increase, and can reduce the num- ber of utility tables. Finally, it propagates the set of utility tables to its parent. n−1} to an−2. Consider the pseudo tree shown in Fig. 3 again. Assume that kp = 3 and then agent an would propagate the utility set utiln = {fn,n−1 ⊗ fn1} to an−1. Since there is no elim- ination in an−1, it is unnecessary to perform the join oper- ation in line 7. Thus, an−1 would propagate the utility set utiln−1 = {fn−1,n−2 ⊗ fn−1,1, utiln It can be concluded that TSPS in the example only requires O(nd3) space, which is much smaller than the one required by GNLE. Formally, we have the following theorem. Theorem 2. The size of each utility table of an agent ai in TSPS is no greater than max(min(AP (ai),kp), max d Proof. According to Theorem 1, the dimension of each util- ity table from child ac ∈ C(ai) is a subset of Sep(ac) ∪ ID(ac) ∪ {ac}. Since TSPS omits the join operation in line 7, the maximal size of received utility tables of ai is (ID(ai)∩(ID(ac)∪{ac})+Sep(ac)) (ID(ai)∩(ID(ac)∪{ac})+Sep(ac)) ac∈C(ai) max ac∈C(ai) d Figure 3: A chain-like pseudo tree variable is eliminated at its highest (pseudo) parent, the par- ent is responsible for selecting the optimal assignment for that variable. Thus, the value messages in our algorithm would contain not only the assignments for ancestors, but also as- signments for descendants. Algorithm 2 presents the sketch of value propagation phase. The phase is initiated by the root agent selecting the opti- mal assignment (line 14). Given the determined assignments either from its parent (line 16) or computed locally (line 15), agent ai selects the optimal assignments for the eliminated variables in each branch ac ∈ C(ai) by a joint optimization over them (line 17-20), and propagates the assignments to- gether with the determined assignments to ac (line 21-22). The algorithm terminates when each leaf agent receives a VALUE message. 3.3 Complexity Analysis Theorem 1. The size of a UTIL message produced by an agent is exponential in the number of its separator and its interface descendants. Proof. We prove the theorem by showing a UTIL message produced by agent ai contains the dimensions of Sep(ai) and ID(ai) ∪ {ai}. The UTIL message must contain the dimen- sions of ID(ai) ∪ {ai} since ai is not the highest (pseudo) parent of aj,∀aj ∈ ID(ai) ∪ {ai}. On the other hand, ac- cording to the definition to ID(ai), the UTIL message can- not contain the dimensions of Desc(ai)\ID(ai) since for each aj ∈ Desc(ai)\ID(ai) it must exist an agent ak ∈ Desc(ai) ∪ {ai} such that ak is the highest (pseudo) parent of aj and thus the variable is eliminated at ak (line 7). Finally, the UTIL message contains Sep(ai) according to [Petcu and Faltings, 2005b] (Theorem 1). Thus, the size of the UTIL message is exponential in Sep(ai) + ID(ai) + 1 and the theorem is concluded. Algorithm2:ValuePropagationforaiWhenInitialization:13ifaiistherootthen14v∗i←argminxiutili15PropagateValue({(xi=v∗i)})WhenreceivedVALUE(Assign)fromP(ai):16PropagateValue(Assign)FunctionPropagateValue(Assign):17foreachac∈C(ai)do18Assignci←Assign[Sep(ac)∪{ac}∪ID(ac)]19ifEV(ai,ac)(cid:54)=∅then20V∗←argminEV(ai,ac)utilci(Assign[dims(utilci)])21Assignci←Assignci∪{(xj=V∗[xj])∀xj∈EV(ai,ac)}22sendVALUE(Assignci)toac Figure 4: A set of utility tables Since the local utility is partitioned into utility tables accord- ing to kp, the maximal size of local utility tables of ai is dmin(AP (ai),kp) Thus the theorem holds. 4.2 Mini-batch Elimination Scheme: A Tradeoff between Time and Space TSPS could factorize a big utility table to a set of smaller util- ity tables, which allows us to reduce the computational efforts when performing eliminations by a decrease-and-conquer strategy. Taking Fig. 3 as an example, to perform the elimi- nation, a1 in GNLE has no choice but to optimize a big utility table over variables x2, . . . xn (line 7), which requires O(dn) operations. Instead, combining with TSPS (kp = 2) we could exploit the the structure of each small utility table by arrang- ing the min operators among them to reduce computational complexity. That is, instead of performing min x2,...xn u1,2,...,n we perform xn (f12 +f21 +···+min (f1n +fn1 +fn,n−1 +fn−1,n)··· ) min x2 which can be solved recursively from xn to x2 and the overall complexity is O(nd3). In other words, we reduce the com- putational complexity by exploiting the independence among utility tables to avoid unnecessary traverses. However, completely distributing the min operators into every variable would incur high memory consumption as a min operator could implicitly join utility tables to a big and indivisible table. Although the problem can be alleviated by carefully arranging the min operators, it is not easy to find the optimal sequence of eliminations in practice. Consider the utility tables shown as a factor graph in Fig. 4 where square nodes represent utility tables and circle nodes represent vari- ables. And the red circles represent the variables to be elim- inated. Obviously, no matter how to arrange the elimination sequence, a 3-ary utility table must appear when eliminating x1 or x2. Instead, if we jointly optimize both x1 and x2, the maximal number of dimensions are 2. We thus overcome the problem by introducing a parame- ter ke which specifies the minimal number of variables op- timized in a min operator (i.e., the size of a batch), and re- fer the tradeoff as a mini-batch elimination scheme (MBES). Specifically, when performing an elimination operation, we first divide elimination variables into several groups whose variables share at least a common utility table. For each vari- able group, we divide the variables into batches whose sizes are at least ke if it is possible. For each batch, we perform (a) network load (b) NCLOs Figure 5: Performance comparison under different agent numbers optimization to the functions that are related to the batch and replace these functions with the results. The process termi- nates when all the variable groups are exhausted. Note that dividing variables into disjoint variable groups in the first step is crucial since optimizing independent variables jointly is equivalent to optimizing them individually. Taking Fig. 4 for example, if we set ke = 2 and let x2, x5 be a batch, a 4-ary utility table over x1, x3, x4 and x6 still appear even if x2 and x5 is jointly optimized. 5 Experimental Results We empirically evaluate the performances of AsymDPOP and state-of-the-art complete algorithms for ADCOPs including PT-ISABB, AsymPT-FB, SyncABB, ATWB and the vanilla DPOP with PEAV formulation (PEAV DPOP) in terms of the number of basic operations, network load and privacy leak- age. For inference-based algorithms, we consider the max- imal number of dimensions during the utility propagation phase as an additional metric. Specifically, we use NCLOs [Netzer et al., 2012] to measure the hardware-independent runtime in which the logic operations in inference-based al- gorithms are accesses to the utility tables while the ones in 812162024# of Agents100101102103104105Network Load (KB)812162024# of Agents102104106108NCLOs(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:8)(cid:1)(cid:4)(cid:4)(cid:1)(cid:9)(cid:6)(cid:10)(cid:11)(cid:2)(cid:12)(cid:13)(cid:4)(cid:11)(cid:2)(cid:12)(cid:14)(cid:5)(cid:1)(cid:4)(cid:4)(cid:11)(cid:15)(cid:1)(cid:16)(cid:17)(cid:11)(cid:18)(cid:11)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:3)(cid:1)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:22)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:23)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:22)(cid:4)(cid:1)(cid:5)(cid:20)(cid:24)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:23)(cid:4)(cid:1)(cid:5)(cid:20)(cid:24)(cid:21) (a) network load (a) maximum dimensions (b) NCLOs (b) NCLOs Figure 6: Performance comparison under different densities Figure 7: Performance comparison of different batch sizes search-based algorithms are constraint checks. For the net- work load, we measure the size of information during an ex- ecution. Finally, we use entropy [Brito et al., 2009] to quan- tify the privacy loss [Litov and Meisels, 2017; Grinshpoun et al., 2013]. For each experiment, we generate 50 random instances and report the medians as the results. In our first experiment, we consider the ADCOPs with the domain size of 3, the density of 0.25 and the agent number varying from 8 to 24. Fig. 5 presents the experimental results under different agent numbers. It can be concluded that com- pared to the search-based solvers, our AsymDPOP algorithms exhibit great superiorities in terms of network load. That is due to the fact that search-based algorithms explicitly exhaust the search space by message-passing, which is quite expen- sive especially when the agent number is large. In contrast, our proposed algorithms incur few communication overheads since they follow an inference protocol and only require a linear number of messages. On the other hand, although PEAV DPOP also uses the inference protocol, it still suffers from a severe scalability problem and can only solve the prob- lems with the agent number less than 12. The phenomenon is due to the mirror variables introduced by PEAV formulation, which significantly increases the complexity. More specifi- cally, a UTIL message in PEAV DPOP contains the dimen- sions of mirror variables, which significantly increases the memory consumption. Fig. 6 presents the performance comparison under differ- ent densities. Specifically, we consider the ADCOPs with the agent number of 8, the domain size of 8 and the den- sity varying from 0.25 to 1. It can be concluded from Fig. 6(a) that AsymDPOP with TSPS (i.e., kp < w∗ where w∗ is the induced width) incurs significantly less communica- tion overheads when solving dense problems, which demon- strates the merit of avoiding unnecessary join operations. Be- sides, it is interesting to find that compared to the one of AsymDPOP without TSPS (i.e., kp = w∗), the network load of AsymDPOP(kp < w∗,·) increases much slowly. That is due to the fact that as the density increases, eliminations are more likely to happen at the top of a pseudo tree. On the other hand, since unnecessary join operations are avoided in TSPS, eliminations are the major source of the dimension in- crease. As a result, agents propagate low dimension utility tables in most of the time. For NCLOs, search-based algo- rithms like AsymPT-FB and PT-ISABB outperform AsymD- POP algorithms when solving dense problems due to their effective pruning. 0.250.40.550.70.851Density101102103104105Network Load (KB)0.250.40.550.70.851Density103104105106107108NCLOs(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:8)(cid:1)(cid:4)(cid:4)(cid:1)(cid:9)(cid:6)(cid:10)(cid:11)(cid:2)(cid:12)(cid:13)(cid:4)(cid:11)(cid:2)(cid:12)(cid:14)(cid:5)(cid:1)(cid:4)(cid:4)(cid:11)(cid:15)(cid:1)(cid:16)(cid:17)(cid:11)(cid:18)(cid:11)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:3)(cid:1)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:22)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:23)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:22)(cid:4)(cid:1)(cid:5)(cid:20)(cid:24)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:23)(cid:4)(cid:1)(cid:5)(cid:20)(cid:24)(cid:21)812162024# of Agents051015Maximum Dimension(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:6)(cid:1)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:13)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:12)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:13)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:12)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:5)(cid:1)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)812162024# of Agents102104106108NCLOs(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:6)(cid:1)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:13)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:12)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:13)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:12)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:5)(cid:1)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14) three ingredients: generalized non-local elimination which facilitates the aggregation of utility in an asymmetric environ- ment, table-set propagation scheme which reduces the mem- ory consumption and mini-batch elimination scheme which reduces the operations in the utility propagation phase. We theoretically show its complexity and our empirical evalua- tion demonstrates its superiorities over the state-of-the-art, as well as the vanilla DPOP with PEAV formulation. Acknowledgements We would like to thank the anonymous reviewers for their valuable comments and helpful suggestions. This work is supported by the Chongqing Research Pro- gram of Basic Research and Frontier Technology un- der Grant No.:cstc2017jcyjAX0030, Fundamental Research Funds the Central Universities under Grant No.: 2018CDXYJSJ0026, National Natural Science Foundation of China under Grant No.: 51608070 and the Graduate Research and Innovation Foundation of Chongqing, China under Grant No.: CYS17023 for References [Brito et al., 2009] Ismel Brito, Amnon Meisels, Pedro Meseguer, and Roie Zivan. Distributed constraint sat- isfaction with partially known constraints. Constraints, 14(2):199 -- 234, 2009. [Burke et al., 2007] David A Burke, Kenneth N Brown, Mustafa Dogru, and Ben Lowe. Supply chain coordina- In The tion through distributed constraint optimization. 9th International Workshop on DCR, 2007. [Chen et al., 2018] Ziyu Chen, Yanchen Deng, Tengfei Wu, and Zhongshi He. A class of iterative refined max-sum al- gorithms via non-consecutive value propagation strategies. Autonomous Agents and Multi-Agent Systems, 32(6):822 -- 860, 2018. [Dechter, 1999] Rina Dechter. Bucket elimination: A uni- fying framework for reasoning. Artificial Intelligence, 113(1-2):41 -- 85, 1999. [Deng et al., 2019] Yanchen Deng, Ziyu Chen, Dingding Chen, Xingqiong Jiang, and Qiang Li. PT-ISABB: A hybrid tree-based complete algorithm to solve asymmet- ric distributed constraint optimization problems. In Pro- ceedings of 18th International Conference on Autonomous Agents and Multiagent Systems, pages 1506 -- 1514, 2019. [Fioretto et al., 2016] Ferdinando Fioretto, William Yeoh, and Enrico Pontelli. A dynamic programming-based MCMC framework for solving DCOPs with GPUs. In Proceedings of 22nd International Conference on Princi- ples and Practice of Constraint Programming, pages 813 -- 831, 2016. [Fioretto et al., 2017] Ferdinando Fioretto, William Yeoh, Enrico Pontelli, Ye Ma, and Satishkumar J Ranade. A dis- tributed constraint optimization (DCOP) approach to the In Proceed- economic dispatch with demand response. ings of the 16th International Conference on Autonomous Agents and MultiAgent Systems, pages 999 -- 1007, 2017. Figure 8: Privacy loss under different tightness To demonstrate the effects of different batch sizes, we benchmark MBES with different ke when combining with TSPS with different kp on the configuration used in the first experiment. Specifically, we measure the maximal number of dimensions generated in the utility propagation phase, in- cluding the intermediate results of MBES. Fig. 7 presents the experimental results. It can be seen that AsymDPOP with a small batch size significantly reduces NCLOs but produces larger intermediate results, which indicates the necessity of the tradeoff. Besides, the performance of MBES significantly degenerates when combining with TSPS with a larger kp. That is because the utility tables contain more dimensions in the scenario, and a utility table would be traversed more frequently when performing eliminations. In the last experiment, we consider the privacy loss of dif- ferent algorithms when solving asymmetric MaxDCSPs with different tightness. In particular, we consider the asymmetric MaxDCSPs with 10 agents, the domain size of 10, the den- sity of 0.4 and the tightness varying from 0.1 to 0.8. Fig. 8 presents the results. It can be concluded from the figure that as the tightness grows, the search-based algorithms leak more privacy while the inference-based algorithms leaks less privacy. That is due to the fact that search-based algorithms rely on a direct disclosure mechanism to aggregate the private costs. Thus, search-based algorithms would leak more pri- vacy when solving the problems with high tightness as they need to traverse more proportions of the search space. In con- trast, inference-based algorithms accumulate utility through the pseudo tree, and an agent ai could infer the private costs of its (pseudo) child ac when the utility table involving both xi and xc is a binary table which is not a result of eliminations or contains zero entries. Thus, AsymDPOP(kp = 2,·) leaks almost a half of privacy. On the other hand, since the num- ber of prohibit combinations grows as the tightness increases, AsymDPOP(kp ≥ 3,·) incurs much lower privacy loss when solving high tightness problems. 6 Conclusion In this paper we present AsymDPOP, the first complete in- ference algorithm for ADCOPs. The algorithm incorporates 0.10.20.30.40.50.60.70.8Tightness00.10.20.30.40.50.60.7Privacy(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:8)(cid:1)(cid:4)(cid:4)(cid:1)(cid:9)(cid:6)(cid:10)(cid:11)(cid:2)(cid:12)(cid:13)(cid:4)(cid:11)(cid:2)(cid:12)(cid:14)(cid:5)(cid:1)(cid:4)(cid:4)(cid:1)(cid:9)(cid:6)(cid:10)(cid:15)(cid:11)(cid:16)(cid:11)(cid:17)(cid:1)(cid:2)(cid:18)(cid:3)(cid:1)(cid:4)(cid:1)(cid:5)(cid:18)(cid:1)(cid:19)(cid:1)(cid:9)(cid:6)(cid:10)(cid:15)(cid:11)(cid:16)(cid:11)(cid:17)(cid:1)(cid:2)(cid:18)(cid:20)(cid:4)(cid:1)(cid:5)(cid:18)(cid:1)(cid:19)(cid:1)(cid:9)(cid:6)(cid:10)(cid:15)(cid:11)(cid:16)(cid:11)(cid:17)(cid:1)(cid:2)(cid:18)(cid:21)(cid:4)(cid:1)(cid:5)(cid:18)(cid:1)(cid:19) [Fioretto et al., 2018] Ferdinando Fioretto, Enrico Pontelli, and William Yeoh. Distributed constraint optimization problems and applications: A survey. Journal of Artificial Intelligence Research, 61:623 -- 698, 2018. [Freuder and Quinn, 1985] Eugene and Michael J. Quinn. Taking advantage of stable sets of variables in constraint satisfaction problems. In Proceedings of the 9th International Joint Conference on Artificial Intelligence, pages 1076 -- 1078, 1985. Freuder C. [Gershman et al., 2009] Amir Gershman, Amnon Meisels, and Roie Zivan. Asynchronous forward bounding for dis- tributed COPs. Journal of Artificial Intelligence Research, 34:61 -- 88, 2009. [Grinshpoun et al., 2013] Tal Grinshpoun, Alon Grubshtein, Roie Zivan, Arnon Netzer, and Amnon Meisels. Asym- metric distributed constraint optimization problems. Jour- nal of Artificial Intelligence Research, 47:613 -- 647, 2013. and Makoto Yokoo. Distributed partial constraint satisfaction problem. In International Conference on Principles and Practice of Constraint Programming, pages 222 -- 236, 1997. [Hirayama and Yokoo, 1997] Katsutoshi Hirayama [Li et al., 2016] Shijie Li, Rudy R. Negenborn, and Gabriel Lodewijks. Distributed constraint optimization for ad- dressing vessel rotation planning problems. Engineering Applications of Artificial Intelligence, 48:159 -- 172, 2016. [Litov and Meisels, 2017] Omer Litov and Amnon Meisels. Forward bounding on pseudo-trees for DCOPs and AD- COPs. Artificial Intelligence, 252:83 -- 99, 2017. [Maheswaran et al., 2004a] Rajiv Maheswaran, Distributed Jonathan P Pearce, and Milind Tambe. algorithms for DCOP: A Graphical-Game-Based ap- In Proceedings of ISCA PDCS, pages 432 -- 439, proach. 2004. T [Maheswaran et al., 2004b] Rajiv T. Maheswaran, Milind Tambe, Emma Bowring, Jonathan P. Pearce, and Pradeep Varakantham. Taking DCOP to the real world: Efficient complete solutions for distributed multi-event scheduling. In Proceedings of the 3rd International Conference on Au- tonomous Agents and Multiagent Systems, pages 310 -- 317, 2004. [Modi et al., 2005] Pragnesh Jay Modi, Wei-Min Shen, Milind Tambe, and Makoto Yokoo. Adopt: asynchronous distributed constraint optimization with quality guaran- tees. Artificial Intelligence, 161(1-2):149 -- 180, 2005. [Monteiro et al., 2012] Tania L Monteiro, Guy Pujolle, Marcelo E Pellenz, Manoel C Penna, and Richard Demo Souza. A multi-agent approach to optimal channel assign- ment in WLANs. In Wireless Communications and Net- working Conference, pages 2637 -- 2642, 2012. [Netzer et al., 2012] Arnon Netzer, Alon Grubshtein, and Amnon Meisels. Concurrent forward bounding for dis- tributed constraint optimization problems. Artificial Intel- ligence, 193:186 -- 216, 2012. [Okamoto et al., 2016] Steven Okamoto, Roie Zivan, and Aviv Nahon. Distributed breakout: Beyond satisfaction. In Proceedings of the 25th International Joint Conference on Artificial Intelligence, pages 447 -- 453, 2016. [Ottens et al., 2017] Brammert Ottens, Christos Dimi- trakakis, and Boi Faltings. DUCT: An upper confidence bound approach to distributed constraint optimization problems. ACM Transactions on Intelligent Systems and Technology, 8(5):69, 2017. [Petcu and Faltings, 2005a] Adrian Petcu and Boi Faltings. In Interna- Approximations in distributed optimization. tional conference on principles and practice of constraint programming, pages 802 -- 806, 2005. [Petcu and Faltings, 2005b] Adrian Petcu and Boi Faltings. A scalable method for multiagent constraint optimization. In Proceedings of the 19th International Joint Conference on Artificial Intelligence, pages 266 -- 271, 2005. [Petcu and Faltings, 2006] Adrian Petcu and Boi Faltings. ODPOP: An algorithm for open/distributed constraint op- timization. In Proceedings of the 21st national conference on Artificial intelligence, pages 703 -- 708, 2006. [Petcu and Faltings, 2007] Adrian Petcu and Boi Faltings. MB-DPOP: A new memory-bounded algorithm for dis- In Proceedings of the 20th Inter- tributed optimization. national Joint Conference on Artificial Intelligence, pages 1452 -- 1457, 2007. [Ramchurn et al., 2011] Sarvapali D Ramchurn, Perukrish- nen Vytelingum, Alex Rogers, and Nick Jennings. Agent- based control for decentralised demand side management in the smart grid. In The 10th International Conference on Autonomous Agents and Multiagent Systems, pages 5 -- 12, 2011. [Rogers et al., 2011] Alex Rogers, Alessandro Farinelli, Ruben Stranders, and Nicholas R Jennings. Bounded ap- proximate decentralised coordination via the max-sum al- gorithm. Artificial Intelligence, 175(2):730 -- 759, 2011. [Vinyals et al., 2011] Meritxell Vinyals, Juan A Rodriguez- Aguilar, and Jes´us Cerquides. Constructing a unifying theory of dynamic programming DCOP algorithms via the generalized distributive law. Autonomous Agents and Multi-Agent Systems, 22(3):439 -- 464, 2011. [Yeoh et al., 2010] William Yeoh, Ariel Felner, and Sven Koenig. BnB-ADOPT: An asynchronous branch-and- bound DCOP algorithm. Journal of Artificial Intelligence Research, 38:85 -- 133, 2010. [Zhang et al., 2005] Weixiong Zhang, Guandong Wang, Zhao Xing, and Lars Wittenburg. Distributed stochastic search and distributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks. Artificial Intelligence, 161(1-2):55 -- 87, 2005. [Zivan and Peled, 2012] Roie Zivan and Hilla Peled. Max/min-sum distributed constraint optimization through value propagation on an alternating DAG. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, pages 265 -- 272, 2012. A AsymDPOP A.1 An Example for AsymDPOP Fig.2 presents a pseudo tree. For better understanding, we take the agent a2 to explain the concepts in a pseudo tree. Since a1 is the only ancestor constrained with a2 via a tree edge, we have P (a2) = {a1}, P P (a2) = ∅ and Sep(a2) = {a1}. Similarly, since a3 and a4 are the descendants con- strained with a2 via tree edge, we have C(a2) = {a3, a4}, P C(a2) = ∅, Desc(a2) = {a3, a4}. Particularly, since a4 ∈ Desc(a2) is constrained with a1 ∈ Sep(a2), we have ID(a2) = {a4}. AsymDPOP begins with the leaf agents (a3 and a4) send- ing their utility tables (util3 and util4) to their parent a2, where util3 = f32 and util4 = f41 ⊗ f42. When a2 receives the UTIL message from its child a3 (assume a3's UTIL message has arrived earlier), it stores the received utility table (i.e., util3 2 = util3 = f32), and joins its private function f23 to update the table util3 2 (i.e., 2 = f32⊗f23). According to the definition of EV (ai, ac) util3 that all the belonging variables' highest (pseudo) parent is ai in branch ac. Here, EV (a2, a3) is given by EV (a2, a3) = P C(a2) ∩ Desc(a3) ∪ {a3}\ID(a2) = ∅ ∩ ∅ ∪ {a3}\{a4} = {a3} Thus, a2 eliminates variable x3 from the utility table util3 2. After that, a2 joins the eliminated result to the running utility table util2 (util2 has been initialized to f21). Similarly, upon receipt of the UTIL message from a4, a2 saves the received 2 = util4 = f41 ⊗ f42), then updates utility table (i.e., util4 the utility table util4 2 by joining the private function f24 (i.e., 2 = f41 ⊗ f42 ⊗ f24). Since EV (a2, a4) = ∅, a2 joins util4 2 to the running utility table util2 directly without any util4 elimination. Since a2 has received all the UTIL messages from its children, it propagates the utility table util2 to its parent a1. Here, we have util2 = f21 ⊗ (f41 ⊗ f42 ⊗ f24) ⊗ (min f23 ⊗ f32) x3 When a1 receives the UTIL message from a2, it saves the received utility table (i.e., util2 1 = util2) and joins its private 1 ⊗ functions f12 and f14 to update util2 (f12 ⊗ f14)). After eliminating x2 and x4 (EV (a1, a2) = {a2, a4}), a1 joins the eliminated result into its running utility table util1 (util1 has been initialized to null). Here, we have util1 = min x2,x4 f12⊗f14⊗(f21⊗(f41⊗f42⊗f24)⊗(min 1 (i.e., util2 1 = util2 x3 f23⊗f32)) Since a1 is the root agent and receives all the UTIL messages from its children, it selects the optimal assignment v∗ 1 for it- self and the optimal assignments v∗ 4 for the eliminated variables a2 and a4. That is, 2 and v∗ v∗ 1 = argmin (v∗ 2, v∗ x1 4) = argmin x2,x4 util1, 1(x1 = v∗ 1) util2 Then a1 propagates a VALUE message including the optimal assignment to its child a2, where the optimal assignment is {(x1 = v∗ 1), (x2 = v∗ 2), (x3 = v∗ 3)}. Figure 9: The sketch of AsymDPOP with TSPS and MBES (mes- sage passing) When receiving the VALUE message from a1, a2 assigns 2 for itself. Since EV (a2, a3) = {a3} and the value v∗ EV (a2, a4) = ∅, a2 selects the optimal assignment for a3 by performing optimization over util3 2 with the determined assignment of x2, that is v∗ 3 = argmin (util3 2(x2 = v∗ 2)) x3 3)} and {(x1 = v∗ Then a2 propagates the optimal assignment {(x2 = 4)} to v∗ 2), (x3 = v∗ a3 and a4, respectively. Once a3 and a4 receives the VALUE messages, they assign for themselves. Since all leaf agents have received VALUE messages, the algorithm terminates. 1), (x2 = v∗ 2), (x4 = v∗ B AsymDPOP with TSPS and MBES B.1 Pseudo Code for AsymDPOP with TSPS and MBES Fig.11 and Fig.12 present the sketch of AsymDPOP with TSPS and MBES which consists of two phases: utility set propagation phase and value propagation phase. Different from the utility propagation phase in AsymDPOP, the utility set propagation phase applies the TSPS to trade off between memory and privacy through propagating multiple small util- ity tables, and utilizes the MBES to trade off between time and space by sequential optimizations. The utility set propagation phase begins with leaf agents sending their utility tables to their parents via UTILSET mes- sages (line 2-3). Note that, the utility tables are obtained from the Function PartitionF. That is, leaf agents partition their lo- cal utilities into multiple smaller utility tables according to kp (line 32-41). If there is any residue, ai adds them to the utility tables (line 42-43). When receiving the UTILSET message from its child i ← ac, ai stores the received utility tables (i.e., utilSetc Algorithm3:AsymDPOPwithTSPSandMBESforai(messagepassing)WhenInitialization:1utilSeti←∅2ifaiisaleafthen3sendUTILSET(PartitionF())toP(ai)WhenreceivedUTILSET(utilSetc)fromac∈C(ai):4utilSetci←utilSetc5foreachaj∈(PC(ai)∩Desc(ac))∪{ac}do6if∃u∈utilSetci,s.t.dims(fij)⊂dims(u)then7u←u⊗fij8utilSeti←utilSeti∪Elimination(utilSetci,EV(ai,ac))9ifaihasreceivedallUTILSETfromC(ai)then10ifaiistherootthen11v∗i←argminxi(⊗u∈utilSetiu)12PropagateValue({(xi=v∗i)})13else14utilSeti←utilSeti∪PartitionF()15while∃u,u(cid:48)∈utilSeti,s.t.dims(u(cid:48))⊂dims(u)do16u←u⊗u(cid:48),utilSeti←utilSeti\{u(cid:48)}17sendUTILSET(utilSeti)toP(ai)WhenreceivedVALUE(Assign)fromP(ai):18PropagateValue(Assign) Figure 11: A chain-like pseudo tree utilSetc), then joins its private functions w.r.t. its (pseudo) children in branch ac into the utility tables utilSetc i (line 4-7). Note that the join operation of its private functions w.r.t. its children does not increase the number of dimen- sions and should be applied accordingly to the related util- ity tables. Then the Function Elimination are used to im- plement sequential eliminations on the utility tables utilSetc i In the Function Elimination, with MBES (line 8, 26-30). variables in EV (ai, ac) are firstly divided into several groups (GEV ) such that the variables in each group share at least one common utility table (line 26). And then, for the variables in each group, ai partitions them into several sets (or batches) with the Function PartitionEV according to ke (line 27, 49- 58). After obtaining the eliminated variable sets (EV Set), ai traverses the sets to optimize the utility tables (utilSet) (line 28-30). In detail, for each set, MBES performs optimization to the utility tables that are related to the eliminated variable in the set and replaces these utility tables with the optimized utility table. When receiving all the UTILSET messages from its chil- dren, ai adds its local utility tables computed by the Function FunctionF into the optimized utility tables, then sends these utility tables to its parent if it is not the root agent (line 14-17). Otherwise, the value propagation phase starts (line 11-12). The value propagation phase is roughly the same as the one in AsymDPOP. The root agent ai selects the optimal as- signments for itself and the eliminated variables (EV (ai, ac)) belong to each branch ac ∈ C(ai). And since the utility set propagation uses the TSPS, there may have more than one utility table. So before selecting the optimal assignments for branch ac (line 23), ai joins all the tables in utilSetc i with the assignments received from its parent (line 18) or computed locally (line 11-12) . After that, ai sends a VALUE message to its child ac (line 25). The algorithm terminates when each leaf agent receives a VALUE message. B.2 An Example of AsymDPOP with TSPS and MBES Figure 10: The sketch of AsymDPOP with TSPS and MBES (auxil- iary functions) For the convenience of further explanation, we denote the joint utility table uijk as a function of three variables xi, xj and xk. And the index of the function is sorted in alphabetical order. We take Fig.13 as an example to demonstrate the Algo- rithm 3. And suppose that kp = 3 and ke = 1. The algo- rithm begins with the leaf agent a5 by sending a UTILSET message with a utility table u245 to its parent a4. Here, u245 is computed by Function PartitionF. Specifically, a5 groups its private functions related with AP (a5) into a function set {f52, f54}, since the dimension of its local utility table is Algorithm3:AsymDPOPwithTSPSandMBESforai(auxiliaryfunctions)FunctionPropagateValue(Assign):19foreachac∈C(ai)do20Assignci←Assign[Sep(ac)∪{ac}∪ID(ac)]21ifEV(ai,ac)(cid:54)=∅then22u←⊗u(cid:48)∈utilSetciu(cid:48)(Assign[dims(u(cid:48))])23V∗←argminEV(ai,ac)(u)24Assignci←Assignci∪{(xj=V∗[xj])∀xj∈EV(ai,ac)}25sendVALUE(Assignci)toacFunctionElimination(utilSet,EV):26U←utilSet,GEV←GroupEV(EV,utilSet)27EVSet←∪EV(cid:48)∈GEVPartitionEV(EV(cid:48))28foreachEV(cid:48)∈EVSetdo29U(cid:48)←{u∀u∈U,dims(u)∩EV(cid:48)(cid:54)=∅}30U←(U\U(cid:48))∪{minEV(cid:48)⊗u∈U(cid:48)f}31returnUFunctionPartitionF():32U←∅,u←null33orderAP(ai)accordingtotheirlevels34foreachaj∈AP(ai)do35if∃u(cid:48)∈utilSeti,s.t.dims(fij)⊂dims(cid:0)u(cid:48)(cid:1)then36u(cid:48)←u(cid:48)⊗fij37else38ifdims(u)≥kpthen39U←U∪{u},u←fij40else41u←u⊗fij42ifu(cid:54)=∅then43U←U∪{u}44returnUFunctionGroupEV(EV,utilSet):45GEV←{dims(u)∩EV∀u∈utilSet}46while∃EV(cid:48),EV(cid:48)(cid:48)∈GEV,s.t.EV(cid:48)∩EV(cid:48)(cid:48)(cid:54)=∅do47EV(cid:48)←EV(cid:48)∪EV(cid:48)(cid:48),GEV←GEV\EV(cid:48)(cid:48)48returnGEVFunctionPartitionEV(EV):49EVSet←∅,EV(cid:48)←∅50foreachev∈EVdo51ifEV(cid:48)≥kethen52EVSet←EVSet∪{EV(cid:48)},EV(cid:48)←{ev}53else54EV(cid:48)←EV(cid:48)∪{ev}55ifEV(cid:48)(cid:54)=∅then56randomselectanelementEV(cid:48)(cid:48)∈EVSet57EV(cid:48)(cid:48)←EV(cid:48)(cid:48)∪EV(cid:48)58returnEVSet 5)} to a3. Upon receipt of the VALUE message from a2, v∗ a3 assigns for itself and sends the assignments received from a2 to its child a4. And a4 performs just like a3. The algo- rithm terminates when the leaf agent a5 receives the VALUE message and assigns for itself. C Experiment Results C.1 The Experimental Configuration The Experiment with Different Agent Numbers • Problem type: Random ADCOPs • Agent numbers: [8, 24] • Density: 0.25 • Domain size: 3 The Experiment with Different Densities • Problem type: Random ADCOPs • Agent numbers: 8 • Density: [0.25, 1.0] • Domain size: 8 The Experiment with Different Domain size • Problem type: Random ADCOPs • Agent numbers: 8 • Density: 0.4 • Domain size: [4, 14] The Experiment with Different Tightness • Problem type: ADCSPs • Agent numbers: 10 • Density: 0.4 • Domain size: 10 • Tightness: [0.1, 0.8] C.2 The Experiment Results three which satisfies kp = 3. Thus, a5 obtains a 3-ary utility table u245 by joining the functions in the function set (i.e., u245 = f54 ⊗ f52). When a4 receives the UTILSET message from its child a5, it saves the utility table (u245) and updates the utility table by joining its private functions f45 and f42 (i.e., u245 = u245 ⊗ (f45 ⊗ f42)). Since a4 is not the highest (pseudo) parent of its any descendants (EV (a4, a5) = ∅), it does not need to perform elimination. Further more, since a4 has received all the UTILSET messages from its children, it sends the utility tables {u245, u34} to its parent a3. Here, the utility table u34 is computed by the Function PartitionF through dealing with the residual function f43. Upon receipt of the UTILSET message from a4, similarly, a3 saves the utility tables and updates the utility table u34 by joining its private functions f34 (i.e., u34 = u34 ⊗ f34). Since a3 is not the highest (pseudo) parent of a4 or any other de- scendants, there is no elimination at a3. Because the residual functions f32 and f31 could not be joined into the utility tables {u245, u34} without increase the number of dimensions, a3 deals them with Function PartitionF and gets a utility table u123. After that, it sends the utility tables {u123, u245, u34} to its parent a2. Once a2 receives the UTILSET message from a3, it also saves the utility tables firstly, and joins the relative private functions into the corresponding utility tables (i.e., u245 = u245 ⊗ (f25 ⊗ f24), u123 = u123 ⊗ (f23 ⊗ f21)). Since that is a2 is the highest (pseudo) parent of a4 and a5, EV (a2, a3) = {a4, a5}, the eliminations are preformed by the Function Elimination. In Function Elimination, a2 firstly partitions the eliminated variables x4 and x5 into a group, as they share a common utility table f542. And since ke = 1, a2 divides these variables into two batches and elim- inates them from the utility tables {u123, u245, u34} one by one. After eliminating x5 (assume x5 is eliminated first), a2 gets the utility tables {u123, u24, u34}. Then a2 obtains the new utility tables {u123, u2, u3} by eliminating x4 (i.e., (u34)). After that, a2 updates u2 = min x4 the utility table u321 by a joint operation of the utility tables {u2, u3} (i.e., u123 = u123 ⊗ u2 ⊗ u3), and sends the updated utility table {u123} to its parent a1. (u24), u3 = min x4 When a1 receives the UTILSET message from a2, it saves the utility table, and then joins its private functions f12 and f13 into the utility table u123 (i.e., u123 = u123 ⊗ f12 ⊗ f13). Since EV (a1, a2) = {a2, a3} and the variables x2 and x3 are both relative to the utility table u321, they are partitioned into a single group. But since ke = 1, a1 still eliminates the variables x2 and x3 from the utility table {u123}, respectively, and obtains the eliminated utility table {u1}. Since it is the root agent and has received all the UTILSET messages from its children, a1 chooses the optimal value v∗ 1 for itself based on the utility table {u1}. After that, the value propagation phase starts. a1 selects the 2 and v∗ optimal values v∗ 3 for a2 and a3, then propagates the assignment {(x1 = v∗ 3)} to its child a2. When receiving the VALUE message from a1, a2 selects the optimal assignments for a4 and a5, and sends the assign- ment {(x1 = v∗ 4), (x5 = 2), (x3 = v∗ 1), (x2 = v∗ 1), (x2 = v∗ 2), (x3 = v∗ 3), (x4 = v∗ (a) Network Load (b) NCLOs Figure 12: Performance comparison under different agent numbers (a) Network Load (b) NCLOs Figure 13: Performance comparison under different densities 812162024# of Agents100101102103104105Network Load (KB)812162024# of Agents102104106108NCLOs(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:8)(cid:1)(cid:4)(cid:4)(cid:1)(cid:9)(cid:6)(cid:10)(cid:11)(cid:2)(cid:12)(cid:13)(cid:4)(cid:11)(cid:2)(cid:12)(cid:14)(cid:5)(cid:1)(cid:4)(cid:4)(cid:11)(cid:15)(cid:1)(cid:16)(cid:17)(cid:11)(cid:18)(cid:11)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:3)(cid:1)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:22)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:23)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:22)(cid:4)(cid:1)(cid:5)(cid:20)(cid:24)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:23)(cid:4)(cid:1)(cid:5)(cid:20)(cid:24)(cid:21)0.250.40.550.70.851Density101102103104105Network Load (KB)0.250.40.550.70.851Density103104105106107108NCLOs(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:8)(cid:1)(cid:4)(cid:4)(cid:1)(cid:9)(cid:6)(cid:10)(cid:11)(cid:2)(cid:12)(cid:13)(cid:4)(cid:11)(cid:2)(cid:12)(cid:14)(cid:5)(cid:1)(cid:4)(cid:4)(cid:11)(cid:15)(cid:1)(cid:16)(cid:17)(cid:11)(cid:18)(cid:11)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:3)(cid:1)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:22)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:23)(cid:4)(cid:1)(cid:5)(cid:20)(cid:1)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:22)(cid:4)(cid:1)(cid:5)(cid:20)(cid:24)(cid:21)(cid:1)(cid:9)(cid:6)(cid:10)(cid:17)(cid:11)(cid:18)(cid:11)(cid:19)(cid:1)(cid:2)(cid:20)(cid:23)(cid:4)(cid:1)(cid:5)(cid:20)(cid:24)(cid:21) (a) Network Load (b) NCLOs Figure 14: Performance comparison under different domain sizes (a) Maximum Dimension (b) NCLOs Figure 15: Performance comparison under different batch sizes 468101214Domain Size100101102103104105106Network Load (KB)468101214Domain Size103104105106107108NCLOsATWBSyncABBAsymPT-FBPT-ISABBPEAVDPOPAsymDPOP(kp=w$;ke=1)AsymDPOP(kp=2;ke=1)AsymDPOP(kp=3;ke=1)AsymDPOP(kp=2;ke=1)AsymDPOP(kp=3;ke=1)812162024# of Agents051015Maximum Dimension(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:6)(cid:1)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:13)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:12)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:13)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:12)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:5)(cid:1)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)812162024# of Agents102104106108NCLOs(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:6)(cid:1)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:13)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:12)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:12)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:13)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:12)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:15)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14)(cid:3)(cid:7)(cid:8)(cid:9)(cid:5)(cid:1)(cid:6)(cid:1)(cid:10)(cid:1)(cid:2)(cid:11)(cid:5)(cid:1)(cid:3)(cid:1)(cid:4)(cid:11)(cid:1)(cid:14) (a) Network Load (b) NCLOs (c) Privacy Figure 16: Performance comparison under different tightness 0.10.20.30.40.50.60.70.8Tightness101102103104105Network Load (KB)ATWBSyncABBAsymPT-FBPT-ISABBAsymDPOP(kp=w$;ke=1)AsymDPOP(kp=2;ke=1)AsymDPOP(kp=3;ke=1)0.10.20.30.40.50.60.70.8Tightness102103104105106107108109NCLOsATWBSyncABBAsymPT-FBPT-ISABBAsymDPOP(kp=w$;ke=1)AsymDPOP(kp=2;ke=1)AsymDPOP(kp=3;ke=1)0.10.20.30.40.50.60.70.8Tightness00.10.20.30.40.50.60.7Privacy(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:8)(cid:1)(cid:4)(cid:4)(cid:1)(cid:9)(cid:6)(cid:10)(cid:11)(cid:2)(cid:12)(cid:13)(cid:4)(cid:11)(cid:2)(cid:12)(cid:14)(cid:5)(cid:1)(cid:4)(cid:4)(cid:1)(cid:9)(cid:6)(cid:10)(cid:15)(cid:11)(cid:16)(cid:11)(cid:17)(cid:1)(cid:2)(cid:18)(cid:3)(cid:1)(cid:4)(cid:1)(cid:5)(cid:18)(cid:1)(cid:19)(cid:1)(cid:9)(cid:6)(cid:10)(cid:15)(cid:11)(cid:16)(cid:11)(cid:17)(cid:1)(cid:2)(cid:18)(cid:20)(cid:4)(cid:1)(cid:5)(cid:18)(cid:1)(cid:19)(cid:1)(cid:9)(cid:6)(cid:10)(cid:15)(cid:11)(cid:16)(cid:11)(cid:17)(cid:1)(cid:2)(cid:18)(cid:21)(cid:4)(cid:1)(cid:5)(cid:18)(cid:1)(cid:19)
1903.06979
1
1903
2019-03-16T19:59:41
A Principal-Agent Model of Systems Engineering Processes with Application to Satellite Design
[ "cs.MA" ]
We present a principal-agent model of a one-shot, shallow, systems engineering process. The process is one-shot in the sense that decisions are made during one time step and that they are final. The term shallow refers to a one-layer hierarchy of the process. Specifically, we assume that the systems engineer has already decomposed the problem in subsystems, and that each subsystem is assigned to a different subsystem engineer. Each subsystem engineer works independently to maximize their own expected payoff. The goal of the systems engineer is to maximize the system-level payoff by incentivizing the subsystem engineers. We restrict our attention to requirement-based system-level payoffs, i.e., the systems engineer makes a profit only if all the design requirements are met. We illustrate the model using the design of an Earth-orbiting satellite system where the systems engineer determines the optimum incentive structures and requirements for two subsystems: the propulsion subsystem and the power subsystem. The model enables the analysis of a systems engineer's decisions about optimal passed-down requirements and incentives for sub-system engineers under different levels of task difficulty and associated costs. Sample results, for the case of risk-neutral systems and subsystems engineers, show that it is not always in the best interest of the systems engineer to pass down the true requirements. As expected, the model predicts that for small to moderate task uncertainties the optimal requirements are higher than the true ones, effectively eliminating the probability of failure for the systems engineer. In contrast, the model predicts that for large task uncertainties the optimal requirements should be smaller than the true ones in order to lure the subsystem engineers into participation.
cs.MA
cs
A Principal-Agent Model of Systems Engineering Processes with Application to Satellite Design Salar Safarkhani†, Vikranth Reddy Kattakuri†, Ilias Bilionis†∗, Jitesh Panchal† †School of Mechanical Engineering, Purdue University, West Lafayette, Indiana 47907-2088 ∗Corresponding author, Email: [email protected] 9 1 0 2 r a M 6 1 ] A M . s c [ 1 v 9 7 9 6 0 . 3 0 9 1 : v i X r a Abstract -- We present a principal-agent model of a one-shot, shallow, systems engineering process. The process is "one-shot" in the sense that decisions are made during one time step and that they are final. The term "shallow" refers to a one-layer hierarchy of the process. Specifically, we assume that the systems engineer has already decomposed the problem in subsystems, and that each subsystem is assigned to a different subsystem engineer. Each subsystem engineer works independently to maximize their own expected payoff. The goal of the systems engineer is to maximize the system-level payoff by incentivizing the subsystem engineers. We restrict our attention to requirement-based system- level payoffs, i.e., the systems engineer makes a profit only if all the design requirements are met. We illustrate the model using the design of an Earth-orbiting satellite system where the systems engineer determines the optimum incentive structures and requirements for two subsystems: the propulsion subsystem and the power subsystem. The model enables the analysis of a systems engineer's decisions about optimal passed-down require- ments and incentives for sub-system engineers under different levels of task difficulty and associated costs. Sample results, for the case of risk-neutral systems and subsystems engineers, show that it is not always in the best interest of the systems engineer to pass down the true requirements. As expected, the model predicts that for small to moderate task uncertainties the optimal requirements are higher than the true ones, effectively eliminating the probability of failure for the systems engineer. In contrast, the model predicts that for large task uncertainties the optimal requirements should be smaller than the true ones in order to lure the subsystem engineers into participation. I. INTRODUCTION The ubiquitous problem of schedule and cost over-runs during the development of large-scale complex systems is well documented within systems engineering literature [1]. Various remedies have been proposed to address these un- sustainable trends, including, better methods and tools for managing complexity, better incentive mechanisms, and tran- sition from document-based systems engineering to model- based systems engineering (MBSE). The research community has related these trends to the fundamental way in which systems engineering processes are carried out. Requirements engineering, which is one of the foundational processes within systems engineering, has been identified as a key source of the inefficiency. Collopy, for example, argues that the use of requirements in systems engineering is an ineffective way of coordination between systems engineer and subsystems engineers [2]. Therefore, there is a need within systems en- gineering to model and analyze the requirements engineering process. There have been few efforts in addressing this need. By modeling systems engineering processes as multi-disciplinary design optimization problems, Collopy et al. show that us- ing requirements within systems engineering processes cre- ates design trade conflicts among different subsystems, re- sulting in dead losses within the system [2]. Collopy and Hollingsworth [1] espouse the use of value driven design (VDD) as a better alternative to requirements engineering, wherein, objectives for extensive attributes are passed down instead of requirements. Their model is applicable for settings where the incentives of the subsystem engineers are well aligned with the objectives of the systems engineers. This assumption may be valid when both the systems engineers and sub-systems engineers are within the same organization. If, on the other hand, the subsystems engineers are independent decision makers with private information and driven by their own objectives, their model is inappropriate, and superiority of VDD is not clear. To model realistic systems engineering processes, there is a need to model interactive decisions of self-interested actors using game theory. Vermillion and Malak [3] take initial steps in that direction by modeling the interactions between a sys- tems engineer and subsystems engineers using principal-agent models. They adapt the generalized principal-agent model to model the situation of a systems engineer delegating work to subsystem engineers as a one-shot game. Their adaption is primarily focused on incorporating behavioral aspects such as deviations from expected utility maximization within the general principal-agent model. While incorporating behavioral aspects within principal- agent models is an important step forward, we believe that there is still a lack of models that account for unique aspects of systems engineering, specifically, the information available to systems engineers, the state of technology, the uncertainty in the ability to achieve specific outcomes, and the level of difficulty of the tasks. To address this gap, we develop a principal-agent model [4] of a simple systems engineering process in which decisions are made once and all involved individuals have their own private interests. Note that our model is an oversimplification of real systems engineering processes which are iterative and in which information and outcomes flow back and forth between the systems engineer and subsystem engineers until a final decision is made. Our model should be considered as a first step towards modeling full fledged systems engineering processes. Using our frame- work, we study the optimal mechanisms within the class of requirement-based incentives. We illustrate the model using a satellite design case study with two subsystems: power and propulsion. Specifically, we show how historical data can be used to infer the parameters of our process model to this case study. The paper is organized as follows. We start Sec. II by describing our systems engineering process model in general terms and we cast the selection of subsystem incentives as a mechanism design problem. In Sec. II.A, we justify some assumptions for the nature of the subsystem engineers which simplify the model. In Sec. II.B, we focus the discussion on the class of requirement-based incentives for all agents. In Sec. II.C and II.D, we non-dimensionalize the equations and we describe how the parameters can be inferred from readily available historical data. In Sec. III, we apply the model to the design of a spacecraft taking into account two subsystems (power and propulsion). Finally, in Sec. IV, we present our numerical study and in Sec. V our conclusions. II. MODELING A SINGLE-SHOT, SHALLOW SYSTEMS ENGINEERING PROCESS We consider a model of a single-shot (evolves in one time-step), shallow (considers one-layer interactions between a systems engineer and multiple subsystem engineers) systems engineering process. The systems engineer (SE) has already decomposed the problem in N subsystems. The SE assigns the design of each subsystem to a subsystem engineer (sSE). Each sSE designs independently to maximize their own expected payoff, and returns the design outcome back to the SE. The goal of the SE is to incentivize the sSEs to produce subsystem designs that maximize the expected system-level payoff by choosing appropriate contracts. We start by formulating the problem of optimal subsystem contract design in its full generality. Then, we make simplifying assumptions about the form of the sSEs' quality and utility functions, and, we study the optimality requirement-based contracts. Let i = 1, . . . , N be a label indexing the sSEs. The i-th sSE chooses a normalized effort level ei ∈ [0, 1]. This measures the percentage of maximum effort that the sSE can allocate to this specific project within a predefined time framework, e.g., in a fiscal year. Second, the units of the effort depend on the nature of the sSE. If the sSE is an individual that works for the same organization as the SE, then the effort ei could be measured in terms of the percentage of that the individual dedicates to the project. Alternatively, if the sSE is an external contractor, e.g., another company, then effort could be measured in terms of the percentage of the available yearly resources that the contractor dedicates to this particular project. We denote the cost of effort to the sSE as ci(ei). In economic terms, ci(ei) is an opportunity cost, i.e., the monetary gain the sSE could receive, but forfeits, to participate in this particular project. Let (Ω,F, P) be a probability space associated with random states of nature. We model the design qualities that the i-th sSE can produce as a stochastic process qi(ei, ω). That is, the 2 quality function qi(ei, ω) gives the design quality that the i- th sSE can achieve by choosing an effort level ei if the state of nature is ω ∈ Ω. The quality function is normalized so that zero corresponds to the quality of the current state-of- the-art. Note that we have deliberately chosen to ignore the dependence of qi(ei, ω) on any private information. In other words, we assume that the form of the quality function is common knowledge. Each of the sSEs enters a contract with the SE. The contracts describe transfer functions, ti(qi), which specify the transport of monetary funds from the SE to the sSE contingent on the quality of the design that the sSE produces. Therefore, the payoff to the sSE is: πi (ei, ω) = ti (qi (ei, ω)) − ci (ei) . (1) We assume that the sSE selects an optimal effort level ex- ante, i.e., before they observe the future state of nature ω. If we further assume that the sSE is risk-neutral, then rationality implies that they should select their effort level by maximizing their expected payoff: ei ∗ (ti (·)) = arg max ei∈[0,1] Eω [πi (ei, ω)] . (2) Note the dependence on the transfer function. To ensure that the sSEs are willing to participate in this project, their optimal expected payoff must be positive. Oth- erwise, the sSEs have no incentive to be part of the project as their expected monetary benefit is smaller than their oppor- tunity cost. Therefore, the SE must choose transfer functions that enforce the participation constraints: Eω [πi (ei ∗ (ti (·)) , ω)] ≥ 0, (3) for i = 1, . . . , N. ties: The SE obtains from each sSE the following design quali- ∗ (ti (·) , ω) = qi (ei qi (4) If V (q1, . . . , qN ) is the net present value of any cash flows that result from a system with subsystem qualities q1, . . . , qN , then the total payoff to the SE is: ∗ (ti (·)) , ω) . π (t (·) , ω) = V (q1 ∗ (t1 (·) , ω) ,··· , qN ∗ (tN (·) , ω)) − N(cid:88) i=1 ∗ (ti (·) , ω)) , ti (qi (5) where we defined t (·) = (t1 (·) ,··· , tN (·)). Assuming that the SE makes ex-ante, risk-neutral decisions, they must select transfer functions that solve: t∗ (·) = arg max Eω [π (t (·) , ω)] , (6) t(·) then the SE does not subject to the N participation constraints defined in Eq. (3). Of course, if the optimal expected payoff Eω[π(t∗(·), ω)] is negative, in the first place. In what follows, we study this mechanism design problem by making specific assumptions for the form of the SE value function, the sSEs' quality functions and costs, and the form of the possible transfer functions. initiate the project A. Assumptions about the subsystem engineers Our final assumption is that the sSE's cost grows linearly with effort as: ci (ei) = ciei, (9) where ci > 0. This assumption is reasonable for almost all types of sSEs. In particular, when sSE is an individual engineer, ci could be the average industry salary per unit effort. For a contractor, ci could be the expected payoff per unit effort of the next most profitable project that they could be engaging in. B. Optimal requirement-based incentives We assume that the SE has N requirements, r1, . . . , rN , one to be satisfied by each subsystem. These requirements arise from the business case of the project. Mathematically, the system design is successful if qi > ri for all i = 1, . . . , N. If the value of a successful system design is V0, then the value function of the SE is: V (q1, . . . , qN ) = V0 H (qi − ri) , (10) N(cid:89) i=1 where H (·) is the Heaviside function: 1, if x ≥ 0, 0, otherwise. H(x) = (cid:40) The random field qi(ei, ω) captures the common state of knowledge about what is technologically possible in the design quality of subsystem i. Using the Karhunen-Lo`eve expansion [5], the random field qi(ei, ω) can be written as: qi(ei, ω) = q0 i (ei) + λikξik(ω)φik(ei), (7) ∞(cid:88) (cid:112) k=1 where q0 i (ei) is the mean of the random field, λik, φik(ei) are the eigenvalues and eigenvectors of its covariance function, respectively, and the random variables ξik are zero mean, unit variance, and uncorrelated. Assuming stationarity of the process, these quantities can, in principle, be estimated sta- tistically from historical data of marginal investments versus increases in product quality. As a first approximation, we trun- cate the series at k = 1 keeping only the largest eigenvalue: qi(ei, ω) ≈ q0 i (ei) + λi1ξi1(ω)φi1(ei). (cid:112) √ Furthermore, we approximate the zero-mean and unit-variance random variable ξi1 as a standard normal random variable ξ (the standard normal is the maximum entropy distribution with zero-mean and unit variance). We also assume that the first eigenvector is approximately constant, φi1(ei) ≈ const, and we introduce the new variable σi = λiφi1(ei). Without loss of generality, we may take that σi > 0. Finally, we take the first order Taylor expansion of q0 i ), recalling that we scale the quality so that zero corresponds to the current state-of-the-art, which can be delivered without any effort. This is reasonable since we are considering a one-shot systems engineering process which, necessarily, takes place in a limited amount of time. For larger timescales, we expect qi(ei, ω) to be curved: Concave for mature technologies, and convex followed by concave for emerging technologies. Furthermore, we take ai > 0 since more effort can only lead to increased design quality. To summarize, we model the quality as: i (ei) = aiei+O(e2 qi (ei, ω) = aiei + σiξ (ω) , (8) where ai, σi > 0, and ξ ∼ N (0, 1). The parameter ai depends on the skills of the sSE as well as on the maturity of the underlying technology. That is, a skillful sSE produces a higher increase in quality from the state-of-the-art than a less skilled sSE. Therefore, keeping the maturity of the technology fixed, ai expected to grow as the skills of the sSE are improved. Similarly, keeping the skills of the sSE fixed, ai decreases as a function of the maturity of the underlying technology. The more mature the underlying technology is, the more difficult it becomes to obtain a given increase in quality. The parameter σi behaves in exactly the opposite way. A skillful sSE produces design qualities that vary less, therefore σi decreases as skill improves. On the other hand, we expect that subsystem designs that depend on mature technologies are more predictable, therefore σi decreases as technological maturity increases. 3 We restrict our attention to the study of requirement-based transfer functions: ti (qi; ψi) = ψi1 + ψi2 H (qi − ψi3) . (11) The first parameter, ψi1, specifies the amount that is going to be paid simply for agreeing to participate in the project, guaranteeing a design quality at least the same as the cur- rent state-of-the-art. The second parameter, ψi2, specifies the amount to be paid if the subsystem engineer meets specific requirements. The third parameter, ψi3, specifies the require- ment that the subsystem engineer has to meet. Note that the optimal passed-down requirement is, in general, different than the real requirement, ri. We start with the optimal decision of the i-th sSE given a fixed contract ti (qi; ψi). The payoff is: πi(ei, ω) = ψi1 + ψi2 H (aiei + σiξi(ω) − ψi3) − ciei. To take the expectation over ω, we use the following result: Eω [H (λ + σξ(ω))] = Φ (12) where Φ(·) is the cumulative distribution function (CDF) of a standard normal random variable. Taking the expectation over ω, we get: σ , (cid:18) λ (cid:19) Eω [πi(ei, ω)] = ψi1 − ciei + ψi2Φ So, the optimal effort level is: i (ti (·; ψi)) = arg max e∗ ei∈[0,1] (cid:26) ψi1 − ciei + ψi2Φ (cid:19) (cid:18) aiei − ψi3 (cid:18) aiei − ψi3 σi . σi (cid:19)(cid:27) . (13) We solve this problem using Brent's method [6] as imple- mented in SciPy [7]. The SE problem consists of maximizing: (cid:18) aie∗ i (ti (·; ψi)) − ri σi (cid:19) Eω [π (t (·, ψ) , ω)] =V0 Φ i=1 N(cid:89) − N(cid:88) − N(cid:88) i=1 i=1 ψi1 ψi2Φ (cid:18) aie∗ (cid:19) i (ti (·; ψi)) − ψi3 σi − cie∗ i (ti (·; ψi)) ≥ 0, (15) (cid:19) , (14) (16) subject to the participation constraints: (cid:18) aie∗ ψi1 + ψi2Φ and the bounds: i (ti (·; ψi)) − ψi3 σi ψik ≥ 0. for k = 1, 2, 3 and i = 1, . . . , N. In practice, the optimal solution is always within the following bounds: 0 ≤ ψi1, ψi2 ≤ 2ci, and ri − 3σi < ψi3 < ri + 3σi. (17) We solve this problem using the constrained optimization by linear approximation (COBYLA) algorithm [8] as imple- mented in [7]. C. Non-dimensionalization of the equations Without loss of generality, we can pick all the subsys- tem requirements to be ri = 1. This can be achieved by appropriately scaling all ai's and all σi's. In other words, the quality function of each subsystem will be measured in units of the corresponding business-imposed requirement. Then, the inverse of the coefficient ai, can be interpreted as the effort that needed to meet the subsystem requirement for sSE if there is no uncertainty. We will consider two levels of ai's corresponding to different levels of subsystem design difficulty: (i) (hard) ai = 1.5, (ii) (easy) ai = 2. Having scaled the quality function in this way, the variance parameter σi can also be interpreted as the amount of uncertainty in the quality of the final design as a percentage of the requirement. We will consider three levels of uncertainty: (i) (low) σi = 0.05, (ii) (moderate) σi = 0.1, and (iii) (high) σi = 0.2. Finally, also without loss of generality, we may set V0 = 1. This can be achieved by appropriately scaling the transfer functions and the opportunity costs of all sSEs. It amounts to measuring all monetary quantities, in terms of the SE's maximum value. For the opportunity costs of the sSEs, we will consider two levels: (i) (low) ci = 0.01, (ii) (high) ci = 0.05. D. Extracting subsystem parameters from historical data To study decision making in the context of a real ap- plication, one needs to extract all parameters, ai, ci, σi, . . . , from historical data. To this end, let Qi denote the quality of the i-th subsystem in physical units, and Ii the cumulative investment per firm on this technology. Historical data, say Si(cid:88) Si(cid:88) s=1 s=1 Di = {(Iis, Qis)}Si s=1, of these quantities are readily available for many technologies. We model the relationship between Qi and Ii as: Qi = Qi0 + Ai(Ii − Ii0) + Σiξi(ω), (18) where Qi0 and Ii0 is the current state of these variables, ξi(ω) ∼ N (0, 1), and Ai and Σi are parameters to be estimated from the all available data Di. We use a maximum likelihood estimator [9] for Ai and Σi. This is equivalent to least squares estimate for Ai: Ai = arg min Ai [Qi0 + Ai(Iis − Ii0) − Qis]2 , (19) and to setting Σi equal to the mean residual square error: Σi = 1 Si [Qi0 + A∗ i (Iis − Ii0) − Qis]2 . (20) Now, let Qir be the required quality for subsystem i in physical units. The scaled quality of a subsystem qi, can be defined as: qi = Qi − Qi0 Qir − Qi0 , (21) with this definition, we get qi = 0 for the state-of-the-art, and qi = 1 for the requirement. Substituting Eq. (18) in Eq. (21) while making use of the maximum likelihood estimates for Ai and Σi, we get qi = Ai Qir − Qi0 (Ii − Ii0) + Σi Qir − Qi0 ξi(ω). (22) From this equation, we see that the uncertain parameter of our previous discussions, can be obtained from σi = Σi Qir − Qi0 . (23) Finally, let Ti and Ci represent the time for which the ith sSE is to be hired and the cost of the engineer per unit time, respectively. Ti is just the duration of the systems engineering process we consider. The opportunity cost Ci can be read inferred from the balance sheets of publicly traded firms related to the technology. We can now define the effort variable ei as: ei = Ii − Ii0 TiCi . (24) (25) From this and Eq. (22), we see that ai is given by: ai = TiCi Ai Qir − Qi0 . III. ILLUSTRATIVE EXAMPLE: SPACECRAFT DESIGN PROBLEM A. Spacecraft systems design During the initial proposal phase of satellite development for scientific applications, the principal investigator puts forward an estimate of how the goals of the project will be achieved through engineering means. These project goals concern the 4 the heart overarching science objectives of the mission which corre- spond to the instrument design at the satellite. However, in the process of successfully launching a scientific instrument into space, all the necessary components to power the instruments, actuate the spacecraft, and transmit data must also be included in the satellite payload. These mission requirements are translated to specific functional requirements for each subsystem of the spacecraft. Typically, a spacecraft consists of seven main sub- systems [10], namely, electrical power subsystem (EPS), propulsion, attitude determination and control (ADC), on- board processing, telemetry, tracking and command (TT&C), structures and thermal subsystems. For the proposed study, we will focus our attention on two subsystems (N = 2): EPS and propulsion. Simplifying the analysis, we assume that the design of these subsystems will be assigned to two (subsystem) engineers in a one-shot fashion. Note that, the systems engineering process of the spacecraft is an iterative process and the information and results are exchanged and flow back and forth between the SE and sSEs in each iteration. Our model is a very crude approximation of reality. The goal of the SE is to optimally incentivize the sSEs to produce subsystem designs that meet the mission's requirements. B. Electrical power subsystem The EPS is designed and configured to perform several key functions, the primary being a continuous and reliable source of peak and average electrical power for the life of the mission. It consists of a power source, energy storage, power conversion/distribution and power regulations and con- trol equipment. Typically, for earth orbiting satellites, one employs solar photo-voltaic arrays as a primary energy source and batteries as secondary power storage units. Silicon solar cells are the most commonly used photo-voltaic cells for space applications because of their low cost and high availability. In this study, the design quality of interest for the EPS sSE is chosen to be the solar cell efficiency, i.e., Q1 is the efficiency of Si-based solar photo-voltaic cells expressed as a percentage value, and I1 is the average cumulative investment in solar cell research per firm. To estimate the relationship between Q1 and I1, we first considered the global trends of commercial Si module efficiencies and cumulative investments in solar-cell research over 2001 -- 2008. Over this period, a total of hundred solar cell research and development companies received venture capital (VC) funding [11]. Based on this information, we assume that, on average, thirteen companies are participating in solar cell R&D every year. The variation of commercial crystalline-Si module effi- ciency (Q1 (%) ) with time is taken from [12]. The trend of cumulative global VC investment per firm (I1 (millions USD)) in crystalline Si-cell technology over time is obtained from [11]. In 2008, the state-of-the-art was Q10 = 19% and the cumulative investment per firm was I10 = 102.4 million USD. A maximum likelihood fit of the parameters in Eq. (18) results in a regression coefficient of A1 = 0.035% per million USD, and standard deviation Σ1 = 0.15%. We can visualize the data and the maximum likelihood fit in Fig. 1. Fig. 1: Spacecraft case study (EPS subsystem): Historical data (2001 -- 2008) of solar cell efficiencies vs cumulative investment per firm. The solid line and the shaded area correspond to the maximum likelihood fit of a linear regression model and the corresponding 95% prediction intervals, respectively. The cost parameter C1 is estimated by considering the total pay towards employees salaries over the number of employees in R&D jobs in global PV industry. According to the statistics [12], around 2,320 employees were involved in such jobs by the end of 2008. The value of C1 is the median salary of a solar cell development engineer which is approximately equal to 100,000 (0.1 million) USD based on data from [13]. Substituting the values of Q10, C1 and A1 in Eq. 25 yields the following relationship between the parameters Q1r, T1 and a1: a1 = 0.0035T1 Q1r − 19 (26) The variation of required quality (efficiency) for sSE-1 (Q1r (%)) with respect to the time for which one person from sSE firm is to be hired (T1 years) is shown in Fig. 2, for two different levels of EPS design difficulty. C. Propulsion subsystem Space propulsion systems essentially provide thrust to lift the launch vehicle along with its payload from the launch pad and place the payload into low-Earth orbit. They assist payload transfer between lower and higher orbits or into trajectories based on the type of mission. Finally, they provide thrust for attitude control and orbit corrections [10]. Based on mission profiles, performance requirements for propulsion systems include thrust, total impulse, and duty cycle specifications for which, the specific impulse and propellant density are the key parameters. Chemical combustion systems, which are the most common systems for space applications can be divided into three basic categories: liquid. solid and hybrid. The terminology refers 5 Fig. 2: Spacecraft case study (EPS subsystem): Variation of Q1r (percentage efficiency) w.r.t T1 (time in years) to the physical state of the stored propellants. In this study, the design quality of interest (Q2) for the propulsion sSE is chosen to be the delivered specific impulse (Isp, measured in seconds) of solid propellants. Specific impulse is defined as the ratio of thrust to weight flow rate of the propellant and is a measure of energy content of the propellants [10]. It signifies the energy to thrust conversion efficiency. I2 is the cumulative investment on chemical propulsion research and technology by NASA over a period of ten fiscal years from 1979 -- 1988. Trends in delivered specific impulse (Q2 (sec.)) and in- vestments by NASA (I2 (millions USD)) in chemical propul- sion technology with time are obtained from [14] and [15], respectively. The state-of-the-art solid propellant technology corresponds to a Q20 value of 252 sec. and I20 value of 149.1 million USD. In this case, the maximum likelihood fit of the parameters results in a regression coefficient of A2 = 0.0133 sec. per million USD, and standard deviation Σ2 = 0.12 sec. The corresponding data and the maximum likelihood fit are illustrated in Fig. 3 The value of C2 in this case is approximately same as that of C1, i.e., C2 = 100,000 USD according to the data obtained from [16]. Substituting the values of Q20, C2 and A2 in Eq. 25 yields the following relationship between the parameters Q2r, T2 and a2: (27) a2 = 0.0013T2 Q2r − 252 Fig. 4 shows the variation of required specific impulse for sSE- 2 (Q2r (sec.)) with time for which one propulsion engineer has to be hired (T2 years) for two different levels of subsystem design difficulty. IV. RESULTS We present numerical examples of one-shot SE processes with two identical sSEs (N = 2). We investigate 4 different cases consisting of all possible combinations of two difficulty levels (easy (ai = 2) vs hard (ai = 1.5)) and sSE opportunity 6 Fig. 3: Spacecraft case study (propulsion subsystem): His- torical data (1979 -- 1988) of specific impulse of solid mono- propellants vs cumulative investment per firm. The solid line and the shaded area correspond to the maximum likelihood fit of a linear regression model and the corresponding 95% prediction intervals, respectively. Fig. 4: Spacecraft case study (propulsion subsystem): Variation of Q2r (Specific impulse) w.r.t T2 (time in years) cost levels (low (ci = 0.01) vs high (ci = 0.05)). For each case, we consider three scenarios with different uncertainty levels: σ = 0.05, 0.1, and 0.2. For each scenario, we obtain the ∗ by solving the mechanism design problem optimal contract ψ of Sec. II within the class of requirement-based incentives. Finally, we study the sensitivity of the SE's expected payoff on the passed-down requirement by changing the values of ψ13 in the range [0, 2]. All numerical results can be found in Fig. 5 and its captions. Specifically, Figs. 5a, 5b, 5c, and 5d include the results for a hard-task -- low-cost-sSE, hard-task -- high-cost-sSEs, easy-task -- low-cost-sSE, and easy-task -- high- cost-sSE, respectively. The optimal contracts of each scenario can be read from the captions of the associated subfigures. i1 and ψ∗ We start by commenting on the properties of the payment amounts ψ∗ i2. We will refer to ψ∗ i1 as the partic- ipation payment, i.e., the fixed payment made to the sSE independently of the design outcome, and to ψ∗ i2 as the bonus payment, i.e., the payment made to the sSE if the passed-down requirements are met in our one-shot systems engineering model. First, we observe that across all the scenarios the participation payment increases as uncertainty grows. This makes sense, since the sSE is expected to ask for a higher certain gain to accept a higher risk task. Counter-intuitively, the bonus payment is independent of the uncertainty level. Second, for a fixed opportunity costs the participation payment decreases with increasing task difficulty while the bonus pay- ment behaves in the opposite way (it increases with increasing task difficulty). This means that for harder tasks the SE hedges themselves by shifting some of the participation payment to the bonus. Finally, as the opportunity cost increases, both the participation and bonus payments increase. Let us focus on the optimal passed-down requirements (ψ∗ i3). Across all scenarios, the optimal passed-down require- ment increases as the uncertainty becomes larger. This is an example of the SE attempting to increase the probability of the actual requirement being met as uncertainty increases. More- over, we observe that the optimal passed-down requirement is independent of the opportunity cost. This is due to the fact that the SE value function is requirement-based. Furthermore, we observe that for easy tasks, captions of Figs. 5c and 5d, the optimal passed-down requirement is always greater than the actual requirement ri = 1. This result can be intuitively understood as follows. Since the task is easy, the sSE will definitely reach the actual requirement with sufficient effort, even in the presence of significant uncertainties. By setting the requirement threshold higher than the actual one, the SE forces the sSE to use more effort, effectively increasing the probability of success to almost certainty. In contrast, for hard tasks, Figs 5a and 5b, the optimal passed-down requirements are lower than the actual system requirement. Since the task is hard, there is a high probability that the sSE may not be able to achieve a very high passed-down requirement. To lure the sSEs to participate, the SE needs to lower the passed-down requirements below the actual threshold. At a first glance, this may look like the SE will not be able to gain a positive expected payoff. However, due to uncertainty in the final outcome, there is a significant probability that the sSE will produce better than the requested result. Naturally, we observe that the expected SE payoff is in- creasing as the opportunity costs go down and that it decreases as the task difficulty increases. For easy tasks, the expected SE payoff decreases as the uncertainty increases, Figs. 5c and 5d. On the contrary, for hard tasks the expected SE payoff increases as a function of the uncertainty, Figs. 5a and 5b. As we saw in the previous paragraph, this makes sense for a hard task that, an increase in uncertainty makes it more likely that the actual requirement is met. V. CONCLUSION We presented a principle agent model of a one-shot, shallow systems engineering process. We assumed that all agents are risk neutral and, thus, they maximize their expected payoff. We modeled the quality function of subsystem engineers as a linear function of effort plus some Gaussian noise. Using a spacecraft design case study, we demonstrated how the parameters of our model can be estimated from historical data. Finally, we posed the optimal mechanism design problem within the class of requirement-based incentives. Our one-shot model of systems engineering process chal- lenges the intuitive belief that one should ask for higher requirements as the design task becomes more difficult. Our model predicted that for a hard task, the optimal passed-down requirement should be less than the actual requirement. The reason is that in this way the sSE is lured into participation while the SE may still meet the requirement because the design outcome may actually be better than anticipated. Our result does not mean that this common belief is wrong. After all, it is a very simple model, capturing only one iteration of systems engineering process. This result may change if the quality function is not linear or if the design quality noise becomes skewed. Even if the modeling choices were spot on, at the present stage, it is too simple to be truly descriptive. There may be mechanisms beyond the ones included in our model that incentivize the SE to ask for a requirement higher than what our model predicts? One reason is that they may underestimate the difficulty of the task. Another reason is that they may want to hedge themselves against dishonest behavior of sSEs, e.g., the sSE may put a design on their back pocket for later use. Third, the systems engineering process may be taking place iteratively and asking for a higher requirement may be an effective way to probe what is possible. From the perspective of the sSE, why would they accept to participate in a hard task with an exceedingly high requirement? Of course, they may also underestimate the difficulty of the task. Alternatively, they may be offered a participation payment that is high enough so that they do not care that it is impossible to meet the passed- down requirement. Finally, they may believe that they will be able to renegotiate the contract in the future, especially if the SE has a history of doing so. All these intricacies, and many more, are not captured by our model. They are topic of on going research towards a theoretical foundation of systems engineering design that accounts for human behavior. ACKNOWLEDGMENT This material is based upon work supported by the National Science Foundation under Grant No. 1728165. REFERENCES [1] P. D. Collopy and P. M. Hollingsworth, "Value-Driven Design," Journal of Aircraft, vol. 48, no. 3, pp. 749 -- 759, 2011. [Online]. Available: https://doi.org/10.2514/1.C000311 7 (a) Hard (ai = 1.5) - low cost (ci = 0.01). σ = 0.05: ψ1 = (0.000, 0.007, ψ13), ψ2 = (0.000, 0.007, 0.945); σ = 0.10: ψ1 = (0.001, 0.007, ψ13), ψ2 = (0.001, 0.007, 0.953); σ = 0.20: ψ1 = (0.002, 0.007, ψ13), ψ2 = (0.002, 0.007, 0.968). (b) Hard (ai = 1.5) - high cost (ci = 0.05). σ = 0.05: ψ1 = (0.004, 0.033, ψ13), ψ2 = (0.004, 0.033, 0.945); σ = 0.10: ψ1 = (0.007, 0.033, ψ13), ψ2 = (0.007, 0.033, 0.953); σ = 0.20: ψ1 = (0.012, 0.033, ψ13), ψ2 = (0.012, 0.033, 0.968). (c) Easy (ai = 2.0) - low cost (ci = 0.01). σ = 0.05: ψ1 = (0.001, 0.005, ψ13), ψ2 = (0.001, 0.005, 1.087); σ = 0.10: ψ1 = (0.002, 0.005, ψ13), ψ2 = (0.002, 0.005, 1.205); σ = 0.20: ψ1 = (0.003, 0.005, ψ13), ψ2 = (0.003, 0.005, 1.221). (d) Easy (ai = 2.0) - high cost (ci = 0.05). σ = 0.05: ψ1 = (0.005, 0.025, ψ13), ψ2 = (0.005, 0.025, 1.087); σ = 0.10: ψ1 = (0.009, 0.025, ψ13), ψ2 = (0.009, 0.025, 1.142); σ = 0.20: ψ1 = (0.014, 0.025, ψ13), ψ2 = (0.014, 0.025, 1.221). Fig. 5: The SE's expected payoff vs. passed-down requirement (ψ13) for several types of sSE [2] P. Collopy, "Adverse Impact of Extensive Attribute Requirements on the Design of Complex Systems," in 7th AIAA ATIO Conf, 2nd CEIAT Int'l Conf on Innov and Integr in Aero Sciences,17th LTA Systems Tech Conf; followed by 2nd TEOS Forum. American Institute of Aeronautics and Astronautics, dOI: 10.2514/6.2007-7820. [Online]. Available: https://arc.aiaa.org/doi/abs/10.2514/6.2007-7820 [3] S. D. Vermillion and R. J. Malak, "Using a Principal-Agent Model to Investigate Delegation in Systems Engineering," no. 57052, p. V01BT02A046, 2015. [Online]. Available: http://dx.doi.org/10.1115/ DETC2015-47778 [4] J. Meluso and J. Austin-Breneman, "Gaming the System: An Agent- Based Model of Estimation Strategies and Their Effects on System Performance," p. V02AT03A050, Aug. 2017. [Online]. Available: http://dx.doi.org/10.1115/DETC2017-68202 [5] R. Ghanem, Stochastic finite elements: a spectral approach. New York: Springer-Verlag, 1991, open Library ID: OL1865197M. [6] R. P. Brent, Algorithms for Minimization Without Derivatives. Mineola, N.Y: Dover Publications, Apr. 2013. [7] E. Jones, T. Oliphant, P. Peterson, and others, SciPy: Open source scientific tools for Python, 2001. [Online]. Available: http: //www.scipy.org/ [8] S. Lucidi and M. Sciandrone, "On the Global Convergence of for Unconstrained Optimization," SIAM Derivative-Free Methods Journal on Optimization, vol. 13, no. 1, pp. 97 -- 116, Jan. 2002. [Online]. Available: http://epubs.siam.org/doi/abs/10.1137/S1052623497330392 [9] M. E. Tipping and C. M. Bishop, "Probabilistic Principal Component Analysis," Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol. 61, no. 3, pp. 611 -- 622, Jan. 1999. [Online]. Available: http://onlinelibrary.wiley.com/doi/10.1111/1467-9868.00196/ abstract [10] J. R. Wertz, D. F. Everett, and J. J. Puschell, Space mission engineering: the new SMAD. Hawthorne, CA: Microcosm Press : Sold and distributed worldwide by Microcosm Astronautics Books, 2011, oCLC: 747731146. [11] "A Historical Analysis (2000-2007) Energy Technologies Fi- nance." [Online]. Available: https://financere.nrel.gov/finance/content/ historical-analysis-investment-solar-energy-technologies-2000-2007 of Renewable Energy Investment Project Solar in [12] S. Price, R. Margolis, G. Barbose, J. Bartlett, K. Cory, T. Cou- ture, J. DeCesaro, P. Denholm, E. Drury, M. Frickel, C. Hemmeline, 8 T. Mendelsohn, S. Ong, A. Pak, L. Poole, C. Peterman, P. Schwabe, A. Soni, B. Speer, R. Wiser, J. Zuboy, and T. James, "2008 solar technologies market report." [13] "Solar Engineer Salaries." [Online]. Available: https://www. environmentalscience.org/career/solar-engineer [14] "Solid." [Online]. Available: http://www.astronautix.com/s/solid.html [15] "NASA Historical Data Books." [Online]. Available: https://history. nasa.gov/SP-4012/vol6/cover6.html [16] "Propulsion Engineer line]. space-exploration-technologies--dragon-propulsion-engineer--hawthorne, -ca Available: Salaries." [On- https://www.paysa.com/salaries/ 9
1109.6838
1
1109
2011-09-30T14:42:14
Distributed Air Traffic Control : A Human Safety Perspective
[ "cs.MA", "cs.AI" ]
The issues in air traffic control have so far been addressed with the intent to improve resource utilization and achieve an optimized solution with respect to fuel comsumption of aircrafts, efficient usage of the available airspace with minimal congestion related losses under various dynamic constraints. So the focus has almost always been more on smarter management of traffic to increase profits while human safety, though achieved in the process, we believe, has remained less seriously attended. This has become all the more important given that we have overburdened and overstressed air traffic controllers managing hundreds of airports and thousands of aircrafts per day. We propose a multiagent system based distributed approach to handle air traffic ensuring complete human (passenger) safety without removing any humans (ground controllers) from the loop thereby also retaining the earlier advantages in the new solution. The detailed design of the agent system, which will be easily interfacable with the existing environment, is described. Based on our initial findings from simulations, we strongly believe the system to be capable of handling the nuances involved, to be extendable and customizable at any later point in time.
cs.MA
cs
Distributed Air Traffic Control : A Human Safety Perspective 1 1 0 2 p e S 0 3 ] A M . s c [ 1 v 8 3 8 6 . 9 0 1 1 : v i X r a Sarvesh Nikumbh Centre for Modeling and Joeprakash Nathaman [email protected] Rahul Vartak [email protected] Simulation University of Pune Pune 411007, India [email protected] ABSTRACT The issues in air traffic control have so far been addressed with the intent to improve resource utilization and achieve an optimized solution with respect to fuel comsumption of aircrafts, efficient usage of the available airspace with min- imal congestion related losses under various dynamic con- straints. So the focus has almost always been more on smarter management of traffic to increase profits while hu- man safety, though achieved in the process, we believe, has remained less seriously attended. This has become all the more important given that we have overburdened and over- stressed air traffic controllers managing hundreds of airports and thousands of aircrafts per day. We propose a multiagent system based distributed approach to handle air traffic ensuring complete human (passenger) safety without removing any humans (ground controllers) from the loop thereby also retaining the earlier advantages in the new solution. The detailed design of the agent sys- tem, which will be easily interfacable with the existing en- vironment, is described. Based on our initial findings from simulations, we strongly believe the system to be capable of handling the nuances involved, to be extendable and cus- tomizable at any later point in time. Keywords Air traffic control, multiagent system, holding pattern gener- ation, landing sequence, decentralization, automated traffic flow management. INTRODUCTION 1. Air traffic is increasing rapidly in many developing and de- veloped countries. The busiest airports are swamped every- day and incidents involving overworked and overstressed air traffic controllers (ATCs) is increasing. In the current sys- tem, ATCs have some awareness of things related to major airport closures, but they have to make multiple decisions about how to move and re-route traffic just based on their experience and little help to guide them. That's better than nothing, when there are about 16000 ATCs at more than 5000 public airports in the USA itself and more than 13000 worldwide [6]. The end result is decisions that are not al- ways optimal for the larger, national needs. The Controllers are on the job for more than 16 to 17 hours on the trot. The resulting fatigue and stress invariably transfers on their de- cision making, which may result in fatal or penalizing errors. As a matter of fact, there have been many such incidences in the past couple of years. It is this aspect of transferred risk of safety of passengers due to overburdened controllers or humans is what we try to address in this work while the usual optimization of resources is inherently achieved. 2. THE MULTIAGENT SYSTEM In this work we propose a multiagent system based dis- tributed approach for such modern air traffic controlling. Modeled as an inherently fault tolerant system, it handles efficient holding pattern and landing sequence generation. It provides a solution out of the classical centralized rout- ing strategies which are often slow to respond to developing weather conditions or airport operations, and which allow minor local delays to cascade into large regional congestions. We restrict our approach to operate only in the vicinity of airports. In this work, we attempt to address the issues of : • What constitutes an agent in this system? • What actions can the agents take to impact air traffic? • Its interface with the environment. Focussing on the airport vicinities lets us proceed with the obvious choice of an aircraft being an agent though in lit- erature there are instances of fixes -- which indicate ground locations throughout the airspace -- as choice of agents. This choice of aircrafts as agents helps us achieve the aim of being able to tackle issues arising in-flight, on-board that trigger last minute decision changes [4]. 2.1 The Design Each aircraft is responsible with various tasks according to the phase of flight it is currently in. The various phases of flight are viz. arrival into airport vicinity (henceforth called the airspace), at entry gate, on path, holding pattern, to metering fix, at metering fix, final descent, on runway and backtrack. Their service requirement is then dynami- cally determined by arising circumstances. On arrival into airspace, every aircraft shares a copy of queue Qi that has a buffer of size Bi to accommodate other aircrafts (whose number is limited for this airspace). We have holding pat- terns formed which are stacks of aircrafts hovering in the airspace at different altitudes maintaining the queue. These aircrafts in the stack form sets of agent systems. All of those at nearly the same altitude (or groupable altitudes) form a system 'A' which is lead by the first amongst them in the queue to land. Similarly there will be systems 'B', 'C' and so on at higher altitudes lead by the corresponding leaders. The leaders in all the stages also form a system amongst themselves together with the aircrafts which have just en- tered into flight on takeoff. This helps them be updated with the direct information of the aircraft's flight just upon enter- ing the airspace. The non-leaders in each stage would have this information relayed to themselves through the leaders. Once the leader at the lowest altitude takes to landing and leaves the system it passes on the leadership to the next in line. Each aircraft here, on entering into any agent system, is updated with the corresponding current status by a provi- sional agent -- the run time Directory Facilitator (DF). It is responsible for providing every agent in the system with the required information about other agents currently alive and their co-ordinates, state and phase description. The ATC isn't thrown out-of-the-loop and is infact our next agent in the system. It picks up major properties as mentioned in [3]. It overhears and overviews completely the decisions made in the entire process. ATC is the main passive supervision service provider requiring very little amount of service for itself. It shares the queue Qi with buffer of size Bi to track all the aircrafts and their movements. It is also responsible for handling communication with other running processes such as the Surface Movement Radars (SMR), TRACONs (Terminal Radar Approach CONtrol). It does so with the help of the other provisional agent of the system -- InPro- cess interfacing agent. It is responsible for detecting agents in the environment and continually updates the DF agent with this piece of information. It reads input from other external processes or entities on the traffic control system such as Flight Management System (FMS), User Request Evaluation Tool (URET) and many others. The other im- portant agent of the system is the TRACON. It is the second control facility located within the vicinity of a large airport typically controling aircraft within a 30-50 nautical mile ra- dius of the airport between the surface and 18,000 feet. The actual airspace boundaries and altitudes assigned to a termi- nal control are based on factors such as traffic flows, neigh- bouring airports and terrain, and vary widely from airport to airport. It is entrusted with ATCs' responsibilities in their absence. They also notify the ATC regarding any air- craft entering the concerned airspace. They thus form the fall-back agents offering a stronger fault-tolerance. We can also handle communication with 'fixes', the agents for the greater airspace facilitating seamless interface between other agent systems elsewhere in the environment. This way we are guaranteed to gain from the advantages of both -- fixes and aircrafts -- as agents. Each agent can now effect a re- route or a ground delay or cause a change in the sequence by prompt decision making. It prevents linguistic/mental com- munication errors triggered by humans in the loop. These 'well-aware'aircrafts would thus be in a position to tackle issues of emergency re-routes or re-sequencing without any fatal delay. 3. SIMULATIONS We based our simulations on artificial data with typical con- ditions viz. free-flights maintained as per the path-corridor correlation [5] and the data-exchange between agents follows the co-operative data exchange described in [1]. The combi- nations of dynamic causes for route or flight-plan changes in the participating agents were chosen by Monte Carlo meth- ods [2]. The resulting variations observed in the pre-fixed flight paths were succesfully handled under various scenar- ios. The simulations were conducted for Mumbai airport which has two runways (landing and takeoff) crossing each other. We achieved an average of about 38 flights per hour with average successful handling of 86.67 % of all flights with variations in their flight-paths, without human intervention. The results are averaged over 25 runs. 4. FUTURE WORK There have been issues observed previously in the Indian airspace caused due to some weak links in the administra- tion. For instance, a well-known public carrier, in 2008, was to land at Hyderabad airport but was allegedly unaware of the new Shamshabad airport inaugurated only a few days before, leading the confused pilots to fly the aircraft to Delhi and then Mumbai (reported in the News [4] and also docu- mented on Wikipedia). Such incidences can be avoided given that a secure information-exchange protocol can ensure re- laying of important notifications across aircrafts. Also, once the system gets into operation, over time it could learn by it- self the various traffic patterns observed over a single day for an airspace and bring about an improvement in the overall performance thus optimizing usage of invaluable resources. Also we could have more well defined reward mechanisms [6] implemented for the agents improving their performance as time progresses. 5. CONCLUSION A fundamental element of this research has been to investi- gate the air traffic operational environments and the effect of and on all the humans in the loop. The need for automat- ing certain tasks and still leaving the monitoring part to the ground air traffic controller has been made visible. The mul- tiagent system and its internal details are discussed. The simulations are performed on the basis of work presented previously in literature. We do not expect the system to yield readily acceptable results in any given scenario. It needs to be rigorously tested to maintain its performance graph. Despite these limitations, we believe that our propo- sition and its demonstration clearly and quite precisely ex- plain the handling of all the nuances in the system and are customizable with relative ease of intuition. We are confi- dent that it can be extended to a variety of similar real-world problems. 6. REFERENCES [1] Aircraft charter world : http://www.aircraft-charter-world.com/. January/February 2009. [2] W. Stirling. J.C. Hill, J.K. Archibald and R. Frost. A multi-agent system architecture for distributed air traffic control. USA. American Institute of Aeronautics and Astronautics. [3] F. Legras and C. Tessier. Lotto: Group formation by overhearing in large teams. LNAI, 12(2922):254 -- 270, 2004. [4] R. Niles. KLM: It knows all about shamshabad : http://www.avweb.com/avwebflash/news/. January/February 2009. [5] Baloch Fariha, Ragothaman Vijay and Pendse. Ravi. Unassisted aircraft landing via co-operative data exchange. In Proceedings of the 3rd Annual GRASP Symposium. Wichita State University, 2007. [6] Kagan. Tumer and Adrian. Agogino. Improving air traffic management with a learning multiagent system. IEEE Intelligent Systems, 24(1):18 -- 22, January/February 2009.
0805.1785
1
0805
2008-05-13T06:32:12
Distributed Self Management for Distributed Security Systems
[ "cs.MA", "cs.AI" ]
Distributed system as e.g. artificial immune systems, complex adaptive systems, or multi-agent systems are widely used in Computer Science, e.g. for network security, optimisations, or simulations. In these systems, small entities move through the network and perform certain tasks. At some time, the entities move to another place and require therefore information where to move is most profitable. Common used systems do not provide any information or use a centralised approach where a center delegates the entities. This article discusses whether small information about the neighbours enhances the performance of the overall system or not. Therefore, two information-protocols are introduced and analysed. In addition, the protocols are implemented and tested using the artificial immune system SANA that protects a network against intrusions.
cs.MA
cs
Distributed Self Management for Distributed Security Systems Michael Hilker University of Luxembourg Faculty of Science, Technology, and Communications 6, Rue Richard Coudenhove-Kalergi, L-1359 Luxembourg [email protected] Abstract. Distributed system as e.g. artificial immune systems, com- plex adaptive systems, or multi-agent systems are widely used in Com- puter Science, e.g. for network security, optimisations, or simulations. In these systems, small entities move through the network and perform cer- tain tasks. At some time, the entities move to another place and require therefore information where to move is most profitable. Common used systems do not provide any information or use a centralised approach where a center delegates the entities. This article discusses whether small information about the neighbours enhances the performance of the over- all system or not. Therefore, two information-protocols are introduced and analysed. In addition, the protocols are implemented and tested us- ing the artificial immune system SANA that protects a network against intrusions. 1 Introduction Distributed systems are widely used in computer science in order to solve prob- lems distributed on several nodes. Examples are simulation or optimisation prob- lems, which run on several nodes in parallel or the network security where a network is secured against intrusion like e.g. viruses, worms, and trojans. These distributed systems are e.g. multi-agent systems [1], complex adaptive systems [2], and artificial immune systems [3,4,5]. These systems use small entities - e.g. agents or artificial cells - that move through the network, perform certain tasks for network security, and work mostly autonomously. These entities receive local information about the situation in the network and contain a limited knowledge about the overall goal - here secure a network against intrusions. An example is that an entity knows how to identify one certain intrusion and receives the status of the node where the entity resides [6]. The performance of the overall systems originates from the performance of all the small entities, which leads to waste of computational power and decreased performance of the overall system when the entities are not properly distributed over all nodes. A key problem in the distributed systems is that the entities work au- tonomously and have to decide in some timestep whether they move to another node and if yes to which node - this problem is part of the self-management of a distributed system. This problem is significant because the distributed security system should secure the whole network and all nodes should have at least a cer- tain number of entities. This article discusses whether exchanging a small piece of information about the nearby situation increases the performance of the secu- rity system or not - local information about a node with some additional global information about the nearby region of the network. Therefore, two information protocols describing how and which information is exchanged are introduced. Thereafter, the two approaches are implemented in an artificial immune system that uses autonomous artificial cells in order to secure a network against intru- sions. Lastly, some discussions about the test results and the analysis conclude the paper. The domain of the application is network security. It describes the research in order to secure a network against intrusions. Intrusions are e.g. viruses, worms, and trojans. There are several approaches in order to secure a network against intrusions, e.g. antivirus software, packet filters, and intrusion detection systems [7]. Most of these common used security systems lack from the local installation because then they only secure one network node and require lots of compu- tational power to check the whole network traffic. Furthermore, the security solutions for a network consist of several systems, e.g. antivirus software in each node, packet filters in each router, and intrusion detection systems at the internet gateway and email server. However, these systems are not connected and do not work together. In order to protect a network against the upcoming intrusions, a more sophisticated approach is required where an example are the distributed systems. Thus, a distributed approach is chosen in the artificial immune system SANA [4] where artificial cells perform the required tasks and build up a dis- tributed intrusion detection system. These cells - the entities - move through the network and require the information where to roam next. The next section intro- duces the existing approaches for sharing movement information in distributed systems. 2 Current situation Currently, there are two different approaches in order to manage the movement of the entities in a distributed system: 1. The entities do not work fully autonomously. A centralised system, which knows the situation of the whole network, delegates the entities - mostly agents - to their destinations. Thus, the system is again dependent on a centralised system, which is also a single point of failure and is a contradiction to the idea of a distributed system. 2. When the entities work fully autonomously, in most systems they receive no information when and where to move. The movement is normally modelled using some probabilistic events with a distribution over all neighbour nodes. Both systems have significant disadvantages. The centralised approach re- quires lots of bandwidth because the center needs information from all over the 2 network and the center is a single point of failure. The distributed approach reduces the bandwidth significantly but it is possible that the entities move to inappropriate nodes where e.g., some nodes have too many entities and other nodes suffer from the low number of entities. Consequently, this article discusses how small pieces of information can help the entities to do the right decision. 3 Information Management and Protocols For investigating research in the information management, the following situa- tion in the network is assumed: An artificial immune system [4] with lots of artificial cells - the entities - pro- tects a network against intrusions [6]. Therefore, a type of artificial cell knows how to detect and remove exactly one intrusion where there are several instances of this type of artificial cells, cp. the immune cells in the human immune sys- tem [8]. The whole system does not contain any centralised system and the artificial cells decide autonomously when and where to move. The artificial im- mune system presents each packet to all artificial cells in this node and the cells decide whether the packet contains an intrusion or not. These cells should be distributed over all nodes so that each node contains approximately the same number of cells. In addition, the artificial immune system contains artificial cells that move through the network and check the nodes whether they are infected by an intrusion or not; e.g. in looking for backdoors or significant files and pro- cesses on the node. These artificial cells require the information where to go because the checks should be done uniformly in time distributed over all nodes; this means that each node is checked regularly but not too often. This prob- lem is the same as the general problem of the entities moving to another node. The artificial cells are the entities and the infrastructure provides the required resources for enabling the information management. For the first problem - the movement of artificial cells that check packets - the notification of insufficient security is introduced and for the second problem - the movement of artificial cells that check nodes - the trails of entities is intro- duced. In both approaches, the required resources must be limited. In the first approach, only one network packet is at most required for each connection in the network. The second approach requires only some storage in the network nodes that depends on the number of different types of artificial cells. Furthermore, the artificial cells receive some small pieces of information and, henceforth, do not increase that much in size and complexity. 3.1 Notification of insufficient Security In this approach, the problem of entities that check packets is discussed [9]. In general, this approach can be used for all entities, which perform regularly cer- tain tasks and which are required in lots of nodes of the network. The approach is motivated by the cytokines and hormones of the humen immune system reg- ulating the immune response and its immune cells motivate this approach [8]. 3 Fig. 1. Distribution of Notification: The node marked with N has an insufficient security level and notifies this to its neighbours. The receiving time of this in- formation is indicated using the colour of the nodes where the more black the earlier the information arrives. The nodes without a colour do not receive the information because they are too far away. For detecting that a node n has an insufficient number of entities, it has a pa- rameter that represents the minimum number of required security min secnode. Each entity returns on demand how many security it provides: secentity. The node n asks every time step all entities residing in this node how many security sece; a weighted each entity provides and sums this up: sectime = sum for a more sophisticated calculation can be also used. If the security in this time step is below the required security min secn > sectime, the node n starts a notification process in order to allure nearby entities. e∈entity node (cid:80) This notification works as follows: 1. Using local communication, the node informs the entities that are working in this node about the insufficient security level. These entities are then more affine to stay than to move. However, the entities are not forced to stay, they still decide on their own. 4 2. The node furthermore sends a network packet to all neighbours that indicate the low security level and the packet also describes the missing level. 3. The nodes receiving this packet forwards it to all entities working in these nodes. These entities then get more affine to move to this node than to stay or to move to another node. The change of the affinity is dependent on the level of lacking security that is stored in the packet. 4. With this workflow, each node maybe receives each time step several packets describing insufficient security levels of several nodes. Therefore, the node will forward only the packet with the highest missing security level. 5. In order to receive a global notification, each node forwards these notifica- tion packets to their neighbours. The value describing the missing value is therefore decreased by a decreasing function fd and if the value is still above a threshold, the packet is forwarded to all neighbours with the decreased value. 6. The notification about insufficient security in a node is not stored. The distribution of the information that a node has insufficient security level is visualised in figure 1. The entities - here artificial cells - react to this information as follows. Each entity has a function fm that describes the probability that it moves to an- other node. Another function fw describes where the entity moves next. These functions can have several parameters as the time the entity did not move, the network load, and lacking security level. Therefore, each time step a probabilistic event is done that succeeds with probability fm and if this event succeeds a sec- ond probabilistic event using fw describes the node where the entity will move. When the entity receives a notification that a node has an insufficient value, the function fm will be increased in order to increase the affinity to move and the second function fw is so changed that the entity will always move towards the node with insufficient security. The function fm is visualised in figure 2. This approach is implemented in the artificial immune system SANA that is developed at the University of Luxembourg for the purpose of network security (section 6). Each node with low security level sends the notification each time step and the entities react to it. In the simulations, the functions are set as follows: – min secnode is set to 20 where there are 60 different types of artificial cells in the artificial immune system – secentity is the number of known intrusions, mostly 1 – the decreasing function fd is set to old value − 1 – if a node has an insufficient security level the artificial cells in this node will not leave it – the movement function fm is shown in figure 2 – the where to move function fw is only used if there is not any notification, otherwise the entities move towards this node 5 Fig. 2. Response function fm of an entity: fm(0) describe the normal affinity to move; fm(x) describes the moving probability when lacking security x is received; maximum limits response to prevent overreaction. 3.2 Trails of Entities This approach provides information to entities performing regular checks in nodes as identifying infected nodes. In general, the approach can be used for entities performing a tasks that must be done regularly but not too often in a node. Therefore, an approach is used that is motivated by artificial ant colonies [10]. Each node n contains storage for each outgoing connection (v, w). In this storage, for each type of entity e is a value stored vv,w,e that describes when the last check took place. When an entity does a check in the node and moves to the next node, it increases this value vv,w,e and every time step the node decreases this value vv,w,e until it reaches zero. The entities in this node use this information in order to evaluate where to move next. Assume the following situation: an entity is in node n and finishes the check. The next step is to move to another node and the entity receives information when an entity of the same type moves to the neighbours, i.e. the values vv,w,e for each (v, w) in n for type e. Then, it uses this information for a probabilistic event where the P r(move to neighbour ni) depends on the value that describes when the node ni was lastly checked. In addition, the value is not a counting of time steps. For the increasing of the value is a function fi and for the decrease a function fd used. Then it is possible to when the last check did place at the neighbouring node as well as how often in the past the node was checked by this type of artificial cell. An example of fi is discussed in figure 3. This approach is also implemented in the artificial immune system where the storage uses float-values. The increasing function fi is set to c1+c2·exp(old value) 1000. The decreasing with c1 and c2 as a constant value, e.g. c1 = 10 and c2 = 1 6 function fd is set to old value − c3 where c3 is a constant value, e.g. 2. Thus, the value increases exponentially and decreases linearly. The probabilistic event sets the probability for each node dependent on the required security in the neighbour nodes. 4 Testing Results As already explained, the two techniques are implemented in an artificial im- mune system. The simulations are done using a network simulator implementing a packet-switching network. The network is a company-like network with about 500 nodes with different server, workstations, and services. An Internet gateway connects the network to the Internet and different intrusions are implemented, which are mostly viruses, worms, and trojans arriving over the network or di- rectly by internal attacks. The results are discussed in the next two subsections: 4.1 Notification of insufficient Security The notification of insufficient security works more than acceptable. When the parameters and functions are chosen properly, the system adapts quickly so that nodes with insufficient security receive artificial cells quickly. Furthermore, the system does not overreact which means that the artificial cells react too heavily and all cells move immediately to a node with insufficient security. Then, the alternating status is prevented: this means that all cells oscillate between two nodes because one of these two nodes has always an insufficient security level. The required resources are limited. For each connection is exactly one net- work packet for each time step used. The required computational power is also limited because the processing of the information is quite fast. The performance increase of the artificial immune system is observed. The performance with no- tification of insufficient security levels is significant higher than in the version without enabled notification. For example in one scenario, about 80% of the intrusions are identifies without the usage of the notification system; this low value occurs because some nodes have too much and some nodes too few artificial cells. When the notification system is enabled, the system identifies about 98% of the intrusions because all nodes have a guaranteed security value. Compared to the centralised approach with an entity management server, the notification of insufficient security requires about 80% less bandwidth and the performance increases by 15% due to the quicker adaption to weak points in the network. The reason for this is that the system quickly solves security problems and the attackers cannot use nodes with insufficient security in order to install intrusions. Additionally, the system distributes the artificial cells in a better way. If there is a node with too many artificial cells that requires too much computational power, there are also nodes with insufficient security and the artificial cells will solve this problem using the information. Furthermore, it is possible to adapt the system to the current situation using changes of the parameters. In addition, important nodes are secured with more entities, which is configured through changes in the notification system. 7 Fig. 3. Trails: an entity in the left node wants to move, reads therefore the trails, and receives the values indicating the trail. Thereafter, it makes a probabilistic event where it chooses uniformly a number from [1, 289]. If the number is in [1, 100] it moves to the node with trail value 1. Else, if the number is in [101, 197], it moves to the node with trail value 5. Else, if the number is in [198, 288], it moves to the node with trail value 10. Else, if the number is 289, it moves to the node with trail value 100. This probabilistic event reflects the trail values of the neighbouring nodes. 4.2 Trails of Entities The trails of entities work well. The system provides information to the entities where their tasks are required and the entities move there. The entities also save computational power because between two checks is a certain time period. In our simulations, without the trails only about 70% of the nodes are checked and some nodes are very often checked about every second time-step. With the trails systems, all nodes are regularly checked and too often checks are successfully prevented where the required computational power is reduced by 60%. Unfortunately, when the network is fragmented in several parts and these parts are connected by a few connections, the trails of entities do not work properly. The reason for this is that many entities must use these connections, they receive a high value, and the probability to move over these connections is reduced. Fortunately, this problem can be solved in using other functions in these nodes: one solution is to use a decreasing function with a significant higher gradient or to not use the trails in this node, which results to a probability of #neighbours for all neighbours. 1 5 Analysis In the analysis of the two techniques, the focus lays on the question how the selected information helps the entities and what other information might be 8 interesting. In addition, the required resources are analysed and a balancing be- tween these two parameters are done. Definition: Local information comes from the network node and is not sent over the network. Global information describes the situation in another node and is sent over the network. Question: Are the information locally or globally? In the notification of insufficient security, the information is local and global because the entities receive the information from the neighbouring nodes directly and using forwarding from nodes that are nearby. However, using feasible pa- rameters, the entities do not receive information about insufficient security in nodes that are far away. The reason for this is that if they receive information about all nodes with insufficient security, the required resources are equal to the centralised approaches. Using the parameters, it is possible to trade off the proportion between the required bandwidth and the distance where information are forwarded. In the trails of entities, the information is locally. There is no exchange be- tween the nodes about this information and the entities receive only the infor- mation of a node. Question: Does information that is more global increase the performance? In the notification of insufficient security, using the parameters it is possible to choose between required bandwidth and global information. However, when the system is so configured that the cells receive information about all nodes with insufficient security, the entities receive too many information and will travel too often through the network. Furthermore, it is uninteresting that an entity moves through the whole network only to fix a problem at a far-away node. Then it is more interesting to solve the problem in the area around the node where only localised information is required. The tests showed that a local setting with a distribution of some hops results in the best performance and limits the bandwidth greatly. In addition, the distribution area of the notification depends on the missing security value: the bigger the missing security level, the greater is the distribution area, which is a more adaptive approach. In the trails of entities, some global information would increase the perfor- mance. Especially in the situation explained in the last section that connections with high load will not be traversed by entities, a view to other nodes would make the decision of an entity where to move more sophisticated. Then, the en- tities would receive a more global view about the nearby network. However, then the system must invest more bandwidth and the selection which information to store in which node is quite difficult. Question: Which other information are interesting to use for these two problems? For the protocol of notification of insufficient security, it would be interesting to know how many artificial cells are on the way towards this node. Furthermore 9 it would be interesting to receive information about more than one node so that the system does not only adapt to the node which has the highest value of lacking security value. However, both would implicate lots of bandwidth and high storage space for saving the information. Furthermore, the workflow in the entities would be more complex. For the protocol of trails of entities, it would be interesting to receive infor- mation about a part of a network and not only from the neighbours of this node. However, this would again increase the required bandwidth and storage space. Question: Which other problems occur in the self-management of a distributed security system? In the notification of insufficient security, the following questions are also of interest: – Which node has too many entities. Too many entities is defined so that the resources - mainly computational power - is not sufficient with the required resources from all entities. It is highly interesting that these entities move to the nodes with insufficient security level in order to balance the system. – Is it possible to design moving chains where several entities move from node to node and after one time step all nodes have a sufficient security level? If yes, which information is required so that all entities can initiate this moving? For the trails of entities, the following questions are also interesting: – How to use these trails so that not too many checks are performed on a node? If too many checks are performed simultaneous, the node has to invest too much computational power. – Is it maybe possible to use these trails in order to find nodes that are con- trolled by an intrusion in absorbing cells? The problem in distributed security systems is that an attacker occupies a node and has access to the security systems. Then, the attacker can remove all incoming entities and after some time the system will lack of too few entities. The system can analyse the trail values in the nodes that are nearby the infected node and maybe there are association between an occupied node and trail values. These questions will be the challenges for the future research in distributed self management of distributed security systems. 6 Applications Currently, the information management is used in the artificial immune system SANA, which protects a network against intrusions [9,11]. Therefore, SANA fa- cilitates lots of small artificial cells performing autonomously the tasks required for network security - the organic computing approach. Common used secu- rity components like antivirus softwares, firewalls, packet filters, and intrusion detection systems complement the system to benefit from their performance. 10 The artificial cell communication enables the collaboration between the different artificial cells where the infrastructure supplies the cells with additional informa- tion. The artificial lymph nodes implement a meeting and response point for a small part of the network and the central nativity and training stations generate and release continuously novel artificial cells including the newest security tech- niques. With the specialised artificial cells is it possible to implement nearly all approaches of network security. The in this article introduced self management organises the cells so that the system is always properly secured and there is no weak point in the network. The information management is more sophisticated implemented where the security components and artificial cells exchange con- tinuously status information in order to adapt the overall system and internal thresholds as well as parameters - implementation of the danger theory [12] and the tunable activation threshold [13] of the immune cells. For the response when an intrusion is found, the components develop a defense strategy and perform this or quarantine the node with informing the administrator for further tasks. Maintenance - updates, extensions, and regular self-checks - are performed by the system using specialised cells where the maintenance is automated and not proper working as well as outdated components are reported to the administra- tor. However, the administrator is able to access and configure all nodes and components of the system through an administration GUI. Infected nodes are identified through regular checks as well as through distributed analysis of data gathered by various security components, i.e. the distributed analysis of network packets through intrusion detection systems and artificial cells [6]. Due tos the usage of common used components, the performance is at least as good as of common used security systems. Due to the dynamic artificial cells is the system hard to predict and to attack, contains no single point of failure, and adapts to the current situation in the network. In addition, a real distributed intru- sion detection system is implemented in all nodes with simplified administration workflows [9]. Furthermore, the notification of low security can be used in nearly all dis- tributed systems where the number of entities can be measured and thereafter modeled using the parameters and functions. The trails can be used in all scenar- ios where a type of entity should visit all nodes regularly but not too frequently. These systems are most distributed systems as the multi-agent systems, the mas- sively distributed systems, complex adaptive systems, and the artificial immune systems. 7 Conclusion This article discusses two information protocols for distributed systems and analyses the performance. The two protocols increase the performance of a dis- tributed system enormously because the entities receive information where their tasks are required. In addition, the required bandwidth is limited because a cen- tralised system is not used. The next steps are to introduce more information protocols and evaluate theoretically how the performance would increase when 11 more bandwidth is invested. Furthermore, the enhancing of the distributed se- curity systems that base on the artificial immune system as archetype is a next step. Acknowledgments The PhD-Project SANA - Security Analysis in iNternet trAffic - is financially supported by the University of Luxembourg. I like to thank Christoph Schommer for helpful discussions and the Ministre Luxembourgeois de l'education et de la recherche for additional financial support. References 1. Bellifemine, F., Poggi, A., Rimassa, G.: JADE - a FIPA-compliant agent frame- work. In: Proceedings of the Practical Applications of Intelligent Agents. (1999) 2. Vargas, P.A., de Castro, L., von Zuben, F.: Artificial immune systems as complex adaptive systems. In: Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS). Volume 1. (2002) 115–123 3. Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection - a review. Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS 2004) (2004) 4. Hilker, M., Schommer, C.: Sana - security analysis in internet traffic through artificial immune systems. Proceedings of the Trustworthy Software Workshop, Saarbruecken, Germany (2006) 5. Hofmeyr, S.A., Forrest, S.: Immunity by design: An artificial immune system. Proceedings of the Genetic and Evolutionary Computation Conference 2 (1999) 1289–1296 6. Hilker, M., Schommer, C.: Agnosco - identification of infected nodes with artificial ant colonies. Proceedings of RASC (2006) 7. Roesch, M.: Snort - lightweight intrusion detection for networks. LISA 13 (1999) 229–238 8. Janeway, C.A., Travers, P., Walport, M., Shlomchik, M.: Immunobiology: the Immune System in Health and Disease. Sixth edn. Garland Publishing (2004) 9. Hilker, M., Schommer, C.: Description of bad-signatures for network intrusion detection. AISW-NetSec 2006 during ACSW 2006, CRPIT 54 (2006) 10. Dorigo, M., Maniezzo, V., Colorni, A.: The Ant System: Optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics 26(1) (1996) 29–41 11. Hilker, M., Schommer, C.: Sana - network protection through artificial immunity. In: Proceedings of the 2nd International Workshop on Theory of Computer Viruses (TCV 2007). (2007) 12. Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link between ais and ids? In: Proceedings of the Second International Conference on Artificial Immune Systems (ICARIS 2003). LNCS 2787, pp. 147-155, Edinburgh, UK (2003) 13. Grossman, Z., Singer, A.: Tuning of activation thresholds explains flexibility in the selection and development of t cells in the thymus. Proceedings of the National Academy of Sciences 93 (1996) 14747–14752 12
1811.01683
1
1811
2018-11-05T13:53:10
Supply Chain Management analysis: a simulation approach of the Value Chain Operations Reference model (VCOR)
[ "cs.MA" ]
The impact of globalization and worldwide competition has forced firms to modify their strategies towards a real time operation with respect to customer's requirements. This behaviour, together with the communication possibilities offered by the actual Information and Communication Technologies, allows the top management to move towards the concept of extended enterprise in which a collaborative link is established among suppliers, commercial partners and customers. When the information flows involve each actor of the chain, from suppliers to the final distribution centers, the extended enterprise becomes a virtual firm, that can be defined as a set of stand-alone operational units that acts to reconfigure themselves as a value chain in order to adapt to the business opportunities given by the market. The present work is intended to verify through a simulation approach the quantitative advantages that can be obtained by the introduction of the Value Chain concept into the Supply Chain Management (SCM). The paper, after a description of the two most known (SCM) methods - SCOR and VCOR - makes a comparison between them by the customer's point of view. In the second part of the work a simulation model has been developed to verify the advantage that the VCOR is able to obtain, validating it on an industrial case study.
cs.MA
cs
Supply Chain Management analysis: a simulation approach of the Value Chain Operations Reference model (VCOR) Yacine Ouzrout * LIESP-Lyon2 Laboratory, Université of Lyon 2, 160 Bd de l'université 69676 Bron Cedex, France, E-mail: [email protected] Phone: +33.478.774.484 *Corresponding author Matteo M. Savino Department of Engineering, University of Sannio, Piazza Roma, 21, 82100, Benevento, Italy, E-mail: [email protected] Abdelaziz Bouras LIESP-Lyon2 Laboratory, Université of Lyon 2, 160 Bd de l'université 69676 Bron Cedex, France E-mail: [email protected] Carlo Di Domenico Hermes Reply S.p.a, Corso Francia, 110, Torino, Italy. E-mail: [email protected] 1. Introduction Scientific literature related on Supply Chain Management (SCM) is rich of publications, but the reality is that there is a lag between practice and theory (Balan, et. al, 2006; Simchi-Levi et al, 2000; Neubert et al, 2004). Mass media and Internet have speeded up the diffusion of new products; at the same time, technical innovation and market severe competition promote rapid obsolescence of existing products and technologies. When a company succeeds in developing a new product category, other competitors may soon emerge. The market originator must endure not only the substantial risk of whether the market would materialize or not, but also the difficulty of recovering major costs, such as research and development and advertisements. Increasingly, the supply chain becomes the mechanism for coping with these problems because it is often inefficient for any single company to produce a whole product (Abdullah et al., 2004; Feller et al, 2006). Hence, modern business is essentially the competition of one supply chain (SC) with another. SC dynamics is the interaction processes of the participants from different departments and companies. A positive aspect of supply chain dynamics is effective collaboration, which may lead to higher performance. A negative aspect is independent decision making, which may create various delays and aggravate forecasting errors (Simatupang and Sridhran, 2002; Abu- Suleiman et al. 2005). This research stresses the interest on the possible quantitative advantages given by the introduction of the Value Chain concept into the SCM through a simulation approach. Discrete event simulation, continuous time-differential equations, discrete time difference models and operational research techniques are some of the commonly used quantitative modelling techniques to evaluate and design supply chains (Lee et al., 2002; Terzi and Cavalieri, 2004). The correct identification of key variables and their interactions, together with determining how the information can be better managed enables the utility of the entire supply chain. In this work we use discrete event formalism to model and study the supply chains. Discrete-event simulation is chosen for its capability to represent physical and information flows along with their respective delays, in an information feedback control type of setting. Our main research interest is to clarify the critical factors for minimizing the negative effects of supply chain dynamics and to gain insight on how to effectively manage them. To achieve these objectives we developed a simulation model to implement the VCOR and to verify the possible advantages that it is able to obtain. 2. The Value Chain management theory A Supply Chain can be defined as a system network that provides raw materials, transforms them into intermediate commodities and/or in finished goods and distributes them to the customers through a delivery system (Christopher et al, 2002). The aim is to produce and distribute the right quantities, to the right locations, at the right time, while reducing costs and maintaining a high level of service. SCM is concerned with smoothness, economically driven operations and maximising value for the end customer through quality delivery. The limitations are however due to the fact that SCM as a concept does not extend far enough to capture customer's future needs and how these get addressed, and furthermore, it does not encompass the post- delivery, post-evaluation and relationship building aspects (Al-Mudimigh et al, 2004). Another important theory can be defined as strategic in the context of SCM, the concept of value chain management. The Value Chain was described and popularized by Michael Porter in his best-seller, Competitive Advantage: Creating and Sustaining Superior Performance (Porter, 1985). Porter defined Value as the amount that buyers are willing to pay for what a firm provides, and he conceived the Value Chain as the combination of generic activities operating within a firm, activities that work together to provide value to customers. Porter linked up the value chains between firms to form what he called a Value System. However, in the present era of greater outsourcing and collaboration, the linkage between multiple firms' value creating processes has more commonly become called as Value Chain. As this name implies, the primary focus in value chains is on the benefits that accrue to customers, the interdependent processes that generate value, and the resulting demand and funds flows that are created. Feller, Shunk, and Callarman (Feller at al. 2006; Jan Olhager et al, 2006) exposed some important considerations about the value concept. First is that value is a subjective experience that is dependent on context. The same product or service has not the same value in different parts of the world or in different situations. Second, value occurs when needs are met through the provision of products, resources, or services. Finally, value is an experience and it flows from the customer. Clemmer (1990) affirms that customer value is layered and has been described by three concentric rings. In the center ring is the product value which is the technical value derived from providing a source of supply. A second ring of service value is provided by the services that surround the product such as personal care and warranty service. The third ring has been called the new service/quality battleground, and was made popular by business thinkers such as Peters and Waterman ("In Search of Excellence"). This third level of value is achieved by providing enhanced service, to "make your customer successful" rather than just satisfied. The huge importance of focusing on the customer has forced the integration of the optimization techniques of the Supply Chain Management, Customer Relationship Management (CRM) and Product Lifecycle Management (PLM), as shown in figure 1. Figure 1 - Integration of PLM, SCM, and CRM from www.process-wizard.com The value chain theory focuses on the management of the product lifecycle (PLM) which is a strategic business approach that helps enterprises to achieve its business goals of reducing costs, improving quality and shortening time to market, contemporarily innovating its products, services, and business operation (CIMdata, 2002). By increasing an enterprise's flexibility to respond quickly to changing market pressures and competitors, the value chain helps companies to: deliver more innovative products and services; § § Reduce costs; § § Shorten time to market while achieving the targeted Return On Improve quality; Investment (ROI); § Establish more collaborative, and improved relationships with their customers and suppliers (Garetti et al, 2005). The value chain management includes also the Customer Relationship Management (CRM) which consists on the creation, the development, the palimony and the optimization of long period relationships more profitable among consumers and firm. The success of CRM is based on the understanding of the consumers' needs and desires, and it fulfils setting such desires to the center of the business, integrating them with the firm's strategy, the people, the technology and the business process (Munari, 2004). 3. Supply Chain and Value Chain Modeling The first general framework for SCM, the Supply Chain Reference Model (SCOR) was developed by the Supply Chain Council (SCOR, 2005); the model is rather general, defining the supply chain standard processes and establishing standard terminology in quite broad terms. SCOR spans customer and market interactions and the physical material transactions. This model can also help manufacturers to carry-out benchmarking against other well-established companies, for that the model proposes some best practices and Key Performance Indicators (KPI). The SCOR-model has been developed to describe the business activities associated with all phases of satisfying a customer's demand; it consists of a plan, source, make and deliver process elements (level 1 of the model) which revolve around the entire supply chain. The main assumption of the model is that by integrating the process elements along the supply chain, companies should become more competitive. But the support functions such as administration, R & D, and customer services are not included (Bolstorff and Rosenbaum, 2003). the European enterprises have realized Nowadays manufacturing in Europe is going on a deep change. The increase of the productivity has concentrated the attention on the approach for the achievement of competitive advantage through efficiency actions and process optimization. Besides, that a complementary kind of initiative is necessary for the product design and engineering processes. It is indispensable, in fact, to keep a better know-how in order to remain competitive and to be able to offer new and advanced products to the market. The introduction of concepts like PLM has become essential to acquire new clients and new market segments, and to adopt concepts of Value Chain Management all over the network. In late 2003 and early 2004 a series of meetings culminated in the development of the first iteration of the Value Chain Operations Reference (VCOR) model. Participants in these meetings came from a global pool of business process knowledge experts many of whom worked for large end-user, consulting or software companies, domain specific not-for-profit organizations, or academia; they created the Value Chain Group: VCG (Value Chain Group, 2005). The VCOR model is able to achieve some benefits to firms summarized as follows: • A standard based approach to define essential collaborations between trading partners. • Agreement on product life cycle objectives and how to achieve them. • Reusable process templates based on best practices. • Integration of existing and new information management systems. • A fast response to changes while maintaining and extending value chain performance. 3.1. The VCOR Framework to their The VCOR model was developed from the perspective of being a value chain framework with the development of Seven Performance Attributes linking the three domains of Product Development, SCM and Customer Chain across the supply networks together. The structure of VCOR model supports and enables companies three critical domains: Product Developments, Supply Network Integration and Customer Success, using one reference model to support the vision of an integrated value chain (Heinzel, 2005). To achieve this goal VCOR uses a "process based, common language" of syntax and semantics while, at the same time, create a base for the successful Service Oriented Architecture Game Plan. The main objective of this model is to increase the performance of the total chain and support the current evolution; for that, it proposes four different modeling layers: integrate Strategic Level: The Top Level of the model includes all the high level processes in Value Chains and is represented through the Process Categories Plan -- Govern -- Execute. The Level is defined to be the Strategic Level of the Model, meaning that this is where high level decisions are made regarding how to gain a competitive advantage for the Value Chain in scope. The VCOR Strategic Level has three Macro-processes: Plan: it balances the current strategic objectives with current asset status and produces decisions on activities to move the organization toward the goals; Govern: decision based process which identifies and enables a value chain by establishing the rules, policies and procedures to control the implementation of Plan and Execute processes within the Value Chain; Execute: it transforms the customer requirements to production processes. The Execute Processes operate within the limits of the Management criteria and to the parameters defined by the Plan Processes. Tactical Level: The second level of the model contains "abstract" processes decomposed from the Strategic Level to implement and fulfill the strategic goals set in the top level of the model hierarchy a set of tactics needs to be developed and realized. The Tactical Level can be described being instituted for "Horizontal Value Chain Process Re-Engineering". The VCOR model processes decomposes from Strategic to the Tactical Level with Plan and Govern, keeping their respective naming in the first part of the process notations on this level as they influence each of the Execution Processes. The figure 2 illustrates the decomposition of the strategic level into component processes. The Market Process has deep impact on the entire chain and for this reason is extended over the diagram. The Plan and Govern processes have the same name (e.g. Plan Research, Govern Develop and so on). To describe these different processes, VCOR defines three main groups: Market, Research & Develop, Acquire, Build & Fulfill, and Sell & Support. Figure 2- VCOR Layers Diagram from EMEA-VCG Operational Level: The third level of the model represents specific processes in the value chain related to actual activities being executed clarifies. On this level focus is usually vertical business process improvements or business process re-engineering as usually it is named. In a value chain perspective this is the level where fine-tuning occurs. 3.2. VCOR vs. SCOR: Metrics and Performances In order to measure the performance of the chain, the Supply Chain Council has introduced five metrics (see table 1) and KPI (Key Performance Indicators) in the first test supply chain reliability, responsiveness, flexibility, costs and efficiency in managing assets (working and fixed capital). For the remaining processes (level two) and elements (level three) there are specific KPI to test the performance of each part of the SC configuration. Moreover, for each process, some best practices are defined to simplify the analysis of the chain. These are reliable points of reference, given by the experience of enterprises leader in their own field, to follow in order to improve the performance without trying unpredictable strategies that could be dangerous. A company cannot be best in all metrics, so it should wisely target its strength and differentiates itself in the market, while ensuring that it stays competitive in the others (Bolstorff and Rosenbaum, 2003; Hausman, 2002) Actually, the most part of companies do not choose to improve all indicators but they focus on some of these, building their strength points. According to the definition of Value Chain Group, a metric is "a quantifiable variable that reflects a specific state of business performance during process execution within a strategic value chain context". In VCOR a metric is characterized by different features: Metric Name, Metric Definition, Priority Dimension, Metric Class & Sub-Class, Formula, Input Requirements, Dimension, Calculation Rules etc. The table 1 describes the definition of the seven dimensions defined in the VCOR model and compares them to the SCOR's model definition. level of the SCOR model to Table 1 SCOR strategic performance metrics vs. VCOR priority dimension SCOR Definition: The performance of the SC in delivering: the correct Delivery/ Reliability product, to the correct place, at the correct time, in the correct condition, packaging and quantity, with the correct documentation, to the correct customer. Metrics: Delivery performance; Fill rates; Perfect order fulfillment. VCOR Description: The ability to deliver the correct product to the correct market and customer on time. Metrics: Deliver Performance; Request Date; Product Release Variance; Forecast Accuracy. SCOR Definition: The velocity at which a SC provides products to customer. Metrics: Order fulfillment lead times. VCOR Description: The cycle time taken to deliver a product or service Responsiveness/ to the customer. Velocity Metrics: Order Fulfillment Lead Time; Product Development Lead Time. SCOR Definition: The agility of a supply chain in responding to Flexibility/ marketplace changes to gain or maintain competitive advantage. Adaptability Metrics: SC response time; Production flexibility. VCOR Description: The capability in responding to market change to gain Costs or maintain competitive advantage. Metrics: Delivery Adaptability; Value Ch. Agility; Ideation Yield. SCOR Definition: The costs associated with operating the SC. Metrics: Cost of goods sold; Total SCM cost; Value-added employee productivity Warranty/return processing costs. VCOR Description: The cost associated with operating a value chain. Metrics: Cost of Quality, Design Cost Ratio; Logistic Cost Ratio; Manufacturing, Sales & Marketing Cost Ratio. SCOR Definition: The effectiveness of an organization in managing assets to Effectiveness / Asset support demand satisfaction (Fixed and working capital). Metrics: Cash-to-cash cycle time; Inventory supply; Asset turns. VCOR Description: The effectiveness of an organization in managing assets of the Value Ch. to support market and customer satisfaction. Metrics: Asset Turnover; Cash Conversion Cycle; Design Realization; Inventory Supply. Metrics: - SCOR Definition: - VCOR Description: The ability to strategically leverage internal & external sources of ideas and introduce them to market through multiple paths. Metrics: Product Innovation Index; R&D Profit Contribution. SCOR Definition: - VCOR Description: The capability to develop positive collaborative Metrics: - Innovation Customer customer relationships. Metrics: Customer Growth Rate &Retention Rate, Market Share. 3.3. VCOR vs. SCOR: Synthesis The two models have been created in order to give a reference point to those companies that applied the principles of SCM and Value Chain Management. The SCOR is an affirmed and reliable model and has preceded the VCOR by few years. For this reason they have some analogies inherent in the structure and differences in their scope. Both models tried to be standards, improved by Supply Chain Council and Value Chain Group respectively, to simplify their correct realization in real cases and facilitate the communication between trading partners. Moreover, they are based on high-level generic process categories to fit better for all types of firms. But the feature that perhaps is the reason of their success is the capability to calculate the level of performance for every single process of the chain in a very simple way and, at the same time, to introduce best practices to facilitate the management of productive processes. It is crucial to found strategic choices on objective data that can be compared with the metrics filed during years of activity or with performance indicators of other companies if possible. Differences between the SCOR and VCOR are that VCOR is an enterprise model using a framework and taxonomy that features governance and the decision making processes at its highest levels with interconnectivity to all Enterprise processes. The interaction of process elements in the supply chain domain are mostly "transactional" as opposed to interaction of Enterprise business process elements involving higher order information processing in the decision making process. A question has arisen: does a company that successfully implements the SCOR model really needs to change framework facing other efforts? The answer is not trivial, but it is possible to state that the paybacks gained with the VCOR can benefit an enterprise enough to precede its own competitors, extending its market. Furthermore, the extension from SCOR to VCOR is not very intricate because VCOR's basic design uses the framework and methodology of a unified General Systems model that can be applied to most organizational type (Feller et al, 2006). Expansion occurs by reaching out into existing vertical domains of SCM, PLM and CRM to integrate their respective business process elements into a unified Value Chain model similar to SCOR. In this sense the VCOR can be considered the natural extension of the SCOR model. In the next sections we will describe a simulation model realized to allow companies to evaluate in advance the possible advantages of the Value Chain implementation. This model includes some of the metrics and KPI presented in the first part of the paper. 4. The simulation of the Value Chain processes In this section we front the problem of the development of a simulation architecture for the implementation of a VCOR model. Nowadays in literature there are few examples of global simulated Supply Chain because it is no easy to model the entire chain and implement it by specific and dedicated software (Lee et al, 2002; Kleijnen, 2005); moreover the number sensitively increases if we consider the examples that apply the SCOR (Boucher et al, 2003, Jain and Leong 2005, Herrmann et al, 2003). This section presents first the advantages of the simulation in comparison to the mathematical models and finally the realization of a generic architecture to simulate the VCOR model. Many researchers tried to solve the production- distribution issues in the form of analytical problems. The objective in this type of method is to minimize the overall production and distribution costs in multi- facility, multi-product and multi-period problems. The algorithms are mainly based on heuristics or on network flow; but it is obvious that the complexity of the problem grows in function of the number of elements in the chain: number of products, resources, constraints... if we also introduce the uncertainty the modelling and the problem solving became prohibitive. In this context of dynamic, stochastic and complex systems it is difficult to analytically model the problem, but the limits of the mathematical analysing can be solved by computer simulation. The benefits in using simulation in Supply Chains can be summarized as follow (Kelton et al, 2004): • Capacity to capture data for analysis: users may model unexpected • • • • events in certain areas and understand the impact of these to the SC It can decrease drastically the risks inherent to changes in planning: users may test several alternatives before making the planning change. Investigating the impact of: innovations within the SC; eliminating an existing infrastructure or adding a new one within the SC; strategic operational changes, such as process, location and use of new facilities, the fusion or the separations of some components of two SC; manufacturing products inside the company; creating new suppliers or subcontracting some processes; Investigating relations between suppliers and other components of the Supply Chains to rationalize the number and size of order lots, using as a basis the total of costs, quality, flexibility and responsibilities; Investigating the opportunities to decrease the varieties of product components and standardize them throughout the Supply Chains. These main reasons have lead us to choose a simulation approach to analyse the SC dynamic and behaviour and to define a simulation model to implement the VCOR processes. The next paragraphs describe the generic supply chain simulation model that we propose; from the configuration to the description of the different blocks in ARENA. 4.1. Model Implementation The objectives of this section are to describe the VCOR model simulation architecture and to illustrate the implementation of its different elements. Since we want to track not only the material flow but also the information and cost flow in order to obtain metrics and performance indicators, we propose to store all the simulation data in a database which leads us to save the parameters and input data for the initialization and the simulation execution. To better explain the application of VCOR to our chain we started from the level 1 of the model, i.e. the Top Level, following a top-down approach. Once defined the Macro-Processes involved in each element of the chain, we choose its configuration and later we depict the level 3 elements implicated in the process. To describe the model we will use the following example (figure 3). Figure 3 - Supply Chain Level 2 Configuration We started from the central element of the chain: only the Firm has a production process that transforms raw materials in finished goods (3 products). For this reason the Firm is the only participant that has a Make process in its configuration. The other members, like Retailer and Suppliers, have only package processes that can be simply included in the Deliver process. For some products the production follows the rule of the Make-to-Stock, whilst for other products a Make-to-Order production is assigned. These considerations are summarized in the figure 3: the processes P1, P2, P3 and P4 represent the development and the establishment of activities over specified time periods that represent a projected appropriation of supply chain resources (materials, production, and delivery) to meet supply chain requirements. One of the most important aims of the VCOR model is to describe and manage information, costs and material flows. In order to achieve this goal the simulation tool is based on the orders management. When any member needs a certain quantity of products it becomes a client and sends an order signal to its predecessor (i.e. the provider) in the chain. An order is characterized by its identifier, quantity of product, product type, timestamps and status. When a client makes an order, it updates the Demand database of its provider. Every time there is a change in the status of the order, the information is updated in the database. This mechanism allows us to exactly know the real position of commodities, monitoring both the material and the information flow. To build our simulation model we used the discrete event oriented ARENA software; the necessary SCOR/VCOR Level 3 elements have been realized in ARENA blocks and then gathered and organized in sub-models in order to set up the different processes. In the following paragraphs we describe, as example, the implementation of different actors of the chain in the model: a. Retailer: the retailer is composed by a Source and a Deliver process with two different configurations: Make-to-Stock and Make-to-Order. An Arena block is implemented with a rule which involves that each request made by the consumer becomes an order of the Retailer to the Firm. In the figure 4 some elements of the Source process are shown. The element called Schedule Product Deliveries S2.1 has the role to check periodically the three inventory levels stored into the database. If the effective level is under a "s" value (chosen by the managers), this module sends an order to the Firm, writing information as the "order id", "client id", "quantity", "product type", etc. in the Firm's Demand database. Figure 4 - Retailer VCOR Source process With the application of VCOR model, the Retailer configuration defines a new process: the Support process which has the objective to solve the Customers problems when a delivered lot is defective because of the transport or a bad installation. The figure 5 illustrates this process. Figure 5 - Retailer VCOR Support process The Manage Incident U2 has the role to register in the Support database a defective order, the related quantity of products returned, the customer identifier and the timestamps. The Resolve Problem U3 resolves the problem writing a new order in the Retailer Demand base with a quantity equal to the number of damaged products. Once the order is delivered the Monitor Experience U7 registers the operation and modifies a variable in the Customer Behaviour model that increments the vote. The Educate Customer U5 simulates a Call Center, it has the important task to decrement the percentage of defective products decrementing the value of a variable in a Customer ARENA module. b. The firm: The Firm has the role to transform raw materials coming from Suppliers into products for the Retailer. Its configuration includes a Source, a Deliver and a Make process. The following figure describes the ARENA representation of the "A5- Receive Order" process Figure 6 -- Firm's Receive Order process The Firm has also four processes derived by PLM and CRM of the Value Chain Management. The Market, Research and Develop processes belong to PLM, while the Sell and the Support to the CRM. With these new processes a company tries to analyze the market and takes consequently strategic decisions, like the restyling of a product or the acquisition of new technologies. Since it is very difficult to reproduce a complex market analysis or a restyling of a product, the ARENA blocks simulate these events in terms of required time and associated costs. The Analyze Market M1 (figure 7) periodically checks the Customer satisfaction level in the Retailer Demand database and, if the vote goes down under a specified threshold, it activates the Architect Solution M4 module. This block finds the product type that has the least number of sales and decides to adapt it. In order to change a product, the Firm needs to modify its production line with the introduction of new technology. Once acquired the new equipment with R3 and R7 modules, Introduce Technology R8 changes the production process in the VCOR Build Product B3 that corresponds to the M2.3 element. Figure 7 - Firm Market, Research, Sell and Develop processes The Develop process materially changes the Bill of Material of the product and it is responsible to launch the product. In fact, the D8 sets the variable "Innovation Factor" in the Customer Behaviour model and, as consequence, the customer's vote increases considerably. The Sell process tries to identify the clients in the market in order to develop relationships and proposals. The Qualify Target S2 classifies the Clients on the basis of their priority and determines which of them can be supplied by the Firm. It calculates the total number of products required by the Clients and finalizes the contracts (S8) that must not exceed the fixed percentage of the dedicated production capacity. 4.2. The Customer Behavior model In the simulation model, the Customers are able to express an opinion, in the form of a vote, which represents the satisfaction level for each single order delivered. This is necessary because it is at the base of the Value Chain philosophy in which the main goal is to give to the market what it needs, obtaining a feedback for the improvements introduced on the product and/or for the introduction of new products. For this reason the VCOR simulation needs a consumer behaviour model. Some models used questionnaires (Chen and Hughes, 2004), some others applied complex neural networks (Wen-Bao, 2007). In our simulation approach we have adopted the Adaptive Learning Model (Hopkins 2006), which consists in a mathematical model which is able to simulate the satisfaction level of the consumer and to pass the data to the corresponding simulation blocks. According to the Adaptive Learning Model two customers generally express their level of satisfaction through a vote for each type of product. This vote decrements its value in exponential way which is coherent if we consider that a product has a life cycle and that at the end it becomes obsolete. The consumer satisfaction can increase if the support service, introduced in the VCOR example, is able to resolve the clients' problems. The factor that can drastically increment the customer satisfaction level is the introduction of a new product as result of a market analysis. This is possible in the mathematical model thanks to an "Innovation Factor" that is enabled when an old product is modified to meet the demand of the market. Our model differs from the Hopkins's one for the following two main aspects: § § the introduction of a forgetting factor α in place of the coefficient δ, in order to model the behaviour of the customer to "forget" the improvement on a product with the time; the input function ui(k), which in the original model expresses the input of the customer, has been modified taking into account the following variables: - The product cost variation Δp: expressed in percentage, according to the market rules. The delay d: expressed in percentage with respect to the delivery lead time of the product. The Quality parameter q: expressed as a ration of conform products over the total product purchased (KPI). - - The adopted consumer behaviour model can be now expressed with Hopkins notation, taking into account our modifications: -=+ ( ) a1 ) 1 × ( ) kx i ×+ a ( )ku i (1) ( kx i Where: × I n s kf )( bx ×+×+×+D×+×+ hfd xi(k) : the vote at instant k of the i customer. α: forgetting factor (0<α<1) ui(k) the user input function In our model ui(k) has the following expression ( ) ku = i Where: s indicates if the last request of support was correctly satisfied or not. ξ takes into account how important is the quality of service. In is a Boolean parameter which indicates if the product delivered is a new one (1) or not (0). It changes its status to one when a new product is introduced in the market and to zero after a first order for this product is delivered. The purpose of the parameter is to increment the customer's vote. (2) ( )k q d p x j ¹ i = yi(k) is the output of the system (i.e. the vote): f(k) is a specific function depending on the vote given at k time. It is based on the specific industrial context and depends essentially on the customer satisfaction detection system adopted by the firm in its Quality Management System. In our application case a measurement system will be adopted with respect to the firm's customer satisfaction requirements. i ( )kx ( ) ky i 5. The case study Our value chain simulation model has been tested on a supply chain related to an agro-food main firm of the southern Italy producing fruit and tomato juices. This firm is involved in a supply chain and uses an Enterprise Resource Planning system (ERP) to integrate the information systems of its different sites. In this case study, we propose different scenarios related to three types of products (figure 8) which represent the 30% of the entire production of the firm and have a market share up to 15%. Figure 8 -The products chosen for the simulation test Here the SCOR we be also used to model and analyze the different processes of the chain. The firm receives fruits, vegetables and chemicals for product preservation from three different suppliers and provides their treatment, packaging and distribution to the retailers. The firm has a set of 10 big retailers that distribute the products to the final customers (supermarkets and small stores). In this study, we have selected only one Retailer with the highest number of customers (7 big supermarkets) and, among the customers, the two customers with the highest value of products sold (2 supermarkets that have a sale rate up to 20%). The supplier has one warehouse, while the firm and the retailer have two warehouses. The described supply chain can be structured as shown in figure 9, where the material flows can be seen too. Figure 9 - Supply Chain structure The Supplier 1 is specialized in the production of only one component (named Raw 1), the Supplier 3 for the Raw 3 component, while the Supplier 2 can supply the other two types of components (Raw 1 and Raw 2) The entire configuration of raw materials distribution necessary for the production of finished goods is given in the following table: Table 2 Production of raw materials by suppliers Production of raw materials Supplier 1 Supplier 2 Supplier 3 Raw 1 Raw 2 Raw 3 X X X X Based on a first analysis we obtained the data related to the demand of the three described products. To do this we have monitored the demand of the two customers during a period of one year, divided in observation periods of one month; the data retrieved are shown in tables 3 for the customer 1 and 2, in which Mi are the observation months. The reported values are in number of boxes for each product. We can see that for the product 1 the demand can be assumed as constant, while it is variable in a seasonal behavior for products 2 and 3. Table 3 Product demand for the Customer # 1 and Customer # 2 Dem. 1 Prod. 1 Prod. 2 Prod. 3 Dem. 2 Prod. 1 Prod. 2 Prod. 3 - - M1 M2 M3 M4 M5 M6 M7 M8 M9 M10 M11 M12 250 260 245 247 255 257 250 251 253 255 250 241 550 659 580 650 770 850 890 790 700 650 590 500 - M1 M2 M3 M4 M5 M6 M7 M8 M9 M10 M11 M12 300 310 312 295 311 320 301 305 313 300 295 297 - 70 165 140 145 250 355 397 410 380 371 280 210 - - - - - - - - - - - - - - - - - - - - . 5.1. SCOR/VCOR model Simulation The validation of the simulation model has been conducted with an experimental campaign, before with SCOR model and then with the extension of the VCOR ARENA modules. This section presents the most important results of the experiments conducted and some comparisons, with the real data of the firm. The unit time of the run is expressed in hours and the run length is two days. The most important parameters of the participant are shown in the table 4, where the numbers in square parenthesis refer respectively to product 1, 2 and 3. Table 4 Participant Retailer Firm Parameters Value used in the simulation Parameter Value Products Inventory Level [1, 2] [0, 0] Rescheduling Frequency Deliver 2 hours 2.5 hours Rescheduling Frequency Source Finished Goods Inventory (FGI) [500, 500, 300] Raw Inventory Level (Kg) [200, 200, 200] Rescheduling Frequency Deliver 2.5 hours Rescheduling Frequency Source Rescheduling Frequency Make Max Daily Production Capacity 3 hours 3 hours 185 Suppliers FGI Inventory Level Rescheduling Frequency Deliver 4 hours Rescheduling Frequency Source 4 hours 500 Figure 10 illustrates the Retailer Delivery Time obtained by the run of the simulations. It is possible to note the peak at the 11th order (18 hours) is caused by the lead time for the replenishment of inventory; the mean time is 5.32 hours. Figure 10 - Retailer Delivery Time The following figure represents how the simulator has calculated the delivery time for the Firm. There are few orders delivered because at the end of the simulation some orders were in Finished Goods Inventory (FGI), "Open" or "In Transit" status. The mean time is rather low, due to the FGI initial stocks. Figure 11 - Firm Delivery Time (mean time: 2.97 hours) We have compared the data obtained with some historical data of the firm, obtaining a satisfactory congruence with the results of the simulation, which difference with real data has never been less than 12% in the worst case. As a further experimental validation of the model, we have noticed that during the entire simulation, the supplier number 2 has never sent an order to its supplier because of the Inventory Level calculated by the simulator which was enough to satisfy the Firm's demand. In fact, a survey conducted on the warehouse holding costs of the supplier number 2 has shown that they are up to the 87% of the total supply chain costs. 5.2. VCOR specifications and Customer Satisfaction Scenario: Simulation Results The VCOR specification has been added through the Market and the Research processes. In this case we have made a previous survey related to the customer satisfaction level with the previous model for the product 1 (the one with the highest numbers of sells). The data have been acquired through the questionnaires of customer satisfaction distributed to the customers during the period in which the orders have been set. Figure 12 shows the results obtained, in which we can see a progressive decreasing of the vote related to the product with the increasing of the number of orders. Figure 12 - Customer Satisfaction trend with SCOR The extension to the VCOR has been made through a particularization of the Customer behavior model presented in section 4.2; in our model the function (2) related to the vote at instant k has a particular expression for the f(k) relation, in order to accomplish the specification of the votes found on the Customer Satisfaction modules used by the firm in its Quality Management System. In this application case the relation ui(k) has the following expression: ( ) ku i (3) ×+×+×+D×+×+ hfd bxa ] ( ) kx i [ ) a1569 ( -× - ( )k in which the notations are the same of equation (2) with the following = × I n x j ¹ i s × p d q additional considerations: • The function f(k) has its values included into the range [0-10], according to the customer satisfaction system of the firm • The pD variation has to be expressed as a percentage of the previous price and the weight b has to be positive • The delay d has to be expressed in percentage with respect to the mean lead time of the product. • The Quality level q has to be expressed in percentage with respect to the mean quality level. The simulation model has been run for the subsequent of the 19 orders. The figure 13 shows the customer satisfaction level in the simulation with VCOR model from the order number 20 to the order number 39, including the Support process in the Retailer and the whole PLM part in the Firm. The simulation has generated a high elevation of the trend after the 20th order due to the introduction in the market of the renewed product (a new taste and nutritional features have been added due to surveys conducted to the customers with and additional survey data base introduced by the CRM module). 10 9 8 7 6 5 4 3 2 1 0 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 Customer Satisf action Tr end Figure 13 -- Customer Satisfaction trends after VCOR simulation As a further validation of the proposed simulation model, a post-sales survey has been conducted on the product for which the simulation has been run. In Figure 14 we can see the real data, coming from the above mentioned Customer Satisfaction questionnaires. We can see that the values and the related trend reflect the simulation analysis with a maximum error of not more than 20% in the worst case. 10 9 8 7 6 5 4 3 2 1 0 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 Cust. Satisf . Tr end Figure 14 -- The results of the survey on customer satisfaction 5.3. Delivery Times Scenario: Simulation Results Another interesting result from the Value Chain simulation is related to the delivery times of the Retailer. In the histogram of figure 15 we report the simulation result of the entire period (from the first to the 37th order). With respect to the SCOR case we have noticed an increasing of the mean delivery time (7.84 hours); this increasing has been investigated inside the firm, finding the main two factors: • With the introduction of the Sell process, the Firm decreases its finished goods inventory level to satisfy the new Customers demand, slowing down the Retailer's orders. • The Support process of the Retailer increases the mean to 2.3 hours; it is due to the support time. Figure 15 - Retailer Delivery Time The Firm's behavior is more complex and for this reason two simulations have been necessary. The first one analyzes the Firm without the value chain part, in which the mean time is 5.36 hours (figure 16), and the second one investigates the whole performance. Figure 16 - Firm Delivery time With the introduction of the Sell process in the Firm, we can notice that in the previous case the firm has satisfied about fifteen orders and now, with the application of CRM part of VCOR, more than thirty. The high increment is mainly addressed to the acquisition of new customers that guarantees fixed financial entrances, to which Retailer's demand must be added. Moreover, the production increases from 296 to almost 500 finished products, stressing the productive cycle to higher level. To sum up, there are some benefits deriving from the adoption of the VCOR model. To better understand the improvements obtained by this choice, some indicators have been calculated to test the performance of the chain: - Stock Rotation Indicator: it shows the sale rapidity of the commodities. It is calculated as: SRI = Sales Profit Meanvalueof the stock in which a big value indicates the capability of the company to use our products. - Stock Mean Time: it indicates the mean time of undelivered materials = or goods. It is calculated as: SMI where Period is the simulation timeline, expressed in hours. Period SRI influence the effective profit. It is calculated as: SPI Sales Profit Costs - = Sales Profit - Sales Profitability Indicator: it gives an idea on how the costs In table 6 the enhancements can be seen; we can notice a huge improvement in all of the Firm's indicators, especially for the SMI for the finished goods and the raw materials inventory. Table 6 Retailer's Performance Indicator Indicator SRI for FGI SMI for FGI SRI for Raw Materials SMI for Raw Materials SPI VCOR 22.4 2.13 hours 1.2 39.8 hours 13% SCOR 12.34 3.88 hours 0.69 68.8 hours 12% This last indicator underlines that with the VCOR a lot of commodity is used (sold or used for the production) in the 45% of the time required with the SCOR simulation. We can also see that the SPI remains almost unchanged. However, if we consider that in the second simulation there are also the Support costs, the fact that the SPI is constant means that the Support costs do not affect much the total costs of the Retailer. 6. Conclusions This paper has discussed the study of the two most known models used to implement the concepts of Supply Chain Management and Value Chain Management, SCOR and VCOR, through a simulation approach. Starting from an analysis of their standard architectures, using a bottom-up approach, and their performance indicators and metrics, a simulation framework has been developed under ARENA. Once implemented the SCOR model the tool was extended to VCOR. The simulation models have been applied into an agro-food firm in which the main experimental results given by the simulation runs have been compared with the real data of the firm. This has been done to assess the model proposed and to verify the difference between the simulated data and the real ones. As confirmed by the results of these simulations, the adoption of VCOR model needs of bigger financial and organizational efforts, but these efforts can be fully repaid by the benefits in terms of quality of service, market extension, competitiveness, flexibility, "quick response", innovation and other features essential for the firms to survive in the global market. Finally, the results of some simulations have been presented, including a comparison of the two models in terms of the main Key Performance Indicators that are crucial for the supply chain analysed. A future work could complete the implementation of the templates to all the processes of VCOR model, extending the flexibility and the reusability of the realized tool. 7. References Abu-Suleiman, A. Boardman, B. and Priest, J.W. (2005) "A framework for an integrated Supply Chain Performance Management System" International Journal of Production Research 43(15) 3287 -- 3296(10). Al-Mudimigh, A.S., Zairi, M. and Ahmed., A.M. (2004) "Extending the concept of supply chain: The effective management of value chains" International Journal of Production Economics, Vol. 87, Issue 3, pp. 309-320. Balan, S. Prem Vrat, Pradeep Kumar (2006) "Assessing the challenges and opportunities of global supply chain management" International Journal of Value Chain Management (IJVCM), Vol.1 n°2, pp.105 -- 116. Bolstorff, P. and Rosenbaum, R. (2003) "Supply Chain Excellence: A Handbook for Dramatic: Improvement Using the SCOR Model" Eds. New York: AMACOM. Boucher, X. Kuhn, H., and Janke, J. (2003) "Integrated Modeling and Simulation of Inter-Organizational Business Processes". MOSIM'03-Toulouse (France). Chen, C.K. Hughes J. (2004) "Using Ordinal Regression Model to Analyze Student Satisfaction Questionnaires" Association for Institutional Research Applications. Vol. 1, May, 26. Christopher, M. and Lee H.L. (2002) Supply Chain Confidence. The Key to Effective Supply Chains Through Improved Visibility and Reliability. White Paper des Stanford Global Supply Chain Management Forum. http://www.stanford.edu. Clemmer, J. (1990) "The Three Rings of Perceived Value." The Canadian Manager. Jun ;15(2):12-15. Feller, A. Shunk, D. and Callarman, T. (2006) "Value Chains Versus Supply Chains". BPT Trends, www.bpttrends.com Garetti, M., Terzi, S., Bertacci, N., Brianza, M. (2005) "Organisational change and knowledge management in PLM Implementation", International Journal of Product Lifecycle Managemement, , Vol. 1, No. 1, pp. 43-51. Hausman, Warren H., (2002) "Supply Chain Performance Metrics, Stanford Global", Supply Chain Management Forum, http://www.stanford.edu. Heinzel, H. (2005) "The value chain operations reference model as a framework to integrate and manage cross-enterprise business processes", PLM'05: international conference on product life cycle management, Eds.Inderscience. Herrmann, J.W., Lin, E., and Pundoor, G. (2003) "Supply Chain Simulation modeling using the Supply Chain Operations Reference Model". Proceedings of DETC'03 Design Engineering Technical Conferences and Computers and Information in Engineering Conference , Chicago, Illinois USA, September 2-6, pp.1-9. Hopkins, E. (2006) "Adaptive Learning Models of Consumer Behavior" Eds. Mimeo. Jain, S. and Leong, S. (2005) "Stress testing a Supply Chain using simulation". Proceedings of the Winter Simulation Conf. ISBN: 07803951902, pp. 8-005. Kelton, W.D., Sadowski, R.P., and Sturrock, D.T.(2004) "Simulation with ARENA" Eds. McGraw-Hill Higher education, ISBN 0072919817. Kleijnen, J.P.C. (2005) "Supply chain simulation tools and techniques: a survey" International Journal of Simulation & Process Modelling, Volume 1, Nos. 1/2. Munari, L. (2004) "Il Customer Relationship Management: un'innovazione di processo." in L'innovazione Finanziaria-Osservatorio Newfin Neubert, G., Ouzrout, Y. & Bouras, A. (2004) Integration and Information Systems within the Supply Chain: A Review. International Journal of Technology Management (IJTM), ISSN0267-5730, Indersciences Publishers, pp. 259-273. Olhager, J. Selldin, E. and Wikner, J. (2006) "Decoupling the value chain" International Journal of Value Chain Management (IJVCM), Vol.1 n°1, pp.19 -- 32. Porter, M., (1985) Competitive Advantage, Creating and Sustaining Superior Performance, The Free Press, New York. SCOR Supply Chain Council "Supply Chain Operations Reference Model SCOR" www.supply-chain.org Simatupang, T.M., and Sridhran R. (2002) "The Collaborative Supply Chain", International Journal of Logistics Management. Simchi-Levi, D., Kaminsky, P., and Simchi-Levi, E. (2000). Designing and managing the supply chain. McGraw-Hill Higher Education. Value Chain Group (2005) "VCOR Quick Reference V1R4" www.value-chain.org, Terzi, S. and Cavalieri, S. (2004). "Simulation in the supply chain context: a survey". Computers in Industry n°53, pp. 3 -- 16. Wen-Bao, L. (2007) "The exploration of customer satisfaction model from a comprehensive perspective" Int. Journal in Expert Systems with Applications Vol. 33, Issue 1, pp. 110-121
1711.09564
2
1711
2017-11-28T04:36:52
AUPCR Maximizing Matchings : Towards a Pragmatic Notion of Optimality for One-Sided Preference Matchings
[ "cs.MA", "cs.DS" ]
We consider the problem of computing a matching in a bipartite graph in the presence of one-sided preferences. There are several well studied notions of optimality which include pareto optimality, rank maximality, fairness and popularity. In this paper, we conduct an in-depth experimental study comparing different notions of optimality based on a variety of metrics like cardinality, number of rank-1 edges, popularity, to name a few. Observing certain shortcomings in the standard notions of optimality, we propose an algorithm which maximizes an alternative metric called the Area under Profile Curve ratio (AUPCR). To the best of our knowledge, the AUPCR metric was used earlier but there is no known algorithm to compute an AUPCR maximizing matching. Finally, we illustrate the superiority of the AUPCR-maximizing matching by comparing its performance against other optimal matchings on synthetic instances modeling real-world data.
cs.MA
cs
AUPCR Maximizing Matchings : Towards a Pragmatic Notion of Optimality for One-Sided Preference Matchings Girish Raguvir J∗, Rahul Ramesh∗, Sachin Sridhar∗, Vignesh Manoharan∗ Department of Computer Science and Engineering Indian Institute of Technology Madras, India 7 1 0 2 v o N 8 2 ] A M . s c [ 2 v 4 6 5 9 0 . 1 1 7 1 : v i X r a Abstract We consider the problem of computing a matching in a bi- partite graph in the presence of one-sided preferences. There are several well studied notions of optimality which include pareto optimality, rank maximality, fairness and popularity. In this paper, we conduct an in-depth experimental study com- paring different notions of optimality based on a variety of metrics like cardinality, number of rank-1 edges, popularity, to name a few. Observing certain shortcomings in the stan- dard notions of optimality, we propose an algorithm which maximizes an alternative metric called the Area under Pro- file Curve ratio (AUPCR). To the best of our knowledge, the AUPCR metric was used earlier but there is no known al- gorithm to compute an AUPCR maximizing matching. Fi- nally, we illustrate the superiority of the AUPCR-maximizing matching by comparing its performance against other optimal matchings on synthetic instances modeling real-world data. Introduction The problem of assigning elements of one set to elements of another set is motivated by important real-world scenarios like assigning students to universities, applicants to jobs and so on. In many of these applications, members of one or both the sets rank each other in an order of preference. The goal is to compute an assignment that is "optimal" with respect to the preferences. In this paper we focus on the one-sided preference list model where members of one set rank a subset of elements in the other set in a linear order (that is, preferences are assumed to be strict). Several notions of optimality like pareto-optimality, rank-maximality, fairness and popularity have been considered in literature (We give formal defini- tions of each of these notions later). For each of the above mentioned notions of optimality, there are efficient algo- rithms studied in the literature to compute the specified op- timal matching. (Abraham et al. 2004) describe an algo- rithm that computes a maximum cardinality pareto-optimal matching. (Abraham et al. 2007) present an algorithm to compute a popular matching while (Irving et al. 2004; Huang et al. 2016) propose algorithms that optimize the head/tail of the matching profile (rank-maximal and fair re- spectively). Maximizing one metric could however result in poor performance on other yardsticks of measure. When ∗All authors contributed equally comparing two matchings, it is difficult to measure the qual- ity of the two matchings using a single scalar value. They can be compared using a variety of metrics like cardinal- ity, number of matched Rank-1 edges or cardinality, none of which can serve as a sole indicator of optimality. Profile based matchings, like Rank-maximal or Fair matchings which optimize for the head or the tail of the pro- file can turn out to be biased under certain circumstances. An alternative is to consider the Area under Profile Curve Ratio metric introduced in (Diebold and Bichler 2017). This met- ric aims to maximize a measure, that is a weighted sum of matched edges, with the weight proportional to its position in the preference list In this work, we first present a comprehensive experimen- tal study of the well-studied notions of optimality and com- pare them using different measures of matching quality. We then describe the AUPCR metric, and propose algorithms to compute an AUPCR maximizing matching, and a maximum cardinality AUPCR maximizing matching. Finally, we empirically evaluate different matching algo- rithms on synthetic graphs generated from generator models specified by (Michail 2011) using various metrics. The gen- erated graphs fall into two categories, one having uniformly random preference lists and the other having highly corre- lated preference lists. Our analysis is inspired by the analysis of (Michail 2011), and we additionally consider a ranking system in which the matchings are ranked based on multi- ple metrics. These rankings are consequently aggregated to obtain a single rank, which we use as a coarse indicator of matching quality. The AUPCR maximizing matching is experimentally shown to have good performance across evaluated metrics on the considered data-sets, and we believe this matching is well suited for practical applications. Preliminaries Consider a set A of applicants and a set P of posts. Every applicant a has preference list over a subset of the posts in P. This list is a linear order (strict list) and is called the pref- erence list of a over P. The problem is readily represented as a bipartite graph with vertices V = A ∪ P and an edge (a, p) is present if p is acceptable to a. Preferences of ap- plicants are encoded by assigning ranks to edges. Each edge (a, p) has a rank i if a considers p as its i-th most preferred post. A matching M ⊆ E is a collection edges such that no two edges share an endpoint. Let A∪P = n and E = m. We now define formally the different notions of optimality. Maximum Cardinality Pareto Optimal Matching A matching M is said to be Pareto-optimal if there is no other matching M(cid:48) such that some applicant is better off in M(cid:48) while no applicant is worse off in M(cid:48) than in M(an ap- plicant is worse of in M if it is matched to an less preferred vertex compared to M(cid:48)) . Maximum cardinality Pareto op- √ timal matchings(POM) can be computed in O(m n) time using the algorithm given by (Abraham et al. 2004). Rank Maximal Matching The notion of rank-maximal matchings was first introduced by Irving under the name of greedy matchings (Irving 2003). A rank-maximal matching is a matching in which the num- ber of rank one edges is maximized, subject to which the number of rank two edges is maximized and so on. An- other way of defining rank-maximal matchings is through their signatures. Given that r is the largest rank given to a choice across all preference lists, we define the signature of a matching M as an r-tuple (x1, x2,··· , xr, xr+1) where, for 1 ≤ i ≤ r, xi represents the number of applicants matched to one of their i-th preferences (xr+1 denotes the number of unmatched applicants). Let (x1, x2,··· , xr, xr+1) and (y1, y2,··· , yr, yr+1) denote the signatures of M and M(cid:48) respectively. We say that M (cid:31) M(cid:48) w.r.t. rank-maximality if there exists an index k such that 1 ≤ k ≤ r and for 1 ≤ i ≤ k, xi = yi and xk > yk. A matching M is rank- maximal if M has the best signature w.r.t. rank-maximality. Through the rest of the paper, we denote this matching as RMM. For the purposes of our experimental evaluation, we implement a simple combinatorial algorithm (Irving et al. 2004) to compute a rank maximal matching. The running time of the algorithm is O(min(C n, n + C) · m). √ Popular Matching To define popularity, we translate preferences of applicants over posts to preferences of applicants over matchings. An applicant a prefers matching M to M(cid:48) if either a is matched in M and unmatched in M(cid:48), or a is matched in both M and M(cid:48) but has better rank in M than in M(cid:48). A matching M is more popular than M(cid:48) if the number of applicants who pre- fer M to M(cid:48) is more than the number of those who prefer M(cid:48) to M. A matching M is popular if there is no matching that is more popular than M. A linear time algorithm to compute a maximum cardinality popular matching for strict prefer- ences is given in (Abraham et al. 2007). The more popular than relation is not transitive, and hence it is possible that a popular matching does not exist. When a popular matching does not exist, one can attempt to obtain the least unpopular matching. We consider the unpopularity factor given in (Mc- Cutchen 2008). An algorithm given in (Huang et al. 2011) finds a popular matching if it exists. Through the rest of the paper, we denote this matching as POPM. Fair Matching Fair matchings can be considered as complementary to rank- maximal matchings. A fair matching is always a maximum cardinality matching, subject to this, it matches the least number of applicants their last preferred post, subject to this, least number of applicants to their second last pre- ferred post and so on. Fair matchings can be conveniently defined using signatures. Let (x1, x2,··· , xr, xr+1) and (y1, y2,··· , yr, yr+1) denote the signatures of two match- ings M and M(cid:48) respectively. We say that M (cid:31) M(cid:48) w.r.t. fairness if there exists a index k, such that 1 ≤ k ≤ r + 1 and for k < i ≤ r + 1, xi = yi, and xk < yk. A matching is fair if it is of maximum cardinality, and subject to that it has the best signature according to the above defined criteria. Recently (Huang et al. 2016) gave a combinatorial algorithm to compute fair matchings. Through the rest of the paper, we denote this matching as FM. AUPCR Maximizing Matching Fair and Rank-maximal matchings are profile based match- ings that are geared towards minimizing the tail or maxi- mizing the head of the profile. However, optimizing for the peripheral portions of a profile may not be necessarily rep- resentative of a good matching in many practical settings. This encouraged us to look into a metric called Area Under Profile Curve Ratio (AUPCR) which, in a sense, seemed to capture the entire signature of a matching. Formulation of AUPCR The Area Under Profile Curve Ratio (AUPCR), introduced under the context of matchings by (Diebold and Bichler 2017) is a measure of second order stochastic dominance of the profile. It is a useful metric that can be used to compare multiple signatures and is very similar in nature to the highly popular Area Under Curve of Receiver Operating Character- istic (Hanley and McNeil 1982). For a matching M of a bipartite graph G(A ∪ P, E) with ni(M ) representing the number of applicants matched to their i'th preference, AUPCR(M) is defined as the ratio of Area Under Profile Curve (AUPC) and Total Area (TA) where TA(M ) = AP (ai, pj) ∈ M : rank(ai, pj) ≤ r (1) AUPC(M ) = P(cid:88) P(cid:88) r=1 = (P − i + 1)ni(M ) Giving us, i=1 AUPCR(M ) = (cid:80)P i=1(P − i + 1)ni(M ) AP (2) (3) One can visualize this quantity by considering Figure 1. For an instance with A = 8, P = 6 and signature of matching M given by (4, 0, 2, 1, 1, 0), the area under the shaded region corresponds to AUPC(M) (= 4+4+6+7+8+8 = 37) while the area of bounding rectangle corresponds to TA(M)(= 8× 6 = 48). With these computed, AUPCR(M) is essentially the ratio of the two and is given by 37 48 ≈ 0.771. Figure 1: AUPCR - Visualization A matching that maximizes this measure can be vaguely seen as a "softer" version of the rank maximal matching: it does not give up matching low ranked edges entirely in order to match a large number of high ranked edges. Based on this we consider two problems: • AUPCR Maximizing Matching - the problem of finding a matching which maximizes the AUPCR metric. We de- note such a matching as AMM. • Max Cardinality AMM - the problem of finding a match- ing with the maximum cardinality among all matchings with maximum AUPCR. We denote such a matching as MC-AMM. In this paper, we formulate algorithms to address the above defined problems and show that the Max Cardinal- ity AUPCR maximizing matching performs favorably on a variety of other standard metrics typically used to compare matchings in practical settings. weight of a matching as w(M ) =(cid:80) Algorithm - AUPCR Maximizing Matching The problem of finding an AUPCR maximizing match- ing can be reduced to the problem of finding a maximum weighted perfect matching. Given a bipartite graph G(A ∪ P, E) and a weight we for each edge e ∈ E, we define the e∈E we. Then, the max- imum weighted perfect matching problem is find a matching M which matches all vertices in A (M is a perfect matching) and maximizes w(M ). Given an bipartite graph G(A ∪ P, E) with edges repre- senting preferences of A, we construct G(cid:48)(A(cid:48) ∪ P(cid:48), E(cid:48)) as follows: 1. A(cid:48) = A1 ∪P and P(cid:48) = P1 ∪ A2 where A1, A2 are copies of A and P1,P2 are copies of P. 2. For each edge e ∈ E of rank i, add edge between corre- sponding vertices of A1 and P1 with weight P − i + 1. Similarly, add an edge between A2 and P2 with the same weight. 3. Add edges with weight 0 from vertices in A1 to their copies in A2. Add similar edges between P1 and P2. We refer to these edges as identity edges. Proof of Correctness Claim. If M is a max weighted perfect matching in G(cid:48), then M restricted to A1 ∪ P1 is a AMM in G. Proof. Let M1 be the matching obtained by restricting M to A1∪P1 and M2 obtained by restricting M to A2∪P2. Since M is a perfect matching, all vertices of G(cid:48) must be matched. So, if a vertex in A1 ∪ P1 is not matched in M1, it must be matched to its copy in A2 ∪ P2 via the identity edge. This means that its copy is also unmatched in M2. So, M1 and M2 match the same set of vertices. Since the identity edges have 0 weight, w(M ) = w(M1) + w(M2) Since M1 and M2 match the same set of vertices, one can copy the edges matched in M1 to A2 ∪ P2. This means that w(M1) = w(M2) and w(M ) = 2w(M1). Maximizing w(M ) is equivalent to maximizing w(M1). (cid:88) e∈M1 we = P − re + 1 (cid:88) P(cid:88) e∈M1 We also have w(M1) = = ni(P − i + 1) = APAUPCR(M1) i=1 Hence, if M is a maximum weight perfect matching in where re is the rank of edge e and ni is the number of edges of M1 with rank i.This means that maximizing w(M1) max- imizes AUPCR(M1). G(cid:48), M1 is a max AUPCR matching in G. Algorithm - Max Cardinality AMM The problem of finding a Max Cardinality AMM can also be reduced to an instance of max weighted perfect match- ing. The reduction is the same as the max AUPCR case, but we add a negative weight of − 1 A+P to the identity edges going from A1 to A2. Proof of Correctness Claim. If M is a max weighted perfect matching in G(cid:48), then M restricted to A1 ∪ P1 is a Max Cardinality AMM in G. Proof. As before, we can prove that w(M1) = w(M2). However, w(M ) = w(M1) + w(M2) + w(I) where I is the set of identity edges from A1 to A2 in M. If M1 leaves kA vertices in A unmatched and kP vertices in P unmatched, then M2 also leaves the same vertices unmatched. So, we have 2(kA + kP ) identity edges in I and hence w(I) = −2 kA + kP A + P Since kA + kP < A + P, we have −2 < w(I) ≤ 0 and 2(w(M1) − 1) < w(M ) ≤ 2w(M1) Let M(cid:48) be a Max AUPCR matching extended to G(cid:48) and M(cid:48) be its restriction to A1 ∪ P1. Since w(M(cid:48)) ≤ w(M ) 1 2(w(M(cid:48) 1) − 1) < 2w(M1) 1) − w(M1) < 1 ⇒w(M(cid:48) ⇒APAUPCR(M(cid:48) ⇒AUPCR(M(cid:48) 1) − APAUPCR(M1) < 1 1) − AUPCR(M1) < 1 AP From the definition of AUPCR, we can see that if two match- ings have different AUPCR, then the difference is ≥ 1AP. So, M(cid:48) 1 and M1 have the same AUPCR, which means that M1 is an AUPCR maximizing matching in G. The cardinality of M1 is M1 = A − kA = P − kP. Writing w(M ) in terms of M1, w(M ) = 2w(M1) − A + P − 2M1 A + P All AUPCR maximizing matchings will have the same w(M1), which means that maximizing w(M ) maximizes M1. So, M1 is a maximum cardinality AUPCR maximiz- ing matching in G. √ The time complexity of the algorithm to find maximum weighted matching presented is O(m n log n) (Duan and Su 2012). Since both our algorithms construct a graph with 2n vertices and m + n2 edges and find a max weighted matching, the time complexity would be O(n2√ n log n). Algorithm Running Time √ O(m √ POM (Abraham et al. 2004) n) O(min(C √ RMM (Irving et al. 2004) n, n + C)m) O(Cm √ FM (Huang et al. 2016) n log n) O(m POPM (Huang et al. 2011) AMM, MC-AMM (Our work) O(n2√ n) n log n) Table 1: C is the maximum rank of any edge in the matching, n = A + P and m = E Experiments ing. Evaluation Metrics The matchings obtained from each algorithm are evaluated with respect to the following metrics. • Cardinality: The number of edges present in the match- • Unpopularity measure: The unpopularity measure u(M, M(cid:48)) measures how far away a matching M is from a popular(least unpopular) matching M(cid:48). Let p(M1, M2) be the number of applicants that prefer M1 over M2. Then u(M, M(cid:48)) for matching M is defined as the ratio of p(M(cid:48), M ) − p(M, M(cid:48)) to the total number of applicants. • Rank 1: The number of matched rank 1 edges • AUPCR: The AUPCR metric is second order stochastic dominance of the profile as defined in Equation 3. • Ranks less than half the preference list size (RHPL): This counts the number of applicants who have been matched to a post with a rank better than or equal to half the length of their preference list. • Average rank: For a matching M, this is the average rank of all matched edges. Although this is similar to the AUPCR metric, the average rank is computed only over the matched edges while AUPCR accounts for unmatched edges. • Worst rank: For a matching M, this is the highest (worst) • Time: The time taken to find the matching. This is imple- mentation dependent, and the algorithms used have been mentioned earlier along with their time complexities. rank among all matched edges in M. Instances For our experiments, we consider two structured instance generators, namely: Highly Correlated and Uniform Ran- dom. These generators are similar in nature to (Michail 2011), but we consider only instances with strict prefer- ence lists. Though all the algorithms described above, ex- cept Maximum Cardinality Pareto Optimal, can also handle instances with ties, we went with this choice to have a set of instances upon which all the algorithms could be compared and analyzed. If one thinks about it, this choice is not too restrictive as in practical scenarios preference lists are often strict and devoid of ties. Uniform Random (UNI) Similar to HC, UNI instances are also parameterized by a density d with 0 ≤ d ≤ 1. Every applicant has a preference list size of l = (cid:98)np · d(cid:99). These preference lists are chosen uniformly at random from the set of permutations of l posts. Let an applicant a's adjacency list be (p1, p2, ..., pl). Then p1 is ranked 1 by a, p2 is ranked 2, and so on. Unlike HC, preference list length is identical across all applicants. Highly Correlated (HC) These instances are generated based on a global preference ordering(say P ) for the set of posts; one that all the applicants agree upon. A HC instance is parameterized by a density d with 0 ≤ d ≤ 1. For every vertex pair (u, v) with u ∈ A, v ∈ P, an edge (u, v) is added with a probability d. Once the graph has been constructed, the applicants rank the posts as per the global preference list: the best post, as per P, an applicant is connected to is assigned rank 1, and so on. Experiment Setup The number of applicants are equal to the number of posts in any graph and is varied from 50 to 900 in steps of 50. Or- thogonally, the density parameter d for HC and UNI is varied from 0.02 to 0.20 in steps 0.02. The reason for this choice of range is that real world datasets are not very dense in nature . Each instance is averaged over 50 random seeds. There ex- ists one more level of averaging across different density(d) values to get one value for each metric for each problem size(number of applicants). The variant of Max-AUPCR, that does not not enforce maximum cardinality is used. Surprisingly, this still yields (a) AUPCR (b) Avg Rank (c) Popularity (d) Rank 1 Figure 2: Uniform Random (a) AUPCR (b) Avg Rank (c) Popularity (d) Rank 1 Figure 3: Highly Correlated a max-cardinality matching without exception. For POPM, in cases where popular matchings don't exist, the least un- popular matching is utilized. The code was executed using the Amazon web services(AWS) based EC2 service on a t2.micro instance(1 GB Ram, 1 CPU, Intel Xeon processor). Experimental Results Comparing matchings based on rank means POM RMM POPM FM AMM 1.00 Card. Unpop. 5.00 Rank 1 3.80 AUPCR 3.81 RHPL 4.28 Avg Rank 4.98 Worst Rank 4.66 2.94 2.00 1.00 4.85 2.89 2.58 3.27 2.00 1.00 1.00 3.28 2.58 3.81 3.39 1.00 1.00 3.99 3.01 3.18 2.00 1.99 1.00 1.26 1.14 2.34 1.22 1.00 1.94 Rank Mean 3.93 2.79 2.44 2.11 1.62 Table 2: Rank means of algorithms on metrics for UNI For this analysis, we consider a set of the evaluation met- rics which we believe characterizes preference matchings in general. For a given metric and graph instance, we rank the algorithms in terms of performance with the best one getting a rank of 1 and worst one getting a rank of 5. We then aver- age this rank across all instances and this value corresponds POM RMM POPM FM AMM Card. 1.00 Unpop. 5.00 Rank 1 4.93 AUPCR 3.25 RHPL 4.09 Avg Rank 5.00 Worst Rank 3.66 2.89 3.07 1.00 4.84 1.96 2.18 4.73 2.11 1.00 1.59 3.92 3.02 3.53 3.42 1.00 1.00 3.94 2.00 2.99 3.96 2.00 1.00 4.75 1.11 3.20 1.09 1.01 1.99 Rank Mean 3.84 2.95 2.66 2.69 1.73 Table 3: Rank means of algorithms on metrics for HC to an entry in Table 2. The rank mean is computed by tak- ing the average of the entries along the column. This value is intended to serve as a measure of overall performance. As seen from the table, each chosen metric has a sub- set of the algorithms performing best. It is however impor- tant to note that AMM performs competitively in almost all metrics. This observation is also qualitatively supported from the fact that the rank mean attained by AMM is lowest among all algorithms for both UNI and HC instances. This empirically shows that AMM is able to achieve a much de- sired balance, making it a very compelling choice for many practical preference matching problems. Comparing the Matchings on different metrics Some interesting observations for some metrics are as fol- lows : • Cardinality : As expected, POM and FM have the largest cardinality since they compute maximum cardinal- ity matchings. However, it was observed that AMM with- out exception returned a maximum cardinality matching. While this may not universally true(as proved in conse- quent section) this is a useful property in practice • RHPL : The RHPL is one metric that no matching in par- ticular optimizes for. It is peculiar to note that AUPCR maximizes this metric indicating that it is indeed a more general notion of optimality. • Rank 1 : It was observed that both popular and rank max- imal matchings have similar if not same number of rank 1 edges. While the head of the signature is maximized, it is observed that both these matchings display poor perfor- mances on metrics that account for the entirety or the tail of the signature. • Time : Dictated by the computational time complexities of the respective algorithms, the times were vastly differ- ent for FM and AMM compared to the other three match- ings. In graphs with 900 vertices(in each partition), the FM took 512.45 seconds,AMM executed in 204.78 sec- onds while POP and PM were executed in less than 5 sec- onds. Is an AMM always a maximum cardinality matching? An AMM need not always be a maximum cardinality match- ing. Consider the instance with A = {a1, a2, a3, a4}, P = {b1, b2, b3, b4} and the preferences given by a1 : (b1, 1) a2 : (b1, 1), (b2, 2) a3 : (b2, 1), (b1, 2), (b3, 3) a4 : (b3, 1), (b1, 2), (b4, 3) As shown in Figure 4 and Figure 5, for this instance, AMM has a cardinality of 3 while a maximum cardinality matching has a cardinality of 4. Figure 4: AUPCR Maximizing Matching Understanding AMM The strongly positive empirical performance of AMM, in various metrics of importance as shown above, leads us to ask some interesting questions. Is an AMM Pareto optimal? Yes, AMM is a Pareto optimal matching. Theorem. AUPCR maximizing matching is Pareto optimal. Proof. Assume to the contrary that an AUPCR maximizing matching M is not Pareto optimal. This means there exists a matching M(cid:48) where every applicant in M(cid:48) is at least as well off as in M and at least one applicant in M(cid:48) is better off than M. Consider a vertex v ∈ A. Let rM (v) be the rank of the post that v is matched to (rM (v) = P + 1 if v is unmatched), and rM(cid:48)(v) be defined analogously. AU P CR(M(cid:48)) − AU P CR(M ) = ((P − rM(cid:48)(v) + 1) − (P − rM (v) + 1)) (rM(cid:48)(v) − rM (v)) (cid:88) (cid:88) v∈A = v∈A > 0 The last inequality follows from the fact that every term of the summation is non negative and at least one term is posi- tive by our assumption that M is not Pareto optimal. Since AUPCR(M(cid:48)) - AUPCR(M) > 0, M is not an AUCPR maximizing matching, a contradiction, and so M must be Pareto optimal. Figure 5: Maximum Cardinality Matching Do all AMMs have the same cardinality? All AMMs need not have the same cardinality. Consider the instance with A = {a1, ...a6} and P = {b1, ...b6} and the preferences given by a1 : (b6, 1), (b3, 2), (b1, 3) a2 : (b2, 1), (b3, 2), (b1, 3) a3 : (b4, 1), (b5, 2), (b2, 3) a4 : (b1, 1), (b4, 2), (b6, 3) a5 : (b5, 1), (b2, 2), (b1, 3) a6 : (b4, 1), (b2, 2), (b5, 3) As shown in Figure 6 and Figure 7, both are AUPCR max- imizing matchings, with an AUPCR of 0.833, but they have different cardinalities. This example also shows that multi- ple AMMs can exist for a given instance. Figure 6: An AMM with M = 5 Figure 8: An AMM with matching with signature (3, 3, 0, 0, 1) Figure 7: An AMM with M = 6 Is an AMM always more "rank maximal" than a FM? An AMM matching need not be more rank-maximal than the fair matching. Consider the instance with A = {a1, a2, a3, a4, a5, a6, a7}, P = {b1, b2, b3, b4, b5, b6, b7} and the preferences given by a1 : (b1, 1) a2 : (b2, 1) a3 : (b3, 1), (b4, 2), a4 : (b1, 1), (b5, 2), (b4, 3) a5 : (b1, 1), (b6, 2), (b2, 3), (b5, 4) a6 : (b1, 1), (b2, 2), (b7, 3), (b6, 4), (b3, 5) a7 : (b7, 1) An AMM matching for the above graph is as show in Figure 8 and it's signature is given by (3, 3, 0, 0, 1). One can easily see that the FM shown in Figure 9 is more rank-maximal with a signature (4, 0, 1, 2, 0). Figure 9: A Fair matching with signature (4, 0, 1, 2, 0) Conclusion In this work, we introduce the notion of an AUPCR maxi- mizing matching. We describe two variants with one max- imizing the AUPCR, and the other maximizing the cardi- nality subject to maximizing the AUPCR. We empirically evaluate our algorithm on standard synthetically generated datasets and highlight that AUPCR maximizing matching achieves this much needed middle-ground with respect to the different notions of optimality. The overall performance of the AUPCR matching is superior in comparison to other matchings when all metrics are cumulatively used for com- parison. Extending the AUPCR matching and finding algo- rithms with reduced time complexity is left as future work. J.; References J.; Cechl´arov´a, K.; [Abraham et al. 2004] Abraham, D. Manlove, D. F.; and Mehlhorn, K. 2004. Pareto optimality in house allocation problems. In International Symposium on Algorithms and Computation, 3–15. Springer. [Abraham et al. 2007] Abraham, D. Irving, R. W.; Kavitha, T.; and Mehlhorn, K. 2007. Popular matchings. SIAM Journal on Computing 37(4):1030–1045. [Diebold and Bichler 2017] Diebold, F., and Bichler, M. 2017. Matching with indifferences: A comparison of algo- rithms in the context of course allocation. European Journal of Operational Research 260(1):268–282. [Duan and Su 2012] Duan, R., and Su, H.-H. 2012. A scaling algorithm for maximum weight matching in bipartite graphs. In Proceedings of the twenty-third annual ACM-SIAM sym- posium on Discrete Algorithms, 1413–1424. SIAM. [Hanley and McNeil 1982] Hanley, J. A., and McNeil, B. J. 1982. The meaning and use of the area under a receiver operating characteristic (roc) curve. Radiology 143(1):29– 36. [Huang et al. 2011] Huang, C.-C.; Kavitha, T.; Michail, D.; and Nasre, M. 2011. Bounded unpopularity matchings. Al- gorithmica 61(3):738–757. [Huang et al. 2016] Huang, C.-C.; Kavitha, T.; Mehlhorn, K.; and Michail, D. 2016. Fair matchings and related prob- lems. Algorithmica 74(3):1184–1203. [Irving et al. 2004] Irving, R. W.; Kavitha, T.; Mehlhorn, K.; Michail, D.; and Paluch, K. 2004. Rank-maximal match- In Proceedings of the fifteenth annual ACM-SIAM ings. symposium on Discrete algorithms, 68–75. Society for In- dustrial and Applied Mathematics. [Irving 2003] Irving, R. W. 2003. Greedy matchings. Tech- nical R eport Tr-2003-136, University of G lasgow. [McCutchen 2008] McCutchen, R. The least- unpopularity-factor and least-unpopularity-margin criteria for matching problems with one-sided preferences. LATIN 2008: Theoretical Informatics 593–604. [Michail 2011] Michail, D. 2011. An experimental compari- son of single-sided preference matching algorithms. Journal of Experimental Algorithmics (JEA) 16:1–4. 2008.
1912.05362
1
1912
2019-12-11T14:43:22
Jason-RS, a Collaboration between Agents and an IoT Platform
[ "cs.MA", "cs.CY" ]
In this article we start from the observation that REST services are the most used as tools of interoperability and orchestration in the Internet of Things (IoT). But REST does not make it possible to inject artificial intelligence into connected objects, ie it cannot allow autonomy and decision-making by the objects themselves. To define an intelligence to a connected object, one can use a Beleive Desire Intention agent (BDI an intelligent agent that adopts human behavior) such as Jason Agentspeak. But Jason AgentSpeak does not guarantee orchestration or choreography between connected objects. There are platforms for service orchestration and choreography in IoT, still the interconnection with artificial intelligence needs to be built. In this article, we propose a new approach called Jason-RS. It is a result of pairing Jason BDI agent with the web service technologies to exploit the agent capacity as a service, Jason-RS turn in Java SE and it does not need any middleware. The architecture that we propose allows to create the link between Artificial Intelligence and Services choreography to reduce human intervention in the service choreography. In order to validate the proposed approach, we have interconnected the Iot BeC 3 platform and the REST agent (Jason-RS). The decision-making faculty offered by Jason-RS is derived from the information sent by the objects according to the different methods of REST (GET, POST, PUT, and DELETE) that Jason-RS offers. As a result, the objects feed the inter-agent collaborations and decision-making inside the agent. Finally, we show that Jason-RS allows the Web of Objects to power complex systems such as an artificial intelligence responsible for processing data. This performance is promising.
cs.MA
cs
Jason-RS, a Collaboration between Agents and an IoT Platform Hantanirina Felixie RAFALIMANANA1,Jean Luc RAZAFINDRAMINTSA1, Syl- vain CHERRIER², Thomas MAHATODY1, Laurent GEORGE2, Victor MANANTSOA1 1 Laboratory for Mathematical and Computer Applied to the Development Systems, University 2 Université Paris-Est, Institut Gaspard Monge (LIGM),77454 Marne-la-Vallée Cedex 2 of Fianarantsoa, Madagascar [email protected] 1 [email protected] [email protected] [email protected] [email protected] [email protected] Abstract. In this article we start from the observation that REST services are the most used as tools of interoperability and orchestration in the Internet of Things (IoT). But REST does not make it possible to inject artificial intelligence into connected objects, ie it cannot allow autonomy and decision-making by the ob- jects themselves. To define an intelligence to a connected object, one can use a Beleive Desire Intention agent (BDI an intelligent agent that adopts human be- havior) such as Jason Agentspeak. But Jason AgentSpeak does not guarantee or- chestration or choreography between connected objects. There are platforms for service orchestration and choreography in IoT, still the interconnection with ar- tificial intelligence needs to be built. In this article, we propose a new approach called Jason-RS. It is a result of pairing Jason BDI agent with the web service technologies to exploit the agent capacity as a service, Jason-RS turn in Java SE and it does not need any middleware. The architecture that we propose allows to create the link between Artificial Intelligence and Services choreography to re- duce human intervention in the service choreography. In order to validate the proposed approach, we have interconnected the Iot BeC3 platform and the REST agent (Jason-RS). The decision-making faculty offered by Jason-RS is derived from the information sent by the objects according to the different methods of REST (GET, POST, PUT, and DELETE) that Jason-RS offers. As a result, the objects feed the inter-agent collaborations and decision-making inside the agent. Finally, we show that Jason-RS allows the Web of Objects to power complex systems such as an artificial intelligence responsible for processing data. This performance is promising. Keywords: BDI Agent, BeC3, Internet of Thing, Jason. 2 1 Introduction The tendency towards the Web of Object (WoO) does not cease to increase from time to time. Given the number of objects to facilitate the daily life, the number of possible interactions and the applications that one can imagine become more powerful and rich. But what are the ways to make these application in a generic way? The object web orientation is considered as a great resource not only for managing objects [1] but also for questions of flexibility of exchanges. In the Web of Object (WoO) one is rather directed towards the use of Web Service [1]. We note that the most used Web Service type is REST1 [2] [1] [3]. REST (Repre- sentational State Transfer) or RESTful is an architecture style for building applications (Web, Intranet, Web Service). It is a set of conventions, rules and good practices to respect and not a technology in its own right. Not only REST is stateless [4] (meaning that the service consumer does not have to store information about the way he is using the service); it is design to reduce the coupling between software pieces. In the Iot, REST may allow reconfiguration of the object, it reuse in a different application for a multiplatform application, REST service structure is easy to describe. REST allows machine to machine communication and is simplier to do than SOAP. The communi- cation is done through the HTTP protocol. Nevertheless the possibility of using the resource via the web given by the REST, it still lacks intelligent data processing. Our contribution aim to add a complex data processing of the object web. We then opt for the reuse of our search fruit in [5] which we call Jason-RS or Jason-Rest for more pre- cision. Jason-RS gives the REST Web Service ability to the BDI agent Service [5]. Jason is a multi-agent platform based on the Agentspeak-L language [6] [7]. It is a platform for BDI agent, that is to say goal-oriented software agent, it is a smart agent. We have to look at the choice of the BDI agent because it is close to human behavior. [8] [9]. So the connexion of the latter with the REST Web Service allows him to publish his ca- pacity as a Web Service. The processing of a complex action can be done inside Jason (prediction, composition of services, constraint logic programming) and could be pub- lished as a Web Service. Jason-RS can serve as an intelligent treatment center. We focus in the collaboration between agent and Iot platform cause connected object had no intelligence, designed differently, so with this collaboration we can open in the intelligence of Iot with a sensor less, little human intervention. In our approach, we collect the information from the connected object and by Jason-RS we delegate the intelligent agent works. All change in the object behavior is sent to the agent BDI (as a perception) in order to provide a decision or to change the agent comportment. Through this perception that the agent can decide and delegate a task to agent or service chore- ography to object. 1 https://www.supinfo.com/articles/single/5642-qu-est-ce-qu-une-api-rest-restful 3 The rest of this article is organized as follows: Section 2 will discuss the related work of our work. Section 3 describes in general the architecture of our contribution. In sec- tion 4 we will evaluate our work through an architecture. In section 5 we discuss a discussion and open challenge. We will conclude this article with a conclusion (section 6) 2 Related work In this article we propose a new form of Web Service that the WoO can use. The use of REST in WoO is not an innovative work as researchers have already done research for the implementation of the latter to allow connected objects to trade [10] [11]. The In- ternet of Things is a system of physical objects that can be discovered, monitored, con- trolled or interact with electronic devices that communicate on various network inter- faces and can potentially be connected to the wider Internet. The webs of object is a concept say recent in computing that offers a future with which object of the daily life can integrate into the web [12]. The Web of Object is considered as a subset of the Internet of Things. WoO applies to standards and software infrastructures such as REST, HTTP and URIs to create applications and services that combine and interact with a variety of network devices. The key point of the WoO is that its implementation does not involve the reinvention of the means of communication given that they use the existing standards. It also gives an easy access to a wide popu- lation of programmer that used to handle such an architecture. It facilitates the integra- tion of the IoT in the internet. It is also a solution that can open the connection of the Industry 4.0 [13]. View the exponential increase of the connected object, to reduce the cost, the re- quired performance and to facilitate communication in the object internet, the W3C recently launched the working group on the Web of Objects. They aim to fight the fragmentation of IoT. They developed the initial standards for the Web of Objects [14]. To facilitate service choreography for Iot Cherrier describes in his thesis a new ap- proach based on a platform to standardize the interoperability of heterogeneous objects [15]. Castellani and Al focused on the implementation of both CoAP and EXI technology for communication between objects by adopting the REST approach [16]. They imple- mented the CoAP protocol to enable communication between distributed connected objects. Then they also implemented the EXI library for compressing XML data into binary. In the paper [2], they discuss how to create an event SOA. They found a new ap- proach for coordinating IoT's services with the resource service. They named EDSOA the result of their research. It is an asynchronous SOA and responsive it can be consid- ered as an event based service. We have inspired by this approach for the technical aspect of Jason-RS. The Web of Object is used in almost any IoT field even in the field of health. On what [17] proposed a new instance of cloud server and set up data collection services 4 on the heterogeneous devices they use. This aims to improve online health service by properly implementing the architectural web object principle for remote control. Based on WoO, [4] describes the object-based web architecture that adopts the prin- ciple of Resource Oriented Architecture (ROA), hence the basis of RESTful. They im- plemented a smart gateway for smart meters. This allows the connected object manage- ment servers to keep track of the status and movements of the objects.[2] the HTTP protocol is used to facilitate access to the service. The answer emitted is in JSON for- mat. The architecture proposed by [4] allows developers to use web programming lan- guages such as (HTML, Python,...). All of the research cited above are interesting from the point of view of exposure and communication capacity in the Internet of Things. Each with its strong point in communication and interconnection in the world of IoT. They all almost used the REST Web Service. But for us, a simple service is not enough not only to bathe the connected objects in the artificial intelligence but also to treat in intelligent way the data captured at the level of the objects. This treatment helps automatic decision-making thanks to the intelligent BDI agent that has the same reasoning mode as humans. We focus our research on the intelligent Web Service, that is, a Web Service associated with artificial intelligence in order to reduce human intervention to the orchestration of services in connected objects and decision-making. We have exploited here our previous research work, Jason-RS. An intelligent Web Service with BDI agents that perform the resolu- tion and automation of certain tasks thanks to their ability to cooperate and exchange using the AgenSpeak (L) agent language. These agents may then exhibit functionality as a Web Rest Service. Jason-RS has the methods used in REST (GET, PUT, POST, and DELETE) to ensure the dialog with heterogeneous clients. 3 Proposed Architecture 3.1 General architecture In this section we discuss the general architecture of our approach. As we are in the world of the IoT there is a mean of communication: the network. There are many types of networks today for the connectivity of objects such as wifi, Bluetooth for common devices, LoraWAN for IoT devices using long distance communication, and ZigBee, 6LowPan, EnOcean, Zwave for short range communication devices, etc. As connected objects do not have enough memory space and very limited energy to feed themselves permanently so it is important to outsource most of its function. Although the design of its objects is different (ie the objects are heterogeneous), a standardization platform is important to allow inter-object choreography. Taking into account all these parameters we have our control center server constituted by the Jason-RS server and the IoT server illustrated by Fig. 1. Generally the IoT server is a centralized platform of (Cloud, big data) whether it is an IoT server that administers the objects. Jason plays a complex problem solver role as well as the complex system such as optimization ... The autonomous and goal-oriented capability through the BDI agent that it implements allows it to perform a task reasonably. This capability is now ex- ploitable through a distributed component as a service [5] through Jason-RS. Then the 5 objects can use it not only to send the sensor data but also to initiate a decision-making process at the agent level. Communication between the IoT and the web is done through the HTTP protocol. With Jason-RS we can use all the existing methods of the REST and most importantly there is an interaction with the agent. As a result we can send data to the central control servers via the POST method. We can also retrieve the data or decision made by the GET method. JASON-RS recognizes directly the task that will send back to the agent. At the agent level as soon as the service is called by the objects or other platform, the agent reacts and changes state in relation to the perception it receives from it envi- ronment. Fig. 1. General architecture of the JASON-RS implementation in the Web of Object We have already studied in our article [5] the publication of Jason's BDI agent ca- pability as a Web Service. We have proposed an approach allows deploying and run- ning Web Services (REST and SOAP) pairs with a Jason BDI agent in java SE envi- ronment. We didn't use a modern Web-App server or application server, and we didn't developed a different middleware cause it requires a lot of time. Deploying an agent inside a server is a tedious task. Then in our strategy, we reused the existing Java fram- works called Non-Blocking Input Output. A small illustration for brightening the archi- tecture is shown in Fig.2. 6 Fig. 2. General architecture of the JASON-RS micro-service [5] Jason-RS offers an opportunity to exploit the world-class logic, which is embedded in Jason. It can associate them with other elements or heterogeneous application. When we can manipulate first-order logic, we can imagine a kind of possibility of complex problem solving as well as the common problem in artificial intelligence. What is in- teresting here is that the reasoning mode of Jason agent is near the human reasoning mode to achieve a goal. Jason-RS aims to outsource the capacity present in Jason as a service. This initial Jason-RS that we have exploited with the collaboration with the Iot plat- form to intelligently process the data received from the connected object. By exploiting the horn clause and the first-order logic included in Jason we will use this ability to decide the action of objects. Then we take into account the behavior of the objects as perception for the agents. To validate our approach we tested the interoperability of Jason-RS and heterogene- ous objects choreographed with BeC3. 3.2 Application of the architecture with a python object and BeC3 Scenario. To illustrate and motivate our approach, we introduce a concrete application using the following scenario. We take the example of the disposal of household waste in our paper [5]. Waste disposal agents have waste disposal costs that vary according to time constraints, people, distances traveled and evacuation loads. A decision-maker who gives these opinions to optimize the evacuation of waste thanks to the information 7 that the evacuator agents gives him. Information of each of its agents could be changed thanks to the perception emitted by different connected objects. The Fig. 3 illustrates the application of this scenario. We used BeC3 for the service Mashup. BeC3 is a com- poser who allows a user to choreograph heterogeneous objects. In our experimentation we have created sensor objects choreographed in BeC3 with other objects. This sensor sends the data captured via Jason-RS in POST for the agents to change the perception of the Jason agent (receiver agent). A decision-maker analyzes the present data and the cost of performing the tasks for each of his agents in order to decide which one is du- rable, and which one can perform a task at lower cost. The sensor is controlled by the Python version of service compatible with BeC3. When the service is launched, it can send a POST request to BeC3 to identify itself and then another POST request to set up its feature handled by the device. Any mashup designed by a user can then be assured by a communication the service on each object. The de- cision made by the agent could be consumed via a GET request to the Jason-RS. Fig. 3. Application interaction between object choreography and Jason-RS 4 Result and discussion We tested this approach in two different objects: a python object, a mobile phone. We used Jason-RS to communicate the BeC3 platform with choreographed objects and BDI agents who take the place of a decision maker instead of a human being (such as it is originally designed in BeC3. 8 There is a demo script (in Python) APIDemo.py in Pylite project (resources dir). We have used xmpp2 server for login, its specificity is the presence. So as we describe in the section 3 we must log in BeC3 in order to create a virtual programmable object: POST /login with content { "username": {xmpp login}, "password": {xmpp password}, "service": {xmpp service (for example im.bec3.com)} } After login, create a BeC3 object with the following JSON format: POST /feature with content { "name": "tot2", "path" : "truc/bidul21", "type": "switch", "details": "ooo", "widget": "none", "mqtt": false } Available types are accelerometer, button, buzzer, gauge, gps, These object can be delete, update. DELETE /feature/{id} PUT /feature/{id} { "data": {data (dependent of object type} } One object is associate with one BDI agent. To connect BeC3 an URL is available from Jason-RS. To change the agent BDI perception a POST request is send by this url format: POST jason_rs_based_url/object_agent/ { "data":value_from_python_object } To receive a decision from BDI agent, Jason-RS provide an URL that we can con- sume: GET jason_rs_based_url/agent_decider/decision 2 https://xmpp.org/ The following sequence diagram presented in Fig.4 shows the exchange between these two platforms 9 Fig. 4. Sequence diagram for communication between object a Jason agent by Jason-RS We analyzed the performance of our approach via a browser. Table 1. The calculation time of the exchanges between the objects and Jason-RS Device Python Object Smart Phone Method REST GET POST, GET Task Duration (millisecond) Consumation WS Sending data 200-450 428-1000 We tested our approach on both devices. During our experiment the return is almost <= 1000 ms. Our test area are done through the WIFI network so the discussion field is open for other types of networks available for the Internet of Things. Agent-based internet of things is an interested field of research now [18], in the face of these works, we focus in the technical side of things, and we compare in table 2 what differentiates our approach compared to the state of the art. Table 2. Comparison with a similar research domain work Work in field Ja- son agent and Agent flexibility in Horn Logic Taking in count internet Heterogeneity of IoT IoT [19] [20] ? ? yes ? ? yes 10 [21] Jason-RS and IoT Platform ? yes yes yes ? yes So in our approach we taking in count the heterogeneity of IoT by using a platform BeC3. To permit an automatic decision making we exploit the horn logic provided in Jason. This collaboration permit a flexibility in interacting between agent and hetero- geneous connected object. 5 Conclusion This article describes our contribution on service improvement in the world of Web of Object. We have integrated our previous Jason-RS research work into the sensor device connected to the web. Object of the IoT do not support the execution of artificial intelligence within themselve because there resources are very limited. Our approach is towards the decentralization of this AI treatment with Jason-RS. Not only is Jason- RS a Web Service but it has an artificial intelligence BDI engine running. So the com- plex data processing in the connected web object is provided by the Jason. The com- munication is done through HTTP protocol as it is more flexible and commonly adopted in the world of web. We tested our approach with a Mashup service platform for heter- ogeneous connected objects called BeC3.Our approach therefore allows the object con- nected to the web to open up to data processing with artificial intelligence as well as complex systems itself. As perspective we are considering the automatic injection of service inside the connected object to reduce the human task of defining the service choreography. References 1. Laine, M. (2012). Restful Web Services for the internet of things. Online]. Saatavilla: http://media.tkk.fi/webservices/personnel/markku_laine/restful_web_services_for _the_in- ternet_of_things.pdf. 2. Gupta, P., Mokal, T. P., Shah, D. D., & Satyanarayana, K. V. V. (2018). Event-Driven SOA- Based IoT Architecture. In International Conference on Intelligent Computing and Applica- tions (pp. 247-258). Springer, Singapore. 3. Wilde, E. (2007). Putting things to REST. 4. Guinard, D., Trifa, V., & Wilde, E. (2010, November). A resource oriented architecture for the Web of Objects. In IoT (pp. 1-8). 5. Rafalimanana, H. F., Razafindramintsa, J. L., Ratovondrahona, A. J., Mahatody, T., & Manantsoa, V. (2018, December). Publish a Jason Agent BDI Capacity as Web Service REST and SOAP. In International conference on the Sciences of Electronics, Technologies of Information and Telecommunications (pp. 163-171). Springer, Cham. 6. A. S. Rao, « AgentSpeak(L): BDI agents speak out in a logical computable language », in Agents Breaking Away, vol. 1038, W. Van de Velde et J. W. Perram, Éd. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996, p. 42-55. 11 7. A. Ricci, R. H. Bordini, et J. F. Hübner, « AgentSpeak(ER): An Extension of AgentSpeak(L) improving Encapsulation and Reasoning about Goals », p. 3, 2018. 8. Norling, E. (2003, July). Capturing the quake player: using a bdi agent to model human behaviour. In Proceedings of the second international joint conference on Autonomous agents and multiagent systems (pp. 1080-1081). ACM. 9. Kamphorst, B., van Wissen, A., & Dignum, V. (2009, November). Incorporating BDI agents into human-agent decision making research. In International Workshop on Engineering So- cieties in the Agents World (pp. 84-97). Springer, Berlin, Heidelberg. 10. Ciortea, A., Boissier, O., & Ricci, A. (2017, October). Beyond physical mashups: Autono- mous systems for the Web of Objects. In Proceedings of the Eighth International Workshop on the Web of Objects (pp. 16-20). ACM. 11. Kovatsch, M., Hassan, Y. N., & Mayer, S. (2015, October). Practical semantics for the In- ternet of Things: Physical states, device mashups, and open questions. In 2015 5th Interna- tional Conference on the Internet of Things (IOT) (pp. 54-61). IEEE. 12. D. Guinard, « A Web of Objects application architecture: Integrating the real-world into the web », PhD Thesis, ETH Zurich, 2011. 13. Kim, J. H. (2017). A review of cyber-physical system research relevant to the emerging IT trends: industry 4.0, IoT, big data, and cloud computing. Journal of Industrial Integration and Management, 2(03), 1750011. 14. « W3C Web of Objects at W3C ».https://www.w3.org/WoO/. 15. Cherrier, S., Salhi, I., Ghamri-Doudane, Y. M., Lohier, S., & Valembois, P. (2014). BeC 3: behaviour crowd centric composition for IoT applications. Mobile Networks and Applica- tions, 19(1), 18-32. 16. Castellani, A. P., Gheda, M., Bui, N., Rossi, M., & Zorzi, M. (2011, June). Web Services for the Internet of Things through CoAP and EXI. In 2011 IEEE International Conference on Communications Workshops (ICC) (pp. 1-6). IEEE. 17. L. Pescosolido, R. Berta, L. Scalise, G. M. Revel, A. De Gloria, et G. Orlandi, « An IoT- inspired cloud-based Web Service architecture for e-Health applications », in 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 2016, p. 1-4. 18. Savaglio, C.; Ganzha, M.; Paprzycki, M.; Bădică, C.; Ivanović, M.; Fortino, G. Agent-based Internet of Things: State-of-the-art and research challenges. Future Gener. Comput. Syst. 2020, 102, 1038 -- 1053. 19. Ciortea, A., Boissier, O., Zimmermann, A., & Florea, A. M. (2016, November). Responsive decentralized composition of service mashups for the internet of things. In Proceedings of the 6th International Conference on the Internet of Things (pp. 53-61). ACM. 20. Singh, M. P., & Chopra, A. K. (2017, June). The internet of things and multiagent systems: Decentralized intelligence in distributed computing. In 2017 IEEE 37th International Con- ference on Distributed Computing Systems (ICDCS) (pp. 1738-1747). IEEE. 21. Novais, P., & Konomi, S. (2016, October). From raw data to agent perceptions for simula- tion, verification, and monitoring. In Intelligent Environments 2016: Workshop Proceedings of the 12th International Conference on Intelligent Environments (Vol. 21, p. 66). IOS Press.
1207.2235
1
1207
2012-07-10T06:47:11
NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component
[ "cs.MA" ]
In this era of "Services" everywhere, with the explosive growth of E-Commerce and B2B transactions, there is a pressing need for the development of intelligent negotiation systems which consists of feasible architecture, a reliable framework and flexible multi agent based protocols developed in specialized negotiation languages with complete semantics and support for message passing between the buyers and sellers. This is possible using web services on the internet. The key issue is negotiation and its automation. In this paper we review the classical negotiation methods and some of the existing architectures and frameworks. We are proposing here a new combinatory framework and architecture, NAAS. The key feature in this framework is a component for prediction or probabilistic behavior pattern recognition of a buyer, along with the other classical approaches of negotiation frameworks and architectures. Negotiation is practically very complex activity to automate without human intervention so in the future we also intend to develop a new protocol which will facilitate automation of all the types of negotiation strategies like bargaining, bidding, auctions, under our NAAS framework.
cs.MA
cs
NAAS: Negotiation Automation Architecture with Buyer’s Behavior Pattern Prediction Component Debajyoti Mukhopadhyay1, Sheetal Vij2, Suyog Tasare2 Department of Information Technnology1 Department of Computer Engineering2 Maharashtra Institute of Technology Pune 411038, India {debajyoti.mukhopadhyay, sheetal.sh, suyog59}@gmail.com Abstract: In this era of “Services” everywhere, with the explosive growth of E- Commerce and B2B transactions, there is a pressing need for the development of intelligent negotiation systems which consists of feasible architecture, a reliable framework and flexible multi agent based protocols developed in specialized negotiation languages with complete semantics and support for message passing between the buyers and sellers. This is possible using web services on the internet. The key issue is negotiation and its automation. In this paper we review the classical negotiation methods and some of the existing architectures and frameworks. We are proposing here a new combinatory framework and architecture, NAAS. The key feature in this framework is a component for prediction or probabilistic behavior pattern recognition of a buyer, along with the other classical approaches of negotiation frameworks and architectures. Negotiation is practically very complex activity to automate without human intervention so in the future we also intend to develop a new protocol which will facilitate automation of all the types of negotiation strategies like bargaining, bidding, auctions, under our NAAS framework. Keywords: NAAS, Negotiation architecture, Negotiation automation, Negotiation framework, Protocols, Agents, Web Services 1. Introduction to Negotiation Negotiation is the process between two or multiple entities where everybody comes to some useful consensus or agreement as a result. Like it or not everybody is a negotiator in some ways without even knowing it. We did it as kids for trading toys, cards and still we do it for the raise in salary, purchasing things in our personal lives. Many people try to avoid this blatant negotiation procedure consciously because they don’t like it but end up in either negotiating or losing in the bargain. Now the question is how to automate this process using the latest technologies and advancements in computing. Here are some key concepts behind the theory of negotiation [6, 7, and 8]. 1.1 Negotiation Types 1. Distributive or fixed pie negotiation. It involves people who have never had a previous interactive relationship neither they are likely to do so in near future. Everybody gets a fixed pie. 2. Integrative negotiation or everybody wins something or win-win scenario. This means to join several parts into whole. This needs some cooperation and higher degree of trust from every entity in negotiation. Ideal ly it is difficult to achieve and most difficult to automate because trust and forming relationships on that is human characteristic and difficult to implement in machines and computing [9]. 1.2 Negotiation Tactics The level of detail in the best negotiator actually understands the human mind and how to use this in different voice tones and expressions for the best possible negotiation outcome for all the parties, ideally. A few common tactics that are used in negotiation are outright refusal, conditioning, calling bluffs [10]. 1.3 Negotiation protocol types It is the set of rules that govern the interaction between participants. Depending upon the types the negotiation can be categorized as bidding, auction, bargaining. [11] In this paper we are proposing a new architecture and a framework for automating the negotiation process. The key feature in this framework is a component for prediction or probabilistic behavior pattern recognition of a buyer, along with the other classical approaches of negotiation frameworks and architectures. 2. Related Work Substantial research work has been done on various negotiation protocols, languages and set of parameters, frameworks on each of the negotiation types like auctioning, bidding, bargaining, simple request and response methods etc. We reviewed the following frameworks and architectures to come up with certain conclusions and assessed if any provision is given in those for observing the buyer’s behavior. Hudert, Guido and Ludwig [1] have defined a framework for augmenting WS- Agreement by Open grid Forum (OGF) standard which actually defines an XML based structural definition of Service Level Agreements [2]. This framework is proposed only in relation with WS-Agreement protocol where parties interested in negotiating an agreement first run the negotiation Meta protocol to establish which negotiation protocol is used. [1] Subsequently, the protocol is executed to determine the resulting, negotiated WS-Agreement document. Finally, winner is determined and acceptance, rejection is performed again according to the WS-Agreement protocol standard (Fig. 1). Fig. 1. Agreement creation process Tung Bui and Gachet [3] found out that web services (using UDDI, WSDL, SOAP, and XML) can be used as a market broker, to help in discovering the supply/demand, arbitrate the pricing, find the most appropriate service for a given request, to modify the request and services and generate the contract. They have given the basic architecture as shown in Fig. 2. Fig. 2. Electronic market for web services In this framework the authors have used BPEL4WS[4,5] and WSCI and proposed following support roles as information, Communication, Negotiation, Bargaining, Execution of transactions , all of them with steps in pre -transaction, transaction and post transaction phases in electronic market. Authors have given detailed diagrams for the seven web services like topology of web services for negotiation and bargaining, service discovery, Adaptation and pricing, Service ranking, service bargaining, best price adaptation, contract composition, here the client is seen as a negotiation manager. This architecture has its limitations like assumption of trust and there is no competitive strategy to distort the cooperative spirit of e -market. There is no fixed pricing, brokerage and addressing of services, no technical requirements as security and logging mechanisms discussed. Bin Wu and Chaozhen Guo [12] present a new web service negotiation mechanism and new web service composition coordinated negot iation architecture to solve the problems which mainly occur in such architectures of web service composition based on agent. The problems like unreasonable use of time and data link resources in the condition of multi-negotiation concurrency which leads to inefficiency of negotiation, lack of effective processing when confronting negotiation failure. Here the authors are applying asynchronous communication theory to the process of Web Service Negotiation and extend effective processing in case of negotiation failure. There are disadvantages as overhead of time spent in processing failure may be more than the benefit it brings, if the bad status of network (Fig. 3 and Fig. 4). Fig. 3. Original web service composition coordinated negotiation architecture Fig. 4. Improved web service composition coordinated negotiation architecture (IWSCCNA) It divides NA into SPNA and SRNA. Here a pseudo algorithm of process handling negotiation failure is given. So the research focuses only on elaborating architecture (Improved Vs OWSCCNA) for proper processing in case of negotiation failure in web services. Jin and Segev [13] have proposed a framework for negotiation processes that provide a consistent model for supporting a comprehensive range of negotiations in dyn amic next generation e-business environment. It has five components negotiation requirements, negotiation structure, negotiation process, negotiation protocol and strategy. The authors have described each of their framework components in stepwise details and claim that this model is the most flexible and practical where protocol and strategy are separated in the design, as shown in Fig. 5 Fig. 5. Negotiation Framework Chhetri, Lin, Goh, jun, Jian, Kowalczyk [14] have proposed an agent based coordinated negotiation architecture to ensure collective functionality, end to end QoS and coordination of complex services and they describe how this architecture can be used in different application domains and also how the negotiation system on the service provider’s side can be implemented both as an agent based negotiation as well as a web service based negotiation system. This work is based on ASAPM, adaptive agreement and process management, aims at developing intelligent agent based techniques and tools to facilitate the adaptive service management and process management. The overall architecture of ASAPM includes following four components (Fig. 6). Fig. 6. ASAPM Coordinated negotiation architecture is proposed on the above as shown in Fig. 7. Fig. 7. Coordinated Negotiation Architecture This two level approach enables the reuse of this architecture in any application domain. This paper does not contain the decision making strategies both at the negotiation level and at the coordination level. All these architectures are mostly implemented in FIPA compliant JADE Agent Framework and WS2JADE toolkit which enables the integration of JADE agents and web services. Stanley, Huang, Yihua, Haifei Li, Wang, Liu, Lee, Lam [15] have presented the design and implementation of a replicable, internet based negotiation server for conducting bargaining type negotiations between enterprises involved in e -commerce and e-business where enterprises can be buyers and sellers of product/services or participants of a complex supply chain involved in purchasing, planning and scheduling. The use of negotiation servers to conduct automated negotiation has been demonstrated by the authors. A content specification language for information registration, a negotiation protocol and its primitive operations, an automated negotiation process, a cost benefit decision model and the architecture of an implemented system have been described in this. This is based on object oriented, active database technology in contrast to the existing systems which are based mostly on distributed agent technology. Their negotiation server is analogous to web server which provide following negotiation services as a registration service, a negotiation proposal processing service, an event and rule management service, a cost-benefit analysis service. The system architecture consists of following components, external to WAN components as shown in Fig. 8. Fig. 8. System Architecture Cao, Chi, Liu [17] have also described an automated negotiation archite cture based on software multi agents using SOA (Service oriented architecture) and web services technology. Here is a reference to Negotiation as a Service where the authors observed that in businesses, negotiation process is better given as a service, not as software and more suitably the entities can be seen in a role of a service provider. Authors correlate it with SaaS (software as a service) where software providers deploy application software on their own servers and customers search, access software services via Internet, consume services as per demand and pay the software providers based on time and number of services consumed. So the users buy software service as an alternative to permanent license and SaaS subverts the traditional life cycle of software i.e. design- development-testing-installation. User need not concern about the upgrade and maintenance of software. Here the authors have given a six layered architecture for the automated negotiation as in Fig. 9. Fig. 9. Architecture for Automated Negotiation Though this prototype has been developed using SOA and UDDI, WSDL, XML technologies , it could not be a standard for practical implementation of negotiation automation due to many pervasive issues and conflicts in standards and overhead due to parsing of SOAP messages and XML documents on every exchange. Precisely in all the above architectures, even if they can be converted into a prototype of automated negotiation, they cannot be a fixed standard for the practical implementation of the same. Also there is no consideration of understanding and predicting the buyer’s behavior in all the above architectures, which is if added it can be a very sophisticated and futuristic approach of negotiation automation. 3. NAAS Automation Architecture We are proposing an automated negotiation system in the form of web service calling it as NAAS (Negotiation as a Service). As we saw in survey, using SOA (Service oriented architecture) we can make the system running in any place as a service node that is integrated with third party e-commerce platforms so the system can play role of negotiation service provider in the real business environment. The benefits are , we can obtain stable visiting quantity, maintenance and upgrade of system can be completed on the server independently, saving human and material resources, automated negotiation system can make use of the existing basic facilities provided by e-commerce platform i.e. security, authentication, transaction management etc. ,saving costs of development. With NAAS we are trying to overcome the issues we saw in the previous architectural styles. Specifically we are trying to add a module which can be developed on a strong algorithmic base i.e. using Association rules or Markov models to predict and then further analyzing the buyer’s behavior for making the process of negotiation automation complete. The main reason for buyer’s behavior prediction module in the basic design is to make the negotiation system intelligent, sophisticated and futuristic so that a better standard for negotiation automated can be created and existing designs can be enhanced. NAAS Architecture Components: 1.Service registry (databases types, directory) 2.Negotiation support system (Negotiation support system provider, Negotiation service requestor) 3.Protocol on internet module, MTS and service discovery by using web services on UDDI, HTTP, SOAP 4.Advertisement publishing from provider/seller 5.Negotiation service requestor/ buyer 6 .Buyer’s behavior pattern prediction (proposed in auction, in bargaining, in bidding for further research by the authors) 7.Business logic module and agent management module (external to NAAS) 8.Strategies, decision modules (external to NAAS). Working: The seller will publish its information about product and the prices etc. On the service registry via web services and web container to which a negotiation support system will interact on some negotiation protocol or all the existing protocols. A MTS is on the internet to transfer the requests from buyers a s well as product information from the sellers. A database can be maintained for all these service related queries and information with different ontology, if this architecture is considered in details. In our buyer’s behavior prediction component, some key features like age, gender, culture, type of product, feedback can be taken as input to the system for the decision making and predicting the buyer’s choices, behavior according to the region, country and states. This will help us in tapping the particular market and applying further strategies in negotiation system according to the buyer’s behavioral aspects for all the types in negotiation like bidding, bargaining and auctions for the desired product on sale (Fig. 10). Fig. 10. NAAS Architecture 4. Discussion on buyer’s behavior prediction component Due to addition of the buyer’s behavior pattern prediction, this architecture can be a flexible, reliable because if in advance of any negotiation process in a multiple buyers and sellers scenario on web based automated negotiation system, we are able to analyze how many potential buyers can be in this negotiation process and what kind of negotiation behavior the particular set of buyers go into. We are proposing a buyer’s behavior prediction component as shown in Fig. 11. Fig. 11. Buyer’s behavior prediction component First, data processor processes the input and then forwards the required values to the prediction logic. Our proposed prediction logic computes the offer values according to the feature which is submitted by the buyer. According to the present proposed prediction logic, we can generate such five types of offer values according to the particular feature (e.g. , age, gender, culture, type of product, buyer’s demand or feedback) For e.g. Feature (F1) = Age then we can divide this into 3 categories like Age[10 - 30] , [30 - 50 ], [50 – 70], we can allocate a weighted value for each of these age groups which will be divided by count (C) of buyer(s) to calculate the percentage. This percentage can be used by seller(s) to negotiate on the Offer Value (OV) of that particular feature (F1...F5). Please see Fig. 12. Fig. 12. Feature Categories This leads to a very successful implementation of various negotiation strategies (auction, bidding, bargaining) etc. There is no existing architecture on negotiation which facilitates the intelligent buyer’s behavior prediction in automated negotiation. We are working on the survey of appropriate existing algorithms for the prediction. 5. Conclusion and Future Work The overall survey of existing architectures leads us to come up with shortfalls and requirements in negotiation automation. NAAS can provide the advantages and further applications related to this. The authors of this manuscript are trying to as sess the work done in this area and come up with some conclusions about how to construct as well as deploy the buyer’s behavior pred iction component for the e-negotiation system. We intend to find out an appropriate algorithmic base to implement this scheme. We also intend to create a new negotiation protocol for our NAAS framework in the next phase of work. References 4. BPEL4WS, 1. Sebastian Hudert, Heiko Ludwig, Guido Wirtz: “A Negotiation Protocol Framework for WS- agreement”; IEEE; 2006 2. Sebastian Hudert, Torsten Eymann, Heiko Ludwig, Guido Wirtz: “A negotiation Protocol Description Language or Automated service Level Agreement Negotiations”; IEEE; 2007 3. Tung Bui, Alexandre Gachet: “Web Services for Negotiation and Bargaining in Electronic Markets: Design Requirements and Implementation Framework”; IEEE; 2005 Introduction to http://www.research.ibm.com/convsupport/papers/BPEL%20&%20Conversations.htm 5. Jin Baek Kim, Arie Segev, Ajit Patankar, Min Gi Cho: “Web Services and BPEL4WS for Dynamic eBusiness Negotiation Processes”; IEEE; 2004 6. Raymond Y.K. Lau: “Towards a web services and intelligent agents-based negotiation system for B2B eCommerce”; IEEE; 2007 7. Yonglei Yao, Li Ma: “Automated Negotiation for Web Services”; IEEE; 2010 8. Negotiation Types, http://www.negotiations.com/articles/negotiation-types/ 9. NegotiationTactics, http://www.negotiationtactics.net/ 10. Negotiation Protocols, http://www.w3.org/2001/03/WSWS-popa/paper19 11. Bin Wu, Chaozen Guo: “The Reasearch and Improvement on the Coordinated - Negotiation Architecture of Web Service Composition based on Agent in the condition of Multi -Negotiation Concurrency”; IEEE; 2010 12. Jin Baek Kim : “a Framework for Dynamic eBosiness Negotiation Processes”; IEEE; 2003 13. Mohan Chhetri, Jian Lin, SukKeong Goh, Jian Zhang, Ryszard Kowalczyk, Jun Yan : “A Coordinated Architecture for the agent –based Service Level Agreement Negotiation of Web Composition”; IEEE; 2006 14. Stanley Su, Chunbo Huang, Joachim Hammer, Yihua Huang, Haifei Li, Liu Wang, Youzhong Liu, Chanyote, Lee, Lam: “An internet based negotiation server for e-commerce”; 2001 Springer Journal VLDB : 72-90; 2001 15. Mu-kun Cao (School of Management, Xiamen University, China), Robert Chi, Ying Liu : “Developing Multi Agent automated negotiation service based on service oriented architec ture”; Service Science Journal, Vol.1. ; 2009
1612.00480
1
1612
2016-12-01T21:38:03
A Scalable and Adaptable Multiple-Place Foraging Algorithm for Ant-Inspired Robot Swarms
[ "cs.MA", "cs.RO" ]
Individual robots are not effective at exploring large unmapped areas. An alternate approach is to use a swarm of simple robots that work together, rather than a single highly capable robot. The central-place foraging algorithm (CPFA) is effective for coordinating robot swarm search and collection tasks. Robots start at a centrally placed location (nest), explore potential targets in the area without global localization or central control, and return the targets to the nest. The scalability of the CPFA is limited because large numbers of robots produce more inter-robot collisions and large search areas result in substantial travel costs. We address these problems with the multiple-place foraging algorithm (MPFA), which uses multiple nests distributed throughout the search area. Robots start from a randomly assigned home nest but return to the closest nest with found targets. We simulate the foraging behavior of robot swarms in the robot simulator ARGoS and employ a genetic algorithm to discover different optimized foraging strategies as swarm sizes and the number of targets are scaled up. In our experiments, the MPFA always produces higher foraging rates, fewer collisions, and lower travel and search time compared to the CPFA for the partially clustered targets distribution. The main contribution of this paper is that we systematically quantify the advantages of the MPFA (reduced travel time and collisions), the potential disadvantages (less communication among robots), and the ability of a genetic algorithm to tune MPFA parameters to mitigate search inefficiency due to less communication.
cs.MA
cs
A Scalable and Adaptable Multiple-Place Foraging Algorithm for Ant-Inspired Robot Swarms* Qi Lu1§, Melanie E. Moses1,2, and Joshua P. Hecker1 6 1 0 2 c e D 1 ] A M . s c [ 1 v 0 8 4 0 0 . 2 1 6 1 : v i X r a Abstract- Individual robots are not effective at exploring large unmapped areas. An alternate approach is to use a swarm of simple robots that work together, rather than a single highly capable robot. The central-place foraging algorithm (CPFA) is effective for coordinating robot swarm search and collection tasks. Robots start at a centrally placed location (nest), explore potential targets in the area without global localization or central control, and return the targets to the nest. The scalability of the CPFA is limited because large numbers of robots produce more inter-robot collisions and large search areas result in substantial travel costs. We address these problems with the multiple-place foraging algorithm (MPFA), which uses multiple nests distributed throughout the search area. Robots start from a randomly assigned home nest but return to the closest nest with found targets. We simulate the foraging behavior of robot swarms in the robot simulator ARGoS and employ a genetic algorithm to discover different optimized foraging strategies as swarm sizes and the number of targets are scaled up. In our experiments, the MPFA always produces higher foraging rates, fewer collisions, and lower travel and search time compared to the CPFA for the partially clustered targets distribution. The main contribution of this paper is that we systematically quantify the advantages of the MPFA (reduced travel time and collisions), the potential disadvantages (less communication among robots), and the ability of a genetic algorithm to tune MPFA parameters to mitigate search inefficiency due to less communication. I. INTRODUCTION A large number of simple individual robots working together has the potential to be useful for tasks which a tra- ditional single expensive, specialized and complicated robot is not able to handle, such as searching in large unmapped areas [1], distributed contaminant cleanup, and rescue [2]. Robot swarms can also be involved in sophisticated problem solving, including cooperative transportation, de-mining, and space exploration [3]–[6]. We focus on developing a scalable, decentralized search- and-collection algorithm based on ant-like foraging [7]–[9]. The swarm can adapt to changes in swarm size and the number of targets through real-time response to conditions without external or off-line intervention. Each robot in the swarm makes real-time in-situ decisions on whether to communicate using pheromones, forego communication but individually return to search a location, or return to the collection zone to gather additional information from other *This work was supported by a James S. McDonnell Foundation Complex Systems Scholar Award, and NASA MUREP #NNX15AM14A funding for the Swarmathon. 1The Department of Computer Science, University of New Mexico, Albuquerque, NM 87106, USA. 2External Faculty, Santa Fe Institute, Santa Fe, NM 87501, USA. §Correspondence: [email protected] robots. The robot behaviors are modeled after those of a particular genus of desert seed harvester ants that [10], [11] are restricted to foraging in short-time windows during which not all available targets can be collected; So they are designed to collect as many targets as possible, but not for optimal complete collection [12]. Here, we present the multiple-place foraging algorithm (MPFA) with multiple nests that robots depart from and return to. The robots make on-line decisions to switch to new collection zones based on proximity to their last-found target. The MPFA was presented in our recent work [13] and it shown that distributing 2, 4, or 8 nests in the MPFA produce higher foraging rates and lower average travel time compared to the central-place foraging algorithm (CPFA) developed by Hecker and Moses [14], [15]. Here we compare the scalability and adaptation of the MPFA to the CPFA when increases the number of robots and the number of targets. In the MPFA we deploy 4 nests uniformly in the same size of search arena. A set of real-valued parameters specifying the individual robot controllers is evolved by a genetic algorithm (GA) to optimize the foraging strategy in the multi-physics robot simulator Autonomous Robots Go Swarming (ARGoS) [16]. Every robot in the swarm uses the same controller. We evolve foraging strategies for different swarm sizes (4, 8, 16, 32 and 64) and number of targets (128, 256, 512, 1024 and 2048). We observe the average foraging rate, collision time, travel and search time change as swarm size and the number of targets increase. The remainder of this paper is organized as follows. Section II introduces related work. The design of the MPFA and the description of evolution are provided in Section III and Section IV. The configuration of the MPFA in ARGoS and the experimental results are in Section V and Section VI. Section VII discusses the conclusions. II. RELATED WORK Central-place foraging is commonly studied in swarm robotics [17], [18]. Hecker and Moses utilized and formal- ized the behaviors from Flanagan and Letendre's ant field studies [10], [11], [19] to create the CPFA. The algorithm is well designed and applied to real physical robots, which are designed on the iAnt robots platform [20]. The error- tolerance, flexibility, and scalability were evaluated on both simulated and real robot swarms [21]. However, the simu- lated robots were not physics-based and collisions between robots were not considered. The studies on task allocation by Hsieh et al [22]–[24] showed that a bio-inspired approach to the deployment of a homogeneous swarm of robots to multiple sites. The robots autonomously redistribute themselves among the candidate sites to ensure task completion by optimized stochastic con- trol policies. It models the swarm as a hybrid system where agents switch between maximum transfer rates and constant transition rates. In our method, the robots are distributed and initialized to multiple nests evenly. Then, they transit to other nests autonomously based on the distribution of remainder targets and the evolved search strategy. The search strategy is evolved by GA automatically and all the robots use the same strategy. There are few studies on multiple-place foraging in bio- logical systems. The polydomous colonies of Argentine ants are comprised of multiple nests spanning hundreds of square meters [25], [26]. A study by Chapman et al [27] showed that a community of spider monkeys can be considered as multiple central place foragers (MCPF). They select a sleeping site close to current feeding areas, and the MCPF strategy entails the lowest travel costs. A study by Tindo et al [28] showed that wasps living in multiple nests have greater survival rate and increased productivity. However, multiple-place foraging has not been systematically com- pared to central placed foraging in robotic swarms which we do here. III. THE DESIGN OF THE MPFA In the MPFA, robots are evenly distributed around nests. They start from a nest but return to the closest nest to their position after finding a target or giving up the search. The use of multiple collection points is the fundamental difference between the CPFA and the MPFA; all other components of the two foraging algorithms are kept deliberately identical in order to test for the effect of multiple nests on swarm foraging efficiency. The behavior of an individual robot in an MPFA foraging round is shown in Fig. 1. Each robot transitions through a series of states as it forages for targets. This differs from the CPFA [21] in how the robots return to nests which are in steps 4 and 5. In the MPFA, robots initially disperse from the nests closest to them, followed by random selected travel paths (step 1). An uninformed correlated random walk is used to search targets when robots stop to follow the paths (step 2) [29]. Robots navigate home to nests closest to them when they retrieve targets or give up search (step 4 and 5) [30]. Robots that find targets will detect the local target density before return to nests (step 3) [31]. Robots that are more likely to return to previously found sites using site fidelity or pheromone recruitment (step 6), then they search the sites thoroughly with informed walk (step 7). In our design, the robots search globally just as in the CPFA – they can travel in the entire arena. As in the CPFA, pheromone trails are simulated using a list of pheromone-like waypoints to identify target-rich areas. When a robot returns to a nest, it will probabilistically select a waypoint from the nest's list and travel to that location. It shares information Fig. 1. The flow chart of an individual robot's behavior in MPFA during an experiment. (pheromone waypoints) locally at its current nest (see Fig. 2). In contrast to the CPFA, pheromone waypoints are globally available to all robots. Since robots always return to the closest nest with a found target, the sensed information relevant to a given target neighborhood is always associated with the nest closest to the position of the identified neighborhood. Thus, if a robot follows a pheromone waypoint from a nest, then the distance from the nest to the destination of the pheromone must be the shortest distance to the target neighborhood identified by the pheromone. Fig. 2. The placement of nests and targets in ARGoS. 1024 targets (black points) and 16 robots (larger blue points) are placed in a 15× 15m2 arena, 4 nests (red circles) are distributed uniformly in the arena. The targets are arranged in a partially clustered distribution. Colored lines indicate pheromone trails with different strength. A small area is magnified to show a robot, colored pheromone waypoints, a large cluster of targets, and a single target. IV. THE GA EVOLUTION We implement the CPFA and MPFA on a foraging task for different experiments in ARGoS. Furthermore, we use a GA to identify MPFA parameters that maximize foraging strategy. We implement our GA using GAlib [32] following parameters described by Hecker and Moses [21]. The set Travel on the PathSearch withInformed WalkStartReach SearchLocationSense LocalResource DensitySearch with Uninformed WalkRandomselect pathSite fidelityPheromonesGive up search Find resourceReturn to TheClosest NestSwitch to searchRetrievingreourceSwitch tosearch1235467 of seven MPFA parameters is identical to the set of CPFA parameters. The movement, sensing, and communication of each single robot are evolved and evaluated. The parameters are described in the following, • Probability of switching to search: The robot has the probability of switching from travel to uninformed random search. The probability is initialized from a uniform random distribution, U(0, 1). • Probability of returning to nest: The robot has the probability of giving up search and returning to nest. It is initialized from a uniform random distribution, U(0, 1). • Uninformed search variation: If the robot searches using a correlated uninformed random walk, the succes- sive turning angles θt is defined by θt = N (θt−1, σ), where θt−1 is the turning angle in the current step, and σ is the standard deviation or uninformed search variation, which determines the turning angle of the next step. σ is initialized from a uniform random distribution, U(0, π). • Rate of informed search decay: If the robot searches using an informed correlated random walk, the standard deviation of the successive turning angles σ decays as a function of time t, σ = ω + (2π − ω)e−λidt, where λid is the rate of informed search decay. λid is initialized from an exponential decay function exp(5). • Rate of laying pheromone and rate of site fidelity: The information decisions are governed by parameteri- zation of a Poisson cumulative distribution function as defined by POIS(k, λ), where k is the likelihood of detecting at least k additional resources, and λ is the rate of laying pheromone or the rate of site fidelity. It is initialized from a uniformed random distribution, U(0, 20). The robot returns to a previous location if POIS(k, λ) > U(0, 1). If k is large, the robot is likely to return to the same location using information on its next foraging trip. • Rate of pheromone decay: The pheromone decays exponentially over time t as defined by e−λpdt, where λpd is the rate of pheromone decay. It is initialized from an exponential decay function exp(10). We repeat the evolutionary process 10 times for the CPFA as well as for the MPFA, in order to generate 10 independently evolved foraging strategies for each experimental configura- tion. In summary, using a swarm size of 40 robots, we evaluate each swarm 8 times on different random placements of targets in the partially clustered distribution to determine their fitness. We use a 50% uniform crossover rate and a 5% Gaussian mutation rate with a standard deviation of 0.02. We use elitism to keep the individual with the highest fitness. We altered the termination criteria of the GA in order to hasten parameter convergence and ran the GA for a maximum of 100 generations. The GA terminates based on three criteria: the number of generations, the convergence of fitness, and the diversity of swarm sizes, which are introduced in GAlib [32]. The GA will stop if the fitness is convergent and the diversity of the population is low. Otherwise, it will stop after 100 generations. Our code is available on GitHub1. In our GA, 89% of the evolution terminates on the con- vergence of fitness and the diversity of swarm sizes. Across 10 independent evolutionary runs, all evolved parameter sets were nearly equally fit: The standard deviation in fitness was at most 5% of the mean fitness value. The fitness of the best parameter set, evaluated on 100 target placements, is shown in Fig. 3 and Fig. 4. V. EXPERIMENTAL CONFIGURATION IN ARGOS Table I shows the experimental configuration in ARGoS. To test scalability, the number of targets is always 1024, and the number of robots is scaled to be 4, 8, 16, 32 or 64. We set different foraging time windows for each swarm, depending on the swarm size. The selected times allow the evolved swarms to collect approximately half of the targets. The foraging time of robots are the same across all experiments: by multiplying the number of robots by the foraging time, we have 480 robot-minutes (or 8 robot-hours) in our experiments (see Table I). To test adaptation, the number of robots is always 32. The number of targets is 128, 256, 512, 1024 or 2048. The foraging time is set independently for each experiment so that approximately 40% of the targets are collected by the best evolved strategy. All experiments are replicated 100 times. The locations of targets and robots are initialized randomly in the 100 replicates. TABLE I EXPERIMENTAL CONFIGURATION IN ARGOS Scalability Adaptation Time (minutes) Robots Targets Robots Targets Time (minutes) 4, 8, 16, 32 or 64 1024 120, 60, 30, 15 and 7.5 32 128, 256, 512, 1024 or 2048 5, 8, 10, 12 and 30 The targets are placed in a partially clustered distribution. This distribution has various sizes of square clusters. The targets are placed either in a large cluster, a medium cluster or individual targets in a uniform random distribution (see Fig. 2). Both algorithms are tested in a simulated arena size of 15× 15m2. The CPFA has one center nest and the MPFA has 4 uniformly and evenly distributed nests. VI. RESULTS We compare the efficiency of the CPFA and the 4 nest MPFA on foraging rate, collision time, and travel and search time when the swarm sizes and the number of targets are scaled up. We identify statistical differences using a t-test, and we identify whether performance varies systematically by calculating a log-linear regression in which the perfor- mance are compared to the log2 of the swarm sizes or the number of targets. 1https://github.com/BCLab-UNM/iAnt-ARGoS/tree/ lukey_development A. Foraging Efficiency B. Collision Efficiency The total foraging rate of each swarm is the sum of the total collected targets in the swarm. We measure the average foraging rate, which is the number of targets per robot collected in every minute. Fig. 3 shows the average foraging rate as the swarm size increases. The average foraging efficiency of the MPFA exceeds that of the CPFA in all cases, by up to 66% in the case of 64 robots. In our simulation, if the distance between two robots is less than 0.25m, each robot will detect a collision. Each robot senses the location of the other and turns left or right in order to avoid a collision, moving approximately 8 cm before resuming traveling. The collision time is the time required to avoid a collision. The total collision time of each swarm is the sum of the total collision time for all robots in the swarm. We measure the average collision time, which is the collision time per robot in collecting a target. The "per robot, per target" collision makes the comparison fairly. For "per robot", it is obvious that a larger swarm results in more collisions, but the rate of increase is not obvious. It is easier to analyze the trend of collision rates on each robot rather than on the swarm when the swarm sizes are different. For "per target", calculating 'per target' definitely dilute the comparison. However, the collision is higher if more targets are collected. We should consider the collision rate based on the foraging rate (In our results, the MPFA always has higher foraging rate). The average collision time as swarm size increases is shown in Fig. 5. Fig. 3. The average efficiency (targets collected per robot, per minute) for the CPFA (p = 0.08) and MPFA (p = 0.04) decrease as the swarm size increases. The p value is from the average of collected targets and the log2 of the swarm size. Results are for 100 replicates. The percentage of improvement is labelled. Fig. 4 shows the average foraging rate as the number of targets increases. The average foraging efficiency of the MPFA exceeds that of the CPFA in all cases, by up to 50% in the case of 2048 targets. Fig. 5. The average efficiency (collision time per robot, per target) for the CPFA (p = 0.06) and MPFA (p = 0.10) increase as the swarm size increases. The collision time for the MPFA is less than the collision time for the CPFA. We also see that the collision time for the MPFA is reduced as the number of targets increases (see Fig. 6). C. Travel and Search Efficiency Foraging time is composed of two distinct activities. When a robot departs from its nest, it travels to a location where it starts to search for targets. Once at the destination, the robot engages in a localized search. Once a target is discovered, the robot takes approximately the same travel time back to the nest. Some robots take approximately the same travel time back to the location of the discovered target if they are recruited by pheromones, but their search time is reduced. We measure the average travel time and search time spent to collect one target by a robot. The average travel time for Fig. 4. The average efficiency (targets collected per robot, per minute) for the CPFA (p = 0.04) and MPFA (p = 0.001) decrease as the number of targets increases. The p value is from the average of collected targets and the log2 of the number of targets. The efficiency is always higher for the MPFA. Fig. 6. The average efficiency (collision time per robot, per target) for the CPFA and MPFA as the number of targets increases (p = 0.03). Fig. 8. The average travel time (per robot, per target) for the CPFA (p = 0.001) and MPFA (p = 0.03) as the number of targets increases. the MPFA (see Fig. 7) is less than the CPFA for all swarm sizes. Fig. 7. The average travel time (per robot, per target) for the CPFA and MPFA decrease as the swarm size increases (p = 0.04). Fig. 9. The average search time (per robot, per target) for the CPFA and MPFA as the swarm size increases (p = 0.03). The travel time for the MPFA (see Fig. 8) is also less than the CPFA as the number of targets increases. Fig. 9 shows that the average search time decreases as the number of robots increases. The search time for the MPFA is less than the CPFA. The search time for the CPFA decreases faster than the MPFA. The improvement is up to 34% in the first case for 4 robots and it is down to 19% in the last case for 64 robots. The search time decreases as the number of targets increases (see Fig. 10). The search time for the MPFA decreases faster than the CPFA. The improvement goes up to 31% in the last case. VII. DISCUSSION This paper explores how swarm size and the number of targets affect foraging rates, collision time, travel and search time. Not surprisingly, increasing the swarm sizes or the number of targets decreases the average foraging rate (see Fig. 10. The average search time (per robot, per target) for the CPFA and MPFA as the number of targets increases (p = 0.05). Fig. 3 and Fig. 4), but decreases slower for the MPFA. This implies that the MPFA is more efficient in larger swarms or in an environment with more targets. The average collision time for the MPFA is much less than the CPFA as the swarm size or the number of targets increases (see Fig. 5 and Fig. 6). The collision time for the CPFA increases faster as the number of targets increases (see Fig. 6). We hypothesize that the more targets there are, the harder robots will spread out in the CPFA. It demonstrates that the MPFA has the advantage of avoiding collisions in large swarm size or in an environment with a large number of targets. The increase of swarm sizes makes the average travel time for the MPFA decrease faster than the CPFA (see Fig. 7). This shows that the MPFA has the advantage of reducing travel time as the swarm size increases. We hypothesize that the evolved probability of returning to nest increases faster as the swarm size increases. The more robots there are, the more likely robots will minimize time traveling in the MPFA. On the other hand, this makes the search time has smaller difference (see Fig. 9). It is obvious that the addition of more nests makes the travel time less for the MPFA. However, the information (pheromone waypoints) is distributed to multiple nests. In contrast to the CPFA, pheromone waypoints are globally available to all robots. So, there are tradeoffs among com- munication (and therefore search time) and travel time and congestion. In addition, the MPFA may get the benefit from all resources are not eventually be moved to one nest. However, we can consider a "high-speed" delivery (multiple targets can be moved in one round) in the future. This may not make the results too much different. The search time for the MPFA decreases faster with increasing numbers of targets (see Fig. 10). This shows that the MPFA has the advantage of reducing search time in an environment with large number of targets. We hypothesize that the evolved probability of laying pheromone increases and it is higher for the MPFA, or the rate of pheromone decay decreases and it is lower for the MPFA as the number of targets increases. The more targets there are, the more likely pheromone will be laid, or slower pheromone decay. These discoveries reveal that the MPFA improves foraging rates when the swarm size or the number of targets are scaled up. This is not only because of the simple intuitive reduction in travel time, but also because of the significant improvement in avoiding collisions. Overall, the MPFA has better performance as the swarm size or the number of targets increases. In the future work, we will discover the trends on the evolved seven parameters and confirm the above hypothesis for the random, partially clustered and clustered resource dis- tributions. In addition, we will consider the cost of deploying multiply nests and evolve the optimized number of nests for different resource distributions. ACKNOWLEDGMENT We gratefully acknowledge members of the Moses Biolog- ical Computation Lab for their assistance with the multiple- place foraging swarm robotics project. Thanks to Antonio Griego for developing the CPFA algorithm in ARGoS. Thanks to Matthew Fricke for discussing the issues in the experiments. REFERENCES [1] D. P. Stormont, Autonomous rescue robot swarms for first responders, In: Proceedings of the 2005 IEEE International Conference on Com- putational Intelligence for Homeland Security and Personal Safety, IEEE; March, 2005. pp. 151-157. [2] G. Kantor, S. Singh, R. Peterson,D. Rus, A. Das, V. Kumar, et al. Distributed Search and Rescue with Robot and Sensor Teams, In: The 5th international conference on field and service robotics, vol. 24. Germany: Springer; 2006. pp. 529-538. [3] R. A. Brooks and A. M. Flynn, Fast Cheap and Out of Control: A Robot Invasion of the Solar System, Journal of the British Interplan- etary Society, 1989, vol. 42, pp. 478-485. [4] G. A. Landis, Robots and humans: synergy in planetary exploration, Acta Astronautica, 2004, vol. 55, no. 12, pp. 985-990. [5] W. Fink and J. M. Dohm, M. A. Tarbell, T. M. Hare and V. R. Baker, Next-generation robotic planetary reconnaissance missions: A paradigm shift, Planetary and Space Science, vol. 53, no. 14, pp.1419- 1426, 2005. [6] Karl A. Stolleis, Joshua P. Hecker, Melanie E. Moses, "The Ant and the Trap: Evolution of Ant-Inspired Obstacle Avoidance in a Multi- Agent System," Proceedings of Earth & Space 2016 Engineering for Extreme Environments, ASCE, Reston, VA, USA. [7] D. M. Gordon and A. W. Kulig, Founding, Foraging, and Fighting: Colony Size and the Spatial Distribution of Harvester Ant Nests. Ecology, vol. 77, no. 8, pp. 2393-2409, Ecological Society of America, 1996. [8] A. F. T. Winfield, Foraging Robots, in Encyclopedia of Complexity and Systems Science, pp. 3682-3700, Springer New York, 2009. [9] W. Liu and A. F. T. Winfield, Modeling and Optimization of Adaptive Foraging in Swarm Robotic Systems, Int. J. Rob. Res. vol. 29, no. 14, pp. 1743-1760, Dec. 2010. [10] T. P. Flanagan, K. Letendre, W. Burnside, G. M. Fricke, and M. E. Moses, How ants turn information into food. Artificial Life (ALIFE), 2011 IEEE Symposium, pp. 178-185, April 2011. [11] T. P. Flanagan, K. Letendre, W. R. Burnside, G. M. Fricke, and M. E. Moses, Quantifying the Effect of Colony Size and Food Distribution on Harvester Ant Foraging. PLoS ONE, vol. 7, no. 7, July 2012. [12] J. P. Hecker, J. C. Carmichael, and M. E. Moses, Exploiting clusters for complete resource collection in biologically-inspired robot swarms. IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), September, 2015. [13] Q. Lu, J. P. Hecker and M. E. Moses, The MPFA: A multiple-place foraging algorithm for biologically-inspired robot swarms, IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), Deajeon, October, 2016 (In review). [14] J. P. Hecker, K. Letendre, K. Stolleis, D. Washington, and M. E. Moses, Formica Ex Machina: Ant Swarm Foraging from Physical to Virtual and Back Again, Proceedings of the 8th International Conference on Swarm Intelligence, ANTS'12, pp. 252-259, Berlin, Heidelberg, Springer-Verlag, 2012. [15] J. P. Hecker, and M. E. Moses, An Evolutionary Approach for Robust Adaptation of Robot Behavior to Sensor Error, Proceedings of the 15th Annual Conference Companion on Genetic and Evolutionary Computation, GECCO '13 Companion, ACM, no. 8, pp. 1437-1444, New York, NY, USA, 2013. [16] C. Pinciroli, V. Trianni, R. O'Grady, G. Pini, A. Brutschy, M. Bram- billa, N. Mathews, E. Ferrante, G. D. Caro, F. Ducatelle, M. Birattari, L. M. Gambardella and M. Dorigo, ARGoS: a Modular, Parallel, Multi-Engine Simulator for Multi-Robot Systems, Swarm Intelligence. vol. 6, no. 4, pp. 271-295, Springer. Berlin, Germany, 2012. [17] E. S¸ahin, S. Girgin, L. Bayindir and A. Turgut, Swarm Robotics, Swarm Intelligence. Natural Computing Series, Springer Berlin Hei- delberg, pp. 87-100, 2008. [18] M. Brambilla, E. Ferrante, M. Birattari and M. Dorigo, Swarm robotics: a review from the swarm engineering perspective, Swarm Intelligence. vol. 7, no. 1, pp. 1-41, 2013. [19] K. Letendre, and M. E. Moses, Synergy in Ant Foraging Strategies: Memory and Communication Alone and in Combination. Proceedings of the 15th Annual Conference on Genetic and Evolutionary Compu- tation, GECCO '13, ACM, no. 8, pp. 41-48, New York, NY, USA, 2013. [20] M. E. Moses, J. P. Hecker and K. Stolleis, The iAnt project. http://iant.cs.unm.edu, 2014. [23] [21] J. P. Hecker and M. E. Moses, Beyond pheromones: evolving error- tolerant, flexible, and scalable ant-inspired robot swarms, Swarm Intelligence, Springer US, vol. 9, pp. 43-70, 2015. [22] M. A. Hsieh, ´A. Hal´asz, S. Berman and V. Kumar, Biologically inspired redistribution of a swarm of robots among multiple sites, Swarm Intelligence, vol. 2, no. 2, pp. 121-141, 2008. ´A. Hal´asz, M. A. Hsieh, S. Berman and V. Kumar, Dynamic redistribu- tion of a swarm of robots among multiple sites, IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 2320-2325, 2007. [24] S. Berman, ´A. Hal´asz, M. A. Hsieh and V. Kumar, Navigation-based optimization of stochastic strategies for allocating a robot swarm among multiple sites, Proceeding of the 47th IEEE Conference on Decision and Control, Cancun, Mexico, Dec. 9-11, 2008. [25] T. P. Flanagan, N. M. Pinter-Wollman, M. E. Moses and D. M. Gordon, Fast and flexible: Argentine ants recruit from nearby trails, PLOS ONE, vol. 8, no. 8, September, 2013. [26] Benefits of Dispersed Central-Place Foraging: An Individual-Based Model of a Polydomous Ant Colony The American Naturalist, 2009, vol. 173, no. 6, pp. 772-778. [27] C. Chapman, L. Chapman and R. McLaughlin, Multiple central place travel consequences of using many foraging by spider monkeys: sleeping sites, Oecologia. vol. 79, no. 4, pp. 506-511, 1989. [28] M. Tindo, M. Kenne and A. Dejean, Advantages of multiple foundress colonies in Belonogaster juncea juncea L.: greater survival and in- creased productivity, Ecological Entomology, vol. 33, no. 2, pp. 293- 297, 2008. [29] J. H. Fewell, Directional fidelity as a foraging constraint in the western harvester ant, Pogonomyrmex occidentalis, Oecologia, vol. 82, pp. 4551, 1990. [30] T. O. Crist and J. A. MacMahon, Individual foraging components of harvester ants: Movement patterns and seed patch fidelity, Insectes Sociaux, vol. 38, no. 4, pp. 379396, 1991. [31] B. H´olldobler, Recruitment behavior, home range orientation and territoriality in harvester ants, Pogonomyrmex, Behavioral Ecology and Sociobiology, vol. 1, no. 1, pp. 344, 1976. [32] M. Wall, GAlib: A C++ library of genetic algorithm components, Mechanical Engineering Department, Massachusetts Institute of Tech- nology, vol. 87, pp. 54, 1996.
1210.7600
1
1210
2012-10-29T09:19:56
Study on the Availability Prediction of the Reconfigurable Networked Software System
[ "cs.MA", "cs.SE" ]
This paper describes multi-agent based availability prediction approach for the reconfigurable networked software system.
cs.MA
cs
Study on the Availability Prediction of the Reconfigurable Networked Software System Ling-zhong Meng * , Min-yan Lu, Jing Lai, Xiao-jie Xu School of Reliability and System Engineering, Beihang University, Beijing, 100191, China This paper describes a multi-agent based availability prediction approach for the reconfigurable networked software system based on the complex system’s model and simulation. Firstly, the definition of the features and availability of reconfigurable networked software system is introduced. Secondly, on the basis of the multi-agent based networked software system modeling method, an availability prediction method of the multi-agent based reconfigurable networked software system is proposed after the analysis of the reconfigurable behavior model. Finally, in order to verify the validity of this proposed method, an actual project is taken to predict its reliability. And the simulation result indicates that the availability of reconfigurable networked software system is significantly improved. Keywords: multi-agent system, reconfigurable, networked software system, availability prediction. Received 01 June 2011; Accepted 31 August 2011 1. INTRODUCTION Networked Software System (NSS) is a kind of Internet-based online complex software system of which topology structure and activity can be evolutionary dynamically [1]. At present, the network-based software system applications and services have become an important pillar of national economy’s sustainable development, social life and national safety, and with the rapid development of the network service, NSS is also widely used in various fields, such as on-line bank, e-government, ERP software, military C4I software and so on. For some stand-alone software, in order to meet the needs of users the software needs to be manual repaired, or can recover by rebooting within a certain time once some parts fail. However, for the Networked Software System used in the critical areas, it will cause serious consequences if the software failure cannot be repaired in time. Reconfigurable software system refers to system which can be reconfigured in structure when its modules fail, according to different design principles by utilizing the dynamic adjustment of the structure in order to complete the customers’ requirements. It can improve the availability of NSS to apply reconfigurable technology * Ling-zhong Meng, email: [email protected] to the network software system, so that the software system failures can be restored in a relatively short period of time. DESEREC is an integrated project of the sixth framework program of the European Union under the "Information Society Technologies" priority, strategic objective "Towards a global dependability and security framework"[2]. One of the research content is “Enable Services Dynamic Configuration” which is to establish a secure, trusted network and service platform. NSS is constituted by a number of subsystem, the elements which compose of the subsystem call each other to complete the required tasks, while the software emerged from the overall system reliability, safety and so on. The traditional methods include the availability researches which based on the features and services[3,4], the evolution analysis of component-based model,, system reliability modeling and assessment methods based on Bayesian Networks [5,6,7] and component-based software reliability prediction, metrics [8] and analysis approach [9,10]. However, these traditional methods cannot be applied in the NSS reliability prediction due to its large scale, complex functional interaction, the complexity of the composition of the components and the reliability of its components will change with outside influence. The American scholar Santa Fe Institute has proposed the concept of the Agent to meet the complex behaviors of the complex system 1 on the macro level. The system is seen as composed of by several autonomous agents. The interactions between the agents are the source of the macro mode of the system. Through the establishment of the agent model, these relationships can better be understood and explained. Agent technology is also applied in the field of software engineering. Agent-oriented software engineering is considered an important means of supporting the development of complex software systems [11]. On this basis, the Mobile Agent-based Mobile Agent mobile system’s reliability assessment study [12, 13, 14] and security research [15] have been developed by applying the agent to different software design and mobile agent’s network services. In this article, using the multi-agent modeling and simulation methods, the reconfigurable NSS is regarded as a complex system to research its reliability and availability [16]. The structure of the paper is as follows. Section 2 reviews a brief summary of the basic concepts of agent and the main ideas of software availability. Section 3 is to study the multi-agent based reliability modeling and simulation method based the analysis of the reconfigurable NSS features. Section 4 shows experimental studies for verifying the proposed simulation with the combination of the actual reconfigurable NSS. Section 5 contains the conclusions. 2. CONCEPTS AND METHODS The dependability is proposed firstly by French scholar Laprie as a collective term in the 1985. In his view, dependability is a nature of the computer system, making the services provided by the computer system has been considered to be trustworthy. It provides a conceptual framework and a clear pattern of development for building dependability computer systems [17]. Laprie made it to be clear that dependability of software contain availability, reliability, safety, confidentiality, integrity, and maintainability in 2004[13]. Software Reliability is the probability of failure-free software operation for a specified time in a specified environment. Agents are the actors that are able to presence to meet the design goals in a particular environment with autonomy, flexibility operations [19]. Agent's structure includes the various abstract components of itself, the status and role of each abstract component in the running agent and the interaction of these abstract components. It currently includes three categories: response structure, thinking structure and hybrid structure [20]. is a Multi-agent Systems (Multi-Agent System, MAS) composition of two or more of the Agents, each Agent is an independent behavior entity, and encapsulates the state and behavior, and interacts with each other through the communication among them. MAS architecture can be divided into centralized, distributed and hybrid. The basic idea of MAS is to consider many subsystems as the composition of multiple autonomous agents, and the interaction between the agents is the origin of the macroscopic properties of the system. Through the establishment of multi-agent model, these systems can be better understood and analyzed. The essential characteristic of multi-agent simulation method is to establish a conceptual model of the actual system from the multi-agent perspective. The process is as follows: 1) Analyze the actual system; 2) establish a conceptual model; 3) build the simulation model; 4) analyze of simulation results; 5) conclusion. 3. MULTI-AGENT BASED RECONFIGURABLE NSS AVAILABILITY STUDY Firstly the concept of the characteristics of reconfigurable NSS and the availability of the system is analyzed, then the multi-agent reconfigurable NSS modeling method is studied which includes the modeling methods of the component agent and connector agent, multi-agent coordination and interaction modeling approaches and reconfigurable modeling method, the multi-agent based reconfigurable NSS availability simulation method is proposed. The process of the multi-agent based reconfigurable NSS modeling and simulation method is as illustrated in Fig.1. Analyze Actual System Modeling Identify Component and connection Identify Node and Edge Modeling Various Agent Modeling Node and Edge Modeling Agent Interaction Modeling Node Interaction Build Reconfigurable Mechanism Modeling Network Topology Evolution Simulation Build Multi-Agent Simulation System Obtain Simulation Conclusions Verify Run Analyze Simulation Results Predict NSS Availability Fig. 1. Modeling and simulation framework based on MAS 3.1 Study of the reconfigurable NSS’s Availability The availability of reconfigurable NSS can be service-oriented, rather than the entire system-oriented. A reconfigurable NSS is able to ensure all services can be completed on schedule when its subsystem’s component fail by the reconfiguration method, then the allocation strategy can be determined successful. For ease of presentation, the concepts used in the text are defined as follows: Definition 2.1 Software Service Software service refers to a set of software function provided by the NSS for the customers. Definition 2.2 Software Business The software business refers to the consumers’ use of software services, including those aggregations of services involved in the software business, the services’ usage mode and performance and quality requirements. The reconfigurable NSS is a typical complex system, composed by a variety of software, and it has a very close relationship with the external environment and customers, its features are as flows: 1) Systemic. Reconfigurable NSS are closely related to the external environment, and reconfigurable NSS itself is an organic whole with a lot of interaction among subsystems. In general reconfigurable NSS is a multi-objective, multi-discipline and developmental system; 2) Evolvability. Under certain conditions, the reconfigurable NSS can be reconfigured with the occurrence of software failures to make the structure change, while the composition of software systems is constantly changing over time; 3) Random. Many random factors affect reconfigurable NSS, such as the spread of the virus, customers’ impact, software defects, therefore reconfigurable NSS is a kind of random system; 4) Continuity. Reconfigurable NSS can provide continuous software business, management and maintenance of the database is online, generally will not stop. The availability of the NSS measures in operational availability (A 0 ), refers to the total time of the software business provided by NSS, including operation time (OT), standby time (ST), the time of 2 corrective maintenance (TCM), the time of preventive maintenance (TPM), the measurement model is as shown in (1). (1) And MUT refers to the average working time, namely OT + ST, while the MDT is the average down time, namely TCM + TPM. 3.2. Multi-agent based reconfigurable NSS Modeling the composition of software architecture, to Referring reconfigurable NSS are described with hierarchical models, object-oriented model and event-driven model. Hierarchical model is the basic structure of the entire software system simulation, object-oriented model aim to simulate the specific components in each layer, event-driven model used to simulate the interaction and communication among the components. 1. The modeling research with the component agent and connector agent Based on software architecture analysis methods, software system can be considered as a combination of many components and connectors. In this mode, component is abstracted as a node, while connector is abstracted as a line. Therefore, the nodes and lines constitute the topology network. Multiple subsystems use connections to connect with each other, constituting the software topology network. Components and connections are abstracted as different structural types of agent, therefore nodes and lines of the topology network get more intelligent to promote the multi-agent availability prediction. Component agent receives the required information from the network environment, make integration or information the information judgment according to the internal state, and then match the information in the Knowledge Base to formulate a planning, and finally generate a series of actions depending on the target, and thus have an impact on the external network environment. Therefore the component agent utilize the cognitive agent to accomplish the model, its formal description is as the following six-point groups. Com_Agent :: = < Comi, Com_set, Com_KB, Com_PS, Com_GS, Com_AS > Comi refers to the serial number of the component agent, Com_set refers to the set of states of the components of Agent, including component reliability, status and other information; Com_KB refers to the knowledge base of component Agent; the Com_PS refers to the component planning a collection of the Agent; Com_GS refers to the target set of component Agent; Com_AS refers to the action collection of component Agent. Connector agents receives the required information from the network environment, then makes the information integration, and react with the internal rule library, and finally process information back to the network environment. Therefore connector agent utilize the reactive agent to accomplish the model, its formal description is as the following four-point groups. Con_Agent :: = < Coni, Con_set, Con_PS, Con_AS > Coni refers to the connector agent's serial number; Con_set refers to the state collection of the connector agent, including the connection reliability, status and other information; the Con_PS refers to the connector agent’s planning collection; Con_AS refers to the connector agent's action set. 2. Research on multi-agent based coordination and interaction modeling NSS consists of multiple subsystems. Each subsystem is composed by several component agent and connector agent. Subsystems connect with each other through different connection agent to transfer the data and control. A number of software services will be called in order to complete the user's software business, while each service involve several component agent and connector agent, namely, the simulation of each user's business use requires multiple component agent and connector agent. Therefore, the modeling and control of multi-agent coordination and interaction become very important. Based on this, a model which is suitable for NSS’s multi-agent coordination and interaction is proposed here, shown in Fig. 2. Software Business Environment Information Bus_Agent Service Rules Service Strategy Ser_Agent Service Learning Action Output Fig. 2. Multi-agent coordination and interaction model The proposed Bus_Agent and Ser_Agent is used to run a multi-agent coordination and interaction model, Bus_Agent refers to the agent which manages multiple services’ use, the Ser_Agent set up the users’ service of NSS, their formal description is as follows: Bus_Agent :: =< Busi, Bus_set, Bus_ser_set, Bus_state> Busi refers to the serial number of the Bus_Agent; Bus_set refers to the composition of the Bus_Agent collection, including the business’ profiles, the transition probability of branches; Bus_ser_set refers to the set of services of business management; Bus_state refers to the status of Bus_Agent. Ser_Agent:: =< Seri, Ser_S, Ser_P, Ser_Per, Ser_Trans > Seri refers to the serial number of the Ser_Agent; Ser_S refers to the set of states; Ser_P refers to the set of perception; Ser_Per presents the perceptual function of E → Ser_P, the state-mapping of the environment refers to the perceptual input, E is the set of the environment; Ser_Trans refers to the decision-makingfunction of Ser_P * Ser_S → Ser_S, changing with according to the perceptual input and the current state to match the actual service. 3. Study on reconfigurable modeling However, in the case of software failures occur, not all of the component agents and connector agents can be reconfigured to meet the user’s requirement of the software business. During the design, the critical software business generally will be designed reconfigurable. The formal modeling of multi-agent reconfigurable process is as follows: Re_Model :: = < Re_seti, <Re_act_set>, Re_PS, Re_Cor > Re_seti refers to the serial number of the multiple agent set which participates in reconfigurable process; <Re_act_set> refers to the collection of each agent's action, in a reconfigurable process, each agent’s effective actions constitute the set of actions; Re _PS refers to the service rule library involved in reconfiguration; Re_Cor refers to the service strategies, including coordination, collaboration and consultation between the multiple agent. Re_act_set:: =< Re_act_seti, <Re_act _com>, <Re_act _con>> Re_act _com::= <Fcomi, Rcomi_set > Re_act _con:: = <Fconi, Rconi_set > The Re_act_seti refers to the serial number of the reconfigurable action; <Re_act_com> refers to the set of reconfigurable component agent; <Re_act_con> refers to the set of reconfigurable connector agent, Fcomi means the serial number of the failed component agent; Rcomi_set refers to a group of component agent which can complete the Fcomi function of the failed component agent through reconfigurable actions; Fconi means the serial number of the failed connector agent; Rconi_set refers to a group of connector agent which can complete the Fconi function of the failed connector agent through reconfigurable actions. 3 3.3. Study on the availability simulation of multi-agent based reconfigurable NSS There are some other functional agents in the availability simulation of the reconfigurable NSS except for component agent, connector agent, business agent (Bus_Agent), service agent (Ser_ Agent) or reconfigurable agent. These agents are used to implement specific functions to ensure the smooth of the simulation operations and the collection of simulation data. These agents include Schedule Agent (Sch_Agent), Monitor Agent (Mon_Agent), Corresponce Agent (Cor_Agent), Data Agent (Dat_Agent) and GUI Agent (Gui_Agent), etc. Schedule Agent is to set the simulation time, decide when the simulation system starts and terminates the simulation when the conditions are met simulation; Monitor Agent collected the data during the simulation in order to achieve real-time display; Corresponce Agent used to provide multiple means of communication among the agents; Data Agent can handle various data during the simulation process to describe the system’s macro performance; GUI Agent is used to receive input data and send output data. The simulation architecture is shown in Fig. 3. Dat_Agent Mon_Agent Re_Model Ser_Agent Sch_Agent Bus_Agent Com_Agent Con_Agent Cor_Agent Fig. 3. Reconfigurable NSS simulation architecture Various types of agent's properties and behavior models are described as follows: Sch_Agent=<Schi, Sch_clock, Sch_Cori>, Schi is for the sequence number of the schedule agent; Sch_clock is for the simulation clock; Sch_Cori is for the connect-out Corresponce agent. Mon_Agent=<Moni, Mon_type, Mon_ Cori >, Moni is for the sequence number of the monitor agent; Mon_type is for the type of the monitor agent; Mon_ Cori is for the connect-out corresponce agent. Cor_Agent=<Cori, Cor_type, in_agents, out_agents>, Cori is for the sequence number of the Corresponce Agent; Cor_type is for the type of the Corresponce Agent, includes monitor agent corresponce, component agent corresponce, connect Agent corresponce; in_agents is for the connect-in agent; out_agents is for the connect-out agent. Dat_Agent=<Dati, Data_type>, Dati is for the sequence number of data agent; Data_type is for the type of data agent, Gui Agent=<Guii, Gui_type>, Guii is for the sequence number of the GUI agent; Gui_type is for the type of the GUI Agent. In the simulation platform, a variety of agents’ behavior is scheduled to coordinate by schedule agent in order to ensure the normal operations of the simulation system. The simulation clock utilizes the equal step method to promote service agent, connector agent, component agent, and ensure the time synchronization of each agent and update the status at the same time. The statistical time of different kinds of time in the availability metrics model is arrived through simulation clock, thus the prediction of the reconfigurable NSS availability will be obtained. 4. APPLICATION An information processing system is selected to study its availability simulation here. The system is responsible for receiving all kinds of data to meet a variety of requirements of management and application. Meanwhile, the system output different kinds of special information for other systems in order to meet the diverse requirements of the users. Thus, this demand the systems must have very high availability. This information processing system is taken as an application case to study the availability prediction based on the multi-agent modeling and simulation method though designing it as a reconfigurable system. As stated above, this proposed application is study on the simulation platform ‘Netlogo’. Netlogo is a modeling and simulation platform, which is programmable and able to simulate the evolution of complex object behavior. It’s especially suitable for the complex systems’ modeling and simulation which is constantly changing with the interaction time. In order to facilitate the system simulation, the following principles are set for the implementation of simulation. 1) Both component agent and connector agent have only two states, failure mode and normal running state; 2) The failure of the component agent and connector agent are independent with each other; 3) In order to accelerate the operation of the software system, the reliability of component agent and connector agent are both set to 0.9999; 4) Reconfigured behavior can be instantaneous with key business-related component failure occurs; 5) The using probability of each software business is the same. On this basis, multi-agent method is utilized to make the availability model of the reconfigurable NSS. The simulation system has been run to get the final state which is shown in Fig. 4. Fig. 4. Availability of simulation results The nodes represent the component agent, amount to 306. Independent node refers to this component agent can provide some of the software business alone. Directed lines represent the connector Agent, amount to 459. Black nodes refers to the agent cannot be reconfigured to returned to normal once failure occurs, and these agents are the agent composed of non-critical software business. The dark gray nodes refers to the agent can be reconfigured to returned to normal once failure occurs, and these agents are the agent composed of critical software business. The simulation system’s availability curve is showed in Fig. 5 after running for some time. The horizontal axis represents the running time; the vertical axis represents the availability of the system, the value of availability metric interval is set to [50%, 100%] in order to display expediently. The black curve represents the availability variation tendency of the non-reconfigurable system; the gray curve represents the availability variation‘s tendency of the 4 14. C. Chowdhury, S. Neogy. Reliability Estimate of Mobile Agent System for Qos Manet Applications. Proceedings Annual Reliability and Maintainability Symposium, (2011) Jan 24-27; Florida, USA 15. E. M. Holloway, G. B. Lamont, and G. L. Peterson. Network Security Using Self Organized Multi Agent Swarms. IEEE Symposium on Computational Intelligence in Cyber Security, (2009) March 30 -April 2; Nashville,USA 16. L. Meng, M. Lu, and J. Lai. The Multi-Agent Based Reliability Simulation Approach for Networked Software System. International Journal of Advancements in Computing Technology. 3, 10 (2011) 17. J. C. Laprie. Dependable Computing and Fault Tolerance: Concepts and Terminology, IEEE the 15th International symposium on fault-tolerant computing, (1985) June 15-18; Wisconsin, USA 18. A. Avizienis, J.C. Laprie. Randell B. et al. Basic Concept and Taxonomy of Depenable and Secure Computing. Dependable and Secure Computing. 1, 1 (2004) 19. M. Wooldridge, N. R. Jennings. Agent Theories, Architectures, and Langeuages: A Survey.Workshop on Agent Theories Architecture and languages, (1995)August 19-20; Montreal, Canada 20. M. Wooldridge, N. R. Jennings. Intelligent Agent: Theory and Practice. Knowledge Engineering Review. 10, 2 (1995) reconfigurable system. Fig. 5. Comparison to reconfigurable NSS and non-reconfigurable NSS According to the analysis of the above results, the availability of the two systems is similar in the early running period of NSS. However, with the advance of simulation time, the reconfigurable system’s availability is significantly higher than the availability of non-configuration system, and the high part is gradually increasing. This indicates that reconfigurable behavior has a significant role in the availability of NSS. Therefore, in some critical system, using the reconfigurable method can improve this kind systems’ availability. 5. CONCLUSIONS According to the multi-agent technology, this paper analyzes and solves the availability prediction of reconfigurable NSS from the perspective of complex systems. Multi-agent based modeling and simulation method is used to verify that the availability of reconfigurable system have obvious improvement than non- reconfigurable System with running time increasing. In the future work, we can do further research from the following aspects: To Coordinate the number and costs of the reconfigurable component agent and connector agent with development costs; and based on works above, to research the selection criteria of the reconfigurable component agent and connector agent. References and Notes Reconfigurability, Information Systems. 1. Z. Feng, K. He, and Y. Ma. Towards Individualized Requirements Specification Evolution for Networked Software Based On Aspect. Making Globally Distributed Software Development a Success Story, (2008) May 10-11; Leipzig, Germany 2. Dependability and Security by Enhanced http://www.deserec.eu/index.html 3. Caban D. Dependability of Large Reconfigurable DepCos-RELCOMEX, (2009) June 30 -July 2; Brunow, Poland 4. Y. O. Boon, Y. Ch. Huah, Y. N Cheah. Dynamic Service Placement and Redundancy to Ensure Service Availability During Resource Failures. Information Technology (ITSim), (2010) Jun 15-17; Kuala Lumpur, Malaysia 5. E. L. Droguett, M. Moura, and C. M. Jacinto. A Semi-Markov Model with Bayesian Belief Network Based Human Error Probability for Availability Assessment of Downhole Optical Monitoring Systems. Simulation Modeling Practice and Theory. 16, 10 (2008) 6. C. W. Kang, M. W. Golay. A Bayesian Belief Network-Based Advisory System for Operational Availability Focused Diagnosis of Complex Nuclear Power Systems. Expert Systems with Applications. 17, 1 (1999) 7. M. Neil, D. Marquez. Availability Modeling of Repairable Systems Using Bayesian Networks. Engineering Applications of Artificial Intelligence, (2010) 8. M. Palviainen, A. Evesti, and E. Ovaska. The Reliability Estimation, Prediction and Measuring of Component-Based Software. The Journal of Systems and Software. 84, 6 (2011) 9.C. Hsu, C. Huang. An Adaptive Reliability Analysis Using Path Testing for Complex Component-Based Software Systems. IEEE Transactions on Reliability. 60, 1 (2011) 10. H. Hu. Reliability Analysis for Component-Based Software System in Open Distributed Environments. International Journal of Computer Science and Network Security. 7, 5 (2007) 11. N. R. Jenning. An Agent-Based Approach for Building Complex Software Systems. Communication of ACM. 44, 4 (2001) 12. M. Daoud, Q. H. Mahmoud. A Fuzzy Approach to Reliability Estimation of Mobile Agent-Based Systems. IEEE International Conference on Systems, Man and Cybernetics, (2007) Oct 7-10; Montreal, Canada 13. C. Chowdhury, S. Neogy. Estimating Reliability of Mobile Agent System for Mobile Ad Hoc Networks. Third International Conference on Dependability, (2010) July 18 - 25; Venice, Italy 5
1010.0034
1
1010
2010-09-30T23:03:07
Spectral Control of Mobile Robot Networks
[ "cs.MA", "eess.SY", "math.OC" ]
The eigenvalue spectrum of the adjacency matrix of a network is closely related to the behavior of many dynamical processes run over the network. In the field of robotics, this spectrum has important implications in many problems that require some form of distributed coordination within a team of robots. In this paper, we propose a continuous-time control scheme that modifies the structure of a position-dependent network of mobile robots so that it achieves a desired set of adjacency eigenvalues. For this, we employ a novel abstraction of the eigenvalue spectrum by means of the adjacency matrix spectral moments. Since the eigenvalue spectrum is uniquely determined by its spectral moments, this abstraction provides a way to indirectly control the eigenvalues of the network. Our construction is based on artificial potentials that capture the distance of the network's spectral moments to their desired values. Minimization of these potentials is via a gradient descent closed-loop system that, under certain convexity assumptions, ensures convergence of the network topology to one with the desired set of moments and, therefore, eigenvalues. We illustrate our approach in nontrivial computer simulations.
cs.MA
cs
Spectral Control of Mobile Robot Networks Michael M. Zavlanos, Victor M. Preciado and Ali Jadbabaie 0 1 0 2 p e S 0 3 ] A M . s c [ 1 v 4 3 0 0 . 0 1 0 1 : v i X r a Abstract -- The eigenvalue spectrum of the adjacency matrix of a network is closely related to the behavior of many dynami- cal processes run over the network. In the field of robotics, this spectrum has important implications in many problems that require some form of distributed coordination within a team of robots. In this paper, we propose a continuous-time control scheme that modifies the structure of a position-dependent network of mobile robots so that it achieves a desired set of adjacency eigenvalues. For this, we employ a novel abstraction of the eigenvalue spectrum by means of the adjacency matrix spectral moments. Since the eigenvalue spectrum is uniquely determined by its spectral moments, this abstraction provides a way to indirectly control the eigenvalues of the network. Our construction is based on artificial potentials that capture the distance of the network's spectral moments to their desired values. Minimization of these potentials is via a gradient descent closed-loop system that, under certain convexity assumptions, ensures convergence of the network topology to one with the desired set of moments and, therefore, eigenvalues. We illustrate our approach in nontrivial computer simulations. I. INTRODUCTION A wide variety of coordinated tasks performed by teams of mobile robots critically rely on the topology of the un- derlying communication network and its spectral properties. Examples include, cooperative manipulation [1] -- [3], surveil- lance and coverage [4] -- [6], distributed averaging [7] -- [9], for- mation control [10] -- [12], flocking [13, 14], and multi-robot placement [15] -- [17], that all require some form of network connectivity, structure and, oftentimes, spectral properties. In this paper we address the problem of controlling a network of mobile robots to a topology with a desired eigenvalue spectrum. This effort is a first step towards the design of controllers that allow robots to perform their assigned tasks, while optimizing coordination within the team. The eigenvalue spectra of a network provide valuable information regarding the behavior of many dynamical pro- cesses running within the network [18]. For example, the eigenvalue spectra of the Laplacian and adjacency matrices of a graph affects the mixing speed of Markov chains [19], the stability of synchronization of a network of nonlinear oscillators [20, 21], the spreading of a virus in a network [22, 23], as well as the dynamical behavior of many decen- tralized network algorithms [24]. Similarly, the second small- est eigenvalue of the Laplacian matrix (also called spectral gap) is broadly considered a critical parameter that influences the stability and robustness properties of dynamical systems Michael M. Zavlanos is with the Dept. of Mechanical Engineer- ing, Stevens Institute of Technology, Hoboken, NJ 07030, USA, [email protected]. Victor. M. Preciado and Ali Jadbabaie are with the Dept. of Electrical and Systems Engi- neering, University of Pennsylvania, Philadelphia, PA 19104, USA, {preciado,jadbabai}@seas.upenn.edu. that are implemented over information networks [25, 26]. Optimization of the spectral gap has been studied both in a centralized [27] -- [29] and decentralized context [30]. In this paper, we propose a novel framework to control the structure of a network of mobile robots to achieve a desired eigenvalue spectrum. In particular, we focus on the spectrum of the weighted adjacency matrix of the network, with weights that are (decreasing) functions of the inter- robot distances. This construction is relevant, for example, in modeling the signal strength in wireless communication networks. Although our framework performs well with dif- ferent distance metrics, in this paper, we focus on the (cid:96)1 norm (Manhattan distance) primarily for analytical reasons, since its composition with convex functions preserves their convexity. Additionally, this metric has potential applications in indoor navigation where the presence of obstacles forces the signals to propagate in grid-like environments. We employ a novel abstraction of the eigenvalue spectrum in terms of the associated spectral moments, and define artificial potentials that capture the distance between the network's spectral moments and their desired values. These potentials are minimized via a gradient descent algorithm, for which we show convergence to the globally optimal mo- ments. Since the eigenvalue spectrum is uniquely determined by the associated spectral moments, our approach provides a way to indirectly control a network's eigenvalues. This work is related to [31], which addresses a similar problem for static robots in discrete environments. This formulation, however, is more appropriate for robotics applications, where communication depends continuously on the robot motion. The rest of this paper is organized as follows. In Section II- A, we introduce some graph-theoretical notation and useful results. In Section II-B, we formulate the control problem under consideration. We introduce an artificial potential and derive the associated motion controllers in Section III-A and discuss convergence of our approach in Section III-B. Finally, in Section IV, we illustrate our approach with several computer simulations. II. PRELIMINARIES & PROBLEM DEFINITION A. Notation and Preliminaries In this section we introduce some nomenclature and results needed in our exposition. Let G = (V , E , W ) denote a weighted undirected graph, with V = [n] being a set of n nodes, E ⊆ V × V a set of e undirected edges, and W ∈ Re a set of weights associated to the edges. If {i, j} ∈ E we call nodes i and j adjacent (or neighbors), which we denote by i ∼ j. In this paper, we consider graphs without self-loops, i.e., {i,i} (cid:54)∈ E for all i ∈ V . We denote by ai j = a ji ∈ R+ the + weight associated with edge {i, j} ∈ E , and assume that ai j = 0 for {i, j} (cid:54)∈ E . We define a walk w of length k from node v0 to vk to be an ordered sequence of nodes (v0,v1, ...,vk) such that vi ∼ vi+1 for i = 0,1, ...,k−1. We define the weight aw of a walk w = (v0,v1, ...,vk) as aw = ∏k−1 A weighted graph can be algebraically represented via its weighted adjacency matrix, defined as the n× n symmetric matrix AG = [ai j], where ai j is the weight of edge {i, j}. In this paper we are particularly interested in the spectral properties of AG . Since AG is a real symmetric matrix, it has a set of real eigenvalues λ1 ≥ λ2 ≥ ... ≥ λn. The powers of the adjacency matrix AG can be related to walks in G : i=0 avi,vi+1. Lemma 1: Let G be a weighted undirected graph with no G can be written in terms self-loops. The (i, j)-th entry of Ak of walks in G as follows: (cid:105) (cid:104) Ak G = ∑ w∈W (k) i, j aw, i j where W (k) i, j node i to j in the complete graph Kn 1. is the set of all closed walks of length k from Proof: The above result comes directly from an alge- braic expansion of(cid:2)Ak (cid:105) (cid:104) G (cid:3) Ak G v0,vk v0,vk n ∑ v1=1 = (cid:104) (cid:105) . First, notice that av0,v1 Ak−1 G . v1,vk (cid:104) Using the above rule in a simple recursion, we can expand the entries of the decreasing powers of AG , to obtain av0,v1av1,v2...avk−1,vk Ak G = (cid:105) v0,vk 1≤v1,...,vk−1≤n ∑ k−1 ∏ i=0 = ∑ w∈W (k) i, j avi,vi+1, (cid:104) Ak−1 (cid:105) which is the statement of our lemma. The following result will be useful in our derivations: Lemma 2: Let G be a weighted undirected graph with no self-loops. Then, we have that G ) ∂tr(Ak ∂ ai j . G i j = 2k (1) Proof: First, notice that for any two matrices S = [si j] and B = [bi j], we have that tr (SB) = ∑i, j si jb ji. Consider S and B to be symmetric matrices. Then, we can write S = U + L, where U and L are upper and lower triangular matrices, respectively, with L = U T . Let i < j (the same holds for j < i), hence ∂ ∂ si j tr(SB) = = = (cid:34) ∂ ∂ si j ∂ ∑ ∂ si j ∂ ∂ ui j ∑ i< j i< j [tr(UB) + tr(LB)] ui jb ji +∑ i> j li jb ji ui jb ji +∑ ui jbi j j>i (cid:35) = b ji + bi j = 2bi j. 1The complete graph Kn, is the undirected graph with n nodes in which every pair of distinct vertices is connected by a unique edge. Then, we have that G ) ∂tr(Ak ∂ ai j = = k ∂ si j which completes the proof. ∂tr(SG Ak−1 G ) ∂ si j ∂tr(Ak−1 G SG ) ∂ si j + ∂tr(SG Ak−1 G ) ∂tr(AG SG Ak−2 G ) ∂ si j + ... + (cid:104) Ak−1 G (cid:105) i j , = 2k B. Problem Definition 1 . . . xT n (cid:2)xT Consider a group of n mobile robots and define by xi(t) ∈ Rd the position of robot i at time t ≥ 0. Let x = (cid:3)T ∈ Rdn denote the stacked column vector of x = u =(cid:2)uT all robot positions, so that xir is the r-th coordinate of the i-th robot position. We assume that we can control the position of the robots by the simple kinematic law (2) where ui (t) ∈ Rd is the control input applied to robot i, and uir (t) is the r-th coordinate of ui (t). (cid:3)T ∈ Rdn, For a given set of robot positions, {xi}n i=1, we define the weighted adjacency matrix of the network of robots as A(x) = [ai j(x)] with uT n . . . 1 ai j(x) (cid:44) e−c(cid:107)xi−x j(cid:107)z, (3) where c > 0 is a constant and z ∈ {1,2} denotes the (cid:96)1 or (cid:96)2 norm. Notice that A(x) is a symmetric matrix with position- dependent real eigenvalues, {λi (x)}n i=1. We define, further, the k-th spectral moment of A (x) by (cid:104) (cid:105) Ak (x) , (4) mk (x) (cid:44) 1 n n ∑ i=1 λ k i (x) = 1 n tr for 1 ≤ k ≤ n, where the last equality follows from diag- onalizing Ak (x). For any finite network with n nodes, its eigenvalue spectrum is uniquely defined by the sequence of n moments (m1,m2, ...,mn). Therefore, we can simultane- ously control the whole set of eigenvalues of a network by controlling the first n spectral moments of A (x). This gives rise to the following problem that we aim to address: {m(cid:63) k}n k=1 denote a desired set of spectral moments. Design control laws ui for all robots i = 1, . . . ,n so that the adjacency matrix A(x) of the position-dependent robot network has spectral moments that satisfy mk(x) → m(cid:63) Problem 3 (Control of spectral moments): Let k for all k = 1, . . . ,n. Controlling the eigenvalue spectrum of the adjacency matrix of a network is particularly important, since it is related to the behavior of interesting network dynamical properties [18]. In Section III we propose a gradient descent algorithm to address Problem 3 and discuss its convergence properties. In Section IV we illustrate our approach in numerical simulations. III. CONTROL OF SPECTRAL MOMENTS A. Controller Design Assume a given sequence of desired spectral moments {m(cid:63) k}n k=1 and define the cost function f (x) (cid:44) n ∑ k=1 1 4k (mk (x)− m(cid:63) k)2 , (5) where mk (x) is defined in (4). Define, further, the gradient descent control law u (cid:44) −∇x f (x). (6) i j (x) (cid:44)sgn(xir − x jr). Hence, we can write (10) using a s(r) Hadamard product as follows (11) ∂ ai j (x) ∂ xir = −c [A (x)◦ Sr (x)]i j . Ak−1(cid:105) (cid:104) Substituting (9) and (11) in (8), we have ∑ (cid:104) (A◦ Sr)Ak−1(cid:105) (mk (x)− m(cid:63) k) (mk (x)− m(cid:63) k) = − c n = − c n ∂ f (x) ∂ xir ∑ ∑ k=1 j=1 ji n n n k=1 , ii [A◦ Sr]i j n uir = (cid:18)1 with no self-loops has(cid:0)n ∑ c n k=1 n 2 Then, we can show the following result: Lemma 4: Let the adjacency matrix A = A (x) be defined as in (3) and assume that z = 1 ((cid:96)1 norm). Then, an explicit expression for the entries of u is given by (cid:19)(cid:104) (A◦ Sr)Ak−1(cid:105) , ii trAk − m(cid:63) k where Sr (x) = [si j] with si j (cid:44)sgn(xir − x jr). Proof: The adjacency matrix of an undirected graph (cid:1) independent entries (for example, the upper triangular entries). Each one of these entries are a function of the vector of positions x. Hence, applying the chain rule, we have the following expansion for the partial derivative of the cost function with respect to the entries xir: ∂ f (x) ∂ xir = ∑ 1≤p<q≤n ∂ f ∂ apq ∂ apq ∂ xir . (7) Furthermore, a particular entry apq depends solely on the position xp and xq; therefore, we have that ∂ apq = 0 if both ∂ xir p and q are different than i. Thus, for a fixed i, only the following summands in (7) survive ∂ api ∂ xir ∂ ai j ∂ xir ∂ f ∂ api ∂ f ∂ ai j ∂ f (x) ∂ xir ∂ aiq ∂ xir ∂ f ∂ aiq p=1 n ∑ ∑ ∑ (8) q=i = + = n , i j=1 where we have used that ai j = a ji and aii = 0. We now analyze each one of the partial derivatives in (8). First, from (5) and (4), we have that ∂ f ∂ ai j = = n ∑ k=1 1 n 1 2k (mk (x)− m(cid:63) (mk (x)− m(cid:63) ∑ k) n k) (cid:104) k=1 (cid:17)(cid:19) (cid:16) (cid:18)1 (cid:105) ∂ ∂ ai j n Ak−1 (x) tr Ak (x) , (9) i j where we have used Lemma 2 in the last equality. Second, from (3) we have that ∂ ai j (x) ∂ xir = −ce−c(cid:107)xi−x j(cid:107)1 ∂ ∂ xir = −cai jsgn (xir − x jr) , (cid:12)(cid:12)xir − x jr (cid:12)(cid:12) (the fact for xir (cid:54)= x jr is not differen- tiable at xir = x jr does not affect our analysis). Let us define the antisymmetric matrix Sr (x) = with that s(r) i j (x) (cid:105) (10) (cid:12)(cid:12) (cid:12)(cid:12)xir − x jr (cid:104) where both matrices A and Sr depend on x. Then, from (4), we obtain the statement of our lemma. An efficient relaxation of the spectral control Problem 3 results from controlling a truncated sequence of spectral moments (m1, ...,ms), for s < n. In this case, we can define a cost function s 1 k=1 ∑ k)2 , fs(x) = (12) and an associated control law u = −∇x fs(x). An explicit expression for u can be obtained by following the steps in the proof of Lemma 4, which result in 4k (mk (x)− m(cid:63) (cid:19)(cid:104) (A◦ Sr)Ak−1(cid:105) (cid:18)1 . (13) trAk − m(cid:63) k s u(s) ir = c n ∑ k=1 n ii Although controlling a truncated sequence of moments is not mathematically equivalent to controlling the whole eigenvalue spectrum of the adjacency, we observe a very good overall matching between the eigenvalues obtained from the relaxed problem and the desired eigenvalue spec- trum, especially for the eigenvalues of largest magnitude, which are usually the most relevant in dynamical problems (Section IV). B. Convergence Analysis To simplify convergence analysis of the closed-loop sys- its dynamics to the open set F = k, ∀ 1 ≤ k ≤ s}.2 We can ensure that x ∈ F tem (2), we restrict {x mk (x) > m(cid:63) for all time by adding the barrier potential bs(x) (cid:44) s ∑ k=1 εk 4k (cid:0)mk (x)− m(cid:63) 1 k (cid:1)2 , (14) to (5), for sufficiently small constants ε1, . . . ,εs > 0 (assum- ing that the initial state of the system is already in F ). The convergence properties of the resulting closed loop system x = −∇x( fs(x) +bs(x)) are discussed in the following result. k}s Theorem 5: Let {m(cid:63) k=1 denote a desired set of adjacency spectral moments and assume that x(0) ∈ F . Then, for sufficiently small ε1 . . . ,εs > 0, the closed loop system x = −∇x ( fs(x) + bs(x)) ensures that the moments {mk( x)}s approximate arbitrarily well the desired set {m(cid:63) k}s k=1. (15) k=1, where x = limt→∞ x(t), 2It is shown in Theorem 5 that this construction does not restrict convergence of the state variables to the desired equilibria. Proof: The time derivative of fs(x) + bs(x) is given by d dt ( fs(x) + bs(x)) = ∇x( fs(x) + bs(x)) x = −(cid:107)∇x( fs(x) + bs(x))(cid:107)2 2 ≤ 0 (16) and so the closed loop system is stable and x will converge to a minimum of fs(x) + bs(x). Since bs(x) → ∞ whenever x → ∂ F , where ∂ F = {x mk (x) = m(cid:63) k, ∀ 1 ≤ k ≤ s} = {x fs(x) = 0} denotes the boundary of the set F , equation (16) also implies that the set F is an invariant of motion for the system under consideration. Let P0 = {x xir(0) ≤ x jr(0) ⇒ xir ≤ x jr, ∀ i, j,r} denote the polytope defined by the relative positions of the robots with respect to their initial configuration x(0), so that x(0) ∈ P0 ∩ F (see Fig. 13). In what follows we show that as ε1, . . . ,εs → 0, the state variable x asymptotically reaches a value in the set P0 ∩ ∂ F , where fs(x) = 0. To see this, observe first that lim ε1,...,εs→0 ( fs(x) + bs(x)) = fs(x) for all x ∈ P0 ∩ F , i.e., for small enough ε1, . . . ,εs > 0, the potential fs(x) +bs(x) can be approximated by fs(x) in P0∩ F . Moreover, note that fs(x) is convex in the set P0 ∩ F . Convexity of fs(x) follows from the fact that −cxir − x jr is affine in P0 for any c > 0 and, therefore, −∑cxir − x jr is also affine for any number of terms in the summation. This implies that e−∑cxir−x jr is convex in P0 as a composition of a convex and an affine function and, therefore, trAk(x)− m(cid:63) k = 1 n = 1 n ∑∏e−cxir−x jr − m(cid:63) n ∑e−∑cxir−x jr − m(cid:63) 1 k k k is also convex as a sum of convex functions. Clearly, ntrAk(x)−m(cid:63) k is nonnegative for any x ∈ P0∩ F . Since any 1 power greater than one of a nonnegative and convex function is also convex, every one of the terms(cid:0) 1 (cid:1)2, for ntrAk(x)− m(cid:63) lim ε1,...,εs k = 1, . . . ,s, is convex, which implies that fs(x) is also convex in P0 ∩ F . Taking the limit of (16) we have that dt ( fs(x) + bs(x)) = fs(x) ≤ 0 in P0 ∩ F . Therefore, convexity of fs(x) along with the condition fs(x) ≤ 0 implies that x will converge to a global minimum of fs(x) in P0 ∩ F (recall that F is an invariant of motion for the system under consideration). Since { fs(x)} = fs(x)x∈P0∩∂ F = 0, inf d x∈P0∩(F∪∂ F ) we conclude that the system will converge to a network with spectral moments {mk(x)}s k=1 that are almost equal to the desired {m(cid:63) k}s k=1. The quality of the approximation depends on how small the constants ε1, . . . ,εs > 0 are. What remains is to show that ∂ F ⊂ P0. For this, assume that ∂ F (cid:54)⊂ P0. Then, if the desired set of moments {m(cid:63) k}s 3The polytope P0 essentially defines an ordering of the state variables. k=1 Fig. 1. Plot of the function e−xir−x jr. Note the boundary xir = x jr of two adjacent convex polytopes P. i (x(cid:63)) = m(cid:63) is realizable, there exists another polytope P (cid:63) (cid:54)= P0 such that ∂ F ⊂ P (cid:63). Equivalently, there exists a configuration x(cid:63) ∈ P (cid:63) such that A(x(cid:63)) has eigenvalues {λi(x(cid:63))}n i=1 with ∑n i=1 λ k k for all k = 1, . . . ,s. The result follows from the observation that P0 can be obtained from P (cid:63) by changing the relative positions of the robots in Rd. Mathematically, this means that there exists a permutation matrix Π ∈ Rnd×nd, i.e., an orthogonal matrix with 0 or 1 entries, such that that if P (cid:63) = {x Ex ≥ 0} with E ∈ Rn2d×nd, then P0 = {x E(Πx) ≥ 0}. Therefore, if x(cid:63) ∈ P (cid:63), then ΠT x(cid:63) ∈ P0. Moreover, A(ΠT x(cid:63))⊗ Id = Π(A(x(cid:63))⊗ Id)ΠT , i.e., a permutation of the robots' coordinates results in a permutation of the entries of (A(x)⊗ Id), where ⊗ indicates the Kronecker product between matrices. Since Π is orthog- onal, A(ΠT x(cid:63))⊗Id and A(x(cid:63))⊗Id have the same eigenvalues. Therefore, there exists a configuration x = ΠT x(cid:63) ∈ P0 such that A( x) has eigenvalues {λi( x)}n i=1 λ k i ( x) = m(cid:63) k for all k = 1, . . . ,s.4 This implies that ∂ F ⊂ P0. In the above discussion, we have used the fact that if i=1 are the eigenvalues of Y ∈ Rn×n and {zi}m {yi}n i=1 are the eigenvalues of Z ∈ Rm×m, then the eigenvalues of Y ⊗ Z are {y1z1, . . . ,y1zm, . . . ,ynz1, . . . ,ynzm}. This implies that the eigenvalues of A(x) ⊗ Id are essentially the eigenvalues of A(x), each one with multiplicity d. i=1 with ∑n Remark 6 (Barrier functions): The barrier functions bs(x) are necessary in the proof of Theorem 5. If not there, the quantities mk(x)− m(cid:63) k are not guaranteed to be positive and, fs(x) is not necessarily convex in therefore, the potential P0. This causes technical difficulties in ensuring a global minimum of fs(x). Also, the analysis in Theorem 5 assumes that ε1, . . . ,εs → 0. This essentially restricts the influence of the barrier potential bs(x) to a small neighborhood of the set ∂ F , so that the potential fs(x) remains unaffected out- 4Equivalently, this means that the two graphs are isomorphic. −1−0.500.51−1−0.500.5100.10.20.30.40.50.60.70.80.91 Fig. 2. Hexagonal formation of mobile robots. side this neighborhood. In practice, the closer the constants ε1, . . . ,εs are to zero, the better the approximation of the desired spectral moments. This approximation can be made arbitrarily good. Remark 7 (Distance metric): In the preceding analysis, we have employed the (cid:96)1 norm (z = 1) as a distance metric to define the entries of the adjacency matrix (see (3)). This choice is mainly due to technical reasons, since it ensures that trAk(x) and, therefore, fs(x), are convex functions. From a practical point of view, the (cid:96)1 metric has potential appli- cations in indoor navigation where the presence of obstacles forces the signals to propagate in grid-like environments. Nevertheless, our numerical simulations indicate that the control law herein proposed also performs well for z = 2 ((cid:96)2 norm). We leave a rigorous proof of this case for future work. IV. NUMERICAL SIMULATIONS In this section we present examples of spectral design of mobile robot networks and discuss performance of our proposed approach. Example 8 (Hexagonal Formation): Consider the prob- lem of controlling the structure of a network of mobile robots to match the eigenvalue spectrum of the hexagonal network on 7 nodes shown in Fig. 2. The target eigenvalues of the weighted adjacency matrix of this formation are i }7 {λ (cid:63) and the corresponding spectral moments are i=1 ={−0.51, −0.47, −0.40, −0.40, 0.05, 0.05, 1.70} , k}7 {m(cid:63) k=1 = {0, 0.53, 0.64, 1.22, 2.02, 3.47, 5.90} . The initial configuration of the mobile robot network is that of a random geometric graph on 7 nodes uniformly distributed in the square [0,1]× [0,1]. We applied the pro- posed control law (15) and studied the evolution of the spectral moments of the network's adjacency matrix. Fig. 3 shows the evolution of the second, third and fourth moment.5 5A similar behavior is observed for the higher order moments. Note that the first spectral moment is always equal to zero for simple graphs. Fig. 3. Evolution of second (blue), third (green) and fourth (red) spectral moments towards the moments of the hexagonal formation. As expected, they all converge to the desired values. The asymptotic values of all spectral moments of the network are {mk}7 k=1 = {0, 0.53, 0.65, 1.23, 2.04, 3.50, 5.95} , (cid:8)m(cid:63) (cid:9)7 k which are very close to the desired sequence of moments k=1, and slightly on the larger side, as predicted by Theorem 5. The eigenvalues of the weighted adjacency matrix of the final configuration are i=1 ={−0.52, −0.48, −0.42, −0.40, 0.02, 0.10, 1.70} , {λi}7 which are also very close to the desired values. Notice that our approach fits better those eigenvalues further away from the origin, since they are more heavily weighted in the expression of spectral moments, than those close to zero. An alternative approach to overcome this limitation would be to modify our cost function (5) to assign more weight to eigenvalues of small magnitude. {mk}4 As discussed in Section III-A, we also consider a relax- ation of Problem 3, that involves a truncated sequence of the first four moments of the network. In this case, the cost function is given by (12) and the closed loop system is defined in (15), for s = 4. The asymptotic values of the first four spectral moments of the network are k=1 = {0, 0.55, 0.65, 1.26} and eigenvalues of the final configuration are {λi}7 i=1 ={−0.55, −0.50, −0.42, −0.31, −0.09, 0.18, 1.71} , which are remarkably close to the set of desired eigenvalues, especially those far from zero. The main advantages of using a relaxation of Problem 3 are (i) that it reduces the computational cost of the controller, since it only requires the terms trAk and Ak−1, and (ii) that it improves the stability of the numerical behavior of the gradient descent algorithm. Example 9 (Random Geometric Network): In this exam- ple we consider the problem of matching the eigenvalue spectrum of a particular realization of a random geometric Fig. 4. Random geometric graph with 10 nodes. The width of each edge is proportional to its weight. Fig. 5. Evolution of second (blue), third (green) and fourth (red) spectral moments towards the moments of the random geometric graph. graph on 10 nodes that are uniformly distributed in [0,1]× [0,1]. This target realization is illustrated in Fig. 4, where the thickness of each edge is proportional to its weight. The eigenvalues of the weighted adjacency matrix of this network are {λ (cid:63) i=1 = {−0.89, −0.85, −0.84, −0.79, −0.77, −0.68, i }10 −0.61, 0.02, 0.27, 5.16} , and the corresponding sequence of spectral moments is k}k>0 = {0, 3.11, 13.45, 71.60, 368.36, 1905, . . .} . {m(cid:63) We applied the control law (15) using the cost function (5) and starting with a different realization of the random geometric graph on 10 nodes in the square [0,1] × [0,1]. In this case, matching the whole set of spectral moments directly provides us with a very good approximation of the eigenvalues spectrum. As before, we also considered the relaxation of Problem 3 involving only a truncated sequence consisting of the first 4 moments. The evolution of the second, third and fourth moments of the network is shown in Fig. 5. The asymptotic values of the spectral moments of the network are {mk}k>0 = {0, 3.13, 13.46, 71.63, . . .} , which are remarkably close to the desired ones and, as in the previous example, slightly on the larger side. Similarly, the final set of eigenvalues is {λ (cid:63) i=1 = {−0.94, −0.87, −0.85, −0.83, −0.74, −0.59, i }10 −0.55, −0.27, 0.50, 5.16} , which is a very good fit to the given eigenvalues, especially for those far from zero. V. CONCLUSIONS AND FUTURE RESEARCH In this paper, we proposed a novel control framework to modify the structure of a mobile robot network in order to control the eigenvalue spectrum of its adjacency matrix. We introduced a novel abstraction of the eigenvalue spectrum by means of the spectral moments and derived explicit gradient descent motion controllers for the robots to obtain a network with the desired set of moments. Since the eigenvalue spectrum is uniquely determined by the associated spectral moments, our approach provides a way of controlling the eigenvalues of mobile networks. Convergence to the desired moments was always guaranteed due to convexity of the proposed cost functions. Efficiency of our approach was illustrated in nontrivial computer simulations. The adjacency matrix eigenvalue spectrum is relevant to the performance of many distributed coordination algorithms run over a network. Therefore, our approach is particularly useful in providing network structures that are optimal with respect to networked coordination objectives. Future work involves theoretical guarantees for the Eu- clidean distance metric (z = 2 in (3)), as well as extension of our results to the spectrum of Laplacian matrix of the network. Moreover, the relaxation of Problem 3 to a trun- cated sequence of moments does not guarantee (mathemati- cally) a good fit of the complete distribution of eigenvalues. Therefore, a natural question is to characterize the set of graphs most of whose spectral information is contained in a relatively small set of low-order moments. REFERENCES [1] K. M. Lynch and M. T. Mason, "Stable pushing: Mechanics, controlla- bility and planning," International Journal of Robotics Research, vol. 15, pp. 533-556, 1996. [2] M. J. Mataric, M. Nilsson, and K. Simsarian, "Cooperative multi- robot box-pushing," IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 556-561, 1995. [3] Z. Wang and V. Kumar, "Object closure and manipulation by multiple cooperating mobile robots," International Symposium on Distributed Autonomous Robotic Systems, pp. 394-399, 2002. [4] J. Cortes, S. Martinez, T. Karatas, and F. Bullo, "Coverage control for mobile sensing networks," IEEE Transactions on Robotics and Automation, vol. 20, pp. 243-255, 2004. [5] L. E. Parker, "Distributed algorithms for multi-robot observation of multiple moving targets," Autonomous Robots, vol. 12, pp. 231-255, 2002. [6] S. Poduri and G. S. Sukhatme, "Constrained coverage for mobile sensor networks," IEEE International Conference on Robotics and Automation, pp. 165-172, 2004. [7] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of mobile autonomous robots using nearest neighbor rules," IEEE Transactions on Automatic Control, vol. 48, pp. 988-1001, 2003. [8] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and cooperation in networked multi-robot systems," Proceedings of the IEEE, vol. 95, pp. 215-33, 2007. [9] W. Ren and R. Beard, "Consensus seeking in multi-robot systems un- der dynamically changing interaction topologies," IEEE Transactions on Automatic Control, vol. 50, pp. 655-661, 2005. [10] J. P. Desai, J. P. Ostrowski, and V. Kumar, "Modeling and control of formations of nonholonomic mobile robots," IEEE Transactions on Robotics and Automation, vol. 17, pp. 905-908, 2001. [11] J. Lawton, B. Young, and R. Beard, "A decentralized approach to elementary formation maneuvers," IEEE International Conference on Robotics and Automation, pp. 2728-2733, 2005. [12] M. Mesbahi and F. Y. Hadaegh, "Formation flying control of mul- tiple spacecraft via graphs, matrix inequalities and switching," AIAA Journal of Guidance, Control and Dynamics, vol. 24, pp. 369-377, 2001. [13] R. Olfati-Saber, "Flocking for multi-robot dynamic systems: Algo- rithms and theory," IEEE Transactions on Automatic Control, vol. 51, pp. 401-420, 2006. [14] H. G. Tanner, A. Jadbabaie, and G. J. Pappas, "Flocking in fixed and switching networks," IEEE Transactions on Automatic Control, vol. 52, pp. 863-868, 2007. [15] S. L. Smith and F. Bullo, "Target assignment for robotic networks: Asymptotic performance under limited communication," American Control Conference, pp. 1155-1160, 2007. [16] M. M. Zavlanos and G. J. Pappas, "Dynamic assignment in distributed motion planning with local coordination," IEEE Transactions on Robotics, vol. 24, pp. 232-242, 2008. [17] S. Kloder and S. Hutchinson, "Path planning for permutation-invariant multi-robot formations," IEEE Transactions on Robotics, vol. 22, pp. 650-665, 2006. [18] V.M. Preciado, Spectral Analysis for Stochastic Models of Large-Scale Complex Dynamical Networks, Ph.D. dissertation, Dept. Elect. Eng. Comput. Sci., MIT, Cambridge, MA, 2008. [19] D.J. Aldous, "Some Inequalities for Reversible Markov Chains," J. London Math. Soc., vol. 25, pp. 564-576, 1982. [20] L.M. Pecora and T.L. Carroll, "Master Stability Functions for Synchro- nized Coupled Systems," Physics Review Letters, vol. 80, pp. 2109- 2112, 1998. [21] V.M. Preciado, and G.C. Verghese, "Synchronization in Generalized Erdos-R´enyi Networks of Nonlinear Oscillators," IEEE Conference on Decision and Control, pp. 4628-4633, 2005. [22] M. Draief, A. Ganesh, and L. Massouli´e, "Thresholds for Virus Spread on Networks," Annals of Applied Probability, vol. 18, pp. 359-378, 2008. [23] V.M. Preciado, and A. Jadbabaie, "Spectral Analysis of Virus Spread- ing in Random Geometric Networks," IEEE Conference on Decision and Control , 2009. [24] N.A. Lynch, Distributed Algorithms, Morgan Kaufmann Publishers, 1997. [25] A. Fax, and R. M. Murray, "Information Flow and Cooperative Control of Vehicle Formations," IEEE Transactions on Automatic Control, vol. 49, pp. 1465-1476, 2004. [26] R. Olfati-Saber, and R. M. Murray, "Consensus Problems in Networks of robots with Switching Topology and Time-Delays," IEEE Transac- tions on Automatic Control, vol. 49, pp. 1520-1533, 2004. [27] A. Ghosh, and S. Boyd, "Growing Well-Connected Graphs," Proc. of the 45th IEEE Conference on Decision and Control, pp. 6605-6611, 2006. [28] R. Grone, R. Merris, and V.S. Sunder, "The Laplacian Spectrum of a Graph," SIAM Journal Matrix Analysis and Applications, vol. 11, pp. 218-238, 1990. [29] Y. Kim, and M. Mesbahi, "On Maximizing the Second-Smallest Eigenvalue of a State Dependent Graph Laplacian," IEEE Transactions on Automatic Control, vol. 51, pp. 116-120, 2006. [30] M.C. DeGennaro, and A. Jadbabaie, "Decentralized Control of Con- nectivity for Multi-robot Systems," IEEE Conference on Decision and Control, pp. 3628-3633, 2006. [31] V. M. Preciado, M. M. Zavlanos, A. Jadbabaie and G. J. Pappas, "Distributed control of the Laplacian spectral moments of a network," American Control Conference, pp. 4462-4467, 2010.
1505.04142
1
1505
2015-05-15T18:03:53
An informational study of the evolution of codes and of emerging concepts in populations of agents
[ "cs.MA" ]
We consider the problem of the evolution of a code within a structured population of agents. The agents try to maximise their information about their environment by acquiring information from the outputs of other agents in the population. A naive use of information-theoretic methods would assume that every agent knows how to "interpret" the information offered by other agents. However, this assumes that one "knows" which other agents one observes, and thus which code they use. In our model, however, we wish to preclude that: it is not clear which other agents an agent is observing, and the resulting usable information is therefore influenced by the universality of the code used and by which agents an agent is "listening" to. We further investigate whether an agent who does not directly perceive the environment can distinguish states by observing other agents' outputs. For this purpose, we consider a population of different types of agents "talking" about different concepts, and try to extract new ones by considering their outputs only.
cs.MA
cs
An informational study of the evolution of codes and of emerging concepts in populations of agents Andr´es C. Burgos1 Daniel Polani2 1,2Adaptive Systems Research Group, University of Hertfordshire, Hatfield, UK 1Email address: [email protected], Tel: +44 1707 28 4490 Abstract We consider the problem of the evolution of a code within a structured population of agents. The agents try to maximise their information about their environment by acquiring information from the outputs of other agents in the population. A naive use of information- theoretic methods would assume that every agent knows how to "interpret" the information offered by other agents. However, this assumes that one "knows" which other agents one observes, and thus which code they use. In our model, however, we wish to preclude that: it is not clear which other agents an agent is observing, and the resulting usable information is therefore influenced by the universality of the code used and by which agents an agent is "listening" to. We further investigate whether an agent who does not directly perceive the environment can distinguish states by observing other agents' outputs. For this purpose, we consider a population of different types of agents "talking" about different concepts, and try to extract new ones by considering their outputs only. Keywords: information theory, code evolution, semantics, emerging concepts 1 1 Introduction If we consider organisms capable of processing information, then we can argue that they must be able to internally assign meaning to the symbols they perceive in a code-based manner [10]. For instance, bacteria perceives chemical molecules in their environment and interprets them in order to better estimate environmental conditions and (stochastically) decide their phenotype [24, 1, 23, 27]. Plants detect airborne signals released by other plants, being able to interpret them as attacks of pathogens or herbivores [13, 29]. Therefore, a correspondence between environmental conditions and chemical molecules must be established. It is in this way that Barbieri characterises codes, and he proposes three fundamental characteristics for them: they connect two independent worlds; they add meaning to information; and they are community rules [2]. Codes connect two independent worlds by establishing a correspondence or mapping between them. These worlds are independent and thus there are no material constraints for establishing arbitrary mappings. The meaning of information comes exclusively from the mapping: symbols by themselves are meaningless. Finally, the third property requires that the correspondence between the two worlds constitutes an integrated system. For instance, human languages establish a correspondence between words and objects [2]; in bacteria it is between chemical molecules and environmental and social conditions [35, 36]. Words (or chemical molecules) by themselves do not have any meaning, and each individual of a population can define, arbitrarily to some extent, their own set with its mapping. However, populations of individuals sharing the same code are ubiquitous in nature. How is it that codes come to be shared by many individuals when their constitution involve arbitrary choices for each individual? This question is what we are investigating in the present paper. For this work, we assume a simple scenario where organisms live in a fluctuating environment. If they can perfectly predict the future environmental conditions, they can prepare themselves by adopting a proper phenotype, and, therefore, survive. However, when uncertainty about the environment remains, organisms will follow a bet-hedging strategy [31, 28], where they try to maximise their long-term growth rate by adopting the phenotype that matches the environment in proportions based on the information they have about it. For example, seeds of annual plants germinate stochastically in different periods in relation to the probability of rainfalls, and their chances of survival are maximised when they match this probability [6]. The relation between information and long-term growth rate can be expressed elegantly in information theoretic terms, where an increase in the environmental information of an organism 2 is translated into an increase in its long-term growth rate [30, 17, 18, 8, 26]. Such models achieve the maximisation of the long-term growth rate by maximising an organism's information about the environment. If we assume this behaviour in organisms, then those obtaining additional environmental information (other than that from their sensors, which we assume it does not completely eliminate environmental uncertainty) from other individuals will have an advantage over those that do not, since they would be able to better predict the future conditions. However, for individuals to be able to communicate with each other, they must be able to translate symbols into environmental conditions, where the output of these symbols results from an individual's code. We consider the code of an individual as a stochastic mapping from its sensors states to a set of outputs. For this study, we consider outputs (or messages) of individuals (or agents) as conventional signs. In semiotics, the science of all processes in which signs are originated, stored, communicated, and being effective [10], two types of signs are traditionally recognised: conventional signs and natural signs [7]. In conventional signs there is no physical constraint on the possible mappings, they are established by conventions. Although in physical systems there can be limitations to the possible mappings that can be implemented, in this work we assume complete freedom of choice. On the other hand, in natural signs, there is always a physical link between the signifier and signified, such as smoke as a sign of fire, odours as signs of food, etc. [3]. In this work, we are not interested in the particular detailed mechanisms by which an agent implements its code, nor how the agent decodes the outputs of other agents. Instead, we focus on the theoretical limits on the amount of environmental information an agent can possibly acquire resulting from different scenarios of population structure and codes distribution. The natural framework to analyse such quantities is information theory [30]. However, it does not take semantic aspects into account, it only deals with frequencies of symbols instead of what they symbolise. Codes, on the other hand, add meaning to information, which makes the integration of sciences such as semiotics with information theory non-trivial [9, 4]. In the following section, we present an information-theoretic model which incorporates the necessity of conventions by dropping from the model the usual implicit assumption of knowing the identity of the communicating units. 2 Model To introduce the model in a progressive manner, let us first consider three agents, θ1, θ2 and θ3. Each of these agents depend on the same environmental conditions for survival, which are 3 modelled by a random variable µ. Agents acquire information about the environment through their sensors, which are modelled by random variables Yθ1, Yθ2 and Yθ3 , all three conditioned on µ, for agents θ1, θ2 and θ3, respectively. We assume each agent acquires the same amount and aspects of environmental information from µ, i.e. p(Yθ1µ) = p(Yθ2µ) = p(Yθ3µ). Let us further assume that the information each agent acquires about the environment does not eliminate its uncertainty, i.e. H(µYθi) > 0 for 1 ≤ i ≤ 3. The code of an agent is a stochastic mapping from its sensor states into a set of outputs, and is represented by the conditional probabilities p(Xθ1Yθ1), p(Xθ2Yθ2) and p(Xθ3Yθ3) for agents θ1, θ2 and θ3, respectively (see Fig. 1). µ Yθ1 Yθ2 Yθ3 Xθ1 Xθ2 Xθ3 Figure 1: Bayesian network representing the relantionship between the sensor and output variables of three agents. Let us assume that agent θ1 perceives only the outputs of agents θ2 and θ3. One possible way of computing the information about the environment agent θ1 has is to consider the mutual information between µ and the joint distribution of the sensor of θ1 and the outputs of θ2 and θ3: I(µ; Yθ1, Xθ2, Xθ3). However, by writing down this quantity, we are implicitly assuming that agent θ1 "knows" which output corresponds to θ2 and which output corresponds to θ3. Therefore, in this consideration, an agent can theoretically do the translations of the outputs according to some internal model of other agents and infer the mentioned amount of information about its environment. 2.1 Indistinguishable sources of messages For this study, on the contrary, we consider an agent observing other agents' messages, but under the assumption that the originator of a message cannot be identified. In this way, the total amount of information an agent can infer from the outputs of other agents will depend on to which extent it either can identify who the other agents are or can rely on them using a coding scheme that does not depend too much on their particular identity. For instance, if agents θ2 and θ3 both agree on the output for each of the environmental conditions, then agent θ1 should be able to infer 4 more environmental information than if they disagree on the output for each of the environmental conditions, given that agent θ1 does not know which of the agents it is observing. To model this idea, let us assume a random variable Θ(cid:48) denoting the selected agent. This agent depends on the same environmental conditions for survival as θ1, which are modelled, as above, by a random variable µ. Agents acquire information about the environment through their sensors, which are modelled by a random variable YΘ(cid:48) conditioned on the index variable denoting the agent under consideration, Θ(cid:48), and µ. The amount of acquired sensory information of a specific agent θ(cid:48) about µ is given by I(µ; Yθ(cid:48)). As above, the code of an agent is a stochastic mapping from its sensor states into a set of messages, and is represented by the conditional probability p(Xθ(cid:48)Yθ(cid:48)) for an agent θ(cid:48) (see Fig. 2). µ Yθ1 Xθ1 YΘ(cid:48) XΘ(cid:48) Θ(cid:48) Figure 2: Bayesian network representing the relationships as described above (see text). However, now we want to model the fact that we do not know which agent is observed. In the case with maximum uncertainty, Θ is uniformly distributed, and then this parametrisation of the codes considers the outputs of all agents in Θ(cid:48) altogether, such that if we are not observing Θ(cid:48), we cannot identify whose agent's output we are observing. In Eq. 3 and Eq. 4 we show two examples of codes for agents θ2 and θ3, while their sensor states are define by the Eq. 2 (Eq. 1 defines the sensors states of agent θ1). We compute how much information about the environment there is when the outputs of both agents (θ2 and θ3) are considered together by agent θ1. (cid:18) y1 1 −   (cid:19) y2  1 −  P r(Yθ1µ) := µ1 µ2 (1) P r(YΘ(cid:48)µ, Θ(cid:48)) :=  y1 1 −   1 −    (2) y2  1 −   1 −  θ2, µ1 θ2, µ2 θ3, µ1 θ3, µ2 If we assume p(θ2) = p(θ3) = 1/2, and p(µ1) = p(µ2) = 1/2 and  = 0.01, then if we consider the codes shown in Eq. 3, we have that I(µ; Yθ1 , XΘ(cid:48)) = 0.97872 bits, where Θ(cid:48) consists of agents θ2 and θ3. However, had θ2 and θ3 "opposite" codes as shown in Eq. 4, then I(µ; Yθ1 , XΘ(cid:48)) = 0.9192 5 P r(XΘ(cid:48)YΘ(cid:48), Θ(cid:48)) :=  x1 x2 0 1 1 0 0 1 0 1  (3) θ2, y1 θ2, y2 θ3, y1 θ3, y2 P r(XΘ(cid:48)YΘ(cid:48), Θ(cid:48)) :=  x1 x2 0 1 1 0 1 0 1 0  (4) θ2, y1 θ2, y2 θ3, y1 θ3, y2 bits, which is exactly I(µ; Yθ1), that is, I(µ; XΘ(cid:48)Yθ1) = 0 bits (agent θ1 cannot acquire any side information from the outputs of agents θ2 and θ3). We should note here that the sensor states y1 and y2 of agents θ2 and θ3 in the conditional probability shown in Eq. 1 and 2 refer almost deterministically to the same environmental condition, and therefore the loss of side information is thus entirely due to the incompatible codes. The conditional probabilities of sensor states given the environmental conditions further defined throughout the paper are also assumed to be almost deterministically. 2.2 Environmental information of a population The model shown in Fig. 2 considers the environmental information of agent θ1, ignoring its own output Xθ1. Nevertheless, agents ignoring their outputs is contrary to our assumption over the incapability of agents to identify the sources of the outputs. On the other hand, we are assuming a specific type of communication, one which could be classified as persistent within the different classifications of stigmergy ([37, 33, 22], see [14] for a summary). To incorporate this option in the model shown in Fig. 2, we could consider the state space of Θ(cid:48) as the set {θ1, θ2, θ3}. Then, to express not only the environmental information of agent θ1, but the average environmental information of the whole population, we can parametrise the agent by a random variable Θ (defined over the same state space, representing the same set of agents as Θ(cid:48)), such that p(YΘµ, Θ) = p(YΘ(cid:48)µ, Θ(cid:48)) (i.e., YΘ(cid:48) is i.i.d. to YΘ, and vice versa). µ YΘ YΘ(cid:48) Θ XΘ(cid:48) Θ(cid:48) Figure 3: Bayesian network representing the sensor variables of a set of agents indexed by the random variable Θ, and the sensor and output variables of a copy of the set of agents indexed by Θ named Θ(cid:48). 6 In this way, the average environmental information of a population of the agents selected by Θ is given by I(µ; YΘ, XΘ(cid:48)) (see Fig. 3). This measure can be consider as the objective function to maximise in our model. However, we would be making two important assumptions: first, this objective function assumes agents have access to the environmental conditions µ, which they indirectly do but only through their sensors; and second, every agent would perceive the output of every other agent, including itself. In this work, instead, we propose that agents follow a behaviour such that it maximises the similarity of their outputs (via their codes) with those of which the agent perceives. A consequence of this behaviour is that the average information about µ is also maximised. In addition, we will introduce a potentially flexible "population structure", so that we can specify which agents interact with which. 2.3 Code similarity First, we introduce a copy of the codes of the agents, such that when we instantiate the variables XΘ and XΘ(cid:48), the probabilities are the same. The structure of the population is then given by p(Θ, Θ(cid:48)) = p(Θ)p(Θ(cid:48)). However, the conditional independence of Θ and Θ(cid:48) restricts significantly the diversity of the structures that can be represented. Θ perceive the outputs of all the agents selected by Θ(cid:48) and vice versa. In order to model a general interaction structure between agents, we consider p(Θ, Θ(cid:48)) not independent, as shown in In such cases, the agents selected by the Bayesian network in Fig. 4, where we introduce a helper variable Ξ. This allows different agents selected by Θ to perceive outputs from exclusive agents selected by Θ(cid:48). µ YΘ YΘ(cid:48) Θ XΘ XΘ(cid:48) Θ(cid:48) Ξ Figure 4: Bayesian network representing the relantionship of the variables in the model of code evolution. YΘ(cid:48) is an i.i.d copy of YΘ and XΘ(cid:48) is an i.i.d. copy of XΘ. Θ(cid:48) covers the same set of agents as Θ, but its probability distribution is not necessary the same. 7 We define the objective function as I(XΘ; XΘ(cid:48)), that is the average code similarity of a pop- ulation of agents according to the population structure p(Θ, Θ(cid:48)). For instance, if the interaction probability of two agents is zero, then the similarity of the codes of these two agents is irrelevant for the objective function. On the other hand, they interact with probability bigger than zero (p(θ, θ(cid:48)) > 0, for some agents θ and θ(cid:48)), then how similar their codes are will influence I(XΘ; XΘ(cid:48)). If we consider our system as a process in time, then at each time-step two agents are chosen according to p(Θ, Θ(cid:48)). Agent Θ reads the output of agent Θ(cid:48) (generated via its code, which is i.i.d over time), and let us assume that it stores the pair (YΘ, XΘ(cid:48)), i.e. its current sensor state together with the perceived output. If this is repeated a large number of times, then the total amount of environmental information that can be inferred from the collected statistics by the population is bounded by I(µ; YΘ, XΘ(cid:48)). This is the theoretical limit to which we refer in the introduction, and for this study we are not interested in how the inference is computed. However, we implicitly assume that agents decode the perceived outputs according to their codes. 2.4 Distance between two codes In order to visualise the evolution of codes, we define the distance between the codes of two agents θi and θj as the square root of the Jensen-Shannon divergence [40, 19] between them. This measure has the property that 0 ≤ JSD(θi, θj) ≤ 1 when log2 is used, and the square root yields a metric. Let us note that this distance requires the sensor states Y to be named identically (for the corresponding states of µ) among agents in order to be meaningful. As we stated above, this is (closely) the case in all our experiments. This requirement over the sensor states discards the possibility of using other measures such as mutual information. dist(θi, θj) = = (cid:113) JSD(cid:0)p(XθiYθi)p(XθjYθj )(cid:1) (cid:114) 1 D(cid:0)p(XθiYθi)p(XθkYθk )(cid:1) + (cid:0)p(XθiYθi) + p(XθjYθj )(cid:1). 2 where p(XθkYθk ) = 1 2 D(cid:0)p(XθjYθj )p(XθkYθk )(cid:1) 1 2 (5) 8 3 Methods To illustrate the behaviour of our model, we consider four different scenarios, which are described in Sec. 4. The common parameters for the first two experiments are the following: the population consists of 25 agents; the amount and quality of the acquired sensory information is the same for every agent, that is p(YΘµ) = p(YΘ(cid:48)µ). For the third scenario, the only difference is that we con- sider only 15 agents, since the dimensions to consider with a flexible structure grows quadratically with the number of agents. The optimisation algorithm used in the following experiments is CMA-ES (Covariance Matrix Adaptation Evolution Strategy), which is a stochastic derivative-free method for non-linear op- timisation problems [12]. We utilised the implementation provided by the Shark library v3.0.0 [15] with its default parameters, which implements the CMA-ES algorithm described in [11]. The evolutionary algorithm used for optimisation does not intend to represent the actual evolution of the codes. Instead, we are interested in the solutions of this optimisation process, which are representative of the possible outcomes of evolution. To visualise the evolution of the codes of the agents, we use the method of multidimensional scaling provided by R version 2.14.1 (2011-12-22). This method takes as input the distance matrix between codes, and plots them in a two-dimensional space preserving the distances as well as possible. To visualise, not only the distances between the resulting codes, but also how they relate to the distances between initial codes, we provide a distance matrix of both initial and resulting codes. The initial codes are randomly set by the evolutionary algorithm. 4 Results In this section, we analyse the outcome of the four different scenarios where code similarity is maximised. While the outcomes are particular for one simulation, they are illustrative of the richness that the model is able to capture, which is described for each scenario. The outcomes are typical solutions, and we cannot perform statistics over simulations since the many solutions are qualitatively different. However, the outcome of each scenario is presented together with a description of alternative outcomes, giving indicators of achievement of local/global optimum. 9 4.1 Well-mixed population In the first scenario, each agent θi perceives the output of every other possible agent θj with the same probability, that is p(θi, θj) = 1/252 for every i, j ∈ [1, 25]. The maximum average code similarity is bounded by I(YΘ; YΘ(cid:48)) = 1.71908 bits, which is achieved under two conditions: first, every code must be a one-to-one mapping; second, the code must be universal. This is indeed the outcome of the performed optimisation, as we show in Fig. 5: the optimised codes (blue points) converged into a universal code (the distance between any of them is zero). Each red (diamond) point correspond to an initial code. Figure 5: 2-dimensional plot of code distance: red points are codes at the beginning of the optimisation process; blue points are codes at the end of the optimisation process (where the distance between every pair of codes is zero). The resulting code adopted by the population is a one-to-one mapping between sensor states and outputs, and any of the 24 possible one-to-one mappings is a global maximum (there are 4 sensor states and 4 possible outputs). However, it is still interesting to briefly analyse the possible paths towards a universal and optimal code. In Fig. 6, we show the distribution of the adopted codes by the agents of the population in an iteration of the optimisation process where the average code similarity is I(XΘ; XΘ(cid:48)) = 1.18276 bits. Here, the most popular code is the suboptimal code shown in Fig. 6 (a). This results from the particular initialised codes, driving the agents temporarily towards a suboptimal code. However, once any of the many-to-one codes becomes (nearly) universally adopted, then any code's deviation improving the code similarity will eventually drive the convention towards optimality. The fact that it does not need simultaneous changes in the code increases the likeliness of improving the code similarity. 10 −0.6−0.4−0.20.00.20.40.6−0.4−0.20.00.20.4dimension 1dimension 2llllllllllllllllllllllllllinitial codesfinal codes Figure 6: Representation of the codes p(xy) by a heat-map using inverse grayscale. For each evolved code, we output the number of agents adopting it. This code distribution was achieved with 25 agents in a well-mixed population. 4.2 Spatially-structured population In another set-up, we assume the agents are structured in a 5 × 5 grid, where p(θ, θ(cid:48)) = 1/105 if θ and θ(cid:48) are neighbours or when θ = θ(cid:48) (see Fig. 8 for a representation of the structure). After randomly initialising the codes, the performed optimisation plateaued on an average code similarity of I(XΘ; XΘ(cid:48)) = 1.13536 bits. As in the former scenario, here the optimal solution is also a universal code with a one-to-one mapping. However, in this case, the result is not a universal code, as can be appreciated in Fig. 7. Spatially structured populations are sensitive to the initial codes and how codes are updated. a a c e e a a c e e b b d f f b b b g h b b b b d Figure 7: 2-dimensional plot of code distance: Figure 8: Representation of the spatial structure points in diamond shape represent codes at the be- utilised for the experiment. Agents are assumed to ginning of the optimisation process; rounded points be distributed in a grid: an edge from one agent to represent codes at the end of the optimisation pro- another means that one agent perceives the output cess. The points are coloured in order to be able to of the other. Agents are labelled (see Fig. 9) and relate this plot with the figure beside it. coloured according to their adopted code. The resulting code distribution among the population is shown in Fig. 9, with 8 different codes 11 y1y2y3y4x1x2x3x4x1x2x3x4x1x2x3x4x1x2x3x4x1x2x3x4(a)20(b)1(c)2(d)1(e)1−0.6−0.4−0.20.00.20.40.6−0.4−0.20.00.20.4dimension 1dimension 2llllllllllllllllllllllllllinitial codesfinal codes in the population. Where well-mixed populations evolved the use of common codes, agreement on codes only occurred among neighbours in spatially structured populations. As a consequence, many local conventions are established within neighbourhoods, and, once this situation is reached, the improvement of the total code similarity requires simultaneous changes to the agent's codes. For instance, the code shown in Fig. 9 (e) could increase the average similarity of the population if p(x2y1) = 1, as it is in the rest of the codes. However, for this to happen (in this particular case), at least two agents need to change their code simultaneously (otherwise the average similarity decreases), which makes the deviation from the resulting code distribution unlikely. Figure 9: Representation of the codes p(xy) by a heat-map using inverse grey scale. For each evolved code, we output the number of agents adopting it. This code distribution was achieved with 25 agents in a grid structure. 4.3 Flexible population structure For the third scenario, we let the structure co-evolve with the codes without any constraint (the probability distribution of the interaction between agents, p(Ξ), is optimised together with the codes). In this case, the resulting average code similarity is nearly optimal, but the code is not necessarily universal. This is because, when the structure is not fixed, agents form roughly disconnected clusters of related codes. In this process, the interaction probability of agents with unrelated codes will vanish. However, once the clusters are formed, if it is not a single isolated agent (such that no other agent perceives its output), then codes of agents are universal within each cluster. This is exemplified by the code distribution and population structure we obtained (see Fig. 10). Here, we have two clusters with universal codes, one optimal (in red) and the other suboptimal (in yellow). Agents with dissimilar codes from every other agent they interact with will become isolated in the optimisation process, as the example shows for two agents (light and dark blue). To summarise, the optimal code similarity equals I(YΘ; YΘ(cid:48)), and is achieved, for instance, when all agents adopt the same one-to-one mapping. Nevertheless, the interaction probability allows agents to form disconnected clusters of related codes, where several one-to-one mappings could 12 y1y2y3y4x1x2x3x4x1x2x3x4x1x2x3x4x1x2x3x4x1x2x3x4x1x2x3x4x1x2x3x4x1x2x3x4(a)4(b)9(c)2(d)2(e)4(f)2(g)1(h)1 result while still achieving optimality. Theoretically, we could have as many one-to-one mappings as the minimum between the amount of agents and the total one-to-one mapping combinations (24 in this case). Figure 10: Each node in the graph corresponds to the code of an agent. There is a weighted edge between agent θi and θj if p(θi, θj) > 0 (which is the weight). We omit weights of edges in the graph since they all are roughly of similar value. The temperature colours on top of the nodes indicate the amount of environmental information they would contribute to any agent perceiving only that agents output. 4.4 Emerging concepts in a well-mixed heterogeneous population So far, we have only considered populations of agents that acquired the same aspects of information from µ (i.e., p(Yθiµ) = p(Yθjµ) for any pair of agents θi, θj). The assumption was that the information that was relevant for the survival of the agents was the same among the agents of the population, and this was represented by µ. Now, we consider a more general scenario, where different types of agents acquire different aspects from the environmental conditions µ. We investigate whether it is possible for an agent that does not directly perceive the environment at 13 all (we call this type of agent "blind") to predict conditions based solely on the outputs of other agents. We consider a well-mixed population, such that different types of agents are forced to talk to each other. Considerations with a flexible population structure are not interesting for our purposes, since in these cases, each type of agent forms a cluster disconnected from clusters of other types. This was confirmed by simulations which are not shown here. Let us illustrate the idea with a relatively simple scenario: we consider five types of agents (we denote the i-th type φi), where each type can only distinguish whether the current state of the environment belongs to its coloured region or not. The environment consists of 9 states, and the probability of each state is uniformly distributed. We illustrate this environment by a 3×3 grid, as shown in Fig. 11, although the square does not denote the physical structure of the environment. Then, the outputs of each type of agent will be related to the regions they capture. For instance, for agents of type φ2 with the same deterministic code, if P r(µ ∈ {1, 2, 4, 5}Xθ = x) equals one (for all θ of type φ2), then x will signify that this agent is currently in the region coloured in red in Fig. 11. We say that a population of agents has a joint concept of the environment if by considering its representation of the environmental information they capture, we can obtain information about the environment, i.e. we require that I(µ; XΘ) > 0. For instance, the symbol x in the example above, assuming that it is only utilised by agents of the same type, can be understood as representing the concept "top-left" of the grid. 1 2 3 4 5 6 7 8 9 states of µ type φ1 type φ2 type φ3 type φ4 type φ5 Figure 11: Representation of the conditional probabilities p(Yθµ) for an agent θ of each type. These are defined such that each type of agent can only distinguish between the coloured region and the white region. For instance, the sensor of type φ2 is defined as P r(Y = y1µ) = 1 if µ ∈ {1, 2, 4, 5}, and zero otherwise, and P r(Y = y2µ) = 1 if µ /∈ {1, 2, 4, 5}, and zero otherwise. For type φ1, P r(Y = y1µ) = 0.5 and P r(Y = y2µ) = 0.5 (Y = 2 for all types of agents). The amount of environmental information that an agent θ of type φ1 (a blind agent) captures is I(µ; Yθ) = 0 bits, while all agents θ of the other types capture I(µ; Yθ) = 0.991076 bits (note that the total entropy in µ to be resolved is H(µ) = 3.16993 bits). Throughout this study, we considered that agents predict the environment by considering their perceptions together with the outputs of other agents. The blind agent, instead, since it is not able to capture any direct cue 14 from µ, we consider capable of perceiving the outputs of both of the agents selected by Θ and Θ(cid:48). With this relaxed consideration, we say a blind agent has a concept of the environment if I(µ; XΘ, XΘ(cid:48)) > 0, i.e. we consider the maximum amount of information an agent can possibly infer from the joint outputs XΘ and XΘ(cid:48). Let us recall that the structure of the population is well-mixed, and thus the distribution of outputs of all agents is considered, including the blind ones, which are not able to express (via their outputs) any particular concept by themselves (for a blind agent θ, I(µ; Xθ) ≤ I(µ; Yθ) = 0, i.e. I(µ; XΘ) vanishes). Therefore, whether a blind agent has some concept of the environment will depend, first, on the universality of the codes of each type of agent (agents representing the same information with different symbols may create ambiguities). Second, on the cardinality of X) utilised by the population. A small alphabet will force agents to the alphabet of X (i.e. represent different concepts of the environment with the same symbols, while a large alphabet is likely to result in exclusive representations of concepts for each type of agent. Taking this into account, we ask, is it possible for a blind agent to identify concepts of the environment? If so, how are these concepts related to the concepts of the individual agents (other than the blind ones)? Is the size of the available alphabet related to the quality of the concepts? To study these questions, we performed different experiments varying the size of the alphabet X, where the rest of the parameters remained the same. In these experiments, we optimised the similarity of codes for a population composed of 20 agents, with 4 agents of each of the five types. In Table 1 we show that the cardinality of the alphabet of X affects the limit of the amount of information a blind agent can possibly infer about the environment. Now, if we measure the uncertainty of the environment for a blind agent for each combination of outputs XΘ and XΘ(cid:48), we find that for some of them, it is zero. For instance, with X = 7, we found that when P r(µ = 5XΘ = 1, XΘ(cid:48) = 2) = 1.0 (see Fig. 12, where only combinations with XΘ ≤ XΘ(cid:48) are shown). These distributions are also valid when swapping the values of XΘ and XΘ(cid:48), since in the well-mixed population the structure is symmetric. Looking at the example of the conditional probability in Fig. 12, we can find many other concepts, although none of them -- apart from the one already discussed -- can uniquely identify a state of the environment. For instance, we have that P r(µXΘ = 3, XΘ(cid:48) = 6) = 0.33 when µ ∈ {3, 5, 7}, which is a concept for being on a particular diagonal of the environment. In Fig. 13 we show the resulting codes (which are universal for each type, including the blind one) for this particular experiment. Here, the types φ2 (red) and φ5 (purple) utilise the same 15 X 2 3 4 5 6 7 8 9 I(µ; XΘ, XΘ(cid:48)) 0.34621 0.56555 0.71620 0.95467 1.08139 1.18362 1.30919 1.30919 Table 1: Results of experiments where the size of the alpha- bet of a population varies. The maximum amount of environ- mental information that a blind agent can infer is achieved with X = 8 and remains equal for bigger alphabets. As the Figure 12: Conditional probabil- ity p(µXΘ, XΘ(cid:48) ) in inverse grey-scale. Each row represents a combination of values of XΘ and XΘ(cid:48) , and each column size of the alphabet decreases, this information also decreases. represents a state of µ. symbols to represent different environmental conditions. By using a small size of the alphabet for X, we force ambiguities in the population, but these will be chosen (by evolution) such that they are minimal. In this way, we maximise the amount of information we can infer from the outputs (although this can be a local optimum). For instance, the outputs of the blind agents (type φ1) for all the experiments never overlapped that of other types (unless we use X = 2, where there is no choice). In other words, blind agents always choose one symbol so that they minimise the amount of utilised symbols from the whole population. Figure 13: Representation of codes p(XΘYΘ, Θ) by a heat-map using inverse grayscale for the experiment with X = 7. For each node, the rows represent a sensor state y, while the columns represent an output state x. The colours on top of the nodes are used to distinguish the type of agent to whom the code belongs, and colours are related to those shown in Fig. 11. In all the performed experiments, we found that for values of X ≥ 6, the blind agent can perfectly predict the environmental state µ = 5 for at least one combination of outputs XΘ and XΘ(cid:48). Interestingly, this new concept, which in this particular experiment can be called the "centre" 16 µ1µ2µ3µ4µ5µ6µ7µ8µ9XΘ=1,XΘ(cid:48)=1XΘ=1,XΘ(cid:48)=2XΘ=1,XΘ(cid:48)=3XΘ=1,XΘ(cid:48)=4XΘ=1,XΘ(cid:48)=5XΘ=1,XΘ(cid:48)=6XΘ=1,XΘ(cid:48)=7XΘ=2,XΘ(cid:48)=2XΘ=2,XΘ(cid:48)=3XΘ=2,XΘ(cid:48)=4XΘ=2,XΘ(cid:48)=5XΘ=2,XΘ(cid:48)=6XΘ=2,XΘ(cid:48)=7XΘ=3,XΘ(cid:48)=3XΘ=3,XΘ(cid:48)=4XΘ=3,XΘ(cid:48)=5XΘ=3,XΘ(cid:48)=6XΘ=3,XΘ(cid:48)=7XΘ=4,XΘ(cid:48)=4XΘ=4,XΘ(cid:48)=5XΘ=4,XΘ(cid:48)=6XΘ=4,XΘ(cid:48)=7XΘ=5,XΘ(cid:48)=5XΘ=5,XΘ(cid:48)=6XΘ=5,XΘ(cid:48)=7XΘ=6,XΘ(cid:48)=6XΘ=6,XΘ(cid:48)=7XΘ=7,XΘ(cid:48)=7 of the world or environment, cannot be obtained by looking to individual concepts only. 5 Discussion We considered four different scenarios of code evolution: in the first one, all agents perceived the outputs of all other agents, including itself. We argued that two main stages of evolution can be recognised: in the first stage, a universal code is established, which can be optimal or not. If it is not optimal, then a second stage will achieve optimality. The same result was obtained in [34], in a model of the evolution of the genetic code (represented as a probabilistic mapping between codons and amino acids), although universality and optimality were simultaneously achieved. In the mentioned work, which developed further the ideas of [38, 39], the authors argue that the universality of the genetic code is a consequence of early communal evolution, mediated by horizontal gene transfer (HGT) between primitive cells. In this evolutionary process, they argue, larger communities will have access (through the exchange of genetic material) to more innovations, leading to faster evolution than smaller ones. Then, "it is not better genetic codes that give an advantage but more common ones" [34]. Although their model does not explicitly show this property, it is captured in our model. We show that a more common, but not optimal code is widely adopted within a population (see Fig. 6). However, in our model, a code imposes itself as universal not because it provides access to more innovations (in our model there is no "code exchange", only the outputs are shared), but because the population structure forces the adoption of the most popular code. After this stage, further changes in the code of the agents eventually lead to optimality. In another related work, [21] explored the origins of language in a scenario consisting of artificial agents with a coupled perception and production of speech sounds. Although this work is focused on plausible mechanisms for the origin of language, it assumes the same similarity principle as we do (hearing a vocalisation increases the probability of producing similar vocalisations), arriving to the same outcome (a universal language, or code). Other works have considered similar principles in the evolution of languages: for instance, the naming game [32] and the imitation game [5]. However, these models assume some common conventions in order to evolve new ones. In this study, our main assumption was that the population of agents depended on common environmental conditions. Our second scenario, where the structure of the population is a grid, showed how establishing local conventions in early stages of evolution constrains the outcome of the code distribution, 17 since to reconcile different conventions, several simultaneous changes are needed. On the other hand, in our third scenario, where we let the structure of the population change simultaneously with the codes themselves, such situations are avoided by "disconnecting" clusters with dissimilar conventions. This property enhances evolution, and can potentially lead to the adoption of several different conventions within an increasingly fragmenting, or "speciating" population. Our last scenario assumed perceptual constraints on the environmental information of each agent, an we looked at emerging concepts within a well-mixed population. This scenario was studied in [20], where, as well as in our study, new conceptualisations of the world emerged as a result of considering together the concepts of every agent. In both studies, the new concept was not representable individually by any agent. Differently from the mentioned study, the new concepts obtained in our study were the result of a simple similarity maximisation principle, while in the work of [20], concepts were obtained through the modelling of an explicit fitness function. The evolution of conventional codes could be interpreted, in the widest sense, as a form of cultural evolution. For instance, considering the definition of culture given by [25]: "Culture is information capable of affecting individuals' behavior that they acquire from other members of their species through teaching, imitation, and other forms of social transmission.", it could be argued that a form of cultural information is present in organisms, such as bacteria or plants. Although there is a dependence among the different dimensions on which information is transmitted in organisms (if we assume the dimensions to be, for instance, genetic, epigenetic, behavioural and symbol-based, as proposed by [16]), our model assumes freedom of choice in one dimension, without direct influence on the others. Finally, communication between individuals of a population opens up the possibility of "signal cheaters", which could be either individuals that do not produce signals themselves but still perceive those of the others, or individuals who exploit other individual's learned responses to symbols to their advantage. However, our model does not allow such behaviour, since the code producing the outputs functions, implicitly, as the interpreter of the perceived signals. 6 Conclusion In the proposed model, we introduced a key assumption which allowed us to evolve, for some structures, universal and optimal codes. This assumption states that an agent cannot distinguish the sources of the outputs it perceives from other agents. Following from this, a universal code will necessary introduce semantics by relating symbols to environmental conditions (via the internal 18 states of the agent). Our model proposes an information-theoretic way of measuring the similarity within a population of codes. In this work, we proposed, as an evolutionary principle, that agents try to maximise their side information about the environment indirectly by maximising their mutual code similarity. This be- haviour produces several interesting outcomes in the code distribution of a structured population. Depending on the population structure, it captures the evolution of a universal and optimal code (well-mixed population structure), while also the evolution of different codes organised in clusters (in a freely evolving structure), which allows the establishment of optimal as well as suboptimal conventions. Finally, we considered a well-mixed heterogeneous population with perceptual constraints on the agents about the environment, and showed how, just by looking at the outputs of agents, it is possible to extract concepts that relate to the environment, concepts that none of the agents of the population could individually represent. References [1] G´abor Bal´azsi, Alexander van Oudenaarden, and James J Collins. Cellular decision making and biological noise: from microbes to mammals. Cell, 144(6):910 -- 25, March 2011. [2] Marcello Barbieri. The organic codes-An introduction to semantic biology. Genetics and Molecular Biology, 2003. [3] Marcello Barbieri. Biosemiotics: a new understanding of life. Die Naturwissenschaften, 95(7):577 -- 99, July 2008. [4] G´erard Battail. Applying Semiotics and Information Theory to Biology: A Critical Compar- ison. Biosemiotics, 2(3):303 -- 320, October 2009. [5] Bart De Boer. Self-organization in vowel systems. Journal of Phonetics, 2000. [6] Dan Cohen. Optimizing reproduction in a randomly varying environment. Journal of Theo- retical Biology, 12(1):119 -- 129, September 1966. [7] J Deely. On 'semiotics' as naming the doctrine of signs. Semiotica, 2006. [8] Matina C. Donaldson-Matasci, Carl T Bergstrom, and Michael Lachmann. The fitness value of information. Oikos, 119(2):219 -- 230, 2010. 19 [9] Donald Favareau. The evolutionary history of biosemiotics. Introduction to biosemiotics, pages 1 -- 67, 2007. [10] Dennis Gorlich, Stefan Artmann, and Peter Dittrich. Cells as semantic systems. Biochimica et biophysica acta, 1810(10):914 -- 23, October 2011. [11] Nikolaus Hansen and Stefan Kern. Evaluating the CMA evolution strategy on multimodal test functions. Parallel Problem Solving from Nature-PPSN VIII, 2004. [12] Nikolaus Hansen and A Ostermeier. Completely derandomized self-adaptation in evolution strategies. Evolutionary computation, 9(2):159 -- 95, January 2001. [13] Martin Heil and Richard Karban. Explaining evolution of plant communication by airborne signals. Trends in ecology & evolution, 25(3):137 -- 44, March 2010. [14] Francis Heylighen. Stigmergy as a generic mechanism for coordination: definition, varieties and aspects. Technical report, Working paper, 2011. [15] Christian Igel, Verena Heidrich-meisner, and Tobias Glasmachers. Shark. Journal of Machine Learning Research, 9:993 -- 996, 2008. [16] Eva Jablonka, Marion J Lamb, and Anna Zeligowski. Evolution in four dimensions: Genetic, epigenetic, behavioral, and symbolic variation in the history of life, volume 5. MIT press Cambridge, MA, 2005. [17] J Kelly. A new interpretation of information rate. IEEE Transactions on Information Theory, 2(3):185 -- 189, 1956. [18] Edo Kussell and Stanislas Leibler. Phenotypic diversity, population growth, and information in fluctuating environments. Science (New York, N.Y.), 309(5743):2075 -- 8, September 2005. [19] J. Lin. Divergence measures based on the Shannon entropy. IEEE Transactions on Informa- tion Theory, 37(1):145 -- 151, 1991. [20] Marco Moller and Daniel Polani. Common concepts in agent groups, symmetries, and con- formity in a simple environment. Artificial Life XI, 2008. [21] PY Oudeyer. The self-organization of speech sounds. Journal of Theoretical Biology, 2005. [22] H Van Dyke Parunak. A survey of environments and mechanisms for human-human stigmergy. In Environments for Multi-Agent Systems II, pages 163 -- 186. Springer, 2006. 20 [23] Theodore J Perkins and Peter S Swain. Strategies for cellular decision-making. Molecular systems biology, 5(326):326, January 2009. [24] Thomas G Platt and Clay Fuqua. What's in a name? The semantics of quorum sensing. Trends in microbiology, 18(9):383 -- 7, September 2010. [25] Peter J Richerson and Robert Boyd. Not by genes alone: How culture transformed human evolution. University of Chicago Press, 2005. [26] Olivier Rivoire and Stanislas Leibler. The Value of Information for Populations in Varying Environments. Journal of Statistical Physics, 142(6):1124 -- 1166, March 2011. [27] Martin Schuster, D Joseph Sexton, Stephen P Diggle, and E Peter Greenberg. Acyl- homoserine lactone quorum sensing: from evolution to application. Annual review of mi- crobiology, 67:43 -- 63, January 2013. [28] J Seger and H. Jane Brockmann. What is bet-hedging? Oxford surveys in evolutionary biology, 1987. [29] Jyoti Shah. Plants under attack: systemic signals in defence. Current opinion in plant biology, 12(4):459 -- 64, August 2009. [30] C.E. Shannon. A mathematical theory of communication. Bell Systems Technical Journal, 27:379 -- 423, 1948. [31] Montgomery Slatkin. Hedging one's evolutionary bets. Nature, 250:704 -- 705, 1974. [32] L Steels. A self-organizing spatial vocabulary. Artificial life, 1995. [33] Guy Theraulaz and Eric Bonabeau. A brief history of stigmergy. Artificial life, 5(2):97 -- 116, January 1999. [34] Kalin Vetsigian, Carl R Woese, and Nigel Goldenfeld. Collective evolution and the genetic code. Proceedings of the National Academy of Sciences of the United States of America, 103(28):10696 -- 10701, 2006. [35] Christopher M Waters and Bonnie L Bassler. Quorum sensing: cell-to-cell communication in bacteria. Annual review of cell and developmental biology, 21:319 -- 46, January 2005. [36] Stuart a West, Ashleigh S Griffin, Andy Gardner, and Stephen P Diggle. Social evolution theory for microorganisms. Nature reviews. Microbiology, 4(8):597 -- 607, August 2006. 21 [37] Edward O Wilson. Sociobiology. Harvard University Press, 2000. [38] Carl R Woese. On the evolution of cells. Proceedings of the National Academy of Sciences of the United States of America, 99(13):8742 -- 7, June 2002. [39] Carl R Woese. A new biology for a new century. Microbiology and Molecular Biology Reviews, 68(2):173 -- 186, 2004. [40] a K Wong and M You. Entropy and distance of random graphs with application to struc- tural pattern recognition. IEEE transactions on pattern analysis and machine intelligence, 7(5):599 -- 609, May 1985. 22
1909.03475
1
1909
2019-09-08T14:18:31
An Architectural Style for Self-Adaptive Multi-Agent Systems
[ "cs.MA", "cs.SE" ]
Modern distributed software systems often operate in dynamic environments in which operation conditions change continuously and subsystems may come and go at will, e.g. intelligent traffic management and multi-robot systems. To manage these dynamics, these systems have to self-adapt their structures and behaviors dynamically. While we have witnessed significant progress over the past decade in the manner in which such systems are designed, persistent challenges remain. In particular, dealing with distribution and decentralized control remains one of the major challenges in self-adaptive systems. This report presents an architecture style that supports software architects with designing architectures for a family of decentralized self-adaptive systems. The architecture style structures the software in a number of interacting autonomous entities (agents) that cooperatively realize the system tasks. Multi-agent systems derived from the architectural style realize flexibility (agents adapt their behavior and interactions to variable operating conditions) and openness (agents cope autonomously with other agents that enter and leave the system). The architectural style consists of five related patterns that distill domain-specific architectural knowledge derived from extensive experiences with developing various multi-agent systems. The architectural patterns are specified using pi-ADL, a formal architectural description language supporting specification of dynamic architectures. This specification provides architects with a rigorous description of the architecture elements of the patterns, their interactions and behavior. We illustrate how we have applied the architectural style with excerpts of two cases from our practice: an experimental system for anticipatory traffic routing and an industrial logistic system for automated transportation in warehouse environments.
cs.MA
cs
An Architectural Style for Self-Adaptive Multi-Agent Systems DANNY WEYNS KU Leuven, Belgium and Linnaeus University, Sweden FLAVIO OQUENDO IRISA - Universit´e de Bretagne-Sud, France Modern distributed software systems often operate in dynamic environments in which oper- ation conditions change continuously and subsystems may come and go at will, e.g. intelligent traffic management and multi-robot systems. To manage these dynamics, these systems have to self-adapt their structures and behaviors dynamically. While we have witnessed significant progress over the past decade in the manner in which such systems are designed, persistent chal- lenges remain. In particular, dealing with distribution and decentralized control remains one of the major challenges in self-adaptive systems. This report presents an architecture style that sup- ports software architects with designing architectures for a family of decentralized self-adaptive systems. The architecture style structures the software in a number of interacting autonomous entities (agents) that cooperatively realize the system tasks. Multi-agent systems derived from the architectural style realize flexibility (agents adapt their behavior and interactions to variable oper- ating conditions) and openness (agents cope autonomously with other agents that enter and leave the system). The architectural style consists of five related patterns that distill domain-specific architectural knowledge derived from extensive experiences with developing various multi-agent systems. The architectural patterns are specified using π-ADL, a formal architectural description language supporting specification of dynamic architectures. This specification provides architects with a rigorous description of the architecture elements of the patterns, their interactions and be- havior. We illustrate how we have applied the architectural style with excerpts of two cases from our practice: an experimental system for anticipatory traffic routing and an industrial logistic system for automated transportation in warehouse environments. Categories and Subject Descriptors: D.2.11 [Software Engineering]: Software Architectures -- Domain-specific architectures; I.2.11 [Artificial Intelligence]: Distributed Artificial Intelligence -- Multi-agent systems General Terms: Design Additional Key Words and Phrases: Architectural style, patterns, self-adaptation, decentralized control, flexibility, openness; Authors' addresses: D. Weyns, Department of Computer Science, KU Leuven, 3000 Leuven Belgium and Lin- naeus University, 351 95, Sweden; [email protected]. F. Oquendo, IRISA Research Institute - Univer- sit´e de Bretagne-Sud, France, ENSIBS, BP 573, F-56017 Vannes Cedex, France; [email protected]. Permission to make digital/hard copy of all or part of this material without fee for personal or classroom use provided that the copies are not made or distributed for profit or commercial advantage, the ACM copyright/server notice, the title of the publication, and its date appear, and notice is given that copying is by permission of the ACM, Inc. To copy otherwise, to republish, to post on servers, or to redistribute to lists requires prior specific permission and/or a fee. c(cid:13) 2012 ACM 0000-0000/2001/0000-0001 $5.00 ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001, Pages . · 2 D. Weyns and F. Oquendo 1. INTRODUCTION Due to the increasing integration and dynamicity of software systems, providing and main- taining the required qualities of software constitutes a huge engineering challenge. Mod- ern distributed software systems, such as mobile multimedia applications, intelligent traffic management, and multi-robot systems usually comprise different subsystems that collabo- rate with each other as peers. Such systems typically have to operate in dynamic environ- ments in which operation conditions change continuously and subsystems may come and go at will. To manage these dynamics and maintain the required functionality and quali- ties, these systems have to self-adapt their structures and behaviors dynamically [Cheng et al. 2009; Weyns 2019]. Several researchers have argued that software architecture provides the right level of abstraction and generality to deal with the challenges of self- adaptability [Oreizy et al. 1999; Garlan et al. 2004; Kramer and Magee 2007; Weyns et al. 2012]. While we have witnessed significant progress over the past decade in the manner in which such systems are designed, persistent challenges remain [Dobson et al. 2006; Hueb- scher and McCann 2008; Salehie and Tahvildari 2009; Cheng et al. 2009; de Lemos et al. 2012; de Lemos et al. 2017]. In particular, dealing with distribution and decentralized control remains one of the major challenges in self-adaptive systems [Kramer and Magee 2007; Brun et al. 2009; Weyns et al. 2013]. This report presents an architecture style that supports software architects with design- ing a family of distributed self-adaptive systems in which control is decentralized. The architecture style distills the knowledge and expertise acquired from eight years of experi- ence with designing and developing multi-agent systems. Multi-agent systems are a class of decentralized self-adaptive systems, comprising of autonomous agents that inhabit some complex dynamic environment, sense and act autonomously in this environment, and by doing so realize a set of goals or tasks for which they are designed [Maes 1995; Jennings et al. 1998; Sterling and Taveter 2009; Weyns and Georgeff 2010]. The architecture style structures the software in a number of such interacting autonomous agents that coopera- tively realize the system tasks with two key quality properties: flexibility, i.e. agents adapt their behavior and interactions to variable operating conditions, and openness, i.e., agents cope autonomously with other agents that enter and leave the system. The architecture style consists of five related architectural patterns that provide generic solution schemes for recurring design problems. These architecture patterns make the ap- plication of the architecture style more operational. To document the architectural patterns we use a template inspired by the approach for documenting architecture styles presented in [Clements et al. 2010]. The elements of the architecture patterns and their relation- ships are specified in π-ADL [Oquendo 2004], a formally founded architecture description language. This specification provides a rigorous description of the architecture elements, their structures, and behaviors. The specification is type checked using the π-ADL.NET tool [Qayyum and Oquendo 2008]. The work presented in this report builds upon previous work [Weyns 2009] in which we have introduced a set of patterns for multi-agent systems. This report extends that work in multiple ways, including a refinement and elaborated discussion of the patterns of the architecture style, the application of the patterns to two applications including a system for anticipatory vehicle routing that was recently developed, and a systematic and complete specification of the structural and behavioral aspects of the architectural style in π-ADL. In addition, this report provides methodological guidelines for how to use the architecture ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 3 style in practice, and a classification of related work on patterns for multi-agent systems. Overview The report is structured as follows. In Section 2 we introduce situated multi-agent systems, the family of decentralized self-adaptive systems that are supported by the architecture style. We discuss the background of the architecture style and introduce two applications that we have built with the style and use for demonstration in the remainder of the paper. Section 3 gives a high-level overview of architectural style, explains the template we use to document patterns, and introduces the necessary basics of π-ADL. Section 4 is the heart of the report, providing a detailed description of the five patterns of the architectural style. Section 5 provides methodological guidelines for using the architecture style. Section 6 discusses related work, and Section 7 draws conclusions and looks at future work. For space reasons, we have omitted some parts of the π-ADL specification. For a complete π-ADL specification, we refer to the online Appendix A. 2. BACKGROUND This section introduces situated multi-agent systems, the family of self-adaptive systems supported by the architecture style. We give a brief overview of the applications that un- derly the architecture style and we introduce two applications from our practice that we use for illustration in the remainder of the report. Finally, we summarize the properties that determine the target domain of the architecture style. 2.1 Situated Multi-Agent Systems A multi-agent system is in essence a system that is structured as a set of autonomous agents. [Wooldridge and Jennings 1995] define an agent as "a computer system, situated in some environment, that is capable of flexible autonomous action in order to meet its design objectives." A multi-agent system is one that consists of a number of agents, which interact with one-another. [Durfee and Lesser 1989] define a multi-agent system as "a loosely coupled network of problem solvers (agents) that interact to solve problems that are beyond the individual capabilities or knowledge of each problem solver." Characteristics of multi- agent systems are as follows: (1) each agent has incomplete information or capabilities for solving the problem and, thus, has a limited viewpoint; (2) there is no system global control; (3) data is distributed; and (4) computation is asynchronous. Multi-agent systems are known for quality attributes such as adaptability, openness, robustness, and scalability, making them particularly interesting to deal with the demanding challenges of complex distributed software applications. Situated multi-agent systems are one family of multi-agent systems. The focus of sit- uated multi-agent systems is on modularization of agent behavior, efficient decision mak- ing, and indirect coordination [Maes 1990; Ferber 1999; Bandini et al. 2002; Mamei and Zambonelli 2004; Parunak et al. 2005; Weyns 2010]. This contrasts with delibera- tive approaches of multi-agent systems that emphasize knowledge representation, ratio- nality, planning, and direct communication [Rao and Georgeff 1995; Sycara et al. 1996; Wooldridge 2000; Pokahr et al. 2005; Bordini et al. 2007]. A particularly interesting as- pect of situated multi-agent systems is indirect coordination [Weyns et al. 2005; Weyns et al. 2007; Weyns et al. 2015]. Indirect coordination reduces the coupling between agents and provides a means for managing complexity by separation of concerns. Classical ex- amples of indirect coordination are computational fields [Mataric 1994; Mamei and Zam- ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 4 D. Weyns and F. Oquendo In bonelli 2004] and digital pheromones [Bonabeau et al. 1999; Parunak et al. 2005]. the approach of computational fields, agents coordinate their behavior by following the shape of virtual force fields that are spread through a shared coordination infrastructure. Environment dynamics and movements of the agents induce changes in the surface of the fields, realizing a feedback cycle that influences the agents' movement. In the ap- proach of digital pheromones, situated agents coordinate their behavior through digital markers (pheromones) in a shared coordination medium, similar to social ants. Agents can drop pheromones to form paths that can guide the agents to locations of interest. Digital pheromones evaporate over time. This mechanism ensures that paths to outdated informa- tion will fade away. These forms of indirect coordination are often constructed on top of basic mechanisms of shared memory based on tuple spaces [Carriero and Gelernter 1989; Schelfthout et al. 2005; Murphy et al. 2006; Mamei and Zambonelli 2009]. 2.2 Underlying Expertise of the Architecture Style The architecture style embodies architectural knowledge gained from the design and devel- opment of various multi-agent system applications. We extensively used the Packet -- World, a simple robotic application, as a study case for investigation and experimentation [Weyns et al. 2005]. We derived expertise from the design and development of a distributed peer-to- peer file sharing system [Schelfthout and Holvoet 2004; Weyns et al. 2004b]. Our focus in this application was on coordination mechanisms inspired by principles of social ants. We have applied multi-agent systems in several experimental robotic applications focussing on the roles agents play to set up collaborations [Steegmans et al. 2004; Weyns et al. 2004a]. We have employed a decentralized multi-agent system architecture in an industrial trans- portation system for controlling automatic guided vehicles [Weyns et al. 2005; Weyns et al. 2008]. A particular interest in this industrial application was on advanced coordina- tion mechanisms that enable situated agents to flexibly adapt their behavior to changes in the stream of tasks that enter the system and other environmental dynamics. We have been using agents in the domain of intelligent transportation systems, for example for traffic jam monitoring [Weyns et al. 2010], supply chains [Haesevoets et al. 2014], and anticipatory vehicle routing [Claes et al. 2011]. The focus here is on situated agents that exploit a co- ordination medium to dynamically organize themselves based on the changing context in which they are situated. Recently, we have also been studying how we can apply similar ideas in the management of dynamic supply chains [Haesevoets 2012]. We now introduce two cases that we use to demonstrate how we have applied the archi- tectural style and realized the patterns in our work. We start by introducing an experimental system for anticipatory vehicle routing. Then we introduce an industrial logistic system for automated transportation. 2.2.1 Anticipatory Vehicle Routing System. The first application is an experimental system to avoid traffic congestion based on anticipatory vehicle routing [Weyns et al. 2007; Claes et al. 2011]. Fig. 1 shows a high-level component model of the system. This application is situated in the domain of intelligent transportation systems, a world- wide initiative to exploit information and communication technology to improve traffic.1 The large number of vehicles today, the limited capacity of the road networks, and un- predictable dynamics of the traffic context (such as a fluctuating amount of traffic, chang- 1http://www.itsworldcongress.com/ ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 5 Fig. 1. Component model of the simulated anticipatory vehicle routing system ing behavior of drivers, traffic jams, and road accidents) make traffic routing a particu- larly challenging problem. Existing technology such as satellite navigation devices exploit broadcast traffic information to trigger vehicles to reroute and bypass traffic jams. Al- though such mechanisms allow substantial performance gain already, they only react upon traffic jams after they occurred. In our research, we study anticipatory vehicle routing that aims to encompass this by using forecast of traffic density. The approach presented here assumes that the road infrastructure is equipped with elec- tronic devices which provide some computation power and are connected through a net- work. Vehicles are equipped with smart devices which can sense that vehicle's local traffic conditions and which can communicate with other vehicles and electronic devices of the road infrastructure. On each vehicle device, a vehicle agent is deployed (see Figure 1) that has knowledge about that vehicle's start location and destination, and its current state such as position and speed. The vehicle agent provides information to the driver to reach its destination with minimal congestion overhead. On each infrastructure device, an infrastructure agent is deployed that has knowledge about the traffic conditions of a part of the road network and maintains bookings for future traffic. Each vehicle agent explores the relevant paths in the environment, and based on the evaluation of the possible alternatives, it chooses one path and records it as an intention. Therefore, the vehicle agent informs the corresponding infrastructure agents of the time the vehicle intends to occupy the corresponding road elements, i.e. the agents need to book these reservations. To explore paths and book reservations vehicle agents use so called ant agents. Ant agents are smart messages that travel on behalf of a vehicle agent along a path in the environment visiting a sequence of infrastructure agents [Holvoet et al. 2009]. A vehicle virtual environment reflects the real traffic environment. This virtual environ- ment is a distributed software entity that is deployed on each device in the traffic system. Vehicle agents and infrastructure agents use the virtual environment to enable the ant agents to explore feasible paths in the environment and make bookings for the selected paths. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. (cid:87)(cid:105)(cid:114)(cid:101)(cid:108)(cid:101)(cid:115)(cid:115)(cid:69)(cid:116)(cid:104)(cid:101)(cid:114)(cid:110)(cid:101)(cid:116)(cid:86)(cid:101)(cid:104)(cid:105)(cid:99)(cid:108)(cid:101)(cid:86)(cid:105)(cid:114)(cid:116)(cid:117)(cid:97)(cid:108)(cid:69)(cid:110)(cid:118)(cid:105)(cid:114)(cid:111)(cid:110)(cid:109)(cid:101)(cid:110)(cid:116)(cid:86)(cid:101)(cid:104)(cid:105)(cid:99)(cid:108)(cid:101)(cid:65)(cid:103)(cid:101)(cid:110)(cid:116)(cid:73)(cid:110)(cid:102)(cid:114)(cid:97)(cid:115)(cid:116)(cid:114)(cid:117)(cid:99)(cid:116)(cid:117)(cid:114)(cid:101)(cid:86)(cid:105)(cid:114)(cid:116)(cid:117)(cid:97)(cid:108)(cid:69)(cid:110)(cid:118)(cid:105)(cid:114)(cid:111)(cid:110)(cid:109)(cid:101)(cid:110)(cid:116)(cid:73)(cid:110)(cid:102)(cid:114)(cid:97)(cid:115)(cid:116)(cid:114)(cid:117)(cid:99)(cid:116)(cid:117)(cid:114)(cid:101)(cid:65)(cid:103)(cid:101)(cid:110)(cid:116)(cid:73)(cid:110)(cid:102)(cid:114)(cid:97)(cid:115)(cid:116)(cid:114)(cid:117)(cid:99)(cid:116)(cid:117)(cid:114)(cid:101)(cid:86)(cid:105)(cid:114)(cid:116)(cid:117)(cid:97)(cid:108)(cid:69)(cid:110)(cid:118)(cid:105)(cid:114)(cid:111)(cid:110)(cid:109)(cid:101)(cid:110)(cid:116)(cid:73)(cid:110)(cid:102)(cid:114)(cid:97)(cid:115)(cid:116)(cid:114)(cid:117)(cid:99)(cid:116)(cid:117)(cid:114)(cid:101)(cid:65)(cid:103)(cid:101)(cid:110)(cid:116)(cid:83)(cid:105)(cid:109)(cid:117)(cid:108)(cid:97)(cid:116)(cid:101)(cid:100)(cid:84)(cid:114)(cid:97)(cid:102)(cid:102)(cid:105)(cid:99)(cid:69)(cid:110)(cid:118)(cid:105)(cid:114)(cid:111)(cid:110)(cid:109)(cid:101)(cid:110)(cid:116)(cid:83)(cid:105)(cid:109)(cid:117)(cid:108)(cid:97)(cid:116)(cid:101)(cid:100)(cid:67)(cid:111)(cid:109)(cid:109)(cid:117)(cid:110)(cid:105)(cid:99)(cid:97)(cid:116)(cid:105)(cid:111)(cid:110)(cid:73)(cid:110)(cid:102)(cid:114)(cid:97)(cid:115)(cid:116)(cid:114)(cid:117)(cid:99)(cid:116)(cid:117)(cid:114)(cid:101)(cid:67)(cid:111)(cid:109)(cid:112)(cid:111)(cid:110)(cid:101)(cid:110)(cid:116)(cid:75)(cid:69)(cid:89)(cid:85)(cid:115)(cid:101)(cid:115) · 6 D. Weyns and F. Oquendo Flexibility and openness are key requirements in this domain as vehicles face contin- uously changing operating conditions, such as changing traffic conditions, new vehicles that enter and leave the system, etc. Therefore, vehicle agents may revise there intentions and book alternative routes when needed. To that end, the vehicle agents send new ant agents at regular times to explore changes in the environment and refresh bookings. This mechanism makes the system robust to dynamics in the traffic environment. Our experiments are done in simulation of a real-world traffic environment, which in- clude a model of the physical traffic environment and the communication network. The simulated environment maintains the state of elements of the physical system, provides the means for monitoring the state of elements in the system, determines the outcome of the actuator actions of the agents, and it collects and delivers messages. 2.2.2 Automated Transportation System. The second application is an industrial trans- portation system that was developed between 2004 and 2007 in a collaboration between researchers of DistriNet Labs and a team of engineers and developers of Egemin2, a leading company that provides full life cycle support for automated transportation systems [Weyns et al. 2005; Weyns et al. 2008; Weyns 2010]. An automated transportation system consists of a number of automatic guided vehicles (AGVs) that need to work together to transport loads in an industrial environment. Trans- port tasks are generated by client systems, typically an enterprise resource planning (ERP) system. The main functionalities that an AGV transportation system has to fulfill are as- signing incoming transportation tasks to appropriate AGVs, routing the AGVs through the warehouse efficiently while avoiding collisions and deadlocks, and recharging the AGVs' batteries. An AGV transportation system has to deal with dynamic and changing operating con- ditions. The stream of transportation tasks that enters the system is typically irregular and unpredictable, AGVs can leave and re-enter the system for maintenance, production ma- chines may have variable waiting times, etc. All kinds of disturbances can occur, supply of goods can be delayed, certain areas in the warehouse may temporarily be closed for main- tenance services, loads can block paths, AGVs can fail, etc. Despite these challenging operating conditions, the system is expected to operate efficiently and robustly. Traditionally, the AGV systems deployed by Egemin are directly controlled by a central server. The server plans the schedule for the system as a whole, dispatches commands to the AGVs, and continually polls their status. System operators monitor the system and intervene whenever needed. This results in reliable solutions. The central point of control also enables easy diagnosis of errors. However, a shift in user requirements challenges the centralized architecture. Customers increasingly request for systems that are able to adapt their behavior with changing circumstances autonomously, i.e. without intervention of an operator. For example, the system should adapt itself when the stream of transportation tasks changes dynamically, or when disturbances occur. Such self-adaptability requires flexibility and openness of the solution. Flexibility enables the system to deal with dynamic operating conditions autonomously, and openness enables it to deal with AGVs entering and leaving the system. Applying a situated multi-agent system opens perspectives to improve flexibility and openness of the system: the AGVs can adapt themselves to the current situation in their 2http://www.egemin.com/ ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 7 Fig. 2. High-level deployment model of a transportation system vicinity, order assignment is dynamic, the system can deal autonomously with AGVs leav- ing and reentering the system, etc. Fig. 2 shows a high-level deployment model of the agent-based system. Each vehicle is controlled by an AGV agent, and each transportation task in the system is represented by a transport agent that is deployed at the transport base. To realize the system requirements, AGV agents and transport agents have to coordinate, e.g. for task assignment, for collision avoidance, etc. Therefore, the agents exploit a local virtual en- vironment. The states of neighboring local virtual environments are synchronized using middleware services that run on top of the .NET platform. 2.3 Target Domain of the Architecture Style We summarize the key characteristics and requirements shared by the systems that underly the architecture style: -- The software systems are subject to dynamic and changing operating conditions, such as dynamically changing workloads and variations in availability of resources and services. -- Activity in the systems is inherently localized, i.e. global control or access to resources is difficult to achieve or even infeasible. -- Important stakeholder requirements are (1) flexibility: the software systems have to adapt to variable operating conditions autonomously; and (2) openness: the software systems have to cope autonomously with parts that come and go during execution. In addition, we consider the following constraints in terms of the domain: -- The speed of changes in the environment are orders of magnitude lower than the speed of communication and the execution of the control software. -- Quasi continual communication access to the distributed software system is available, e.g., via a LAN. -- We consider distributed software systems within a single ownership domain. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. (cid:65)(cid:71)(cid:86)(cid:77)(cid:105)(cid:100)(cid:100)(cid:108)(cid:101)(cid:119)(cid:97)(cid:114)(cid:101)(cid:83)(cid:101)(cid:114)(cid:118)(cid:105)(cid:99)(cid:101)(cid:115)(cid:77)(cid:105)(cid:100)(cid:100)(cid:108)(cid:101)(cid:119)(cid:97)(cid:114)(cid:101)(cid:83)(cid:101)(cid:114)(cid:118)(cid:105)(cid:99)(cid:101)(cid:115)(cid:84)(cid:114)(cid:97)(cid:110)(cid:115)(cid:112)(cid:111)(cid:114)(cid:116)(cid:66)(cid:97)(cid:115)(cid:101)(cid:65)(cid:71)(cid:86)(cid:86)(cid:105)(cid:114)(cid:116)(cid:117)(cid:97)(cid:108)(cid:69)(cid:110)(cid:118)(cid:105)(cid:114)(cid:111)(cid:110)(cid:109)(cid:101)(cid:110)(cid:116)(cid:84)(cid:66)(cid:86)(cid:105)(cid:114)(cid:116)(cid:117)(cid:97)(cid:108)(cid:69)(cid:110)(cid:118)(cid:105)(cid:114)(cid:111)(cid:110)(cid:109)(cid:101)(cid:110)(cid:116)(cid:46)(cid:78)(cid:69)(cid:84)(cid:65)(cid:71)(cid:86)(cid:86)(cid:105)(cid:114)(cid:116)(cid:117)(cid:97)(cid:108)(cid:69)(cid:110)(cid:118)(cid:105)(cid:114)(cid:111)(cid:110)(cid:109)(cid:101)(cid:110)(cid:116)(cid:65)(cid:71)(cid:86)(cid:77)(cid:105)(cid:100)(cid:100)(cid:108)(cid:101)(cid:119)(cid:97)(cid:114)(cid:101)(cid:83)(cid:101)(cid:114)(cid:118)(cid:105)(cid:99)(cid:101)(cid:115)(cid:46)(cid:78)(cid:69)(cid:84)(cid:46)(cid:78)(cid:69)(cid:84)(cid:65)(cid:71)(cid:86)(cid:65)(cid:103)(cid:101)(cid:110)(cid:116)(cid:65)(cid:71)(cid:86)(cid:65)(cid:103)(cid:101)(cid:110)(cid:116)(cid:84)(cid:114)(cid:97)(cid:110)(cid:115)(cid:112)(cid:111)(cid:114)(cid:116)(cid:65)(cid:103)(cid:101)(cid:110)(cid:116)(cid:84)(cid:114)(cid:97)(cid:110)(cid:115)(cid:112)(cid:111)(cid:114)(cid:116)(cid:65)(cid:103)(cid:101)(cid:110)(cid:116)(cid:67)(cid:108)(cid:105)(cid:101)(cid:110)(cid:116)(cid:115)(cid:75)(cid:69)(cid:89)(cid:67)(cid:111)(cid:109)(cid:112)(cid:111)(cid:110)(cid:101)(cid:110)(cid:116)(cid:80)(cid:114)(cid:111)(cid:99)(cid:101)(cid:115)(cid:115)(cid:105)(cid:110)(cid:103)(cid:110)(cid:111)(cid:100)(cid:101)(cid:115)(cid:115)(cid:105)(cid:116)(cid:117)(cid:97)(cid:116)(cid:101)(cid:100)(cid:105)(cid:110)(cid:119)(cid:97)(cid:114)(cid:101)(cid:104)(cid:111)(cid:117)(cid:115)(cid:101)(cid:87)(cid:105)(cid:114)(cid:101)(cid:108)(cid:101)(cid:115)(cid:115)(cid:69)(cid:116)(cid:104)(cid:101)(cid:114)(cid:110)(cid:101)(cid:116) · 8 D. Weyns and F. Oquendo These characteristics and constraints determine the target domain (family of systems) that are supported by the architecture style for multi-agent systems. 3. OVERVIEW OF THE ARCHITECTURE STYLE In this section, we give a general introduction of the architectural style. We start with a brief overview of the patterns that constitute the architecture style. Then, we outline the pattern template that we use for the detailed description of the patterns. We conclude the section with a brief overview of the basic language primitives of π-ADL. 3.1 Patterns of the Architecture Style Fig. 3 shows an overview of the different patterns of the architecture style with the rela- tionships between the patterns. Fig. 3. Overview of the patterns of the architectural style The basic patterns of the architecture style are Situated Agent and Virtual Environment. A situated agent is an autonomous problem solving entity that encapsulates its state and controls its behavior. The responsibility of an agent is to realize the application specific tasks it is assigned. Situated agents are cooperative entities that are able to flexibly adapt their behavior and interactions with changing conditions. Agents are situated in a virtual environment that maintains a virtualization of the relevant parts of the world and serves as a coordination medium for the agents, i.e. the virtual environment mediates both the interactions among agents and the access to resources. Besides the basic patterns, there are three additional patterns that refine the situated agent pattern: Selective Perception, Protocol-based Communication, and Behavior-Based Action Selection. A situated agent can use selective perception to sense the environment and up- date its knowledge about the world. Situated agents can use protocol-based communication to exchange messages according to prescribed communication protocols, i.e. well-defined ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 9 sequences of messages. Finally, a situated agent can use behavior-based action selection to decide about the actions it wants to perform in the environment. Selective perception, protocol-based communication, and behavior-based action selection are supported by the virtual environment. The patterns have several variability points. For example, for the design of agents that only communicate indirectly via the virtual environment, the protocol-based communica- tion pattern can be omitted. We elaborate on variability in Section 5. 3.2 Pattern Template To document the patterns of the architecture style we use the following template: (1) The name of the pattern. (2) A primary presentation that shows the elements and their relationships in the pattern. We use component and connector models to describe the pattern's units of execution. (3) A description of the architectural elements and their responsibilities. We illustrate the description with examples from the two cases introduced in Section 2. The architec- tural elements are specified in π-ADL. Some fragments are omitted for brevity. For a complete formal specification, we refer to the online Appendix A. (4) A rationale that motivates the design of the pattern. This pattern template follows the approach for documenting architectural styles presented in [Clements et al. 2010]. We discuss related patterns from the field of multi-agent systems in Section 6. 3.3 π-ADL in a Nutshell The patterns of the architectural style are specified in π-ADL, a formal architectural de- scription language. It is a theoretically well-founded language based on the higher-order typed π-calculus, supported by a specification and verification toolset providing services for automated checking of architectural properties. nent is an architectural abstraction that delivers some system functionalities. Formal specification improves the understanding of the specification, enables reasoning about the patterns, and provides a firm foundation for employing the patterns in practice. The patterns are type checked using the π-ADL.NET tool [Qayyum and Oquendo 2008]. In this section, we briefly explain the main language constructs of π-ADL. We limit the explanation to the subset of language constructs that we use to describe the patterns. • abstraction: the basic architectural element in π-ADL. Abstraction is a unit of execution. • component: the basic computational element that we use in the description. A compo- • connection: a basic interaction point. A connection provides a communication channel between architectural elements that allows value passing. Values are sent and received through connections via the out and in prefixes respectively. Value passing via a con- nection is synchronous. • port: an interface between a component and its environment. Ports are described in • unifies: expresses the linking of two connections. Unifies connects connections together. • relays: expresses the binding between external ports and ports of components. If con- nections have the same names in different ports, identifying ports is enough to express unifications. terms of connections. Protocols may be enforced by ports and among ports. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · D. Weyns and F. Oquendo 10 • type: a value type which can be declared either a basic type or a constructed type. A type is declared within the scope of a behavior. • Integer, Boolean, and String: regular basic types. • Any: an unspecified data type, represents any arbitrary combination of data types. We use any as an abstract data type that has to be made concrete when the patterns are applied to a concrete domain. • view: a collection of named elements, possibly of different types. • sequence: an indexed collection of elements of the same type. • set: an abstract collection of elements of a particular type. • location: an abstract storage of elements of a particular type. • behavior: an expression of the process of a component in terms of actions and interac- tions with its environment through connections. • function: a part of functionality within a behavior which performs a specific task. A function may take input of different types and produce output of a particular type. • compose: expresses the capability of a behavior to parallel compose the capabilities of multiple behaviors. The composed behaviors can proceed independently and can interact via attached connections. • choose: expresses the capability of a behavior to choose the capability of one of set of behaviors. If all the sub-behaviors are blocking on an input, the first one to resume execution will continue while the others will terminate. • unobservable: expresses the capability to enact an action invisibly, i.e. internally, silently. Non-observable behavior is internal to an abstraction. 4. ARCHITECTURAL STYLE We now present the patterns of the architectural style using the pattern template. We start with the two basic patterns: Virtual Environment and Situated Agent. Then we explain the three additional patterns that refine a situated agent: Selective Perception, Protocol-Based Communication, and Behavior-Based Action Selection. 4.1 Virtual Environment 4.1.1 Primary Presentation. The primary presentation of the virtual environment pattern is shown in Figure 4. The virtual environment provides a domain-specific infrastructure that supports the ac- tivities of situated agents (perception, communication, performing actions). In particular, it provides a virtualization of the external environment, possibly augmented with support for coordination.3 For example, the virtual environment may represent the physical context as a map and this map may be equipped with facilities for agents to add marks on particu- lar locations, supporting indirect coordination among the agents. The virtual environment 3Environment is an overloaded term in software engineering. The term is used for development environment, execution environment, physical environment, etc. In this report, we refer with environment (or external environ- ment) to the part of the external world (which may comprise both physical or software elements) with which the system interacts, and in which the effects of the system will be observed and evaluated [Jackson 1997]. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 11 Fig. 4. Primary presentation of virtual environment requires middleware services for observing the external environment, transmitting mes- sages, and executing actions in the environment. At the top level, the virtual environment is defined as follows: component VirtualEnvironment is abstraction () { type Focus is view[focusName : String, focusParams : Any]. type Sense is view[agentId : String, focus : Focus]. type Representation is Any. type Action is view[agentId : String, actionName : String, actionParams : Any]. type Operation is Any. type Message is view[id : Integer, sender : String, receiver : String, protocol : String, performative : String, content : Any]. type Observation is Any. type Observed is Any. type StateItem is view[name : String, val : Any]. type StateItems is set(StateItem). type SynchronizationUpdate is Any. type Transmission is Any. port perceive is { connection sense is in(Sense). connection sensed is out(Representation). } port act is { connection action is in(Action) }. port communicate is { connection sendMsg is in(Message). port operate is { connection operation is out(Operation) }. connection receiveMsg is out(Message) }. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 12 D. Weyns and F. Oquendo port synchronize is { connection syncOut is out(SynchronizationUpdate). connection syncIn is in(SynchronizationUpdate) }. port observe is { connection observation is out(Observation). connection observed is in(Observed) }. port transmit is { connection transmission is out(Transmission). connection deliver is in(Transmission) }. //composition behavior is compose { actionService is ActionService() perceptionservice is PerceptionService() communicationservice is CommunicationService() state is State() synchronization is Synchronization() { sense relays perceptionService::sense perceptionService::readWriteState unifies state::readWriteState perceptionService::sensed relays sensed and and and and } where and and ... } } } The π-ADL specification first defines the different types and ports. Some types include the Any data type. These types have to be made concrete when the pattern is applied to a concrete domain. Then, the composition of the various component instances is defined (for brevity, only the composition of the perception service is showed). The components are further refined and explained in the following subsection. 4.1.2 Architectural Elements. The State repository has a central role in the virtual environment. The repository con- tains data that is shared between the components of the virtual environment. The π-ADL specification of state is defined as follows: component State is abstraction() { type StateItem is view[name : String, val : Any]. type StateItems is set(StateItem). port readWriteState is { connection stateTemplate is in(StateItems). connection readState is out(StateItems). connection writeState is in(StateItems) }. assuming { protocol is (via stateTemplate receive StateItems. true*.via readState send StateItems)* or (via writeState receive StateItems)* }. stateRepository is location(set(StateItems)). behavior is { write is function( state : StateItems, repository : set(StateItems) ) : set(StateItems) { unobservable }. read is function( template : StateItems, repository : set(StateItems) ) : ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 13 StateItems { unobservable }. choose { //read state via stateTemplate receive state_template : StateItems. via readState send read(state_template, stateRepository). behavior(). //write state via writeState receive state_items : StateItems. stateRepository := write(state_items, stateRepository). behavior(). or } } } State items are abstract data that represent elements of interest maintained by the virtual environment. State items are stored in the state repository. The state repository provides a port that allows clients to read state based on a state template, and write state. The behavior specifies how reading and writing is executed. Reading requires a template of state items to select the state items of interest. The internal behavior of read and write are invisible and have to be made concrete for a particular domain. State stored in the state repository typically includes an abstract representation of ex- ternal resources and additional state that is used for coordination purposes. An example of state related to external resources in the vehicle routing system is a map of the traffic environment. The physical road network is mapped onto a graph representation of discrete road elements, i.e. road segments and crossroads, that are connected via edges. The road network is concretely realized as follows: public class Edge<RoadElement> { private int id; private RoadElement elem; ... } public class RoadNetwork<RoadElement> { private ArrayList<Edge<RoadElement>> edges; public RoadNetwork(){ edges = new ArrayList<Edge<RoadElement>>(); } ... } Edge has an id and a road element of the type RoadElement, corresponding to the name and value of a state item. The road network models a state repository that comprises a list of edges. Road network implements regular accessors and mutators to read and write state. For our case study, we used OpenStreepMap to generate the graph of the city of Leuven, which consists of over 1600 road elements as shown in Figure 5. In the vehicle routing system, additional state maintained by the state repository are the current position of the vehicle on the map, and road segments that are marked indicating that they are temporarily blocked. Similarly in the AGV transportation system, the state related to external resources in- ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 14 D. Weyns and F. Oquendo (a) Rendering of the OpenStreetMap data (b) Graph model based on OpenStreetMap data Fig. 5. Example of a graph model used in the vehicle routing system. The figure on the left shows a rendering of the OpenStreetMap data of the city center of Leuven. The figure on the right shows the graph with over 1600 roads. cludes a map of the warehouse that is modeled as a graph of segments. A segment repre- sents an atomic part of the warehouse infrastructure along which an AGV can be instructed to drive (typically 3 to 5 meter). Examples of additional state are virtual marks situated on the map. As an example, consider Fig. 6 that shows a fusion view4 of the AGV local virtual environments of three AGVs. Fig. 6. Path projections in the virtual environment. 4The view is generated on a remote machine that collects the state of the virtual environment of the AGVs via a wireless network and fuses the information into one image. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. (cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:5)(cid:5)(cid:7)(cid:8)(cid:5)(cid:4)(cid:9)(cid:10)(cid:11)(cid:9)(cid:5)(cid:12)(cid:11)(cid:9)(cid:5)(cid:12)(cid:6)(cid:5)(cid:5)(cid:7)(cid:8)(cid:5)(cid:4)(cid:9)(cid:10)(cid:6)(cid:5)(cid:5)(cid:7)(cid:8)(cid:5)(cid:4)(cid:9)(cid:10)(cid:6)(cid:5)(cid:5)(cid:7)(cid:8)(cid:5)(cid:4)(cid:9)(cid:10)(cid:13)(cid:5)(cid:14)(cid:5)(cid:12)(cid:4)(cid:5)(cid:5)(cid:15)(cid:5)(cid:16)(cid:16)(cid:5)(cid:4)(cid:17)(cid:18)(cid:9)(cid:1)(cid:2)(cid:3)(cid:2)(cid:4)(cid:5)(cid:2)(cid:2)(cid:6)(cid:2)(cid:7)(cid:3)(cid:2)(cid:8)(cid:13)(cid:9)(cid:19)(cid:20)(cid:21)(cid:5)(cid:12)(cid:20)(cid:22)(cid:2)(cid:6)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:24)(cid:5)(cid:25)(cid:8)(cid:5)(cid:5)(cid:26)(cid:16)(cid:5)(cid:16)(cid:4)(cid:5)(cid:16)(cid:16)(cid:27)(cid:12)(cid:28)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:8)(cid:5)(cid:6)(cid:5)(cid:4)(cid:4)(cid:9)(cid:10)(cid:29)(cid:5)(cid:4)(cid:4)(cid:5)(cid:6)(cid:5)(cid:8)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:5)(cid:2)(cid:4)(cid:11)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:24)(cid:12)(cid:5)(cid:7)(cid:5)(cid:24)(cid:4)(cid:23)(cid:30)(cid:31)(cid:12)(cid:5)(cid:32)(cid:2)(cid:6)(cid:33)(cid:5)(cid:12)(cid:5)(cid:8)(cid:7)(cid:5)(cid:12)(cid:24)(cid:34)(cid:35)(cid:23)(cid:35)(cid:2)(cid:23)(cid:4)(cid:23)(cid:23)(cid:8)(cid:8)(cid:23)(cid:23)(cid:4)(cid:5)(cid:6)(cid:5)(cid:28)(cid:20)(cid:12)(cid:5)(cid:21)(cid:20)(cid:19)(cid:9)(cid:13)(cid:36)(cid:2)(cid:4)(cid:32)(cid:5)(cid:8)(cid:33)(cid:9)(cid:24)(cid:5)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:24)(cid:12)(cid:5)(cid:7)(cid:5)(cid:24)(cid:4)(cid:23)(cid:30)(cid:37)(cid:28)(cid:15)(cid:20)(cid:24)(cid:8)(cid:2)(cid:6)(cid:12)(cid:23)(cid:31)(cid:28)(cid:2)(cid:5)(cid:16)(cid:26)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:16)(cid:5)(cid:24)(cid:8)(cid:23)(cid:18)(cid:26)(cid:8)(cid:5)(cid:12)(cid:5)(cid:13)(cid:18)(cid:5)(cid:27)(cid:14)(cid:5)(cid:8)(cid:24)(cid:5)(cid:25)(cid:8)(cid:5)(cid:5)(cid:26)(cid:16)(cid:5)(cid:16)(cid:12)(cid:27)(cid:27)(cid:14)(cid:12)(cid:5)(cid:21)(cid:38)(cid:27)(cid:32)(cid:5)(cid:20)(cid:39)(cid:2)(cid:3)(cid:14)(cid:5)(cid:4)(cid:16)(cid:5)(cid:20)(cid:25)(cid:5)(cid:24)(cid:31)(cid:9)(cid:40)(cid:27)(cid:4)(cid:2)(cid:5)(cid:12)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:19)(cid:5)(cid:5)(cid:12)(cid:32)(cid:4)(cid:5)(cid:40)(cid:23)(cid:15)(cid:24)(cid:5)(cid:25)(cid:4)(cid:23)(cid:23)(cid:32)(cid:8)(cid:5)(cid:40)(cid:5)(cid:2)(cid:1)(cid:8)(cid:23)(cid:23)(cid:4)(cid:26)(cid:16)(cid:4)(cid:22)(cid:20)(cid:12)(cid:5)(cid:21)(cid:30)(cid:9)(cid:16)(cid:25)(cid:2)(cid:8)(cid:20)(cid:41)(cid:41)(cid:41)(cid:20)(cid:4)(cid:23)(cid:23)(cid:8)(cid:42)(cid:5)(cid:12)(cid:32)(cid:2)(cid:8)(cid:23)(cid:8)(cid:32)(cid:20)(cid:11)(cid:5)(cid:12)(cid:7)(cid:2)(cid:5)(cid:16)(cid:26)(cid:4)(cid:23)(cid:23)(cid:8)(cid:9)(cid:10)(cid:11)(cid:12)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:24)(cid:5)(cid:25)(cid:5)(cid:8)(cid:2)(cid:5)(cid:4)(cid:6)(cid:5)(cid:5)(cid:25)(cid:21)(cid:31)(cid:12)(cid:2)(cid:9)(cid:12)(cid:2)(cid:3)(cid:4)(cid:23)(cid:23)(cid:8)(cid:38)(cid:27)(cid:32)(cid:5)(cid:20)(cid:39)(cid:2)(cid:3)(cid:14)(cid:5)(cid:4)(cid:16)(cid:5)(cid:25)(cid:5)(cid:24)(cid:15)(cid:5)(cid:2)(cid:7)(cid:5)(cid:12)(cid:24)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:43)(cid:9)(cid:16)(cid:20)(cid:1)(cid:5)(cid:20)(cid:13)(cid:23)(cid:5)(cid:16)(cid:4)(cid:23)(cid:23)(cid:8)(cid:13)(cid:5)(cid:8)(cid:12)(cid:2)(cid:20)(cid:30)(cid:5)(cid:5)(cid:12)(cid:23)(cid:5)(cid:12)(cid:26)(cid:4)(cid:23)(cid:23)(cid:8)(cid:19)(cid:5)(cid:5)(cid:12)(cid:32)(cid:4)(cid:5)(cid:40)(cid:23)(cid:15)(cid:24)(cid:5)(cid:25)(cid:8)(cid:5)(cid:5)(cid:26)(cid:16)(cid:5)(cid:16)(cid:12)(cid:27)(cid:27)(cid:14)(cid:12)(cid:5)(cid:21)(cid:43)(cid:5)(cid:19)(cid:20)(cid:11)(cid:23)(cid:8)(cid:20)(cid:13)(cid:9)(cid:9)(cid:19)(cid:4)(cid:23)(cid:23)(cid:8)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:5)(cid:8)(cid:3)(cid:2)(cid:26)(cid:16)(cid:5)(cid:4)(cid:5)(cid:37)(cid:43)(cid:9)(cid:9)(cid:16)(cid:20)(cid:42)(cid:4)(cid:9)(cid:12)(cid:44)(cid:27)(cid:2)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:5)(cid:2)(cid:4)(cid:11)(cid:19)(cid:5)(cid:5)(cid:12)(cid:32)(cid:4)(cid:5)(cid:40)(cid:23)(cid:15)(cid:15)(cid:23)(cid:40)(cid:5)(cid:4)(cid:32)(cid:12)(cid:5)(cid:5)(cid:19)(cid:9)(cid:10)(cid:11)(cid:12)(cid:22)(cid:24)(cid:5)(cid:8)(cid:33)(cid:9)(cid:14)(cid:5)(cid:8)(cid:25)(cid:5)(cid:24)(cid:29)(cid:26)(cid:5)(cid:5)(cid:8)(cid:24)(cid:12)(cid:9)(cid:5)(cid:14)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:4)(cid:9)(cid:45)(cid:8)(cid:5)(cid:12)(cid:5)(cid:46)(cid:43)(cid:41)(cid:37)(cid:28)(cid:15)(cid:20)(cid:24)(cid:8)(cid:2)(cid:6)(cid:12)(cid:23)(cid:31)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:3)(cid:2)(cid:25)(cid:5)(cid:32)(cid:27)(cid:9)(cid:28)(cid:20)(cid:24)(cid:8)(cid:2)(cid:8)(cid:9)(cid:15)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:5)(cid:8)(cid:3)(cid:2)(cid:26)(cid:16)(cid:5)(cid:4)(cid:5)(cid:37)(cid:15)(cid:9)(cid:8)(cid:2)(cid:8)(cid:24)(cid:20)(cid:28)(cid:9)(cid:27)(cid:32)(cid:5)(cid:25)(cid:2)(cid:3)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:30)(cid:23)(cid:4)(cid:24)(cid:5)(cid:7)(cid:5)(cid:12)(cid:24)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:21)(cid:5)(cid:12)(cid:14)(cid:27)(cid:27)(cid:12)(cid:16)(cid:5)(cid:16)(cid:26)(cid:5)(cid:5)(cid:8)(cid:25)(cid:5)(cid:24)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:5)(cid:8)(cid:3)(cid:2)(cid:26)(cid:16)(cid:5)(cid:4)(cid:5)(cid:37)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:5)(cid:8)(cid:3)(cid:2)(cid:26)(cid:16)(cid:5)(cid:4)(cid:5)(cid:37)(cid:29)(cid:26)(cid:5)(cid:5)(cid:8)(cid:24)(cid:12)(cid:9)(cid:5)(cid:14)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:10)(cid:9)(cid:8)(cid:16)(cid:5)(cid:2)(cid:24)(cid:8)(cid:5)(cid:27)(cid:12)(cid:20)(cid:11)(cid:23)(cid:8)(cid:20)(cid:36)(cid:23)(cid:5)(cid:47)(cid:5)(cid:8)(cid:7)(cid:5)(cid:12)(cid:24)(cid:33)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:12)(cid:5)(cid:13)(cid:15)(cid:5)(cid:12)(cid:16)(cid:5)(cid:4)(cid:23)(cid:12)(cid:5)(cid:8)(cid:25)(cid:5)(cid:24)(cid:13)(cid:5)(cid:12)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:4)(cid:5)(cid:24)(cid:8)(cid:2)(cid:16)(cid:32)(cid:2)(cid:5)(cid:33)(cid:35)(cid:16)(cid:8)(cid:5)(cid:32)(cid:27)(cid:18)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:12)(cid:5)(cid:13)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:16)(cid:5)(cid:2)(cid:28)(cid:26)(cid:16)(cid:5)(cid:14)(cid:47)(cid:45)(cid:5)(cid:48)(cid:20)(cid:32)(cid:12)(cid:23)(cid:27)(cid:32)(cid:22)(cid:30)(cid:12)(cid:9)(cid:5)(cid:8)(cid:14)(cid:5)(cid:4)(cid:32)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:4)(cid:5)(cid:24)(cid:8)(cid:2)(cid:16)(cid:32)(cid:2)(cid:5)(cid:33)(cid:35)(cid:16)(cid:8)(cid:5)(cid:32)(cid:27)(cid:18)(cid:13)(cid:14)(cid:10)(cid:15)(cid:23)(cid:7)(cid:9)(cid:27)(cid:26)(cid:5)(cid:12)(cid:45)(cid:23)(cid:8)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:30)(cid:12)(cid:9)(cid:5)(cid:19)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:4)(cid:4)(cid:9)(cid:13)(cid:32)(cid:12)(cid:23)(cid:23)(cid:24)(cid:8)(cid:3)(cid:2)(cid:36)(cid:20)(cid:8)(cid:5)(cid:21)(cid:21)(cid:5)(cid:12)(cid:14)(cid:27)(cid:27)(cid:12)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:32)(cid:12)(cid:23)(cid:23)(cid:24)(cid:8)(cid:3)(cid:2)(cid:36)(cid:20)(cid:8)(cid:5)(cid:21)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:12)(cid:27)(cid:27)(cid:14)(cid:12)(cid:5)(cid:21)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:16)(cid:12)(cid:27)(cid:27)(cid:14)(cid:12)(cid:5)(cid:21)(cid:21)(cid:9)(cid:4)(cid:33)(cid:27)(cid:2)(cid:46)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:16)(cid:4)(cid:5)(cid:16)(cid:16)(cid:27)(cid:12)(cid:28)(cid:28)(cid:23)(cid:8)(cid:6)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:10)(cid:5)(cid:35)(cid:33)(cid:5)(cid:4)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:21)(cid:5)(cid:8)(cid:20)(cid:36)(cid:2)(cid:3)(cid:8)(cid:24)(cid:23)(cid:23)(cid:12)(cid:32)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:12)(cid:5)(cid:40)(cid:8)(cid:3)(cid:2)(cid:36)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:5)(cid:24)(cid:9)(cid:26)(cid:12)(cid:5)(cid:13)(cid:17)(cid:16)(cid:49)(cid:8)(cid:23)(cid:23)(cid:4)(cid:12)(cid:5)(cid:2)(cid:35)(cid:12)(cid:5)(cid:10)(cid:20)(cid:4)(cid:23)(cid:23)(cid:8)(cid:2)(cid:32)(cid:12)(cid:23)(cid:15)(cid:43)(cid:27)(cid:4)(cid:5)(cid:16)(cid:20)(cid:11)(cid:23)(cid:8)(cid:32)(cid:5)(cid:8)(cid:7)(cid:5)(cid:45)(cid:40)(cid:26)(cid:4)(cid:23)(cid:23)(cid:8)(cid:39)(cid:9)(cid:9)(cid:12)(cid:45)(cid:23)(cid:8)(cid:8)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:4)(cid:4)(cid:9)(cid:13)(cid:8)(cid:23)(cid:23)(cid:4)(cid:5)(cid:32)(cid:8)(cid:9)(cid:48)(cid:20)(cid:5)(cid:32)(cid:27)(cid:38)(cid:15)(cid:14)(cid:16)(cid:32)(cid:4)(cid:5)(cid:14)(cid:4)(cid:5)(cid:5)(cid:12)(cid:23)(cid:15)(cid:10)(cid:5)(cid:35)(cid:33)(cid:5)(cid:4)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:15)(cid:14)(cid:16)(cid:39)(cid:2)(cid:5)(cid:27)(cid:25)(cid:5)(cid:20)(cid:10)(cid:5)(cid:35)(cid:33)(cid:5)(cid:4)(cid:16)(cid:5)(cid:16)(cid:26)(cid:5)(cid:5)(cid:8)(cid:25)(cid:5)(cid:24)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:16)(cid:5)(cid:5)(cid:30)(cid:20)(cid:5)(cid:24)(cid:2)(cid:4)(cid:2)(cid:5)(cid:13)(cid:21)(cid:5)(cid:12)(cid:14)(cid:27)(cid:27)(cid:12)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:11)(cid:9)(cid:5)(cid:12)(cid:14)(cid:2)(cid:23)(cid:32)(cid:27)(cid:35)(cid:26)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:12)(cid:27)(cid:27)(cid:14)(cid:12)(cid:5)(cid:21)(cid:24)(cid:5)(cid:25)(cid:8)(cid:5)(cid:5)(cid:26)(cid:16)(cid:5)(cid:16)(cid:4)(cid:5)(cid:33)(cid:35)(cid:5)(cid:10)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:12)(cid:5)(cid:33)(cid:6)(cid:2)(cid:32)(cid:5)(cid:12)(cid:31)(cid:20)(cid:5)(cid:16)(cid:12)(cid:5)(cid:41)(cid:19)(cid:9)(cid:33)(cid:16)(cid:27)(cid:45)(cid:16)(cid:23)(cid:12)(cid:30)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:45)(cid:5)(cid:9)(cid:4)(cid:7)(cid:16)(cid:32)(cid:27)(cid:9)(cid:30)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:12)(cid:27)(cid:27)(cid:14)(cid:12)(cid:5)(cid:21)(cid:28)(cid:12)(cid:9)(cid:27)(cid:25)(cid:5)(cid:12)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:2)(cid:5)(cid:4)(cid:40)(cid:16)(cid:7)(cid:9)(cid:35)(cid:23)(cid:43)(cid:17)(cid:26)(cid:8)(cid:2)(cid:29)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:16)(cid:4)(cid:5)(cid:16)(cid:16)(cid:27)(cid:12)(cid:28)(cid:48)(cid:2)(cid:32)(cid:32)(cid:5)(cid:12)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:2)(cid:27)(cid:12)(cid:15)(cid:21)(cid:5)(cid:12)(cid:14)(cid:27)(cid:27)(cid:12)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:12)(cid:5)(cid:9)(cid:14)(cid:8)(cid:5)(cid:8)(cid:3)(cid:2)(cid:35)(cid:27)(cid:40)(cid:23)(cid:15)(cid:15)(cid:23)(cid:40)(cid:27)(cid:35)(cid:2)(cid:3)(cid:8)(cid:5)(cid:8)(cid:14)(cid:9)(cid:5)(cid:12)(cid:43)(cid:23)(cid:8)(cid:16)(cid:5)(cid:8)(cid:2)(cid:27)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:24)(cid:12)(cid:5)(cid:7)(cid:8)(cid:5)(cid:6)(cid:2)(cid:22)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:24)(cid:9)(cid:26)(cid:12)(cid:5)(cid:13)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:12)(cid:27)(cid:27)(cid:14)(cid:12)(cid:5)(cid:21)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:12)(cid:5)(cid:6)(cid:8)(cid:9)(cid:1)(cid:15)(cid:23)(cid:12)(cid:5)(cid:5)(cid:4)(cid:14)(cid:5)(cid:4)(cid:32)(cid:48)(cid:5)(cid:32)(cid:2)(cid:8)(cid:24)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:49)(cid:16)(cid:17)(cid:13)(cid:5)(cid:12)(cid:26)(cid:9)(cid:24)(cid:5)(cid:8)(cid:25)(cid:2)(cid:3)(cid:8)(cid:24)(cid:23)(cid:23)(cid:12)(cid:32)(cid:48)(cid:9)(cid:5)(cid:16)(cid:5)(cid:4)(cid:7)(cid:5)(cid:12)(cid:24)(cid:32)(cid:23)(cid:4)(cid:15)(cid:23)(cid:40)(cid:27)(cid:35)(cid:2)(cid:3)(cid:8)(cid:5)(cid:8)(cid:14)(cid:9)(cid:5)(cid:12)(cid:48)(cid:2)(cid:32)(cid:32)(cid:5)(cid:12)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:15)(cid:5)(cid:2)(cid:46)(cid:5)(cid:12)(cid:16)(cid:7)(cid:5)(cid:12)(cid:24)(cid:11)(cid:12)(cid:2)(cid:5)(cid:16)(cid:5)(cid:8)(cid:33)(cid:9)(cid:19)(cid:38)(cid:27)(cid:32)(cid:5)(cid:20)(cid:48)(cid:9)(cid:8)(cid:32)(cid:5)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:8)(cid:5)(cid:2)(cid:26)(cid:8)(cid:5)(cid:26)(cid:2)(cid:8)(cid:5)(cid:31)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:12)(cid:5)(cid:32)(cid:32)(cid:2)(cid:48)(cid:48)(cid:5)(cid:45)(cid:2)(cid:20)(cid:11)(cid:23)(cid:8)(cid:32)(cid:5)(cid:12)(cid:14)(cid:23)(cid:5)(cid:12)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:42)(cid:9)(cid:8)(cid:26)(cid:5)(cid:2)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:45)(cid:9)(cid:9)(cid:7)(cid:5)(cid:12)(cid:5)(cid:31)(cid:42)(cid:9)(cid:8)(cid:26)(cid:5)(cid:2)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:23)(cid:23)(cid:7)(cid:5)(cid:16)(cid:12)(cid:5)(cid:14)(cid:23)(cid:36)(cid:21)(cid:5)(cid:16)(cid:16)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:50)(cid:20)(cid:42)(cid:9)(cid:8)(cid:26)(cid:5)(cid:2)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:5)(cid:4)(cid:9)(cid:45)(cid:4)(cid:9)(cid:11)(cid:28)(cid:12)(cid:27)(cid:16)(cid:16)(cid:5)(cid:4)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:48)(cid:5)(cid:32)(cid:2)(cid:8)(cid:24)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:21)(cid:5)(cid:12)(cid:14)(cid:27)(cid:27)(cid:12)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:15)(cid:5)(cid:2)(cid:46)(cid:5)(cid:12)(cid:16)(cid:7)(cid:5)(cid:12)(cid:24)(cid:28)(cid:12)(cid:9)(cid:27)(cid:25)(cid:5)(cid:12)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:31)(cid:2)(cid:5)(cid:26)(cid:5)(cid:12)(cid:20)(cid:37)(cid:9)(cid:27)(cid:26)(cid:5)(cid:12)(cid:5)(cid:5)(cid:4)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:48)(cid:2)(cid:51)(cid:14)(cid:9)(cid:8)(cid:32)(cid:5)(cid:12)(cid:5)(cid:8)(cid:32)(cid:2)(cid:3)(cid:6)(cid:18)(cid:5)(cid:9)(cid:40)(cid:9)(cid:4)(cid:32)(cid:20)(cid:1)(cid:5)(cid:35)(cid:9)(cid:27)(cid:51)(cid:4)(cid:23)(cid:23)(cid:8)(cid:48)(cid:5)(cid:32)(cid:2)(cid:8)(cid:24)(cid:5)(cid:8)(cid:33)(cid:9)(cid:19)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:16)(cid:4)(cid:5)(cid:33)(cid:35)(cid:5)(cid:10)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:27)(cid:2)(cid:8)(cid:5)(cid:16)(cid:8)(cid:23)(cid:43)(cid:8)(cid:23)(cid:23)(cid:4)(cid:26)(cid:33)(cid:35)(cid:2)(cid:46)(cid:5)(cid:24)(cid:12)(cid:5)(cid:11)(cid:13)(cid:23)(cid:8)(cid:32)(cid:7)(cid:9)(cid:9)(cid:24)(cid:33)(cid:9)(cid:19)(cid:31)(cid:9)(cid:45)(cid:40)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:4)(cid:5)(cid:24)(cid:8)(cid:2)(cid:16)(cid:32)(cid:2)(cid:5)(cid:33)(cid:35)(cid:16)(cid:8)(cid:5)(cid:32)(cid:27)(cid:18)(cid:18)(cid:27)(cid:32)(cid:5)(cid:8)(cid:16)(cid:35)(cid:33)(cid:5)(cid:2)(cid:32)(cid:16)(cid:2)(cid:8)(cid:24)(cid:5)(cid:4)(cid:1)(cid:12)(cid:5)(cid:5)(cid:19)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:10)(cid:2)(cid:8)(cid:32)(cid:5)(cid:12)(cid:7)(cid:12)(cid:9)(cid:5)(cid:32)(cid:5)(cid:12)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:38)(cid:8)(cid:46)(cid:5)(cid:17)(cid:18)(cid:2)(cid:5)(cid:14)(cid:5)(cid:17)(cid:11)(cid:12)(cid:9)(cid:27)(cid:25)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:24)(cid:5)(cid:25)(cid:8)(cid:5)(cid:5)(cid:26)(cid:16)(cid:5)(cid:16)(cid:45)(cid:23)(cid:23)(cid:39)(cid:11)(cid:23)(cid:4)(cid:4)(cid:5)(cid:2)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:10)(cid:5)(cid:35)(cid:33)(cid:5)(cid:4)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:33)(cid:35)(cid:12)(cid:27)(cid:28)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:9)(cid:12)(cid:30)(cid:2)(cid:5)(cid:18)(cid:2)(cid:5)(cid:18)(cid:34)(cid:45)(cid:5)(cid:12)(cid:2)(cid:6)(cid:23)(cid:4)(cid:23)(cid:23)(cid:8)(cid:13)(cid:9)(cid:14)(cid:5)(cid:8)(cid:2)(cid:5)(cid:12)(cid:16)(cid:32)(cid:12)(cid:5)(cid:5)(cid:19)(cid:13)(cid:23)(cid:4)(cid:14)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:2)(cid:5)(cid:18)(cid:29)(cid:40)(cid:9)(cid:9)(cid:12)(cid:25)(cid:5)(cid:24)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:10)(cid:2)(cid:32)(cid:32)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:23)(cid:23)(cid:4)(cid:16)(cid:26)(cid:27)(cid:9)(cid:28)(cid:20)(cid:6)(cid:12)(cid:2)(cid:1)(cid:22)(cid:24)(cid:5)(cid:4)(cid:23)(cid:8)(cid:26)(cid:2)(cid:5)(cid:12)(cid:4)(cid:23)(cid:23)(cid:8)(cid:18)(cid:5)(cid:2)(cid:8)(cid:23)(cid:23)(cid:4)(cid:4)(cid:2)(cid:12)(cid:40)(cid:23)(cid:8)(cid:5)(cid:2)(cid:26)(cid:26)(cid:33)(cid:35)(cid:34)(cid:34)(cid:4)(cid:7)(cid:5)(cid:12)(cid:26)(cid:20)(cid:36)(cid:9)(cid:27)(cid:26)(cid:5)(cid:12)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:3)(cid:2)(cid:12)(cid:23)(cid:31)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:14)(cid:9)(cid:28)(cid:29)(cid:26)(cid:23)(cid:32)(cid:16)(cid:14)(cid:5)(cid:16)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:40)(cid:23)(cid:33)(cid:35)(cid:29)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:40)(cid:23)(cid:33)(cid:35)(cid:29)(cid:37)(cid:12)(cid:23)(cid:5)(cid:8)(cid:5)(cid:8)(cid:32)(cid:9)(cid:8)(cid:35)(cid:6)(cid:2)(cid:5)(cid:18)(cid:29)(cid:35)(cid:33)(cid:23)(cid:40)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:36)(cid:9)(cid:4)(cid:14)(cid:5)(cid:8)(cid:40)(cid:9)(cid:9)(cid:12)(cid:26)(cid:24)(cid:23)(cid:8)(cid:24)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:16)(cid:4)(cid:5)(cid:33)(cid:35)(cid:5)(cid:10)(cid:48)(cid:23)(cid:45)(cid:7)(cid:5)(cid:12)(cid:24)(cid:8)(cid:23)(cid:23)(cid:4)(cid:5)(cid:4)(cid:4)(cid:5)(cid:40)(cid:23)(cid:15)(cid:10)(cid:5)(cid:35)(cid:33)(cid:5)(cid:4)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:13)(cid:14)(cid:10)(cid:22)(cid:12)(cid:23)(cid:16)(cid:45)(cid:27)(cid:16)(cid:20)(cid:48)(cid:27)(cid:5)(cid:4)(cid:5)(cid:8)(cid:16)(cid:14)(cid:5)(cid:16)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:2)(cid:5)(cid:45)(cid:19)(cid:4)(cid:23)(cid:23)(cid:25)(cid:21)(cid:28)(cid:12)(cid:27)(cid:16)(cid:16)(cid:5)(cid:4)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:45)(cid:23)(cid:23)(cid:39)(cid:39)(cid:23)(cid:23)(cid:45)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:28)(cid:27)(cid:12)(cid:35)(cid:33)(cid:26)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:15)(cid:4)(cid:5)(cid:2)(cid:8)(cid:20)(cid:28)(cid:5)(cid:24)(cid:2)(cid:3)(cid:8)(cid:33)(cid:9)(cid:19)(cid:31)(cid:23)(cid:8)(cid:9)(cid:12)(cid:23)(cid:45)(cid:23)(cid:4)(cid:23)(cid:23)(cid:8)(cid:19)(cid:9)(cid:33)(cid:16)(cid:8)(cid:5)(cid:12)(cid:9)(cid:33)(cid:35)(cid:29)(cid:8)(cid:23)(cid:23)(cid:4)(cid:6)(cid:35)(cid:3)(cid:2)(cid:48)(cid:20)(cid:5)(cid:1)(cid:20)(cid:16)(cid:23)(cid:4)(cid:16)(cid:2)(cid:8)(cid:23)(cid:26)(cid:29)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:16)(cid:4)(cid:5)(cid:33)(cid:35)(cid:5)(cid:10)(cid:13)(cid:5)(cid:8)(cid:32)(cid:12)(cid:2)(cid:6)(cid:20)(cid:37)(cid:9)(cid:8)(cid:16)(cid:35)(cid:2)(cid:5)(cid:8)(cid:35)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:29)(cid:4)(cid:27)(cid:2)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:2)(cid:27)(cid:4)(cid:29)(cid:31)(cid:23)(cid:12)(cid:6)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:28)(cid:12)(cid:9)(cid:5)(cid:6)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:32)(cid:23)(cid:40)(cid:16)(cid:27)(cid:2)(cid:12)(cid:5)(cid:26)(cid:27)(cid:48)(cid:1)(cid:5)(cid:20)(cid:28)(cid:5)(cid:12)(cid:2)(cid:9)(cid:26)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:29)(cid:35)(cid:33)(cid:9)(cid:9)(cid:8)(cid:46)(cid:2)(cid:35)(cid:33)(cid:26)(cid:4)(cid:23)(cid:23)(cid:8)(cid:45)(cid:9)(cid:6)(cid:26)(cid:12)(cid:23)(cid:23)(cid:11)(cid:11)(cid:4)(cid:23)(cid:45)(cid:2)(cid:8)(cid:24)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:11)(cid:23)(cid:23)(cid:12)(cid:26)(cid:6)(cid:9)(cid:45)(cid:18)(cid:27)(cid:32)(cid:5)(cid:8)(cid:16)(cid:35)(cid:33)(cid:5)(cid:2)(cid:32)(cid:16)(cid:2)(cid:8)(cid:24)(cid:5)(cid:4)(cid:4)(cid:5)(cid:24)(cid:8)(cid:2)(cid:16)(cid:32)(cid:2)(cid:5)(cid:33)(cid:35)(cid:16)(cid:8)(cid:5)(cid:32)(cid:27)(cid:18)(cid:37)(cid:9)(cid:8)(cid:16)(cid:26)(cid:23)(cid:8)(cid:26)(cid:2)(cid:8)(cid:20)(cid:10)(cid:5)(cid:27)(cid:8)(cid:2)(cid:5)(cid:12)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:11)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:15)(cid:12)(cid:9)(cid:45)(cid:45)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:48)(cid:5)(cid:8)(cid:52)(cid:20)(cid:11)(cid:5)(cid:12)(cid:7)(cid:5)(cid:5)(cid:35)(cid:6)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:12)(cid:5)(cid:26)(cid:16)(cid:9)(cid:35)(cid:5)(cid:1)(cid:20)(cid:4)(cid:23)(cid:26)(cid:2)(cid:11)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:11)(cid:8)(cid:2)(cid:5)(cid:4)(cid:40)(cid:4)(cid:9)(cid:9)(cid:33)(cid:35)(cid:16)(cid:5)(cid:24)(cid:9)(cid:13)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:5)(cid:3)(cid:2)(cid:23)(cid:26)(cid:16)(cid:38)(cid:20)(cid:8)(cid:23)(cid:11)(cid:20)(cid:4)(cid:27)(cid:23)(cid:31)(cid:34)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:31)(cid:23)(cid:12)(cid:6)(cid:32)(cid:23)(cid:4)(cid:4)(cid:23)(cid:23)(cid:8)(cid:31)(cid:23)(cid:12)(cid:6)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:31)(cid:12)(cid:5)(cid:4)(cid:23)(cid:26)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:22)(cid:8)(cid:24)(cid:5)(cid:4)(cid:16)(cid:20)(cid:31)(cid:4)(cid:5)(cid:2)(cid:8)(cid:8)(cid:23)(cid:23)(cid:4)(cid:23)(cid:45)(cid:23)(cid:12)(cid:9)(cid:8)(cid:23)(cid:31)(cid:22)(cid:2)(cid:6)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:1)(cid:2)(cid:5)(cid:16)(cid:26)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:10)(cid:23)(cid:12)(cid:24)(cid:27)(cid:5)(cid:12)(cid:2)(cid:26)(cid:5)(cid:20)(cid:18)(cid:5)(cid:19)(cid:53)(cid:14)(cid:12)(cid:5)(cid:4)(cid:23)(cid:23)(cid:8)(cid:43)(cid:54)(cid:20)(cid:31)(cid:54)(cid:20)(cid:10)(cid:2)(cid:8)(cid:35)(cid:6)(cid:5)(cid:4)(cid:5)(cid:12)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:31)(cid:23)(cid:27)(cid:4)(cid:20)(cid:18)(cid:5)(cid:7)(cid:12)(cid:27)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:47)(cid:27)(cid:12)(cid:4)(cid:9)(cid:37)(cid:11)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:4)(cid:9)(cid:9)(cid:33)(cid:35)(cid:16)(cid:3)(cid:2)(cid:48)(cid:8)(cid:23)(cid:23)(cid:4)(cid:24)(cid:12)(cid:5)(cid:7)(cid:8)(cid:2)(cid:27)(cid:1)(cid:21)(cid:2)(cid:5)(cid:8)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:9)(cid:47)(cid:23)(cid:28)(cid:20)(cid:5)(cid:1)(cid:36)(cid:5)(cid:4)(cid:32)(cid:23)(cid:32)(cid:2)(cid:24)(cid:33)(cid:5)(cid:2)(cid:32)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:29)(cid:26)(cid:17)(cid:10)(cid:23)(cid:23)(cid:12)(cid:26)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:28)(cid:9)(cid:8)(cid:32)(cid:24)(cid:5)(cid:8)(cid:9)(cid:26)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:16)(cid:5)(cid:14)(cid:16)(cid:32)(cid:23)(cid:26)(cid:29)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:6)(cid:12)(cid:23)(cid:31)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:27)(cid:2)(cid:4)(cid:23)(cid:16)(cid:5)(cid:11)(cid:20)(cid:16)(cid:23)(cid:5)(cid:12)(cid:32)(cid:8)(cid:34)(cid:30)(cid:9)(cid:5)(cid:32)(cid:5)(cid:20)(cid:13)(cid:23)(cid:23)(cid:12)(cid:32)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:26)(cid:8)(cid:2)(cid:18)(cid:20)(cid:6)(cid:2)(cid:12)(cid:5)(cid:32)(cid:5)(cid:12)(cid:42)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:24)(cid:8)(cid:2)(cid:45)(cid:23)(cid:4)(cid:11)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:26)(cid:12)(cid:23)(cid:23)(cid:10)(cid:17)(cid:26)(cid:29)(cid:42)(cid:12)(cid:5)(cid:32)(cid:5)(cid:12)(cid:2)(cid:6)(cid:20)(cid:18)(cid:2)(cid:8)(cid:26)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:15)(cid:9)(cid:4)(cid:9)(cid:8)(cid:5)(cid:4)(cid:20)(cid:28)(cid:5)(cid:24)(cid:23)(cid:27)(cid:4)(cid:26)(cid:4)(cid:23)(cid:23)(cid:8)(cid:55)(cid:5)(cid:24)(cid:5)(cid:4)(cid:23)(cid:23)(cid:8)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:9)(cid:12)(cid:28)(cid:8)(cid:23)(cid:23)(cid:4)(cid:26)(cid:4)(cid:27)(cid:23)(cid:24)(cid:5)(cid:28)(cid:20)(cid:4)(cid:5)(cid:8)(cid:9)(cid:4)(cid:9)(cid:15)(cid:18)(cid:5)(cid:9)(cid:20)(cid:1)(cid:23)(cid:12)(cid:26)(cid:5)(cid:4)(cid:23)(cid:23)(cid:8)(cid:29)(cid:26)(cid:12)(cid:2)(cid:3)(cid:32)(cid:5)(cid:12)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:13)(cid:9)(cid:14)(cid:5)(cid:8)(cid:2)(cid:5)(cid:12)(cid:16)(cid:32)(cid:12)(cid:5)(cid:5)(cid:19)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:14)(cid:23)(cid:48)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:23)(cid:26)(cid:29)(cid:20)(cid:8)(cid:23)(cid:43)(cid:8)(cid:23)(cid:23)(cid:4)(cid:19)(cid:9)(cid:33)(cid:26)(cid:2)(cid:36)(cid:10)(cid:23)(cid:26)(cid:23)(cid:32)(cid:2)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:6)(cid:23)(cid:31)(cid:11)(cid:2)(cid:8)(cid:6)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:55)(cid:9)(cid:27)(cid:26)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:16)(cid:45)(cid:9)(cid:6)(cid:8)(cid:41)(cid:20)(cid:5)(cid:32)(cid:3)(cid:2)(cid:4)(cid:28)(cid:21)(cid:2)(cid:5)(cid:8)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:12)(cid:5)(cid:32)(cid:5)(cid:48)(cid:24)(cid:5)(cid:25)(cid:8)(cid:5)(cid:5)(cid:26)(cid:16)(cid:5)(cid:16)(cid:26)(cid:9)(cid:33)(cid:35)(cid:16)(cid:12)(cid:23)(cid:34)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:32)(cid:12)(cid:5)(cid:5)(cid:19)(cid:18)(cid:5)(cid:40)(cid:5)(cid:4)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:43)(cid:54)(cid:28)(cid:54)(cid:20)(cid:11)(cid:23)(cid:8)(cid:20)(cid:10)(cid:9)(cid:8)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:1)(cid:5)(cid:6)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:8)(cid:8)(cid:9)(cid:56)(cid:8)(cid:23)(cid:7)(cid:23)(cid:12)(cid:28)(cid:15)(cid:9)(cid:8)(cid:2)(cid:8)(cid:24)(cid:20)(cid:18)(cid:5)(cid:9)(cid:40)(cid:9)(cid:4)(cid:32)(cid:20)(cid:41)(cid:17)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:23)(cid:24)(cid:5)(cid:48)(cid:20)(cid:2)(cid:12)(cid:8)(cid:5)(cid:13)(cid:39)(cid:5)(cid:12)(cid:14)(cid:2)(cid:57)(cid:12)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:29)(cid:26)(cid:12)(cid:2)(cid:3)(cid:32)(cid:5)(cid:12)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:18)(cid:23)(cid:8)(cid:24)(cid:5)(cid:8)(cid:32)(cid:23)(cid:23)(cid:4)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:32)(cid:12)(cid:23)(cid:23)(cid:24)(cid:9)(cid:28)(cid:21)(cid:2)(cid:5)(cid:8)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:45)(cid:5)(cid:4)(cid:4)(cid:2)(cid:36)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:12)(cid:5)(cid:26)(cid:16)(cid:5)(cid:5)(cid:45)(cid:5)(cid:24)(cid:12)(cid:27)(cid:28)(cid:8)(cid:23)(cid:23)(cid:4)(cid:5)(cid:32)(cid:12)(cid:9)(cid:9)(cid:11)(cid:48)(cid:23)(cid:14)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:43)(cid:54)(cid:28)(cid:54)(cid:20)(cid:11)(cid:23)(cid:8)(cid:20)(cid:10)(cid:9)(cid:8)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:32)(cid:12)(cid:5)(cid:5)(cid:19)(cid:18)(cid:5)(cid:40)(cid:5)(cid:4)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:23)(cid:23)(cid:7)(cid:5)(cid:16)(cid:6)(cid:23)(cid:23)(cid:8)(cid:5)(cid:32)(cid:4)(cid:5)(cid:30)(cid:13)(cid:14)(cid:10)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:16)(cid:45)(cid:9)(cid:6)(cid:8)(cid:41)(cid:20)(cid:5)(cid:32)(cid:3)(cid:2)(cid:4)(cid:28)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:23)(cid:2)(cid:16)(cid:5)(cid:12)(cid:5)(cid:33)(cid:21)(cid:20)(cid:23)(cid:2)(cid:12)(cid:23)(cid:10)(cid:1)(cid:2)(cid:5)(cid:16)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:32)(cid:4)(cid:2)(cid:30)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:16)(cid:5)(cid:2)(cid:1)(cid:11)(cid:27)(cid:27)(cid:12)(cid:6)(cid:12)(cid:27)(cid:2)(cid:16)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:5)(cid:26)(cid:2)(cid:16)(cid:16)(cid:40)(cid:2)(cid:4)(cid:2)(cid:33)(cid:31)(cid:30)(cid:5)(cid:4)(cid:32)(cid:5)(cid:8)(cid:23)(cid:23)(cid:6)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:18)(cid:2)(cid:3)(cid:8)(cid:20)(cid:58)(cid:59)(cid:1)(cid:5)(cid:6)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:32)(cid:12)(cid:5)(cid:5)(cid:19)(cid:43)(cid:27)(cid:16)(cid:26)(cid:27)(cid:16)(cid:20)(cid:18)(cid:2)(cid:40)(cid:16)(cid:2)(cid:27)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:2)(cid:5)(cid:4)(cid:40)(cid:16)(cid:40)(cid:2)(cid:4)(cid:2)(cid:33)(cid:31)(cid:21)(cid:2)(cid:5)(cid:8)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:21)(cid:2)(cid:14)(cid:9)(cid:4)(cid:2)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:19)(cid:5)(cid:5)(cid:12)(cid:32)(cid:3)(cid:2)(cid:32)(cid:7)(cid:34)(cid:43)(cid:9)(cid:46)(cid:5)(cid:19)(cid:20)(cid:41)(cid:41)(cid:17)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:15)(cid:5)(cid:12)(cid:6)(cid:33)(cid:9)(cid:19)(cid:32)(cid:12)(cid:5)(cid:5)(cid:19)(cid:8)(cid:23)(cid:23)(cid:7)(cid:5)(cid:16)(cid:6)(cid:23)(cid:23)(cid:8)(cid:5)(cid:32)(cid:4)(cid:5)(cid:30)(cid:5)(cid:26)(cid:2)(cid:16)(cid:16)(cid:40)(cid:2)(cid:4)(cid:2)(cid:33)(cid:31)(cid:31)(cid:33)(cid:2)(cid:4)(cid:2)(cid:40)(cid:16)(cid:16)(cid:2)(cid:26)(cid:5)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:3)(cid:2)(cid:32)(cid:7)(cid:34)(cid:1)(cid:2)(cid:5)(cid:16)(cid:26)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:4)(cid:5)(cid:7)(cid:9)(cid:39)(cid:20)(cid:32)(cid:4)(cid:27)(cid:9)(cid:8)(cid:12)(cid:34)(cid:1)(cid:23)(cid:24)(cid:9)(cid:7)(cid:5)(cid:12)(cid:26)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:38)(cid:9)(cid:16)(cid:26)(cid:5)(cid:12)(cid:26)(cid:27)(cid:8)(cid:8)(cid:5)(cid:4)(cid:43)(cid:27)(cid:16)(cid:26)(cid:27)(cid:16)(cid:20)(cid:18)(cid:2)(cid:40)(cid:16)(cid:2)(cid:27)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:2)(cid:5)(cid:4)(cid:31)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:16)(cid:5)(cid:2)(cid:1)(cid:1)(cid:2)(cid:5)(cid:16)(cid:26)(cid:16)(cid:5)(cid:40)(cid:9)(cid:9)(cid:12)(cid:26)(cid:15)(cid:10)(cid:21)(cid:2)(cid:5)(cid:8)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:21)(cid:2)(cid:5)(cid:8)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:28)(cid:2)(cid:5)(cid:12)(cid:7)(cid:5)(cid:5)(cid:6)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:13)(cid:14)(cid:10)(cid:21)(cid:2)(cid:14)(cid:9)(cid:4)(cid:2)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:18)(cid:2)(cid:3)(cid:8)(cid:20)(cid:58)(cid:59)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:6)(cid:5)(cid:5)(cid:7)(cid:12)(cid:5)(cid:2)(cid:28)(cid:21)(cid:2)(cid:5)(cid:8)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:26)(cid:28)(cid:12)(cid:27)(cid:24)(cid:7)(cid:5)(cid:12)(cid:24)(cid:40)(cid:23)(cid:32)(cid:19)(cid:5)(cid:5)(cid:12)(cid:32)(cid:3)(cid:2)(cid:32)(cid:7)(cid:34)(cid:31)(cid:12)(cid:9)(cid:14)(cid:2)(cid:8)(cid:35)(cid:2)(cid:5)(cid:33)(cid:27)(cid:2)(cid:16)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:12)(cid:9)(cid:15)(cid:8)(cid:23)(cid:23)(cid:4)(cid:2)(cid:5)(cid:45)(cid:8)(cid:5)(cid:22)(cid:15)(cid:14)(cid:10)(cid:23)(cid:12)(cid:26)(cid:5)(cid:4)(cid:23)(cid:12)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:22)(cid:54)(cid:29)(cid:9)(cid:4)(cid:14)(cid:23)(cid:47)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:3)(cid:2)(cid:32)(cid:7)(cid:34)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:2)(cid:4)(cid:9)(cid:14)(cid:2)(cid:21)(cid:8)(cid:23)(cid:23)(cid:4)(cid:2)(cid:5)(cid:45)(cid:8)(cid:5)(cid:22)(cid:13)(cid:5)(cid:12)(cid:19)(cid:16)(cid:26)(cid:4)(cid:23)(cid:23)(cid:8)(cid:60)(cid:20)(cid:18)(cid:29)(cid:13)(cid:48)(cid:9)(cid:8)(cid:32)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:18)(cid:2)(cid:3)(cid:8)(cid:20)(cid:59)(cid:61)(cid:10)(cid:23)(cid:12)(cid:26)(cid:5)(cid:4)(cid:23)(cid:12)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:8)(cid:23)(cid:45)(cid:5)(cid:16)(cid:9)(cid:9)(cid:37)(cid:20)(cid:45)(cid:5)(cid:4)(cid:4)(cid:2)(cid:36)(cid:8)(cid:23)(cid:23)(cid:4)(cid:2)(cid:5)(cid:45)(cid:8)(cid:5)(cid:22)(cid:18)(cid:5)(cid:8)(cid:26)(cid:5)(cid:32)(cid:12)(cid:5)(cid:5)(cid:19)(cid:8)(cid:23)(cid:23)(cid:4)(cid:2)(cid:5)(cid:45)(cid:8)(cid:5)(cid:22)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:8)(cid:5)(cid:6)(cid:5)(cid:4)(cid:4)(cid:9)(cid:39)(cid:20)(cid:12)(cid:5)(cid:26)(cid:5)(cid:2)(cid:31)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:40)(cid:2)(cid:36)(cid:34)(cid:35)(cid:33)(cid:26)(cid:27)(cid:12)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:23)(cid:23)(cid:4)(cid:5)(cid:32)(cid:2)(cid:5)(cid:25)(cid:5)(cid:5)(cid:11)(cid:8)(cid:23)(cid:23)(cid:4)(cid:16)(cid:4)(cid:5)(cid:14)(cid:27)(cid:5)(cid:12)(cid:26)(cid:29)(cid:20)(cid:8)(cid:3)(cid:2)(cid:26)(cid:29)(cid:30)(cid:5)(cid:45)(cid:5)(cid:5)(cid:8)(cid:26)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:29)(cid:40)(cid:23)(cid:23)(cid:12)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:60)(cid:20)(cid:18)(cid:29)(cid:13)(cid:15)(cid:9)(cid:8)(cid:2)(cid:8)(cid:24)(cid:20)(cid:34)(cid:4)(cid:7)(cid:5)(cid:12)(cid:26)(cid:4)(cid:23)(cid:23)(cid:8)(cid:18)(cid:2)(cid:3)(cid:8)(cid:20)(cid:59)(cid:61)(cid:36)(cid:5)(cid:12)(cid:6)(cid:33)(cid:27)(cid:2)(cid:46)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:31)(cid:4)(cid:23)(cid:26)(cid:26)(cid:5)(cid:17)(cid:18)(cid:9)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:15)(cid:10)(cid:21)(cid:2)(cid:5)(cid:8)(cid:16)(cid:5)(cid:16)(cid:26)(cid:5)(cid:5)(cid:8)(cid:25)(cid:5)(cid:24)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:24)(cid:27)(cid:12)(cid:28)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:16)(cid:9)(cid:18)(cid:17)(cid:6)(cid:5)(cid:5)(cid:7)(cid:12)(cid:9)(cid:15)(cid:8)(cid:23)(cid:23)(cid:4)(cid:32)(cid:2)(cid:12)(cid:26)(cid:16)(cid:34)(cid:20)(cid:8)(cid:2)(cid:24)(cid:8)(cid:2)(cid:8)(cid:9)(cid:15)(cid:43)(cid:9)(cid:46)(cid:5)(cid:19)(cid:20)(cid:36)(cid:23)(cid:27)(cid:26)(cid:5)(cid:12)(cid:16)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:8)(cid:23)(cid:45)(cid:12)(cid:27)(cid:33)(cid:35)(cid:29)(cid:20)(cid:4)(cid:5)(cid:12)(cid:23)(cid:15)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:6)(cid:12)(cid:5)(cid:15)(cid:43)(cid:9)(cid:46)(cid:5)(cid:19)(cid:20)(cid:31)(cid:2)(cid:5)(cid:12)(cid:12)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:6)(cid:12)(cid:5)(cid:15)(cid:11)(cid:12)(cid:5)(cid:32)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:8)(cid:5)(cid:32)(cid:45)(cid:5)(cid:5)(cid:28)(cid:18)(cid:2)(cid:8)(cid:32)(cid:5)(cid:8)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:23)(cid:23)(cid:4)(cid:26)(cid:2)(cid:9)(cid:8)(cid:5)(cid:28)(cid:20)(cid:12)(cid:5)(cid:26)(cid:5)(cid:31)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:16)(cid:32)(cid:12)(cid:23)(cid:23)(cid:24)(cid:5)(cid:9)(cid:13)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:12)(cid:9)(cid:9)(cid:40)(cid:8)(cid:5)(cid:12)(cid:5)(cid:46)(cid:43)(cid:41)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:32)(cid:9)(cid:48)(cid:20)(cid:8)(cid:23)(cid:11)(cid:34)(cid:4)(cid:7)(cid:12)(cid:5)(cid:35)(cid:33)(cid:26)(cid:20)(cid:48)(cid:9)(cid:32)(cid:5)(cid:8)(cid:7)(cid:23)(cid:35)(cid:33)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:29)(cid:40)(cid:23)(cid:23)(cid:8)(cid:16)(cid:5)(cid:20)(cid:15)(cid:12)(cid:9)(cid:9)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:8)(cid:23)(cid:45)(cid:5)(cid:16)(cid:9)(cid:9)(cid:37)(cid:20)(cid:45)(cid:5)(cid:4)(cid:4)(cid:2)(cid:36)(cid:22)(cid:4)(cid:19)(cid:20)(cid:39)(cid:9)(cid:14)(cid:5)(cid:45)(cid:7)(cid:5)(cid:12)(cid:4)(cid:23)(cid:23)(cid:8)(cid:8)(cid:23)(cid:23)(cid:4)(cid:27)(cid:23)(cid:6)(cid:23)(cid:12)(cid:15)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:5)(cid:2)(cid:4)(cid:11)(cid:8)(cid:23)(cid:23)(cid:4)(cid:26)(cid:33)(cid:35)(cid:12)(cid:27)(cid:28)(cid:20)(cid:5)(cid:16)(cid:8)(cid:23)(cid:23)(cid:40)(cid:29)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:16)(cid:5)(cid:5)(cid:19)(cid:25)(cid:27)(cid:5)(cid:22)(cid:43)(cid:23)(cid:8)(cid:20)(cid:11)(cid:23)(cid:8)(cid:32)(cid:5)(cid:14)(cid:5)(cid:4)(cid:32)(cid:5)(cid:4)(cid:23)(cid:23)(cid:8)(cid:38)(cid:27)(cid:32)(cid:5)(cid:7)(cid:23)(cid:23)(cid:8)(cid:19)(cid:9)(cid:33)(cid:26)(cid:33)(cid:35)(cid:23)(cid:31)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:26)(cid:16)(cid:45)(cid:9)(cid:6)(cid:5)(cid:9)(cid:21)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:5)(cid:16)(cid:32)(cid:2)(cid:45)(cid:29)(cid:1)(cid:2)(cid:5)(cid:16)(cid:26)(cid:16)(cid:5)(cid:16)(cid:26)(cid:5)(cid:5)(cid:8)(cid:25)(cid:5)(cid:24)(cid:13)(cid:9)(cid:5)(cid:24)(cid:23)(cid:23)(cid:12)(cid:32)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:23)(cid:23)(cid:4)(cid:16)(cid:40)(cid:2)(cid:4)(cid:2)(cid:33)(cid:31)(cid:48)(cid:2)(cid:35)(cid:33)(cid:23)(cid:12)(cid:32)(cid:20)(cid:11)(cid:23)(cid:4)(cid:14)(cid:5)(cid:6)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:34)(cid:27)(cid:24)(cid:27)(cid:16)(cid:26)(cid:20)(cid:11)(cid:5)(cid:12)(cid:45)(cid:5)(cid:47)(cid:4)(cid:5)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:24)(cid:5)(cid:25)(cid:16)(cid:4)(cid:5)(cid:14)(cid:2)(cid:27)(cid:1)(cid:8)(cid:23)(cid:23)(cid:4)(cid:32)(cid:8)(cid:23)(cid:26)(cid:16)(cid:12)(cid:5)(cid:5)(cid:36)(cid:19)(cid:9)(cid:9)(cid:33)(cid:35)(cid:16)(cid:5)(cid:25)(cid:12)(cid:23)(cid:21)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:16)(cid:24)(cid:8)(cid:2)(cid:8)(cid:8)(cid:2)(cid:25)(cid:12)(cid:5)(cid:14)(cid:38)(cid:18)(cid:5)(cid:9)(cid:40)(cid:9)(cid:4)(cid:32)(cid:20)(cid:28)(cid:5)(cid:9)(cid:16)(cid:2)(cid:5)(cid:12)(cid:4)(cid:23)(cid:23)(cid:8)(cid:38)(cid:27)(cid:32)(cid:5)(cid:7)(cid:23)(cid:23)(cid:8)(cid:22)(cid:4)(cid:19)(cid:20)(cid:39)(cid:9)(cid:14)(cid:5)(cid:45)(cid:7)(cid:5)(cid:12)(cid:4)(cid:23)(cid:23)(cid:8)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:9)(cid:9)(cid:12)(cid:15)(cid:20)(cid:5)(cid:16)(cid:8)(cid:23)(cid:23)(cid:40)(cid:29)(cid:55)(cid:2)(cid:5)(cid:6)(cid:5)(cid:4)(cid:2)(cid:8)(cid:24)(cid:5)(cid:8)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:26)(cid:23)(cid:23)(cid:12)(cid:26)(cid:16)(cid:4)(cid:9)(cid:9)(cid:33)(cid:35)(cid:29)(cid:37)(cid:12)(cid:2)(cid:16)(cid:26)(cid:2)(cid:23)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:28)(cid:5)(cid:5)(cid:45)(cid:32)(cid:5)(cid:8)(cid:40)(cid:23)(cid:32)(cid:1)(cid:27)(cid:2)(cid:14)(cid:5)(cid:4)(cid:16)(cid:25)(cid:5)(cid:24)(cid:32)(cid:4)(cid:5)(cid:14)(cid:5)(cid:8)(cid:2)(cid:27)(cid:12)(cid:28)(cid:19)(cid:5)(cid:5)(cid:12)(cid:32)(cid:8)(cid:5)(cid:3)(cid:2)(cid:28)(cid:60)(cid:20)(cid:18)(cid:29)(cid:13)(cid:22)(cid:16)(cid:40)(cid:4)(cid:23)(cid:8)(cid:23)(cid:32)(cid:5)(cid:4)(cid:23)(cid:23)(cid:8)(cid:34)(cid:4)(cid:7)(cid:5)(cid:12)(cid:26)(cid:20)(cid:1)(cid:5)(cid:3)(cid:9)(cid:8)(cid:24)(cid:33)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:18)(cid:2)(cid:3)(cid:8)(cid:20)(cid:59)(cid:61)(cid:18)(cid:5)(cid:9)(cid:40)(cid:9)(cid:4)(cid:32)(cid:20)(cid:28)(cid:5)(cid:9)(cid:16)(cid:2)(cid:5)(cid:12)(cid:4)(cid:23)(cid:23)(cid:8)(cid:15)(cid:9)(cid:12)(cid:26)(cid:12)(cid:2)(cid:3)(cid:6)(cid:16)(cid:5)(cid:16)(cid:26)(cid:12)(cid:23)(cid:23)(cid:26)(cid:8)(cid:23)(cid:23)(cid:4)(cid:12)(cid:5)(cid:14)(cid:3)(cid:2)(cid:11)(cid:18)(cid:9)(cid:4)(cid:23)(cid:8)(cid:32)(cid:5)(cid:8)(cid:8)(cid:23)(cid:23)(cid:7)(cid:5)(cid:16)(cid:12)(cid:5)(cid:14)(cid:23)(cid:36)(cid:15)(cid:9)(cid:8)(cid:2)(cid:8)(cid:24)(cid:20)(cid:28)(cid:9)(cid:27)(cid:32)(cid:5)(cid:25)(cid:2)(cid:3)(cid:8)(cid:4)(cid:23)(cid:23)(cid:8)(cid:8)(cid:23)(cid:23)(cid:4)(cid:8)(cid:3)(cid:2)(cid:25)(cid:5)(cid:32)(cid:27)(cid:9)(cid:28)(cid:20)(cid:24)(cid:8)(cid:2)(cid:8)(cid:9)(cid:15)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:8)(cid:5)(cid:2)(cid:21)(cid:26)(cid:16)(cid:5)(cid:14)(cid:5)(cid:16)(cid:6)(cid:23)(cid:23)(cid:8)(cid:5)(cid:32)(cid:4)(cid:5)(cid:30)(cid:62)(cid:63)(cid:64)(cid:55)(cid:20)(cid:30)(cid:23)(cid:16)(cid:26)(cid:33)(cid:27)(cid:2)(cid:16)(cid:7)(cid:5)(cid:12)(cid:24)(cid:62)(cid:63)(cid:62)(cid:65)(cid:36)(cid:2)(cid:8)(cid:32)(cid:5)(cid:6)(cid:2)(cid:8)(cid:32)(cid:13)(cid:5)(cid:2)(cid:4)(cid:2)(cid:24)(cid:17)(cid:1)(cid:12)(cid:2)(cid:5)(cid:14)(cid:27)(cid:4)(cid:32)(cid:2)(cid:24)(cid:33)(cid:5)(cid:2)(cid:32)(cid:16)(cid:35)(cid:9)(cid:4)(cid:4)(cid:5)(cid:24)(cid:5)(cid:17)(cid:18)(cid:19)(cid:18)(cid:6)(cid:2)(cid:7)(cid:3)(cid:2)(cid:8)(cid:26)(cid:9)(cid:27)(cid:12)(cid:2)(cid:16)(cid:26)(cid:2)(cid:8)(cid:19)(cid:9)(cid:12)(cid:45)(cid:23)(cid:26)(cid:2)(cid:9)(cid:8)(cid:10)(cid:2)(cid:8)(cid:2)(cid:5)(cid:45)(cid:5)(cid:8)(cid:2)(cid:8)(cid:16)(cid:26)(cid:2)(cid:26)(cid:27)(cid:27)(cid:26)(cid:15)(cid:9)(cid:8)(cid:2)(cid:8)(cid:6)(cid:4)(cid:2)(cid:3)(cid:6)(cid:34)(cid:26)(cid:33)(cid:5)(cid:8)(cid:5)(cid:27)(cid:45)(cid:48)(cid:5)(cid:32)(cid:2)(cid:8)(cid:24)(cid:5)(cid:8)(cid:33)(cid:9)(cid:19)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:11)(cid:23)(cid:23)(cid:12)(cid:26)(cid:6)(cid:9)(cid:45)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:9)(cid:4)(cid:20)(cid:21)(cid:22)(cid:7)(cid:21)(cid:23)(cid:2)(cid:24)(cid:25)(cid:7)(cid:26)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:30)(cid:23)(cid:16)(cid:26)(cid:33)(cid:27)(cid:2)(cid:16)(cid:7)(cid:5)(cid:12)(cid:24)(cid:31)(cid:12)(cid:9)(cid:14)(cid:2)(cid:8)(cid:35)(cid:2)(cid:5)(cid:32)(cid:9)(cid:45)(cid:5)(cid:2)(cid:8)(cid:15)(cid:5)(cid:16)(cid:16)(cid:5)(cid:4)(cid:17)(cid:18)(cid:9)(cid:29)(cid:2)(cid:8)(cid:26)(cid:17)(cid:1)(cid:9)(cid:8)(cid:23)(cid:26)(cid:27)(cid:16)(cid:40)(cid:23)(cid:12)(cid:6)(cid:41)(cid:10)(cid:22)(cid:37) An Architectural Style for Self-Adaptive Multi-Agent Systems · 15 To avoid collisions, AGV agents have to lock the segments they want to drive. Therefore, the virtual environment uses path projections that are realized as follows: public class PathProjection { private int id; private int priority; private Hull hull; private ArrayList projection; private Status status; ... public void lock() public void clear(ArrayList segments) ... { ... } } { ... } A path projection has an identifier, a priority that is used to give precedence to AGVs with important transportation tasks, a hull that represents the physical area an AGV occu- pies on the floor, a projection that consists of an array of segments of the intended path, and finally a status which is requested or locked. When an AGV agent projects the path projec- tion in the AGV local virtual environment, the path projection will have status requested. The local virtual environment then coordinates with other local virtual environment and marks the path projection locked when the conditions for the AGV are safe to move on. This coordination is realized by the synchronization component discussed below. When the AGV drives forward, the path projection is gradually cleared. The Perception Service provides the functionality for agents to sense the environment. The π-ADL specification of the perception service is defined as follows: component PerceptionService is abstraction () { type Focus is view[focusName : String, focusParams : Any]. type Sense is view[agentId : String, focus : Focus]. type Representation is Any. type Observation is Any. type Observed is Any. ... port perceive is { connection sense is in(Sense). port observe is { connection observation is out(Observation). connection sensed is out(Representation). } connection observed is in(Observed) }. ... perceptionTypes is location(set(StateItems)). behavior is { analyzePerception is function ( sense : Sense ) : StateItems { unobservable }. virtualPerception is function ( items : StateItems, types : set(StateItems) : Boolean { unobservable }. generateRepresentation is function( sense : Sense, state : StateItems) : Representation { unobservable }. ... ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 16 D. Weyns and F. Oquendo via sense receive sense_request : Sense. sense_items := analyzePerception( sense_request ). if virtualPerception( sense_items, perceptionTypes ) then { //perceive local state repository unobservable. via stateTemplate send sense_items. via readState receive perceived_state. via sensed send generateRepresentation( sense_request, perceived_state ). behavior(). } else { //perceive external environment unobservable. via observation send generateObservation( sense_items ). unobservable. via observed receive external_observed. observation_state := analyzeObserved( external_observed ). via sensed send generateRepresentation( sense_request, observation_state ). behavior(). } } } The perception service supports selective perception. Selective perception enables an agent to direct its perception at the relevant aspects according to its current task. This facilitates better situation awareness. To direct its perception an agent selects a focus. A focus has a set of domains-specific parameters that determine aspects such as element types of interest, operating range, etc. Sensing results in a representation. A representation is a domain-specific data structure that represents the sensed elements in a form that can be interpreted by the agents. When an agent invokes a perception request, the perception service analyzes it and de- termines whether it concerns a virtual perception of the local state or a perception of the external environment. In case of a virtual perception, a representation is generated based on state derived from the repository. In case of an external perception, an observation is generated, and a representation is generated from the observed state. An observation is a domain-specific command that allows observing state of the external environment. Examples of foci in the AGV transportation system are a focus to observe the positions of nearby vehicles and a focus to observe the status of an operating space. An example in the vehicle routing system is a focus to sense a path on the road infrastructure: public PathFocus(String name, int maxDist, Node from, Node to) { ... } pfocus = new PathFocus("paths", 1500, n15, n125); This focus selects the traffic routes with a maximum distance of 1500 m from a given node (n15) to another node (n125). The nodes refer to the elements of the road elements ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 17 of the road network. Nodes are an abstraction of road elements used by the agents. The perception service maps nodes to road elements of the road network maintained by the state repository of the virtual environment. Note that the result of a perception with this focus may dynamically change when certain road areas are temporary not accessible as reflected in the map. Such map updates can be maintained by the synchronization components (discussed below). The representation that results from sensing a path on the road infrastructure is an object of graph paths that is realized as follows: public class GraphPath { private ArrayList<Node> path; ... } public class GraphPaths { private ArrayList<GraphPath> paths; ... } Graph paths contains a list of paths, each path consisting of a list of nodes. Agents can interpret graph paths to support their decision making. Both for the AGV transportation systems and the vehicle routing system, we only use virtual perceptions. Synchronization of the state of the virtual environment with the ex- ternal environment is realized by the synchronization component (discussed below). An example of a virtual perception in the AGV transportation systems is a perception request to check the status of a path projection (see Fig. 6). An example in the vehicle routing system is a perception request to sense traffic roads with a path focus: public class PathSense( PathFocus pf ) { ... } psense = nes PathSense(pfocus); virtualEnv.sense(id, psense); Action Service is responsible to deal with agents' actions. The π-ADL specification of the action service is defined as follows: component ActionService is abstraction () { type Action is view[agentId : String, actionName : String, actionParams : Any]. type Operation is Any. ... port act is { connection action is in(Action) }. port operate is { connection operation is out(Operation) }. ... actionTypes is location(set(StateItems)). behavior is { analyzeAction is function ( act : Action ) : StateItems { unobservable }. virtualAction is function( state : StateItems, ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 18 D. Weyns and F. Oquendo types :location(set(StateItems)) : Boolean { unobservable }. updateState is function( state: StateItems ) : StateItems { unobservable }. generateOperation is function( state : StateItems ) : Operation { unobservable }. action_items : StateItems. via act receive action_request : Action. action_items := analyzeAction( action ). if virtualAction( action_items, actionTypes ) then { //apply action to local state unobservable. via writeState send updateState( action_items ). behavior(). } else { //apply external action unobservable. via operate send generateOperation( action_items ). behavior(). } } } Situated agents perform actions to realize their tasks. When an agent invokes an action, the action service analyzes the action based on the action types to determine whether the action is concerned with modifying the state of the virtual environment (virtual action) or modifying the state of external resources (external action). In the former case, the local action is executed on the state repository of the virtual environment. In the latter case, an operation is generated and executed. An operation is an action that can be executed in the external environment. An example of a virtual action in the AGV transportation system is an agent that projects a requested path on the map in the AGV local virtual environment (see Fig. 6). public Project(String name, int prio, Hull hull, Path path) { ... } ... project = new Project("project", 0, hull, path); virtualEnv.invoke(id, project); The project action has a name, the priority of the transport currently performed by the requesting AGV, the hull of the AGV, and the path for the projection (i.e., a list of nodes that correspond to segments). The excerpt illustrates how a concrete action is instantiated and then executed on the virtual environment by an agent with identifier id. The virtual environment of in the vehicle routing system does not provide virtual actions. An example of an external action in the vehicle routing system is an vehicle agent that advises the driver about a preferable route. An example in the AGV transportation system is an AGV agent that commands the vehicle to pick a load: public Pick(String name, Node node) { ... } ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 19 ... pick = new Pick("pick", n45); virtualEnv.invoke(id, pick); The pick action consists of a name and the node where the load is located. Node is an abstraction of a position on the map of the environment, maintained by the agents. This action is then then converted to an operation for Egemin's AGV steering system E'nsor R(cid:13) (Egemin Navigation System On Robot). For an AGV with a single fork lift, the pick action only requires the segment where the load is located. The physical execution of the action, such as staying on track, turning, and the manipulation of the load is handled by E'nsor. Actually, the control commands provided by the E'nsor interface are coded in a low-level digital format. The virtual environment therefore uses the underlying E'pia R(cid:13) middleware (Egemin Platform for Integrated Automation) to invoke external action, which translates the operations to Ensor control commands. Similarly, to inform a driver about a route in the vehicle routing system, the action is translated to interface commands for a dashboard driver. To support such external actions, the action service can provide supporting functionality to translate action requests to low- level operations. Alternatively, supporting middleware services are available that support action translation. The Communication Service is responsible for managing the communicative interactions among agents. The service receives messages, provides the necessary infrastructure to buffer messages, and deliver messages to the appropriate agents. Communication service is defined as follows: Component CommunicationService is abstraction () { type Message is view[id : Integer, sender : String, receiver : String, protocol : String, performative : String, content : Any]. type Transmission is Any. ... port communicate is { connection sendMsg is in(Message). port transmit is { connection transmission is out(Transmission). connection deliver is in(Transmission) }. connection receiveMsg is out(Message) }. ... addresses is location(set(StateItems)). behavior is { analyzeMessage is function ( msg : Message ) : ItemStates { unobservable }. localCommunication is function( msg_items: StateItems, addrs : location(set(StateItems) ) : Boolean { unobservable }. generateTransmission is function( msg_items : StateItems, addrs : location(set(StateItems) ) : Transmission { unobservable }. analyzeTransmission is function( trans : Transmission, addrs : location(set(StateItems) ) : StateItems { unobservable }. generateMessage is function( trans_items : StateItems, addrs : location(set(StateItems) ) : ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 20 D. Weyns and F. Oquendo Message { unobservable }. ... choose { //send message unobservable. via sendMsg receive message_in. message_items := analyzeMessage(message_in). if localCommunication(message_items, addresses) then //deliver message locally via receiveMsg send message_in. behavior(). else //deliver message remotely transmission_out = generateTransmission(message_state, addresses). via transmission send transmission_out. behavior(). or //deliver message unobservable; via deliver receive transmission_in. transmission_data := analyzeTransmission(transmission_in, addresses). message_out := generateMessage(transmission_data, addresses). via receiveMsg send message_out. behavior(). } } An agent communication message consists of message identifier, the names of the sender and receiver, the message performative (inform, request, propose, etc.), the name of the protocol, and the content of the message. The content is described in a content language which is based on a shared ontology. The ontology defines a vocabulary of words that enables agents to refer unambiguously to concepts and relationships between concepts in the domain when exchanging messages. Such message descriptions enable a designer to express the communicative interactions independently of the underlying communication technology. When the message service receives a message, it analyzes the message and checks whether it concerns a message for a local or a remote addressee. In the former case, it forwards the message to the right agent, in the latter case a transmission is generated and the message is transmitted to the remote agent. To actually transmit the messages, the communication service makes use of a distributed communication system provided by un- derlying middleware. The communication service can provide supporting functions for exchanging messages in a distributed setting, such as white and yellow page services, or alternatively, the service may depend on the underlying middleware for such functions. When the communication service receives a transmission from a remote host, it analy- ses it and generates a message from the received data in the agent message format. The message is then forwarded to the agent. In the AGV transportation systems, we developed two approaches for task assignment, one based on computational fields (we explain this approach below) and another approach in which agents exchange messages [Weyns et al. 2008]. In the message-based approach, transport agents and AGV agents exchange messages with one another to agree on the ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 21 assignment of transportation tasks. Here is an example of a message for a call for proposals sent by a transport agent: public Message(int id, String sender, String receiver, String protocol, String performative, Content c) { ... } ... transport = new Content("regular", "5", "n60"); cfp = new Message(77, "ta14", "20m", "DynCNET", "cfp", transport); virtualEnv.send(id, cfp); The identifier of this message is 77. The message is sent by transport agent ta14. Re- ceivers are all AGV agents within a scope of 20 m from the location of the transport. The protocol is DynCNET (dynamic Contract Net [Weyns et al. 2008]) and the performative of the message is cfp (call for proposals). We elaborate on the DynCNET protocol when we discuss the protocol-based communication pattern. The content of the message con- tains 3 elements: regular, i.e., the type of the transport; 5, i.e., the priority of the transport; and n60, i.e., the location of the transport. The receivers use the performative to parse the content of the message correctly. An example of a message in the vehicle routing system is a vehicle agent that sends a reservation ant (i.e., a smart message) to book a particular path along the traffic network. public Message(int id, String protocol, ... String sender, String receiver, String performative, Content c) { } ... booking = new Content(...); ant = new Message(44, "va174", "ia75", "PropagateIntention", "booking", booking); virtualEnv.send(ant); This message with identifier 44 is sent by vehicle agent va147. The first receiver is infrastructure agent ia75. The name of the protocol is propagate intention. The performa- tive says that the message is a booking. The booking contains a sequence of entries that correspond with road segments along the path of the booking, including the names of the infrastructure agents along the path, and timing data. When an infrastructure agent receives the message, it parses the content to extract the data to book the local reservation. Then the agent acknowledges its reservation by marking the entry of its booking in the content of the message. Finally, the agent updates the sender with its id and the receiver with the id of the next infrastructure agent in the list, and forwards the messages. Once the infrastructure agent at the final destination has made its booking it sends the booking message back to the vehicle agent to notify the agent about the booking. Synchronization is responsible for synchronizing state of the virtual environment with external entities, i.e., virtual environments on neighboring nodes as well as external re- sources. The π-ADL specification of synchronization is defined as follows: component Synchronization is abstraction () { type SynchronizationUpdate is Any. ... ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 22 D. Weyns and F. Oquendo port synchronize is { connection syncOut is out(SynchronizationUpdate). connection syncIn is in(SynchronizationUpdate) }. ... synchronizationItems is location( set(StateItems) ). behavior is { selectItems is function( item : location(set(StateItems)) : StateItems { unobservable }. localSync is function( state : StateItems, location( set(StateItems) )) : Boolean { unobservable }. ... generateSyncUpdate is function( state : StateItems ) : SynchronizationUpdate { unobservable }. decodeSyncUpdate is function( update : SynchronizationUpdate) : StateItems { unobservable }. choose { //locally initiated synchronization unobservable. via stateTemplate send selectItems(synchronizationItems). via readState receive state_items : StateItems. if localSync(state_items, synchronizationItems) //local state update via writeState send updateState(state_items). else //external synchronization unobservable. via syncOut send generateSyncUpdate(state_items). behavior(). or //remotely initiated synchronization unobservable. via syncIn receive sync_update : SynchronizationUpdate. via writeState send decodeSyncUpdate(sync_update). behavior(). } } } A synchronization update defines a synchronization interaction with the external envi- ronment. This abstract type has to be instantiated for the domain at hand. A synchroniza- tion can be initiated either locally or remotely. In the former case, a distinction can be made between a synchronization that updates the local state of the virtual environment, and one that triggers an external update. In the latter case, the received synchronization update is decoded and the resulting data is used to update the local state repository. An example of synchronization in the AGV transportation system is the coordination required to resolve conflicts between path projections requested by AGV agents. To re- alize this coordination, the synchronization components of the AGV virtual environments rely on the ObjectPlaces middleware [Schelfthout 2006]. We developed ObjectPlaces to encapsulate the tedious management tasks associated with distribution in mobile applica- tions, and applied it to the AGV transportation system. ObjectPlaces enables to set up an ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 23 automatically up-to-date collection of data objects on a set of nodes in the network, and maintain these objects in the face of dynamically changing conditions. To resolve con- flicts between path projections requested by different AGV agents, ObjectPlaces uses a mutual exclusion protocol. For a detailed discussion of path projection coordination with ObjectPlaces, we refer the interested reader to [Schelfthout et al. 2006]. We illustrate synchronization in the AGV transportation with another example. As ex- plained above, besides the message-based approach, we also developed an approach for transport assignment that is based computational fields. These fields are emitted by trans- port agents. The computational fields are distributed data structures spread in through the virtual environment, which attract AGV agents. Each AGV agent of an idle AGV com- bines the sensed fields and follows the gradient of the combined field, guiding its AGV to a load [Weyns et al. 2008]. Fig. 7 shows a snapshot from the simulation of an industrial AGV transportation system in which a number of transport agents emit a field in the virtual environment. The range of the fields is variable and depends on the priority of the tasks. In this case, the synchronization components of the local virtual environments are responsible for maintaining the fields. Fig. 7. Transport fields emitted in the virtual environment This field-based approach employs both types of locally initiated synchronizations. In particular, if a task is not assigned after a predefined amount of time, its priority is in- ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. Figure6.TransportsemitfieldsinthevirtualenvironmenttoattractidleAGVsCollisionavoidance.AGVagentsmarkthepaththeyaregoingtodriveintheirlocalvirtualenvironmentusinghulls.ThehullofanAGVisthephysicalareatheAGVoccupies.AseriesofhullsdescribethephysicalareaanAGVoccupiesalongacertainpath.Iftheareaisnotmarkedbyotherhulls(theAGV'sownhullsdonotintersectwithothers),theAGVcanmovealongandactuallydriveoverthereservedpath.Incaseofaconflict,theinvolvedlocalvirtualenvironmentsusetheprioritiesofthetransportedloadsandthevehiclestode-terminewhichAGVcanmoveon.AGVagentsmonitorthelocalvirtualenvironmentandonlyinstructtheAGVtomoveonwhentheyareallowed.Afterwards,theAGVagentsre-movethemarkingsinthelocalvirtualenvironment.TheleftpartsofFig.8andFig.9showtwoAGVscoor-dinatetoavoidacollision(weexplaintherightpartofthefiguresbelow).ThesnapshotsshowafusionviewofthetwolocalvirtualenvironmentsthatiscollectedviaremoteaccessofthetwoAGVs.InFig.8twoAGVsarecoordinating.BothAGVsareprojectinghullsinthevirtualenvironment.Atthispointthereisanoverlapofhulls:theAGVontop(boxmarkedwithX)isreadytomovetotheleft,thesmallerAGVatthebottomismanoeuvringtoturnright.TheAGVatthebottomhasalreadyreservedthetrajectoryoccupiedbyitshull,andthusithasprioritytotheAGVatthetopthatmustwait.InFig.9,theAGVatthebottomhaspassedthecurve.ThereisnolongeranoverlapofhullsandtheAGVatthetophasstarteddrivingtotheleft.4.2.3ObjectPlaces:MiddlewareforMobileApplicationsThemobilityoftheAGVsimposehighlydynamicopera-tionconditionsandinherentdistributionofresources.Atyp-icalapproachinmainstreamsoftwareengineeringistosup-portdistributionwithasuitablemiddleware.Wehavede-velopedamiddlewareformobileapplicationscalledOb-jectPlaces(Schelfthout2006).MobileapplicationssuchasanAGVtransportationsystemarecharacterizedby(1)theirneedtotakeintoaccounttheirphysicalenvironment(usu-allycalledcontext)explicitly;and(2)theirneedtodealwithdynamicsandunexpectedeventsoriginatingfromtheircon- · 24 D. Weyns and F. Oquendo creased. Such update is triggered locally by the synchronization component and updates the local state of the field in the virtual environment. On the other hand, a change in priority of a field triggers the synchronization component to spread of field in the virtual environ- ment to neighboring nodes. This is an example of a locally initiated synchronization that triggers an external update. public class FieldData { private int id; private int priority; private Node source; ... } public class TaskField { private Task task; private FieldData fieldData; ... } ... //transport agent creates a field and then performs an emit action fdata = new FieldData(120, 3, n60); field = new TaskField(t60, fdata); emit = new Emit('emit', field); virtualEnv.invoke(ta8, emit); //virtual environment distributes the field objectplace.put(field, callback); ... The excerpt shows how transport agent ta8 located at node n60 creates a field with id 120 and priority 3 for transportation task t60, and then emits the field in the virtual environment. Subsequently, the virtual environment distributes the field to other nodes using the put operation provided by the underlying ObjectPlaces middleware (the put operation is an example of a domain-specific realization of a synchronization update. For emitting a field, only the nodes within a certain distance from the transport agent that emits the field will receive the field. This distance is determined based on the priority of the field (in the field data). When an AGV enters or leaves the range determined by this distance, the virtual environment of the AGV will be notified by the middleware and the field will be added or removed respectively. When the execution of the task is not started after a certain time, the priority of the task will be increased and the virtual environment will update the field in the objectplace. This is turn will trigger the update to the other nodes via the middleware. An example of an externally initiated synchronization in the traffic routing application is the periodic update of the position of a car on the virtual road network. To that end, the synchronization component will use the digital data derived from the position sensor of the car to update the position of the car in the state repository of the virtual environment. 4.1.3 Design Rationale. Three primary principles that underlay the design of the virtual environment are separa- tion of concerns, synchronization processes, the shared data style. Action service, perception service, and communication service provide operations cor- responding to the various ways situated agents can access the virtual environment. By ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 25 separating the various concerns, the decomposition of the virtual environment yields a flexible modularization that can be tailored to a broad family of application domains. For example, for applications in which agents interact via marks in the virtual environment but do not communicate via message exchange, the communication service can be omitted. The synchronization component contributes to the flexibility and openness of the multi- agent system. Synchronization can encapsulate processes that maintain a representation of the state of external resources in the state repository, which reflect dynamics in the environment. Agents can perceive these dynamics, which allow them to flexibly adapt their behavior when operating conditions change. Furthermore, synchronization processes can keep track of agents that come and go and reflect this in the state repository of the virtual environment. This indirection reduces the coupling between agents enhancing the openness of the multi-agent system. The shared data style results in low coupling between elements that have clear and dis- junctive responsibilities. This makes the elements better understandable in isolation. Fur- thermore, it improves reuse (elements are not dependent on too many other elements) and modifiability (changes in one element do not affect other elements or the changes have only a local effect). 4.2 Situated Agent 4.2.1 Primary Presentation. The primary presentation of the situated agent pattern is shown in Fig. 8. Fig. 8. Primary presentation of situated agent A situated agent is an autonomous entity that is situated in a virtual environment. A situated agent encapsulates its state and controls its behavior, aiming to realize the tasks it is assigned. Situated agents are able to adapt their behavior according to changing operating ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 26 D. Weyns and F. Oquendo conditions. A situated agent is a cooperative entity. The realization of the overall tasks results from interaction among agents. At the top level, the π-ADL specification of situated agent is defined as follows: component SituatedAgent is abstraction () { //type definitions type Focus is view[focusName : String, focusParams : Any]. type Sense is view[agentId : String, focus : Focus]. type Representation is Any. type Action is view[agentId : String, actionName : String, actionParams : Any]. type Message is view[id : Integer, sender : String, receiver : protocol : String, performative : String, content : Any]. port perceive is { connection sense is out(Sense). connection sensed is in(Representation) }. port act is { connection action is out(Action) }. port communicate is { connection send is out(Message). connection receive is in(Message) }. //composition behavior is compose { perception is Perception() communication is Communication() actionSelection is ActionSelection() currentKnowledge is CurrentKnowledge() and and and } where { perception::sense relays sense perception::request unifies communication::request perception::request unifies actionSelection::request sensed relays perception::sensed communication::send relays send receive relays communication::receive actionSelection::action relays action currentKnowlege::readWriteKnowledge unifies and and and and and and and communication::readWriteKnowledge and currentKnowlege::readWriteKnowledge unifies actionSelection::readWriteKnowledge and currentKnowlege::readWriteKnowledge unifies perception::readWriteKnowledge } } The specification starts with defining types and ports of a situated agent. Then, the com- position of the constituent components of a situated agent is defined. We introduce these components in the following subsection. An elaborated discussion of perception, action selection and communication follows in the next sections that discuss refined patterns for each of these components. 4.2.2 Architectural Elements. The Current Knowledge repository contains data that is shared among the components of a situated agent. The π-ADL specification of current knowledge is defined as follows: component CurrentKnowledge is abstraction() ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 27 { type KnowledgeItem is view[name : String, val : Any]. type Knowledge is set(KnowledgeItem). port readWriteKnowledge is { connection knowledgeTemplate is in(Knowledge). connection readKnowlege is out(Knowledge). connection writeKnowledge is in(Knowledge) }. assuming { protocol is (via knowledgeTemplate receive Knowledge. true*.via readState send Knowledge.)* or (via writeState receive Knowledge.)* }. currentKnowledge is location(set(Knowledge)). behavior is { write is function( knowledge : Knowledge, repository : set(Knowledge) ) : location(set(Knowledge)) { unobservable. }. read is function( template : Knowledge, repository : set(Knowledge) ) : Knowledge { unobservable }. choose { //read knowledge via knowledgeTemplate receive knowledge_template : Knowledge. unobservable. via readKnowledge send read(knowledge_template, currentKnowledge). behavior(). or //write knowledge via writeKnowledge receive knowledge_items : Knowledge. unobservable. currentKnowledge := write(knowledge_items, currentKnowledge). behavior(). } } } Knowledge items are abstract elements that represent something of interest to the agent. Such items can refer to elements of the external environment, elements in the virtual envi- ronment, or internal elements. An agent's current knowledge is maintained in a repository that provides a shared port that allows components to read and write knowledge. The pro- tocol of the read write port enforces the atomic completion of either reading or writing the repository. Reading knowledge requires a template and after processing the requested knowledge is returned. Reading and writing are further specified in the behavioral part of the definition. Examples of knowledge in the vehicle routing system are a path along the road network represented as a graph of nodes (see the definition of graph path in section 4.5.2 where we discuss the perception service), the current position of the car as a node of the graph, the status of the traffic in the monitored area, bookings for road segments, etc. An example of knowledge in the AGV transportation systems is operating space that an AGV agent uses to keep track of its path projections in the virtual environment. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 28 D. Weyns and F. Oquendo public class OperatingSpace { private Path requestedPath; private Path lockedPath; ... public void locked(Path p) { ... } public void release(Path p) { ... } ... } An operating space keeps track of a requested path and a locked path. The requested path has been projected in the virtual environment, but is not locked yet (at least the AGV agent has not observed this). The locked path is reserved for the AGV to move safely. Operation space provides a lock operation to add a projected path to the locked path once it is locked, and an operation to release the path behind the AGV when it moves. Perception is responsible for collecting data for the agent. This data concerns either state of the virtual environment or state of the environment. The π-ADL specification of per- ception is defined as follows: component Perception is abstraction() { type Focus is view[focusName : String, focusParams : Any]. type Filter is view[filterName : String, filterParams : Any]. type PerceptionRequest is view[id : String, focus : Focus, filter : Filter]. type Sense is view[agentId : String, focus : Focus]. type Representation is Any. ... port request is { connection requestPerception is in(PerceptionRequest). port perceive is { connection sense is out(Sense). connection notifyRequest is out(String)}. connection sensed is in(Representation) }. ... behavior is { generateSense is function( p_request : PerceptionRequest) : Sense { unobservable }. via requestPerception receive request : PerceptionRequest. via sense send generateSense(request). unobservable. via sensed receive representation : Representation. unobservable. via writeKnowledge send update : Knowledge. via notifyRequest send request::id. behavior(). } } The perception component enables an agent to sense the virtual environment for infor- mation. To support selective perception, a perception request includes a selected focus and filter. We explained the concept of a focus in section 4.5.2. A filter allows an agent to select only those elements of a representation that match a particular selection criteria. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 29 Perception requests can be triggered by the communication component and the action selection component. When perception receives a request, it generates a sense that is used to sense the virtual environment, resulting in a representation. Perception processes the representation, updates the agent's current knowledge, and then notifies the perception requester. An example of a filter in the AGV transportation system is a filter to select the nearest transportation task that resulted from sensing the tasks within a certain distance. An exam- ple in the vehicle routing system is a filter to select the shortest path from a set of sensed paths: public ShortestPath(Sting name, GraphPaths paths) { ... } pfilter = new ShortestPath('shortestPath', sensedPaths); This filter selects the shortest path from a given set of sensed paths. The representation of graph paths is discussed in section 4.5.2. We elaborate on the perception when we discuss the selective perception pattern. Behavior-Based Action Selection is responsible for realizing the agent's objectives by invoking actions in the virtual environment. Actions either intend to manipulate the state of the virtual environment or manipulate external resources. The π-ADL specification of action selection is defined as follows: component ActionSelection is abstraction() { type Action is view[agentId : String, actionName : String, actionParams : Any]. ... port act is { connection action is out(Action) }. behavior is { unobservable. via action send action : Action. behavior(). } } After the definition of types and ports, the abstract behavior of action selection is defined. During internal processing, action selection can decide to select an action and subsequently, the selected action is invoked in the virtual environment. The following excerpt illustrates how an action is realized in the vehicle routing system: public InstructDriver(String name, GraphPath path) { ... } ... intention = new InstructDriver('intention', path); virtualEnv.invoke(id, intention); The action advises the driver with a preferable path in the environment. For examples of actions in the AGV transportation system, we refer to the discussion of the action ser- vice in section 4.5.2, where we discuss several examples. We further elaborate on decision making when we discuss the behavior-based action selection pattern. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 30 D. Weyns and F. Oquendo Communication is responsible for communicative interactions with other agents. Mes- sage exchange enables agents to share information and set up collaborations. The π-ADL specification of communication is defined as follows: component Communication is abstraction () { type Message is view[id : Integer, sender : String, receiver : String, protocol : String, performative : String, content : Any]. ... port communicate is { connection sendMsg is out(Message). connection receiveMsg is in(Message) }. behavior is { choose { //receive message via receiveMsg receive message : Message. unobservable. behavior(). or //send message unobservable. via sendMsg send message : Message. unobservable. behavior(). or //silence unobservable. behavior(). } } } After type and port declarations, the behavior of communication is defined. The com- munication component either receives a message that is internally processed, or it sends a message after internal processing, or its behavior is silent (e.g., a conversation is termi- nated without further notice). We have presented concrete realizations of messages for both the vehicle routing system and the AGV transportation system in section 4.5.2, where we discuss the communication service. We elaborate on communication and give a concrete example of a protocol when we explain the protocol-based communication pattern. 4.2.3 Design Rationale. The primary principles that underlay the design of situated agent are decentralized control and locality, perception on demand, and parallelism of action selection and communica- tion. In a situated multi-agent system, control is decentralized and divided among the agents. Situated agents manage the dynamic and changing operating conditions locally and au- tonomously, enabling them to flexibly adapt their behavior when needed. However, decen- tralized control (the system tasks are realized by agents that make local decisions) typically requires more communication. The performance of the system may be affected by the com- munication links between agents, which could impose a major bottleneck. Furthermore, agents' decision making is based on local information, which may result in suboptimal ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 31 system behavior. These tradeoffs and should be kept in mind throughout the design and development of a situated multi-agent system. Selective perception enables an agent to focus its attention to the relevant aspects in the environment according to its current tasks. When selecting actions and communicating messages with other agents, decision making and communication typically request per- ceptions to update the agents knowledge. By selecting an appropriate focus and filter, the agent directs its attention to the current aspects of its interest, and adapts it attention when the operating conditions change. The overall behavior of a situated agent is the result of the coordination of action se- lection and communication. Action selection is responsible for selecting suitable actions to perform tasks. Communication is responsible for the communicative interactions with other agents. However, the two components coordinate to complete the agent's tasks more efficiently. For example, agents can send each other messages with requests for information that enable them to act more purposefully, or support each other in a collaboration. En- suring that both action selection and communication behave in a coordinated way requires a careful design. On the other hand, the separation of functionality for coordination (via communication) from the functionality to perform actions to complete tasks has several advantages. Besides improving reusability, it allows both functions to act in parallel and at a different pace. In many applications, sending messages and executing actions happen at different tempo. A typical example domain is robotics, but it applies to any application in which the time required for performing actions in the environment differs significantly from the time to communicate messages. Separation of communication from performing actions enables agents to reconsider the coordination of their behavior while they perform actions, improving adaptability and efficiency. 4.3 Selective Perception 4.3.1 Primary Presentation. The primary presentation of the selective perception pattern is shown in Fig. 9. Selective perception is responsible for collecting runtime information to update the agent's current knowledge. Perception requests can be initiated by the communication component and the action selection component. The π-ADL specification of communica- tion is defined as follows: component Perception is abstraction() { type Focus is view[focusName : String, focusParams : Any]. type Filter is view[filterName : String, filterParams : Any]. ... port perceive is { connection sense is out(Sense). connection sensed is in(Representation) }. port request is { connection requestPerception is in(PerceptionRequest) connection notifyRequest is out(String) }. port readWriteKnowledge is { connection knowledgeTemplate is out(Knowledge). connection readKnowledge is in(Knowledge). connection writeKnowledge is out(Knowledge) }. behavior is compose { sensing is Sensing(). ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 32 D. Weyns and F. Oquendo Fig. 9. Primary presentation of selective perception and interpreting is Interpreting(). and descriptions is Descriptions(). and filtering is Filtering(). } where { requestPerception relays sensing::applySensing and sensing::sense relays sense and sensed relays sensing::sensed and sensing::interpret unifies interpreting::interpret and interpreting::readDescriptions unifies descriptions::readDescriptions and interpreting::filter unifies filtering::filter and requestPerception relays filtering::requestPerception and filtering::readWriteKnowledge relays readWriteKnowledge and filtering::notifyRequest relays notifyRequest } } After type and port declarations, the composition of the constituent components of per- ception is defined. We now discuss these components further in detail. 4.3.2 Architectural Elements. The perception components comprises one data repository: descriptions, and three com- ponents: sensing, interpreting, and filtering. To explain the various elements, we follow the logical thread of successive activities that take place from the moment a requester takes the initiative to sense the virtual environment until the agent's current knowledge is updated and the requester is notified. Sensing is defined as follows: component Sensing is abstraction() { ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 33 ... type PerceptionRequest is view[id : String, focus : Focus, filter : Filter]. type Sense is view[agentId : String, focus : Focus]. type Representation is Any. ... port perceive is { connection sense is out(Sense). port apply is { connection applySensing is in(PerceptionRequest) }. port interpret is { connection percept is out(Representation) }. connection sensed is in(Representation) }. behavior is { generateSense is function(request : PerceptionRequest) : Sense { unobservable. }. via applySensing receive request : PerceptionRequest. via sense send generateSense(request). unobservable. via sensed receive representation : Representation. unobservable. via percept send representation. behavior(). } } Sensing is initiated by a perception request with a focus. Sensing applies sense requests in the virtual environment and sends the resulting representation to the interpreting com- ponent. We have explained and illustrated the concepts of focus and representation in the discussion of the virtual environment pattern, see section 4.5.2. Descriptions is defined as follows: component Descriptions is abstraction() { type Representation is Any. type Description is Any. port readDescriptions is { connection representation is in(Representation). connection description is out(set(Description)) } assuming { protocol is { (via representation receive Any.true*. via description send Any.)* } }. descriptions is location(set(Description)). behavior is { select is function(rep : Representation, des : set(Description) ) : set(Description) { unobservable. }. unobservable. via representation receive repres : Representation. via description send select(repres, descriptions). behavior(). } } Description maintains a repository of descriptions to interpret representations. A de- scription specifies a particular pattern of the data contained in a representation. An exam- ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 34 D. Weyns and F. Oquendo ple in the vehicle routing system is a description used by infrastructure agents to map a representation of the traffic state to a level of traffic congestion in a monitored range: public class TrafficObservation { private double density; private double intensity; private double averageSpeed; ... } public class CongestionLevel { private TrafficObservation observation: ... public CongestionLevel(TrafficObservation o) { ... } } Traffic observation is a representation of the current traffic in a monitored range. This representation comprises three traffic variables in the monitored range: the current density (i.e., the number of vehicles per length unit), intensity (i.e., the number of vehicles per time unit) and average speed. Given a traffic representation, the congestion level description allows to determine the current the traffic state in the monitored range. Interpreting is defined as follows: component Interpreting is abstraction() { type Representation is Any. type Description is Any. type Knowledge is set(KnowledgeItems). ... port interpret is { connection interpretIn is in(Representation) }. port readDescriptions is { connection representation is out(Representation). connection description is in(set(Description)) }. port filter is { connection interpretOut is out(Knowledge) }. behavior is { interpreting is function(r : Representation, ds : set(Description)) : Knowledge { unobservable. }. via interpretIn receive repres : Representation. via representation send repres. unobservable. via description receive descriptions : Description. via interpretOut send interpreting(repres, descriptions). behavior(). } } The interpreting component uses a set of descriptions to extract knowledge from a rep- resentation. This knowledge represent elements sensed in the virtual or the external envi- ronment that can be used to update the current knowledge of the agent. An example in the traffic monitoring system is the traffic state derived from a traffic observation using a congestion level description: public class TrafficState { ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 35 private GraphPath path; private Status status; ... } The path represents the part of the road network that is monitored by an infrastructure agent. Status is the actual status of the traffic on the path, ranging from free flow to jammed. The infrastructure agent employs the traffic state to provide predictive traffic intensity in- formation which is used to improve bookings requested by vehicle agents. For details on this prediction mechanism, we refer the interested reader to [Claes et al. 2011]. Filtering is defined as follows: component Filtering is abstraction() { ... type Filter is view[filterName : String, filterParams : Any]. type PerceptionRequest is view[id : String, focus : Focus, filter : Filter]. port filter is { connection filterIn is in(Knowledge) }. port apply is { connection applyFiltering is in(PerceptionRequest). connection notifyRequest is out(String) }. port readWriteKnowledge is { connection knowledgeTemplate is out(Knowledge). connection readKnowledge is in(Knowledge). connection writeKnowledge is out(Knowledge) }. behavior is { filtering is function(percept : Knowledge, filter : Filter) : Knowledge { unobservable. }. unobservable. via applyFiltering receive request : PerceptionRequest. unobservable. via filterIn receive percept : Knowledge. via writeKnowledge send filtering(percept, request::filter). via notifyRequest send request::id. behavior(). } } Filtering filters a percept using a selected filter. A filter imposes conditions on a percept that determine whether the data elements of the percept can pass the filter or not. The filtering component uses the filtered percept to update the agent's current knowledge, and then notifies the requester. We discussed an example of a filter in the vehicle routing system that selects the shortest path from a given set of sensed paths. Here is an example in the AGV transportation system: public ParkLocation(Sting name, Node pos, List<Node> locations) { ... } tfilter = new ParkLocation('nearestParking', myPos, sensedLocs); This filter selects the nearest park location for the given AGV position from a given set of observed park locations. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 36 D. Weyns and F. Oquendo 4.4 Behavior-Based Action Selection 4.4.1 Primary Presentation. The primary presentation of the behavior-based action selection pattern is shown in Fig. 10. Fig. 10. Primary presentation of behavior-based action selection To select actions, a situated agent employs a behavior-based action selection mechanism. The main advantages of behavior-based action selection are efficiency and flexibility to deal with dynamism in the environment. The π-ADL specification of action selection is defined as follows: component ActionSelection is abstraction() { ... type Action is view[agentId : String, actionName : String, actionParams : Any]. port act is { connection invoke is out(Action) }. port request is { connection requestPerception is out(PerceptionRequest). connection notifyRequest is in(String) }. port readWriteKnowledge is { ... }. behavior is compose { decisionMaking is DecisionMaking(). and roles is Roles(). and commitments is SituatedCommitments(). } where { decisionMaking::updateReadRoles unifies roles::updateReadRoles ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 37 and decisionMaking::readWriteCommitments unifies commitments::readWriteCommitments decisionMaking::act relays act decisionMaking::knowledgeTemplate relays knowledgeTemplate and and ... } } Central to behavior-based action selection is the decision making component that em- ploys roles and situated commitments to select actions. A role represents a coherent part of functionality of a situated agent. Roles are relatively simple behavioral modules that tightly couple sensing to action. A situated commitment defines an engagement of an agent in a collaboration that takes into account the context of the collaboration. Decision making se- lects the next action of the agent based on the agent's roles and the current commitments. We discuss roles and situated commitments now in detail. 4.4.2 Architectural Elements. The action selection component comprises three components: roles, situated commit- ments, and behavior. Roles is defined as follows: component Roles is abstraction() { type Role is view[name : String, behaviors : Any, actions : set(Action)]. port updateReadRoles is { connection updateRoles is in(Knowledge). connection readRoles is out(set(Role)). } roles is set(Role). behavior is { update is function(k : Knowledge, roles : set(Role)) : set(Role) { unobservable }. choose { //update roles via updateRoles receive knowledge : Knowledge. unobservable. roles := update(knowledge, roles). behavior(). or //read roles unobservable. via readRoles send(roles). behavior(). } } The roles component comprises a set of roles. A role has a name, a set of behaviors, and a set of actions. The roles can be updated with new knowledge, and the set of roles can be ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 38 D. Weyns and F. Oquendo read. The main roles of the AGV agent in the AGV transportation system are "Working," "Charging" and "Parking," which respectively denote the roles to perform a transportation task, recharge the AGV's battery, and park the vehicle when it is idle. For the concrete realization of the roles we used an extension of free-flow trees [Tyrrell 1993; Bryson 2001; Steegmans et al. 2004]. Fig. 11 shows the design of the tree for the working role of an AGV agent. Fig. 11. Design of the free-flow tree for the working role of AGV agents A free-flow tree is composed of a hierarchy of nodes representing the role behavior with leave nodes representing actions. To select an action, activity is injected at the top node of the tree. While the activity flows along the nodes additional activity may be injected based on stimuli sensed by the agent (ovals in Fig. 11). When the activity arrives at the leave nodes the action with the highest activity is the preferable action for the role in the given context. The main behaviors of the working role are moving, performing a job (pick or drop a load), and finishing job (i.e., the actual manipulation of the load during a pick or drop). The behaviors are affected by stiumuli related to the actual position of the AGV to the pick or drop location, and the reservation of hulls to avoid collisions. Skip move is selected when no new move action is required (e.g, when the AGV waits on a crossroad), and skip finished is selected during the manipulation of a load. Commitments is defined as follows: component Commitments is abstraction() { type SituatedCommitment is view[name : String, context : Any, condition : Boolean, effect : Any]. port updateReadCommitments is { connection updateCommitments is in(Knowledge). connection readCommitments is out(set(Commitment)). ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 39 } commitments is set(SituatedCommitment). behavior is { update is function(k : Knowledge, cs : set(SituatedCommitment)) : set(SituatedCommitment) { unobservable }. choose { //update commitments via updateCommitments receive knowledge : Knowledge. unobservable. roles := update(knowledge, commitments). behavior(). or //read commitments unobservable. via readCommitments send(commitments). behavior(). } } The commitments component comprises a set of situated commitments. A situated com- mitment is defined by a name, a context, an activation condition, and an effect. Com- mitments can be updated with new knowledge, and the set of commitments can be read. Agents agree on mutual commitments in a collaboration via direct communication (see the Communication pattern below). Once the agents have agreed on a collaboration, the mu- tual situated commitments will affect the selection of actions in favor of the agents roles in the collaboration. An example of a situated commitment in the vehicle routing system is "current inten- tion" that represents the booking of a path a vehicle agent at the infrastructure agents. This commitment will guide the driver along the selected path to the destination. The main commitments in the AGV transportation system are "Work" and "Charge." Work is a mu- tual commitment between an AGV agent and a transport agent to perform a transportation task. Charge is commitment of an AGV agent to charge its battery enabling it to perform future transportation tasks. Such commitment contributes implicitly to the realization of the system tasks. Fig. 12 shows the design of the work commitment for AGV agents. A situated commitment in the AGV transportation system is represented by a connec- tor between a set of source roles (in) and one target role (out). When activated, addi- tional activity is injected to the target role, proportional to the activity levels of the source roles [Steegmans et al. 2004; Weyns et al. 2008]. The work commitment connects the parking role (single source role) with the working role (target role) and is activated when the AGV has accepted a job (these elements define the context and condition of the situated commitment). When the work commitment is activated it injects an additional amount of activity in the working role (i.e., the activity of the top node of the parking role is added to the top node of the working role). This additional activity will stimulate the working role to start performing the committed task. Decision Making is defined as follows: ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 40 D. Weyns and F. Oquendo Fig. 12. Design of the work commitment of AGV agents component DecisionMaking is abstraction() { type Role is view[name : String, behaviors : Any, actions : set(Action)]. type SituatedCommitment is view[name : String, context : Any, condition Boolean, effect : Any]. type Action is view[agentId : String, actionName : String, actionParams : Any]. ... port updateReadRoles is { connection updateRoles is in(Knowledge). connection readRoles is out(set(Roles)). } port updateReadCommitments is { connection updateCommitments is in(Knowledge). connection readCommitments is out(set(SituatedCommitment)). } port act is { connection selectAction is out(Action).}. ... externalActions is location(set(Action)). selectedAction is Action. behavior is { selectAction is function (roles : set(Role), commitments : set(SituatedCommitment) : Action { unobservable. }. externalAction is function (action : Action, actions : set(Action)) : Boolean { unobservable. }. unobservable. via updateRoles send roleKnowledge : Knowledge. via updateCommitments send commitmentKnowledge : Knowledge. via readRoles receive roles : set(Roles). via readCommitments receive commitments : set(SituatedCommitment). selectedAction := selectAction(roles, commitments). if (externalAction(selectedAction, externalActions)) then ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 41 via selectAction send selectedAction. behavior(). else unobservable. behavior(). } } The decision making component has a repository with external actions that define effec- tive actions that can be invoked in the virtual environment. Actions that are not included in this set are internal to the agent and may be used to update the agent's current knowledge. Decision making starts with updating the state of the roles and situated commitments based on the agent's current knowledge. Next, the roles and situated commitments are read and an action is selected. Subsequently, the component checks whether the selected action is an external action, and if so the action it is invoked. We illustrate the realization of the action selection function for the two example applications. We start with an excerpt of the decision making of an AGV agent that integrates the roles and situated commitments illustrated in Fig. 11 and Fig. 12. To manage the complexity, we designed behavior-based action selection of the AGV agent in two subsequent steps. In the first step, a free-flow tree is used to select an action at a high-level of abstraction. Examples of such actions are move, pick, and park. In the next step, the selected action is further refined taking into account collision avoidance and deadlock avoidance. For example, for a move action, the next segment is added if the corresponding path projection has been locked. We illustrate here the fist step, for additional information, we refer the interested reader to [Weyns and Holvoet 2007; Weyns 2010]. Fig. 13 shows a snapshot of the main part of the free-flow tree of an AGV agent in action. Fig. 13. Runtime snapshot of the free-flow tree of an AGV agent. The part of the tree that deals with battery charging is omitted. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 42 D. Weyns and F. Oquendo The action selection function of the AGV agent is executed every second. To select an action, activity is injected via the root node of the tree. The root node feeds its activity to the working node and the parking node. These nodes feed the activity down through the hierarchy until the activity arrives at the action nodes, i.e. the leaf nodes of the tree. The level of activity that flows from one node to another may be multiplied by a weight factor that is associated with the edge. For example, the connection between the root node and the top node of the parking role has a weight factor of 2. The colors of the nodes in Fig. 13 give a visual representation on the level of activities of the different parts of the behavior (the exact values are indicated next to each node). While the activity flows through the tree, some of the nodes receive additional activity from stimuli, e.g., the nodes just beneath the working role (R2 and R3) receive additional activity from the nearJob stimulus. When activated, the situated commitment work, that connects the parking role with the working role, injects an additional amount of activity in the working role (equal to the activity in the parking role). In the situation shown in Fig. 13, the situated commitment is active and as a result the activity level of the working role is 3, i.e., the sum of the activity 1 from the root node and 2 from the parking role via the situated commitment. When all action nodes have collected their activity the node with the highest activity level is selected for execution. In the example, the activity collected by the pick node is dominant (value 33) so the agent will select this action. The concrete node where to perform the action will be determined in the second step of action selection (see also the definition of the pick action in the discussion of the action service in section 4.5.2). We conclude the discussion of the behavior-based action selection pattern with an ex- cerpt of the design that illustrates the decision making of the vehicle agents in the antici- patory vehicle routing application. Figure 14 shows the subsequent actions selected by the vehicle agent. 1: loop 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: end loop // Update the feasible paths paths ← getAlternatives(currentLocation, destination) // Select the best route selectedP ath ← choose(paths) // Decide whether to revise intention if reviseIntention(currentIntention, selectedP ath) then currentIntention ← selectedP ath end if // Trigger propagation of the current intention propagateIntention(currentIntention) // Instruct the driver instructDriver(currentIntention) Fig. 14. Decision making of a vehicle agent in the anticipatory vehicle routing system The behavior of the vehicle agent is contained in a single role, with the current intention (selected path) as a single type of situated commitment. On line 3, the vehicle agent updates its knowledge with feasible paths explored by exploration ants. On line 5, the agent selects the shortest path based on the set of feasible paths. On line 7, the vehicle agent decides on whether to deviate to this new path. Whatever the agent decides, on line 11, the vehicle agent triggers sending out an intention ant to the infrastructure agents along the path of its ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 43 current intention. Finally, the driver is instructed about the current intention. The interested reader finds additional information in [Weyns et al. 2007; Claes et al. 2011]. 4.4.3 Design Rationale. The primary principles that underlay the design of action selection are behavior-based decision making, role and situated commitment as first class concepts. Behavior based decision making enables an agent to act efficiently. A situated agent se- lect its actions based on the locally perceived state of the environment and limited internal state. The reactive nature of behavior based decision making enables an agent to respond efficiently when the conditions in the system and the environment change. Nevertheless, locality and reactivity of decision making may affect that overall efficiency due to a lack of global and long term view on the system. Behavior based decision making is therefore suitable for interaction driven problem domains, rather than data driven domains. This fits the target domain of the architecture style. The design of a behavior-based decision making mechanism may be a complex task for non-trivial agents. To manage this complexity, we introduced roles and situated commit- ments for situated agents. Roles and situated commitments provide design abstractions that allow to structure the agent behavior. Furthermore, roles and situated commitments pro- vide the means for agents to set up collaborations in a particular context. A role represents a coherent part of functionality that can serve as a building block for social organization of an agent system. A situated commitment is defined based on the context in which agents are situated, which typically refers to their roles. Explicitly naming roles and situated com- mitments enables agents to set up collaborations, reflected in mutual commitments. Such collaboration can be set up by exchanging messages (see the Protocol-Based Communi- cation pattern below). Once a collaboration is established, the mutual commitments will affect the selection of actions in favor of the agents' roles in the collaboration. The so- cial behavior is typically driven by the context in which agents are situated (e.g., in field based transport assignment, agents are driven by the fields that are emitted in the virtual environment by the tasks). The latter results in high degree of openness (when a task or AGV enters the system, the agents take into account the new field, and when a task or AGV leaves the system the field simply disappears). 4.5 Protocol-Based Communication 4.5.1 Primary Presentation. The primary presentation of the protocol-based communication pattern is shown in Fig. 15. Protocol-based communication enables situated agents to share information and set up collaborations. The communication component processes incoming messages, and pro- duces outgoing messages according to well-defined communication protocols. A commu- nication protocol specifies a set of possible sequences of messages. The π-ADL specifica- tion of the communication component is defined as follows: component Communication is abstraction() { type Message is view[id : Integer, protocol_ : String, sender : String, protocol : String, performative : String, content : Any]. ... ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 44 D. Weyns and F. Oquendo Fig. 15. Protocol-based communication pattern port communicate is { connection send is out(Message). connection receive is in(Message) }. ... behavior is compose { messageReceiving is MessageReceiving(). inbox is Inbox(). messageDecoding is MessageDecoding(). communicating is Communicating(). conversatations is Conversations(). messageEncoding is MessageEncoding(). outbox is Outbox(). messageSending is MessageSending(). and and and and and and and } where { receive relays messageReceiving::receive messageReceiving::addIn unifies inbox::addIn messageDecoding::removeIn unifies inbox::removeIn messageDecoding::decode unifies communicating::decode communicating::knowledgeTemplate relays knowledgeTemplate readKnowledge relays communicating::readKnowledge communicating::writeKnowledge relays writeKnowledge communicating::requestPerception relays requestPerception and and and and and and and ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 45 and communicating::readUpdateConversation unifies conversations::readUpdateConversation communicating::encode unifies messageEncoding::encode messageEncoding::addOut unifies outbox::addOut messageSending::removeOut unifies outbox::removeOut messageSending::send relays send and and and and } } Message receiving accepts messages from the communication service and adds them to the inbox message buffer. Message decoding selects messages from the inbox and decodes the messages. The communicating component interprets the decoded messages and up- dates the agent knowledge and conversations. Communicating also initiates and continues conversations when the necessary conditions hold (based on the agent's current knowledge and the ongoing conversations). Ongoing conversations are stored in the conversations repository. A conversation is a communicative interaction following a well-defined com- munication protocol that defines of a series of protocol steps. Message encoding encodes newly composed messages and add them to the outbox message buffer. Finally, message sending selects pending messages from the outbox buffer and passes it to the communica- tion service of the virtual environment. 4.5.2 Architectural Elements. We limit the discussion to the central components: message decoding, conversations, and communicating. Message encoding is basically the inverse of message decoding. The other components, message receiving, inbox, outbox, and message sending, have standard functions. The online Appendix A provides a rigorous definition of these components. Message Decoding is defined as follows: component MessageDecoding is abstraction() { ... type Message is view[id : Integer, sender : String, receiver : String, protocol : String, performative : String, content : Any]. type MessageData is view[id : Integer, sender : String, receiver : String, protocol : String, performative : String, content : sequence[Knowledge]]. port removeInbox is { connection removeIn is in(Message) }. port decodeMessage is { connection decode is out(MessageData) }. language : Any. ontology : Any. behavior is { decode is function( msg : Message, ontology : Any, language : Any ) : MessageData { unobservable. }. unobservable. via removeIn receive message : Message. via decodeMsg send decode(message, language, ontology). behavior(). } } ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 46 D. Weyns and F. Oquendo Message data is data extracted from a message in a form that can be interpret by the communicating component. Message decoding selects a received message from the inbox buffer and decodes the message according to the given content language and ontology. The content language defines the format of the messages, i.e. the subsequent fields the message is composed of, and the ontology defines a shared vocabulary of words that agents use to represent domain concepts and relationships between the concepts. As an example, in the AGV transportation system, we defined a content language for the messages of the DynCNET protocol that allows tasks agents and AGV agents to agree on task assignment. DynCNET offers an alternative to field-based task assignment in the AGV transportation system, which we illustrated in section 4.5.2. We elaborate on the protocol below. The content language defines for each performative a set of strings that represent fields of the corresponding messages. The ontology defines the domain of values for each field. For example, the domain of the task priority field defines 5 priority levels represented as integers. During message decoding, the content of the message is parsed based on the performative of the message using the content language and the ontology. Conversations is defined as follows: component Conversations is abstraction() { ... type MessageData is view[id : Integer, sender : String, receiver : String, protocol : String, performative : String, content : sequence[Knowledge]]. type Conversation is sequence[MessageData]. port readUpdateConversation is { connection selectConversation is in(Integer). connection readConversation is out(Converstation). connection updateConversation is in(MessageData). connection addConversation is in(MessageData). connection terminateConversation is in(Integer) }. type conversations is location(set(Conversation)). behavior is { add is function(data : MessageData, convs : set(Conversation) ) : set(Conversation) { unobservable. }. write is function( id : Integer, convs : set(Conversation) ) : set(Conversation) { unobservable. }. read is function( conv : Conversation, conv : Conversation ) : set(Conversation) { unobservable. }. terminate is function(id : Integer, convs : set(Conversation) ) : set(Conversation) { unobservable. }. choose { //add conversation via addConversation receive data : MessageData. conversations := add(data, conversations). behavior(). or ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 47 //read conversation via selectConversation receive id : Integer. via readConversation send readConversation(id, conversations). behavior(). //write conversation via updateConversation receive conversations := write(data, conversations). behavior(). data : MessageData. //delete conversation via terminateConversation receive id : Integer. conversations := terminate(id, conversations). behavior(). or or or } } } A conversation is a sequence of message data. The conversation component maintains a set of ongoing conversations. Conversations offers four functions that allows the com- municating component to manage the conversations repository. Add includes a new con- versation to the set of conversations, read returns a conversation based on a given id, write updates an ongoing conversation, and delete removes the conversation with a given id from the set of conversations. Communicating, the central component of the communication pattern, is defined as fol- lows: component Communicating is abstraction () { type MessageData is view[id : Integer, sender : String, receiver : String, protocol : String, performative : String, content : sequence[Knowledge]]. type Conversation is sequence[MessageData]. type Protocol is view[name : String, steps : Any]. ... port readUpdateConversation is { ... }. port decodeMessage is { connection decode is in(MessageData) }. port encodeMessage is { connection encode is out(MessageData) }. ... protocols : set(Protocol). conversationIds : set(Integer). behavior is { extractKnowledge is function (data : MessageData) : Knowledge { unobservable. }. addCommunication is function (data : MessageData) : Knowledge { unobservable. }. updateCommunication is function (data : MessageData) : Knowledge { unobservable. }. closeCommunication is function (c : Conversation) : Knowledge { unobservable. }. ongoingConversation is function (id : Integer, ids : set(Integer)) : Boolen { unobservable. }. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 48 D. Weyns and F. Oquendo continueConversation is function (k : Knowledge, ids : set(Integer)) : Boolen { unobservable. }. terminateConversation is function (ps : set(Protocol), c: Conversation, k : Knowledge) : Boolean { unobservable. }. initiateConversation is function (ps : set(Protocol), k : Knowledge) : MessageData { unobservable. }. encodeMessage is function (ps : set(Protocol), c : Conversation, k : Knowledge) : MessageData { unobservable. }. getId is function (k : Knowledge, ids : set(Integer)) : Integer { unobservable. }. addId is function (id : Integer, ids : set(Integer)) : set(Integer) { unobservable. }. msg_knowledge : Knowledge. enc_msg_data : Messagedata. conv_id : Integer. choose { //handle incoming message via decode receive dec_msg_data : MessageData. msg_knowledge := extractKnowledge(dec_msg_data). if(ongoingConversation(dec_msg_data::id, conversationIds)) then { via updateConversation send dec_msg_data. via writeKnowledge send updateCommuncation(dec_msg_data). } else { via addConversation send dec_msg_data. via writeKnowledge send addCommuncation(dec_msg_data). } behavior(). } or { //handle outgoing message unobservable. via readKnowledge receive knowledge : Knowledge. if(continueConversation(knowledge, conversationIds)) then { via selectConversation send getId(knowledge, conversationIds). via readConversation receive conversation : Conversation. enc_msg_data := encodeMessage(protocols, conversation, knowledge). via encode send enc_msg_data. via updateConversation send enc_msg_data. via writeKnowledge send updateCommunication(enc_msg_data). } else { enc_msg_data := initiateConversation(protocols, knowledge). via addConversation send enc_msg_data. conversationIds := addId(id, conversationIds). via writeKnowledge send addCommunication(enc_msg_data). } behavior(). } ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 49 or { unobservable. via readKnowledge receive knowledge : Knowledge. conv_id := getId(knowledge, conversationIds). via selectConversation send conv_id. via readConversation receive conversation : Conversation. if(terminiateConversation(protocols, conversation, knowledge)) then { //terminate conversation via terminateConversation send conv_id. conversationIds := deteleId(conv_id, conversationIds). via writeKnowledge send closeCommunication(conversation). } else { //silence unobservable. } behavior(). } } } Central to message-based communication are protocols. A protocol is characterized by a name and a set of protocol steps. To manage the communicative interactions, the com- municating component maintains a set of conversation identifiers. The behavior of the communicating component consists of three parts: handling incoming messages, handling outgoing messages, and silent behavior. An incoming message can refer to an ongoing conversation or initiate a new conversation. An outgoing message can be the continuation of an ongoing conversation or the initiation of a new conversation, depending on the con- ditions as reflected in the agent's current knowledge. Silent behavior can either terminate a conversation when the necessary conditions hold, or have no effects. We illustrate protocol-based communication with DynCNET, a protocol for transport as- signment that we developed for the AGV transportation system. DynCNET is an extension of the well-know contract net protocol Contract NET [Smith 1980], with "Dyn" referring to support for dynamic task assignment. The default protocol consists of four steps: (1) the initiator sends a call for proposals; (2) the participants respond with proposals; (3) the initiator notifies the provisional winner; and finally, (4) the selected participant informs the initiator that the task is started. These four steps are basically the same as in the standard Contract NET protocol.The flexibility of DynCNET is based on the provisional agreement between initiator and participant, and the possible revision of the assignment of the task between the third and fourth step of the protocol. These state diagrams in Fig. 16 and Fig. 17 show the behavior of the AGV agent and the transport agent respectively. When a task enters the system and it is ready to be executed (task-ready), the corresponding transport agent enters the Active state in which it remains until the task is completed (task -- completed) (see Figure 17). As soon as an AGV agent is ready -- to -- work it enters the Working state in which it remains until the task is executed (ready) (see Figure 16). Let us first explain adaptation from the viewpoint of an AGV agent. When an AGV agent is ready to execute a task, it enters the Voting state. As long as the agent has not received a provisional accept, it answers cfp's with proposals. When the AGV ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 50 D. Weyns and F. Oquendo Fig. 16. DynCNET protocol for an AGV agent. In the shaded state, the agent can switch the provisional agree- ment. The format of a state transition is event [guard] / actions. agent receives a provisional -- accept message, it enters the Intentional state. As soon as the AGV starts the task (task -- started), it sends a bound message to the transport agent to inform the latter that the execution of the task is started. The AGV agent is then committed to execute the task.5 However, if a new opportunity occurs before the task is started, i.e. the AGV agent receives a provisional -- accept which is a better offer, the agent changes to the Switch Initiator state. The agent then retracts from the earlier provisional task assignment (send(retract)), and switches to the more suitable task (SwitchTask()) entering again the Intentional state. AGV agents use the function TaskInOutScope() to determine whether new tasks enter and leave their area of interest (see Figure 16). This function is realized by perception component. Let us know look at adaptation from the transport agent viewpoint. As long as the trans- port agent has not selected an AGV to execute the task (! haveWinner), it sends period- ically (Timer()) cfp's to the AGV agents in scope. Based on the received proposals from the AGV agents, it selects a winner, sends a provisional -- accept message, and enters the Assigned state. As soon as the transport agent receives a bound message from the selected AGV agent, it enters the state Executing in which the task is effec- tively started. However, if a new opportunity occurs before the task is started, i.e. the trans- port agent receives a proposal from an AGV agent which is better than the current provi- sionally accepted proposal, the transport agent changes to the Switch Participant 5The transport agent's state changes from Assigned to Executing when it receives the bound message from the AGV agent (see Figure 17). ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 51 Fig. 17. DynCNET protocol for a transport agent. agreement. The format of a state transition is event [guard] / actions. In the shaded state, the agent can switch the provisional state. In this state the transport agent sends an abort message to the provisionally as- signed AGV agent, and subsequently sends a provisional -- accept message to switch to the more suitable AGV agent (newWinner). The function AGVInOutScope() no- tifies the transport agent when AGVs enter and leave its area of interest. This function is realized by the agent's perception component. 4.5.3 Design Rationale. The primary principles that underlay the design of protocol-based communication are coordination through message exchange and structured interactions through protocols. Coordination through message exchange complements indirect coordination via marks in the virtual environment such as field-based coordination. Direct communication allows situated agents to exchange information and set up explicit collaborations. By exchanging messages, agents can agree to take up roles in a collaboration, reflected in mutual com- mitments. Such commitments steer the behavior of the agents towards the realization of shared objectives. Collaborations based on mutual commitments require a careful design as it creates explicit dependencies between agents. Communication defined in terms of protocols structures the communication, which fits the reactive nature of situated agents. In each step of a communicative interaction, condi- tions determine the agent's behavior in the conversation. Conditions not only depend on the status of the ongoing conversations and the content of received messages, but also on the actual conditions in the environment reflected in the agent's current knowledge. This ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 52 D. Weyns and F. Oquendo contributes to the flexibility of the agent's behavior. 5. METHODOLOGICAL GUIDELINES We explained the key characteristics and requirements of the systems targeted by the ar- chitectural style in section 2.3. From our experience, we derive a set of guidelines to apply the style for systems within the target scope. Our objective is to offer the reader some guidance with respect to important aspects of the design of a situated multi-agent systems when using the architectural style. What agents to select? A key design decision of a situated multi-agent system is to se- lect the type and number of agents in a system. There is no standard rule to select agents. However, as a rule of thumb, active entities that perform tasks in an autonomous way are primary candidates to become agents. In both the systems we used in this report, we have selected two types of agents: one type that performs the actual tasks for the users (AGV agents that perform transportation tasks and vehicle agents that guide drivers), and another type that supports the first type if agent (task agents and infrastructure agents). In purely technical systems, agents are typically selected for processes that perform tasks, and re- sources that encapsulate some activities. In socio-technical systems, agents often represent social actors in the system (in addition to processes and resources). For example, in [Hae- sevoets et al. 2010], we selected different types of situated agents in a supply chain that represent the different actors in a supply chain. Responsibilities of agents and virtual environment. Another key decision in the design of a situated multi-agent system is assigning responsibilities to agents and the virtual envi- ronment. In particular, for decisions regarding coordination, the designer often has a choice to either assign the responsibility to agents are assign it the virtual environment. The key underlying principle here is complexity management through separation of concerns. An excellent example that illustrates this aspect was the choice between the protocol-based and field-based approach to assign tasks in the AGV transportation systems. Using a protocol puts the burden of coordination on the agents. The task of the communication service is simply routing messages. Using the field-based approach puts the burden of spreading and maintaining the fields on the virtual environment. In this option, the agents can observe fields that guide them to a task. Finding a good balance that takes into account the different coordination tasks is not trivial. Variant selection. The patterns of the architectural style have several built-in variability mechanisms. Situated agents can or cannot make use of protocol-based communication. In the latter case, the communication component of situated agent and the communication service of the virtual environment can be omitted. The perception service may or may not require direct access to the external environment. In the latter case, the synchronization component can be responsible to synchronize the state repository of the virtual environ- ment with corresponding elements in the environment. We applied this approach in the AGV transportation system. The state of the virtual environment can be coded in the same format as the knowledge used by the agents. For such a setting, the interpreting and de- scriptions components of agents can be omitted. Other variants are filters of the perception component, commitments of behavior-based action selection, and synchronization of the virtual environment. Supporting middleware. As any modern distributed software system, a situated multi- ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 53 agent system requires common middleware service such as basic support for distribution, support for persistency, transactions, security, etc. Such services can be provided by com- mon middleware that provides a basic design and deployment platform. Often, additional domain-specific services are required, such as communication services or dedicated ser- vices to interact with the external environment. The integration with this underlying mid- dleware and supporting services is a crucial aspect in the design of a situated multi-agent system. 6. RELATED WORK Over the last decade, many patterns for multi-agent systems have been documented. To obtain a good overview of the state of the art on these patterns, we have performed a systematic literature review. The review covered the main publication venues of the field since 1998 resulting in 206 patterns documented in in 39 articles.6 The list of articles with the patterns is attached in the online Appendix B. We limit the discussion here to a classification of the patterns that we derived from the study, and we explain how the patterns of the architectural style presented in this report fit in this classification. The study material and additional results are available via http://homepage.lnu.se/staff/daweaa/SLR- MASPatterns.htm The objective of classifying design patterns for multi-agent systems is to provide an intellectual graspable overview of the huge space of existing patterns. The classification offers engineers a general picture of the pattern space of multi-agent systems, and helps those who are not familiar with the domain to get an easy jump-start to understand the pat- tern space. Several researchers have proposed classifications of design patterns for MAS, but these classifications are either bound to a specific catalog of patterns, or to an devel- opment methodology [Kendall et al. 1998; Aridor and Lange 1998; Tahara et al. 1999; Schelfthout et al. 2002; Oluyomi 2006; Chella et al. 2010]. The classification presented in this report covers the full space of patterns for multi-agent systems as document at the time of writing. The classification resulted from the analysis of several types of data that were collected during the review, including pattern categories (source of inspiration), pattern associations (explicitly documented relations between patterns), and short description of the patterns. From the analysis of the data, we derived four dimensions of patterns for multi-agent sys- tems: inspiration, abstraction, focus, and granularity. Fig. 18 shows a graphical overview of the dimensions, illustrated with example patterns. Metaphors and analogies help in understanding complex systems. The inspiration di- mension has four categories that provide intuitive domains from which patterns are de- rived. Examples of nature-inspired patterns are gradient fields [De Wolf et al. 2007] that is inspired by the fields in nature, and delegate ant MAS [Holvoet et al. 2009] that is in- spired by behavior of social insects. Examples of society-inspired patterns are emergent society [Kendall et al. 1998] and holonic society [Chella et al. 2010] that get their inspira- tion from the way societies emerge and structure themselves. Examples of human-inspired patterns are receptionist [Silva et al. 2000] and gossip [Fernandez-Marquez et al. 2011]. 6Publications from SpringerLink, ACM Digital Library, IEEE Explore, Science Direct, CiteseerX, Google Scholar were searched automatically. Publications of The Knowledge Engineering Review (KER), Transactions on Autonomous and Adaptive Systems (TAAS) and the Journal of Autonomous Agents and Multi-Agent Systems (JAAMAS) were searched manually. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 54 D. Weyns and F. Oquendo Fig. 18. Classification of patterns for multi-agent systems with example patterns. Finally, locker [Aridor and Lange 1998] and blackboard [Deugo et al. 1999] are example of patterns that get there inspiration from artifacts in our environment. The abstraction dimension classifies patterns either as conceptual or concrete. Both these main categories are further refined in subcategories that refer to stages in the soft- ware life cycle where the patterns can be used. Actors [Mouratidis and Weiss 2006] and pyramid [Kolp et al. 2006] are examples of patterns that are useful in early phases in the life cycle, while broker [Hayden et al. 1999] and synchronizer [Schelfthout et al. 2002] can be applied in detailed design and the implementation phase. The focus dimension has two categories: structural and behavioral. Structural patterns are useful to deal with the decomposition of a system, while behavior patterns are use- ful to deal with interaction aspects. Examples of structural patterns are reflective black- ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 55 board [Silva et al. 2003] and joint venture [Kolp et al. 2006], the former focusing a particu- lar coordination structure for an agent system, the latter focusing on the way a community of agents is organized. Examples of behavioral patterns are market maker [Deugo et al. 1999], negotiating agents [Deugo et al. 1999], and conversation [Kendall et al. 1998]. These patterns provide different approaches to support interactions among agents. Finally, the granularity dimension refers to the scope of the patterns, i.e., the system or parts of the system. Hierarchical contracting [Kolp et al. 2006] and emergent soci- ety [Kendall et al. 1998] are examples of patterns that apply to a multi-agent system as a whole. Messenger [Aridor and Lange 1998] and virtual environment [Weyns 2009] are patterns that apply to parts of a multi-agent system. Intention [Kendall et al. 1998] and InteRRaP [Lind 2002] are patterns that support the design of individual agents. We conclude with classifying the patterns presented in this report, see Table I. Table I. Classification applied to the patterns of the architectural style Pattern Virtual environment Situated agent Inspiration nature-inspired nature-inspired Selective perception artifact-inspired Behavior based action selection society-inspired Protocol based communication society-inspired Abstraction conceptual (design) conceptual (design) conceptual (design) conceptual (design) conceptual (design) Focus structural (architectural) structural (architectural) behavioral Granularity subsystem level agent level agent level behavioral agent level behavioral (interactions) agent level The patterns of the architectural style take inspiration from nature (environment, sens- ing, synchronization,e tc.), artifacts (focus, filter), and society (protocols, roles, situated commitments, etc.). The five patterns are useful during architectural design. The primary patterns (virtual environment and situated agent) are structural, while the refined patterns are of behavioral nature. 7. CONCLUSIONS AND FUTURE WORK To further mature the domain of software architecture, [Shaw and Clements 2006] argue for the creation of reference materials that give engineers access to the field's systematic knowledge. This report presents an architectural style for multi-agent systems that doc- uments well-proven design expertise for a family of self-adaptive software systems. The structures and behaviors of the pattern elements are specified in π-ADL, a formal ADL supporting automated verification of architectural properties. These specifications provide rigorously defined templates to guide architects when applying the patterns in practice. The templates are under-specified providing the necessary flexibility for applying the patterns for a wide range of systems. We have illustrated how we have realized the various patterns of the style with excerpts from an experimental as well as an industrial case study. Whereas the presented architectural style consolidates design knowledge, expertise from building new systems brings new know-how that may be useful to extend or evolve the ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 56 D. Weyns and F. Oquendo style. In recent work, we have built a number of applications in which the pattern real- izations of the presented architecture style have been extended with additional features. In one extension, we have encapsulated the life-cycle management of agent organizations as a reusable service, which is modeled as an intermediate component between agent and virtual environment [Weyns et al. 2010]. In another extension, we have added self-healing components to a situated agent system that deals with particular types of faults [Vromant et al. 2011]. These self-healing components monitor agents and the virtual environment de- ployed on different nodes and make adaptations when faults occur. Both these extensions may eventually lead to two new patterns that extend the architectural style. To conclude, we hope that the systematic knowledge documented in this report will contribute to a better understanding of multi-agent system architectures and their value for designing complex self-adaptive systems. Online Appendix https://people.cs.kuleuven.be/danny.weyns/Appendix-1-2.pdf Acknowledgement The research presented in this report consolidates multiple collaborative research efforts spread over eight years. We acknowledge the valuable contributions of our colleagues in these efforts, including Kurt Schelfhout, Alexander Helleboogh, Nelis Boucke, Ro- brecht Haesevoets, Rutger Claes, Elke Steegmans, Bartosz Michalik, Tom Holvoet, Us- man Iftikhar, Jan Wielemans, Tom Lefever, Rudy Vanhoutte, Wim Van Betsbrugge, Jan Vercammen, Zawar Qayyum, and Qin Xiong. REFERENCES ARIDOR, Y. AND LANGE, D. B. 1998. Agent design patterns: elements of agent application design. In Proceed- ings of the second international conference on Autonomous agents. ACM, New York, NY, USA, 108 -- 115. BANDINI, S., MANZONI, S., AND SIMONE, C. 2002. Dealing with space in multi -- agent systems: a model for situated mas. In AAMAS '02: Proceedings of the first international joint conference on Autonomous agents and multiagent systems. ACM, New York, NY, USA, 1183 -- 1190. BONABEAU, E., DORIGO, M., AND THERAULAZ, G. 1999. Swarm intelligence: from natural to artificial systems. Oxford University Press, Inc., New York, NY, USA. BORDINI, R., HUBER, J., AND OOLDRIDGE, M. 2007. Programming Multi-Agent Systems in AgentSpeak. Wiley. BRUN, Y., MARZO SERUGENDO, G., GACEK, C., GIESE, H., KIENLE, H., LITOIU, M., M ULLER, H., PEZZ `E, M., AND SHAW, M. 2009. Software engineering for self-adaptive systems. Springer-Verlag, Berlin, Heidel- berg, Chapter Engineering Self-Adaptive Systems through Feedback Loops, 48 -- 70. BRYSON, J. 2001. Intelligence by Design, Principles of Modularity and Coordination for Engineering Complex Adaptive Agents. PhD Dissertation, MIT, USA. CARRIERO, N. AND GELERNTER, D. 1989. Linda in context. Communications of the ACM 32, 444 -- 458. CHELLA, A., COSSENTINO, M., GAGLIO, S., SABATUCCI, L., AND SEIDITA, V. 2010. Agent-oriented soft- ware patterns for rapid and affordable robot programming. J. Syst. Softw. 83, 557 -- 573. CHENG, B. H., LEMOS, R., GIESE, H., INVERARDI, P., AND MAGEE, J., Eds. 2009. Software Engineering for Self-Adaptive Systems. Springer-Verlag, Berlin, Heidelberg. CHENG, B. H., LEMOS, R., GIESE, H., INVERARDI, P., MAGEE, J., ANDERSSON, J., BECKER, B., BEN- COMO, N., BRUN, Y., CUKIC, B., MARZO SERUGENDO, G., DUSTDAR, S., FINKELSTEIN, A., GACEK, C., GEIHS, K., GRASSI, V., KARSAI, G., KIENLE, H. M., KRAMER, J., LITOIU, M., MALEK, S., MIRAN- DOLA, R., M ULLER, H. A., PARK, S., SHAW, M., TICHY, M., TIVOLI, M., WEYNS, D., AND WHITTLE, J. 2009. Software engineering for self-adaptive systems: A research roadmap. 1 -- 26. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 57 CLAES, R., HOLVOET, T., AND WEYNS, D. 2011. A decentralized approach for anticipatory vehicle routing using delegate multi-agent systems. IEEE Transactions on Intelligent Transportation Systems 12, 2. CLEMENTS, P., BACHMANN, F., BASS, L., GARLAN, D., IVERS, J., LITTLE, R., NORD, R., AND STAFFORD, J. 2010. Documenting Software Architectures: Views and Beyond; 2nd Edition. Addison Wesley. DE LEMOS, R. ET AL. 2012. Software engineering for self-adaptive systems ii. Springer-Verlag, Berlin, Heidel- berg, Chapter Software Engineering for Self-Adaptive Systems: A Second Roadmap. DE LEMOS ET AL., R. 2017. Software engineering for self-adaptive systems: Research challenges in the provi- sion of assurances. In Software Engineering for Self-Adaptive Systems III: Assurances. Springer, 3 -- 30. DE WOLF, T. ET AL. 2007. Design patterns for decentralised coordination in self-organising emergent systems. In Engineering Self-Organising Systems. Lecture Notes in Computer Science, vol. 4335. Springer, Berlin, Heidelberg, Germany, 28 -- 49. DEUGO, D., OPPACHER, F., KUESTER, J., AND OTTE, I. V. 1999. Patterns as a means for intelligent software engineering. In Proceedings of the 1999 Conference on Artificial Intelligence. 605 -- 611. DOBSON, S., DENAZIS, S., FERN ´ANDEZ, A., GAITI, D., GELENBE, E., MASSACCI, F., NIXON, P., SAFFRE, F., SCHMIDT, N., AND ZAMBONELLI, F. 2006. A survey of autonomic communications. ACM TAAS 1, 223 -- 259. DURFEE, E. AND LESSER, V. 1989. Negotiating Task Decomposition and Allocation Using Partial Global Planning. Distributed Artificial Intelligence 2, 229 -- 244. FERBER, J. 1999. Multi-Agent Systems: An Introduction to Artificial Intelligence. ISBN 0-201-36048-9, Addison-Wesley. FERNANDEZ-MARQUEZ, J., ARCOS, J., DI MARZO SERUGENDO, G., AND CASADEI, M. 2011. Descrip- In Engineering of Autonomic and tion and composition of bio-inspired design patterns: The gossip case. Autonomous Systems (EASe), 2011 8th IEEE International Conference and Workshops on. 87 -- 96. GARLAN, D., CHENG, S., HUANG, A., SCHMERL, B., AND STEENKISTE, P. 2004. Rainbow: Architecture- Based Self-Adaptation with Reusable Infrastructure. IEEE Computer 37, 10. HAESEVOETS, R. 2012. Macodo: Architecture-Centric Support for Dynamic Service Collaborations. Ph.D Dissertation. Supervisors: Danny Weyns and T. Holvoet, Katholieke Universiteit Leuven, Belgium. HAESEVOETS, R., WEYNS, D., AND HOLVOET, T. 2014. Architecture-centric support for adaptive service collaborations. ACM Trans. Softw. Eng. Methodol. 23, 1 (Feb.), 2:1 -- 2:40. HAESEVOETS, R., WEYNS, D., TORRES, M. H. C., HELLEBOOGH, A., HOLVOET, T., AND JOOSEN, W. 2010. A middleware model in alloy for supply chain-wide agent interactions. In Agent-Oriented Software Engineering XI. Lecture Notes in Computer Science. Springer. HAYDEN, S. C., CARRICK, C., AND YANG, Q. 1999. Architectural design patterns for multiagent coordination. In Proceedings of the 3rd international conference on autonomous agents. HOLVOET, T., WEYNS, D., AND VALCKENAERS, P. 2009. Patterns of delegate mas. In Proceedings of the 2009 Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems. SASO '09. IEEE Computer Society, Washington, DC, USA, 1 -- 9. HUEBSCHER, M. C. AND MCCANN, J. A. 2008. A survey of autonomic computing: degrees, models, and applications. ACM Computer Surveys 40, 7:1 -- 7:28. JACKSON, M. 1997. The meaning of requirements. Ann. Softw. Eng. 3, 5 -- 21. JENNINGS, N., SYCARA, K., AND WOOLDRIDGE, M. 1998. A Roadmap of Agent Research and Development. Autonomous Agents and Multiagent Systems 1. KENDALL, E. A., MURALI KRISHNA, P. V., PATHAK, C. V., AND SURESH, C. B. 1998. Patterns of intelligent In Proceedings of the second international conference on Autonomous agents. ACM, and mobile agents. 92 -- 99. KOLP, M., GIORGINI, P., AND MYLOPOULOS, J. 2006. Multi-agent architectures as organizational structures. Autonomous Agents and Multi-Agent Systems 13, 3 -- 25. KRAMER, J. AND MAGEE, J. 2007. Self-managed systems: an architectural challenge. In FOSE '07: Future of Software Engineering. IEEE Computer Society. LIND, J. 2002. Patterns in agent-oriented software engineering. In Proceedings of the 3rd international con- ference on Agent-oriented software engineering III. AOSE'02. Springer-Verlag, Berlin, Heidelberg, Germany, 47 -- 58. MAES, P. 1990. Situated Agents can have Goals. Designing Autonomous Agents, MIT Press. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 58 D. Weyns and F. Oquendo MAES, P. 1995. Artificial Life Meets Entertainment: Life like Autonomous Agents. Communications of the ACM 38, 11, 108 -- 114. MAMEI, M. AND ZAMBONELLI, F. 2004. Co-Fields: A Physically Inspired Approach to Distributed Motion Coordination. IEEE Pervasive Computing 3, 2, 52 -- 61. MAMEI, M. AND ZAMBONELLI, F. 2009. Programming pervasive and mobile computing applications: the tota approach. ACM Transaction on Software Engineering and Methodology 18, 4. MATARIC, M. J. 1994. Leaning to behave socially. In SAB94: Proceedings of the third international conference on Simulation of adaptive behavior : from animals to animats 3. MIT Press, Cambridge, MA, USA, 453 -- 462. MOURATIDIS, H. AND WEISS, M. 2006. Patterns for modelling agent systems with tropos. In Software En- gineering for Multi-Agent Systems IV, A. Garcia, R. Choren, C. Lucena, P. Giorgini, T. Holvoet, and A. Ro- manovsky, Eds. Lecture Notes in Computer Science, vol. 3914. Springer-Verlag, 207 -- 223. MURPHY, A. L., PICCO, G. P., AND ROMAN, G.-C. 2006. Lime: A coordination model and middleware supporting mobility of hosts and agents. ACM Trans. Softw. Eng. Methodol. 15, 3 (July), 279 -- 328. OLUYOMI, A. 2006. Phd. Ph.D. thesis, The University of Melbourne. OQUENDO, F. 2004. Pi-ADL: an Architecture Description Language based on the higher-order typed pi-calculus for specifying dynamic and mobile software architectures. SIGSOFT Softw. Eng. Notes 29, 3, 1 -- 14. OREIZY, P., GORLICK, M., TAYLOR, R., HEIMHIGNER, D., JOHNSON, G., MEDVIDOVIC, N., QUILICI, A., ROSENBLUM, D., AND WOLF, A. 1999. An architecture-based approach to self-adaptive software. Intelligent Systems and Their Applications 14, 54 -- 62. PARUNAK, H. V. D., BRUECKNER, S., AND SAUTER, J. 2005. Digital Pheromones for Coordination of Un- manned Vehicles. In Environments for Multiagent Systems, E4MAS. Lecture Notes in Computer Science, Vol. 3374. Springer. PARUNAK, H. V. D., BRUECKNER, S., SAUTER, J., AND MATTHEWS, R. 2005. Global Convergence of Local In 4th Joint Conference on Autonomous Agents and Multiagent Systems. Utrecht, The Agent Behaviors. Netherlands. POKAHR, A., BRAUBACH, L., AND LAMERSDORF, W. 2005. A BDI architecture for goal deliberation. In 4th International Joint Conference on Autonomous Agents and Multiagent Systems. ACM, New York, NY, USA, 1295 -- 1296. QAYYUM, Z. AND OQUENDO, F. 2008. The pi-adl.net project: an inclusive approach to adl compiler design. W. Trans. on Comp. 7, 5, 414 -- 423. RAO, A. AND GEORGEFF, M. 1995. BDI Agents: From Theory to Practice. In 1st International Conference on Multiagent Systems. The MIT Press. SALEHIE, M. AND TAHVILDARI, L. 2009. Self-adaptive software: Landscape and research challenges. ACM Transactions on Autonomous and Adaptive Systems 4. SCHELFTHOUT, K. 2006. Supporting Coordination in Mobile Networks: A Middleware Approach. PhD Dis- sertation: Katholieke Universiteit Leuven, Belgium. SCHELFTHOUT, K., CONINX, T., HELLEBOOGH, A., HOLVOET, T., STEEGMANS, E., AND WEYNS, D. 2002. Agent Implementation Patterns. In OOPSLA Workshop on Agent-oriented Methodologies. Seattle, WA USA. SCHELFTHOUT, K. AND HOLVOET, T. 2004. A pheromone-based coordination mechanism applied in peer-to- peer. Lecture Notes in Computer Science, Vol. 2872. Springer. SCHELFTHOUT, K., WEYNS, D., AND HOLVOET, T. 2005. Middleware for Protocol-based Coordination in In 3rd International Workshop on Middleware for Pervasive and Ad-hoc Computing. Dynamic Networks. ACM Press, Grenoble, France. SCHELFTHOUT, K., WEYNS, D., AND HOLVOET, T. 2006. Middleware that enables protocol-based coordina- tion applied in automated guided vehicle control. Distributed Systems on Line 7. SHAW, M. AND CLEMENTS, P. 2006. The golden age of software architecture. IEEE Software 23, 2, 31 -- 39. SILVA, I. C., DA SILVA, A. R., AND MEIRA, N. 2000. A set of agent patterns for a more expressive approach. In Proceedings of the EuroPLOP 2000. 331 -- 346. SILVA, O., GARCIA, A., AND LUCENA, C. 2003. The reflective blackboard pattern: Architecting large multi- agent systems. In Software Engineering for Large-Scale Multi-Agent Systems, A. Garcia, C. Lucena, F. Zam- bonelli, A. Omicini, and J. Castro, Eds. Lecture Notes in Computer Science, vol. 2603. Springer Berlin, Hei- delberg, 73 -- 93. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. An Architectural Style for Self-Adaptive Multi-Agent Systems · 59 SMITH, R. 1980. The Contract Net Protocol: High Level Communication and Control in a Distributed Problem Solver. In IEEE Transactions on Computers, C-29(12). STEEGMANS, E., WEYNS, D., HOLVOET, T., AND BERBERS, Y. 2004. A Design Process for Adaptive Behavior of Situated Agents. In Agent-Oriented Software Engineering V. Lecture Notes in Computer Science, Vol. 3382. Springer. STERLING, L. AND TAVETER, K. 2009. The Art of Agent-Oriented Modeling. MIT Press. SYCARA, K., PANNU, A., WILLAMSON, M., ZENG, D., AND DECKER, K. 1996. Distributed intelligent agents. IEEE Expert 11, 6 (dec), 36 -- 46. TAHARA, Y., OHSUGA, A., AND HONIDEN, S. 1999. Agent system development method based on agent patterns. In Proceedings of the 21st International Conference on Software Engineering. ICSE '99. ACM, New York, NY, USA, 356 -- 367. TYRRELL, T. 1993. Computational Mechanisms for Action Selection. PhD Dissertation, University of Edin- burgh. VROMANT, P., WEYNS, D., MALEK, S., AND ANDERSSON, J. 2011. On interacting control loops in self- adaptive systems. In Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. SEAMS '11. ACM, New York, NY, USA, 202 -- 207. WEYNS, D. 2009. A Pattern Language for Multiagent Systems. In Joint Working International Conference on Software Architecture and European Conference on Software Architecture (WICSA/ECSA). Cambridge, UK. WEYNS, D. 2010. Architecture-Based Design of Multi-Agent Systems. ISBN 978-3-642-01063-7, Springer. WEYNS, D. 2019. Software Engineering of Self-Adaptive Systems. Chapter in Handbook of Software Engi- neering, Springer. WEYNS, D., BOUCK ´E, N., AND HOLVOET, T. 2008. A field-based versus a protocol-based approach for adap- tive task assignment. Autonomous Agents and Multi-Agent Systems 17, 2, 288 -- 319. WEYNS, D. AND GEORGEFF, M. 2010. Self-adaptation using multiagent systems. IEEE Softw. 27, 1, 86 -- 91. WEYNS, D., HAESEVOETS, R., HELLEBOOGH, A., HOLVOET, T., AND JOOSEN, W. 2010. The macodo mid- dleware for context-driven dynamic agent organzations. ACM Transaction on Autonomous and Adaptive Sys- tems 5, 1, 3.1 -- 3.29. WEYNS, D., HELLEBOOGH, A., AND HOLVOET, T. 2005. The Packet-World: a Test Bed for Investigating Situ- ated Multi-Agent Systems. In Software agent-based applications, platforms, and development kits. Whitestein Series in Software Agent Technology. WEYNS, D. AND HOLVOET, T. 2007. Architectural design of a situated multiagent system for controlling automatic guided vehicles. International Journal of Agent-Oriented Software Engineering 1, 4. WEYNS, D., HOLVOET, T., AND HELLEBOOGH, A. 2007. Anticipatory vehicle routing using delegate multi- agent systems. In Intelligent Transportation Systems Conference, 2007. ITSC 2007. IEEE. IEEE, 87 -- 93. WEYNS, D., HOLVOET, T., SCHELFTHOUT, K., AND WIELEMANS, J. 2008. Decentralized control of automatic guided vehicles: Applying multi-agent systems in practice. In Development Track OOPSLA, ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications. WEYNS, D., MALEK, S., AND ANDERSSON, J. 2012. Forms: Unifying reference model for formal specification of distributed self-adaptive systems. ACM TAAS 7, 1, 8:1 -- 8:61. WEYNS, D., MICHEL, F., ET AL. 2015. Agent environments for multi-agent systems -- a research roadmap. In Revised Selected and Invited Papers of the 4th International Workshop on Agent Environments for Multi-Agent Systems IV - Volume 9068. Springer-Verlag New York, Inc., New York, NY, USA, 3 -- 21. WEYNS, D., OMICINI, A., AND ODELL, J. 2007. Environment as a First-Class Abstraction in Multiagent Systems. Autonomous Agents and Multi-Agent Systems 14, 1. WEYNS, D., PARUNAK, H. V. D., MICHEL, F., HOLVOET, T., AND FERBER, J. 2005. Environments for Multiagent Systems, State-of-the-art and Research Challenges. D. Weyns, H. V. D. Parunak, and F. Michel, Eds. Lecture Notes in Computer Science, Vol. 3374. Springer Verlag. WEYNS, D., SCHELFTHOUT, K., HOLVOET, T., AND LEFEVER, T. 2005. Decentralized control of E'GV In 4th Joint Conference on Autonomous Agents and Multiagent Systems, Industry transportation systems. Track. ACM Press, New York, NY, USA, Utrecht, The Netherlands. WEYNS, D., SCHMERL, B., GRASSI, V., MALEK, S., MIRANDOLA, R., PREHOFER, C., WUTTKE, J., AN- DERSSON, J., GIESE, H., AND GOSCHKA, K. 2013. Software engineering for self-adaptive systems ii, ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001. · 60 D. Weyns and F. Oquendo lncs vol. 7475. Springer-Verlag, Berlin, Heidelberg, Chapter On Patterns for Decentralized Control in Self- Adaptive Systems. WEYNS, D., STEEGMANS, E., AND HOLVOET, T. 2004a. Integrating Free-Flow Architectures with Role Mod- els Based on Statecharts. In Software Engineering for Multi-Agent Systems III. Lecture Notes in Computer Science, Vol. 3390. Springer. WEYNS, D., STEEGMANS, E., AND HOLVOET, T. 2004b. Towards Active Perception in Situated Multi-Agent Systems. Applied Artificial Intelligence 18, 9-10, 867 -- 883. WOOLDRIDGE, M. 2000. Reasoning about Rational Agents. MIT Press. WOOLDRIDGE, M. AND JENNINGS, N. 1995. Intelligent agents: theory and practice. The Knowledge Engi- neering Review 10, 2. ACM Transactions Journal Format, Vol. 2, No. 3, 09 2001.
1905.01360
1
1905
2019-04-20T18:30:58
Skynet: A Top Deep RL Agent in the Inaugural Pommerman Team Competition
[ "cs.MA", "cs.AI", "cs.LG" ]
The Pommerman Team Environment is a recently proposed benchmark which involves a multi-agent domain with challenges such as partial observability, decentralized execution (without communication), and very sparse and delayed rewards. The inaugural Pommerman Team Competition held at NeurIPS 2018 hosted 25 participants who submitted a team of 2 agents. Our submission nn_team_skynet955_skynet955 won 2nd place of the "learning agents'' category. Our team is composed of 2 neural networks trained with state of the art deep reinforcement learning algorithms and makes use of concepts like reward shaping, curriculum learning, and an automatic reasoning module for action pruning. Here, we describe these elements and additionally we present a collection of open-sourced agents that can be used for training and testing in the Pommerman environment. Code available at: https://github.com/BorealisAI/pommerman-baseline
cs.MA
cs
Skynet: A Top Deep RL Agent in the Inaugural Pommerman Team Competition Chao Gao∗, Pablo Hernandez-Leal, Bilal Kartal, and Matthew E. Taylor Borealis AI {pablo.hernandez, bilal.kartal, matthew.taylor}@borealisai.com Edmonton, Alberta, Canada Abstract The Pommerman Team Environment is a recently proposed benchmark which involves a multi-agent domain with challenges such as partial observability, decentralized execution (without communication), and very sparse and delayed rewards. The inaugural Pommerman Team Competition held at NeurIPS 2018 hosted 25 participants who submitted a team of 2 agents. Our submission nn_team_skynet955_skynet955 won 2nd place of the "learning agents" category. Our team is composed of 2 neural networks trained with state of the art deep reinforcement learning algorithms and makes use of concepts like reward shaping, curriculum learning, and an automatic reasoning module for action pruning. Here, we describe these elements and additionally we present a collection of open-sourced agents that can be used for training and testing in the Pommerman environment. Code available at: https://github.com/BorealisAI/ pommerman-baseline Keywords: Deep Reinforcement Learning; Multi-Agent Deep Reinforcement Learning; Pommerman Acknowledgements 9 1 0 2 r p A 0 2 ] A M . s c [ 1 v 0 6 3 1 0 . 5 0 9 1 : v i X r a ∗[email protected] Department of Computing Science, University of Alberta. Work performed as intern at Borealis AI 1 Introduction The Pommerman environment for benchmarking Multi-Agent Learning is based on the classic console game Bomberman. The team competition involves 4 bomber agents initially placed at the four corners of an 11×11 board. Each two diagonal agents form a team. At every step, each agent issues an action simultaneously from 6 discrete candidate moves: moving left, right, up, down, placing a bomb, or stop. The bomb action is legal as long as the agent's ammo is greater than 0, and any illegal action is superseded with stop by the environment. Each cell on the board can either be a passage, a rigid wall, or wood. Only passage is passable for the agent. Wood would be destroyed if it is covered by an exploding bomb's flame while a rigid location is unaffected. Also, when wood is destroyed a powerup might appear (according to some probability) at the same location. There are 3 types of powerups: ExtraBomb, EnableKick, and ExtraBlast for which the agent respectively, increases its ammo by 1, acquires the ability to kick bombs, and rises its bombs' blast strength by 1. The game starts with a procedurally generated random map and each agent initially has an ammo of 1 and blast strength of 2. Whenever an agent places a bomb, it explodes after 10 time steps, producing flames that have a lifetime of 2 time steps and a radius of the bomb placing agent's blast strength. The game ties when both teams have at least one agent alive after 800 steps. The team environment is also partially observable, meaning each agent can only see the local board with a radius of 4 cells, see Figure 1(a). Pommerman is a challenging benchmark for multi-agent learning and model-free reinforcement learning, due to the following characteristics: Sparse and deceptive rewards: the former refers to the fact that the only non-zero reward is obtained at the end of an episode. The latter refers to the fact that quite often a winning reward is due to the opponents' involuntary suicide, which makes reinforcing an agent's action based on such a reward deceptive. Note that suicide happens frequently during learning since an agent has to place bombs to explode wood to move around on the board, while due to terrain constraints, in some cases, performing non-suicidal bomb placement requires complicated, long-term, and accurate planing. Delayed action effects: the only way to make a change to the environment (e.g., bomb wood or kill an agent) is by means of bomb placement, but the effect of such an action is only observed when the bomb's timer decreases to 0; more complications are added when a placed bomb is kicked to another position by some other agent. Imperfect information: an agent can only see its nearby areas. This makes the effect of certain actions, such as bomb kicking, unpredictable. Indeed, even detecting which agent placed the exploding bomb is intractable in general because of the hidden information of the board. Uninformative multiagent credit assignment: In the team environment, the same episodic reward is given to two members of the team. It may not be clear how to assign credit to individual agents. For example, consider an episode where an agent eliminates an opponent but then commits suicide, and its teammate eliminates the remaining opponent. Under this scenario, both team members get a positive reward from the environment, but this could reinforce the suicidal behaviour of the first agent. Similarly, one agent could eliminate both opponents whereas its teammate just camps; both agents would get positive rewards, reinforcing a lazy agent [7]. 2 Skynet955 nn_team_skynet955_skynet955 is a team composed of two identical neural networks, where skynet955 is trained after equipping the neural net agent with an "ActionFilter" module for 955 iterations. The philosophy is to instill prior knowledge to the agent by telling the agent what not to do and let the agent discover what to do by trial-and-error. The benefit is twofold: 1) the learning problem is simplified since suicidal actions are removed and bomb placing becomes safe; and 2) superficial skills such as not moving into flames and evading bombs in simple cases are handled. Below we describe the main components of our team: the ActionFilter and the reinforcement learning aspect. ActionFilter We designed the filter to speed up learning so that agents can focus on higher level strategies. The filter thus serves as a safety check to provide more efficient exploration. The ActionFilter is implemented by rules shown in Table 1. Note that for the "avoiding suicide" rules, skynet955 implemented a simple version of them (e.g., a moving bomb was simply treated as static); a full implementation would arguably make the agent stronger. It is worth mentioning that the above ActionFilter is extremely fast. In our experiments, together with neural net evaluation, each action takes ≈ 3 ms on a GTX 1060 GPU on average, while the time limit in the competition is 100 ms per move. Also, we note that another natural approach for "bomb placement" pruning is conducting a lookahead search using "avoding suicide" rules; this is perhaps better than the crude rules described above. We think this ActionFilter will be useful for learning agents within the Pommerman domain, since it can constrain the action space during learning without significantly affecting the overall team strategy. Ideally, one can even start model-free learning with the filter, and once an agent acquires some basic 1 (a) (b) Figure 1: (a) An example team environment Pommerman game. On the right is shown the partial observation (a limited area around) for each agent. (b) Winning percentage of the learning team against a team of Static opponents and a team of Smart random opponents. Table 1: ActionFilter rules Avoiding Suicide Bomb Placement Not going to positions that are flames on the next step. Not going to doomed positions, i.e., positions where if the agent were to go there the agent would have no way to escape. For any bomb, doomed positions can be computed by referring to its blast strength, blast range, and life, together with the local terrain. Not place bombs when teammate is close, i.e., when their Manhattan distance is less than their combined blast strength. Not place bombs when the agent's position is covered by the blast of any previously placed bomb. skills, it can be unplugged from the neural network so that strategy bias by filter is completely removed. For this reason, we have open-sourced an implementation of the ActionFilter.1 Reinforcement Learning As depicted in Figure 2, the architecture contains 4 convolution layers, followed by policy and value heads. The input contains 14 features planes, each of shape 11×11, similar to [9]. It then convolves using 4 layers of convolution, each has 64 3×3 kernels; the result thus has shape 11×11×64. Then, each head convolves using 2 1×1 kernels. Finally, the output is squashed into action probability distribution and value estimation, respectively. Such a two-head architecture is a natural choice for Action-Critic algorithms, as it is generally believed that forcing policy and value learning to use shared weights could reduce over-fitting [10]. Instead of using an LSTM to track the history observations, we use a "retrospective board" to remember the most recent value at each cell of the board, i.e., for cells outside of an agent's view, in the "retrospective board" its value is filled with what was present when the agent saw that cell the last time. The input feature has 14 planes in total, where the first 10 are extracted from the agent's current observation, the rest 4 are from "retrospective board." We initially performed experiments with an LSTM to track all previous observations; however, due to computational overhead on top of the already prolonged training in Pommerman domain, we decided to replace it with the "retrospective board" idea, which yielded similar performance but was significantly faster. 1 https://github.com/BorealisAI/pommerman-baseline Figure 2: Architecture used for the skynet955 agents 2 05001,0001,500020406080100IterationWiningPercentageAgainstStaticTeam05001,0001,5002,00005101520IterationWiningPercentageAgainstSmartRandomTeam Table 2: Reward Shaping for skynet955 agents Going to a cell not in a 121-length FIFO queue gets 0.001. Picking up kick gets 0.02. Picking up ammo gets 0.01. Picking up blast strength gets 0.01. At the end of a game, dead agent in the winning team gets 0.5. For draw games, all agents receive 0.0. On one enemy's death gets 0.5. On a teammate's death gets −0.5. (cid:34) (cid:88) The neural net is trained by PPO [10], minimizing the following objective: o(θ;D) = (st,at,Rt)∈D −clip( πθ(atst) θ (atst) πold , 1−, 1+)A(st, at)+ ·max α 2 (cid:104) (vθ(st)−Rt)2, (vold θ (st)+clip(vθ(st)−vold θ (st),−, )−Rt)2(cid:105)(cid:35) , (1) where θ is the neural net, D is sampled by πold θ , and  is a tuning parameter. Refer to OpenAI baseline for details [10]. Curriculum Learning Training is conducted by letting two identical neural net players compete against a set of curricu- lum [1] opponents: (i) Static opponent teams, where opponents do not move or place bombs. Competing against a team of Static opponents teaches our agents to get closer to opponents, place a bomb, and move away to a safe zone. The trained neural net is then used against the second opponent in the curriculum. (ii) SmartRandomNoBomb: players that do not place bombs. Smart random means it has the ActionFilter as described earlier and the action taken is random (except that bomb placing is disallowed). The reason we let SmartRandomNoBomb not place bombs is that the neural net can focus on learning true "killing" skills, not a skill that solely relies on the opponent's strategy flaw (e.g., the provided baseline SimpleAgent has a significant flaw where the competitor can diagonally block and make SimpleAgent be killed by its own bomb). This avoids the "false positive" reward signal caused by opponent's involuntary suicide. Competing against a team of SmartRandomNoBomb helps our agents to learn better battling skills such as using the topological map to corner the opponents and pursuing opponents. Reward shaping: To cope with the sparse reward problem, a dense reward function is added during the learning, see Table 2. It should be noted the above hand designed reward function is still noisy in the sense that an agent's contribution was not clearly separated. Results: Figure 1(b) shows the learning curves against Static and SmartRandomNoBomb teams. In our training, each iteration contains 120 games, produced in parallel by 12 actor workers. The curves show that, against Static agents, the neural net achieved wining percentage around 70%, while against SmartRandomNoBomb, it never reached 20%. We note that because the opponents do not place bombs, the rest of the games are almost all draws. The learning seems to be slow, in part because playing against SmartRandomNoBomb, a large number of games were ended with draws, which gives reward signal 0 in our training. In the competition, our team was composed of two identical neural net models, at each step, for each of our agent, each action typically costs one to several milliseconds, while the time limit is 100ms per move. The submitted agent skynet955 was the neural net model at iteration 955 obtained in training against SmartRandomNoBomb team, as by the time of submission only around 1000 iterations were finished. Throughout our training and testing, only the V0 environment (which has no wall collapsing) was used. By contrast, in the competition, the V1 (which has wall collapsing, meaning at certain time step, the boarder passages will suddenly change to rigid walls, and any agent that happens to be in any of the corresponding cells dies) was used. An open-sourced collection of agents for Pommerman Against SimpleAgent, it is not difficult to train a non-placing- bomb neural net agent that wins by diagonally blocking and forcing SimpleAgent to get stuck on its self-placed bomb.2 This strategy flaw of SimpleAgent stems from its hand-crafted heuristic strategy for enemy engagement and bomb placement. Learning agents exploit this flaw and the learned policy does not generalize against other opponents types. Therefore, we propose and open source different agents to be used for training, see Table 3. StaticAgent is an extremely simple agent that always executes the stop action, the advantage of using this agents is that rewards are noise-free. SmartRandomNoBomb agent is a very challenging opponent. It moves randomly among the filtered actions, therefore learning against it provides better generalization. It does not place bombs, and thus never commits suicide. In contrast to SimpleAgent and CautiousAgent, it does not use Dijkstra, and it takes less time to act. CautiousAgent is based on a modification of SimpleAgent, the main idea is to only let this agent place a bomb when it is certain to kill an opponent. However, with this adaptation, the "weak" opponent SimpleAgent is instantly turned into a "strong" player. Killing this agent requires quite advanced skills. When learning against this opponent, a large number 2https://youtu.be/3yUhI46Xx8o 3 Our open-sourced agents: Description of different agents. Table 3: StaticAgent, SmartRandom, SmartRandomNoBomb and CautiousAgent, will be helpful to baseline against and to train against. The bottom 3 agents are relatively stronger than the provided baseline, less prone to exploitation due to higher level of stochasticity, and fast decision makers to be used during training. SimpleAgent (Provided by Pommer- man) StaticAgent A heuristic agent that uses Dijkstra and rules for navigation, tune-up collection, and simple attacks. A boring agent that always executes the stop action. Helpful for learning agents as rewards are noise-free. Takes random actions from the filtered action space. Stochastic but careful actions render it a competitive opponent for RL agents. Similar to SmartRandom but force the agent not place bomb at all. SmartRandom (Random agent + Ac- tionFilter) SmartRandomNoBomb (Random agent + ActionFilter + No Bombing) CautiousAgent pleAgent) Skynet955 (Neural Network agent) (Modified Sim- The modification enables the agent to place a bomb if and only if it guarantees a kill. Agent that is trained with PPO using reward shaping, ActionFilter, and opponent curriculum learning. of games ended with draws, or the challenger is killed. For example, in our tests, our Skynet agent can easily achieve 70% wining percentage against SimpleAgent team, but only around 10% against CautiousTeam, if not excluding draws. 3 Conclusions and Future work In spite of the good performance of our skynet agents, there are still many potential avenues for future research. For example, recent innovations, such as curiosity [2, 8], centralized learning with decentralized execution [5], or difference rewards [4] have shown to be able to produce good results in related domains, it remains to experimentally verify how effective they would be in the challenging domain of Pommerman. One challenge of multi-agent learning in partial observable environments is the credit assignment for each individual agent's behavior [3, 6]. Whenever there is a success or failure, it is important to correctly identify who is to reward or blame. Unfortunately, the original environment provided by Pommerman does not provide any such information. However, if centralized training [5] can be used by revising the environment, information might be helpful in devising more accurate reward function, for example: identification of bombs' owners and bombs' kickers; in general for any relevant event occurred (wood destruction, enemy's death, etc.) identifying which agent is to reward or blame could be based on who is responsible for the corresponding exploding bomb. Lastly, an ensemble consists of multiple neural net models may also improve the playing performance in the competition setting. References [1] Y. Bengio, J. Louradour, R. Collobert, and J. Weston. Curriculum learning. In Proceedings of the 26th annual international conference on machine learning, pages 41 -- 48. ACM, 2009. [2] Y. Burda, H. Edwards, A. Storkey, and O. Klimov. Exploration by random network distillation. arXiv preprint arXiv:1810.12894, 2018. [3] S. Devlin, L. Yliniemi, D. Kudenko, and K. Tumer. Potential-based difference rewards for multiagent reinforcement learning. In AAMAS, pages 165 -- 172, 2014. [4] J. N. Foerster, G. Farquhar, T. Afouras, N. Nardelli, and S. Whiteson. Counterfactual Multi-Agent Policy Gradients. In 32nd AAAI Conference on Artificial Intelligence, 2017. [5] J. N. Foerster, N. Nardelli, G. Farquhar, T. Afouras, P. H. S. Torr, P. Kohli, and S. Whiteson. Stabilising Experience Replay for Deep Multi-Agent Reinforcement Learning. In International Conference on Machine Learning, 2017. [6] P. Hernandez-Leal, B. Kartal, and M. E. Taylor. Is multiagent deep reinforcement learning the answer or the question? A brief survey. arXiv preprint arXiv:1810.05587, 2018. [7] L. Panait and S. Luke. Cooperative Multi-Agent Learning: The State of the Art. Autonomous Agents and Multi-Agent Systems, 11(3), Nov. 2005. [8] D. Pathak, P. Agrawal, A. A. Efros, and T. Darrell. Curiosity-driven exploration by self-supervised prediction. In International Conference on Machine Learning (ICML), volume 2017, 2017. [9] C. Resnick, W. Eldridge, D. Ha, D. Britz, J. Foerster, J. Togelius, K. Cho, and J. Bruna. Pommerman: A multi-agent playground. arXiv preprint arXiv:1809.07124, 2018. [10] J. Schulman, F. Wolski, P. Dhariwal, A. Radford, and O. Klimov. Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347, 2017. 4
1001.4122
1
1001
2010-01-23T02:31:26
Distributed Control of the Laplacian Spectral Moments of a Network
[ "cs.MA", "cs.CE" ]
It is well-known that the eigenvalue spectrum of the Laplacian matrix of a network contains valuable information about the network structure and the behavior of many dynamical processes run on it. In this paper, we propose a fully decentralized algorithm that iteratively modifies the structure of a network of agents in order to control the moments of the Laplacian eigenvalue spectrum. Although the individual agents have knowledge of their local network structure only (i.e., myopic information), they are collectively able to aggregate this local information and decide on what links are most beneficial to be added or removed at each time step. Our approach relies on gossip algorithms to distributively compute the spectral moments of the Laplacian matrix, as well as ensure network connectivity in the presence of link deletions. We illustrate our approach in nontrivial computer simulations and show that a good final approximation of the spectral moments of the target Laplacian matrix is achieved for many cases of interest.
cs.MA
cs
Distributed Control of the Laplacian Spectral Moments of a Network Victor M. Preciado, Michael M. Zavlanos, Ali Jadbabaie, and George J. Pappas 1 0 1 0 2 n a J 3 2 ] A M . s c [ 1 v 2 2 1 4 . 1 0 0 1 : v i X r a Abstract -- It is well-known that the eigenvalue spectrum of the Laplacian matrix of a network contains valuable infor- mation about the network structure and the behavior of many dynamical processes run on it. In this paper, we propose a fully decentralized algorithm that iteratively modifies the structure of a network of agents in order to control the moments of the Laplacian eigenvalue spectrum. Although the individual agents have knowledge of their local network structure only (i.e., myopic information), they are collectively able to aggregate this local information and decide on what links are most beneficial to be added or removed at each time step. Our approach relies on gossip algorithms to distributively compute the spectral moments of the Laplacian matrix, as well as ensure network connectivity in the presence of link deletions. We illustrate our approach in nontrivial computer simulations and show that a good final approximation of the spectral moments of the target Laplacian matrix is achieved for many cases of interest. I. INTRODUCTION A wide variety of distributed systems composed by au- tonomous agents are able to display a remarkable level of self-organization despite the absence of a centralized coordinator [1, 2]. For example, the structure of many "self-engineered" networks, such as social and economic networks, emerges from local interactions between agents aiming to optimize their local utilities [3]. Motivated by the implications of a network's Laplacian spectrum on its structure (i.e., number of connected components) and behavior of dynamical processes implemented on it (i.e., speed of convergence of distributed consensus algorithms), we propose a distributed model of graph evolution in which autonomous agents can modify their local neighborhood in order to control a set of moments of the network Laplacian spectrum. The eigenvalue spectra of a network provide valuable information regarding the behavior of many dynamical pro- cesses running within the network [4]. For example, the eigenvalue spectrum of the Laplacian matrix of a graph affects the mixing speed of Markov chains [5], the stability of synchronization of a network of nonlinear oscillators [6, 7], the spreading of a virus in a network [8, 9], as well as the dynamical behavior of many decentralized network algorithms [10]. Similarly, the second smallest eigenvalue of the Laplacian matrix (also called spectral gap) is broadly considered a critical parameter that influences the stability This work is partially supported by the ONR MURI HUNT and AFOR MURI Complex Networks programs Victor M. and George J. Pappas Preciado, Michael M. Jad- babaie, Labora- tory, Uni- versity USA {preciado,zavlanos,jadbabai,pappasg}@seas.upenn.edu are with GRASP Science, 19104, Applied PA Pennsylvania, School of Engineering and Zavlanos, Ali of Philadelphia, and robustness properties of dynamical systems that are im- plemented over information networks [11, 12]. Optimization of the spectral gap has been studied by several authors both in a centralized [13] -- [15] and decentralized context [16]. In contrast, our approach focuses on controlling the moments of the Laplacian eigenvalue spectrum. In this way, we can influence the behavior of certain dynamical processes run within the network. As we show, the benefit of controlling the spectral moments, and especially the lower order ones, lies in lower computational cost and elegant distributed implementation. A major challenge in our approach is to efficiently control the spectral moments of a network in a fully distributed fash- ion while maintaining network connectivity in the presence of link deletions. Our work is related to [17], where a fully distributed algorithm is proposed to compute the full set of eigenvalues and eigenvectors of a matrix representing the network topology. However, our approach is computationally cheaper since computation of the spectral moments does not require a complete eigenvalue decomposition, but can be performed distributively by averaging local network infor- mation, such as node degrees. On the other hand, control of the network structure to the desired set of spectral moments is based on greedy actions (link additions and deletions) that are the result of distributed agreement protocols between the agents. We show that our distributed topology control algorithm is stable and converges to a network with spectral moments "close" to the desired. The performance of our algorithm is illustrated in computer simulations. The rest of this paper is organized as follows. In Section II, we formulate the problem under consideration and review some terminology. In Section III, we derive closed-form expressions for the first four moments of the Laplacian spectrum in terms of graph properties that can be measured locally. Based on these expressions, we introduce a dis- tributed algorithm to compute these moments. In Section IV, we propose an efficient distributed algorithm to control of the spectral moments of a network. Finally, in Section V, we illustrate our approach with several computer simulations. II. PRELIMINARIES & PROBLEM DEFINITION Let G = (V, E) denote a graph on n nodes, where V = {v1, . . . , vn} denotes the set of nodes and E ⊆ V × V is the set of edges. If (vi, vj) ∈ E whenever (vj, vi) ∈ E we say that G is undirected and call nodes vi and vj adjacent (or neighbors), which we denote by vi ∼ vj. The set of all nodes adjacent to node v constitutes the neighborhood of node v, defined by N v = {w ∈ V : (v, w) ∈ E}, and the number of those neighbors is called the degree of node v, denoted by deg v. In this paper, we consider finite simple graphs, meaning that two nodes are connected by at most one edge and self-loops are not allowed. We define a walk from v0 to vk of length k to be an ordered sequence of nodes (v0, v1, ..., vk) such that vi ∼ vi+1 for i = 0, 1, ..., k − 1. We say that a graph G is connected if there exists a walk between every pair of nodes. If v0 = vk, then the walk is closed. A closed walk with no repeated nodes (with the exception of the first and last nodes) is called a cycle. Triangles and quadrangles are cycles of length three and four, respectively. Let d (v, w) denote the distance between two nodes v and w, i.e., the minimum length of a walk from v to w. We say that v and w are k-th order neighbors if d (v, w) = k and define the k-th order neighborhood of a node v as the set of nodes within k = {w ∈ V : d (v, w) ≤ k}. a distance k from v, i.e., N v A k-th order neighborhood, induces a subgraph Gv k ⊆ G k defined as the set of with node-set N v edges in E that connect two nodes in N v k . We say that a graphical property PG is locally measurable within a radius k around a node v if PG is exclusively a function of the k ). For example, both neighborhood subgraph, i.e., PG = f (Gv the degree and the number of triangles touching a node are locally measurable within a radius 1. Also, the number of quadrangles touching a node is locally measurable within a radius 2. k and edge-set E v Graphs can be algebraically represented via the adjacency and Laplacian matrices. The adjacency matrix of an undi- rected graph G, denoted by AG = [aij ], is an n×n symmetric matrix defined entry-wise as aij = 1 if nodes vi and vj are adjacent and aij = 0 otherwise.1 The powers of the adjacency matrix is related to walks in a graph. In particular we have the following results [18]: Lemma 2.1: The number of closed walks of length α joining node vi to itself is given by the i-th diagonal entry of the matrix Aα G. G)ii = deg vi, (A3 2Ti and (cid:0)A4 G(cid:1)ii = 2Qi + (deg vi)2 +Pj∈Ni Corollary 2.2: Let G be a simple graph. Denote by Ti and Qi the number of triangles and quadrangles touching node vi, respectively. Then (AG)ii = 0, (A2 G)ii = (deg vj − 1). Arranging the node degrees on a diagonal matrix yields the degree matrix DG = diag (deg vi). Then, the Laplacian matrix LG of a graph G can be defined by LG = DG − AG. Let λ1 ≤ λ2 ≤ ... ≤ λn be the eigenvalues of LG, where 1 is the vector of all ones. One can prove that LG is positive semidefinite and λ1 = 0. Furthermore, G is connected if and only if λ2 > 0, or equivalently, if ker LG = span{1} [18]. As a result, we have the following well-known result: Theorem 2.3 ( [19]): Consider a fixed undirected graph G on n nodes and let θi(t) ∈ R denote the state variable of node i. Let θ(t) = [θi(t)] ∈ Rn be the vector of all states and assume θ(t) = −LGθ(t). Then the network G is connected if and only if, lim t→∞ θ(t) = 1 n n Xi=1 θi(0)1 ∈ span{1}. (1) 1For simple graphs with no self-loops, aii = 0 for all i. 2 for all initial conditions θ(0) ∈ Rn. Theorem 2.3 says that the graph G is connected if and only if all nodes eventually reach a consensus on their state values θi(t), for all initial conditions. Therefore, connectivity of a network G can be verified almost surely by comparing the asymptotic state values (1) of all agents, for any random initialization. Note that a similar result can be obtained by application of a finite-time maximum (or minimum) consensus [20]. A. Problem Definition Consider a discrete-time sequence of graphs {G(s)}s≥1 where s ∈ {1, 2, . . . } is the discrete time index. We denote by {λi(s)}s≥1 the set of Laplacian eigenvalues of G(s). We define the k-th spectral moment of the Laplacian matrix of G(s) at time s as: mk (s) , 1 n n Xi=1 λk i (s). Similarly, the k-th centralized spectral moment of the Lapla- cian can written as: ¯mk(s) , 1 n (λi(s) − m1 (s))k n Xi=1 (cid:18)k r(cid:19) (−1)k−r mr(s)mk−r Xr=0 k 1 = (s). (2) The first four centralized spectral moments of the Laplacian corresponds to the mean, variance, skewness and kurtosis of the eigenvalue spectrum and they play a central role in this paper. Define further the error function: CME (G(s)) = 4 Xk=0h( ¯mk (s))1/k − ( ¯m∗ k)1/ki2 , (3) where ¯m∗ k denotes a given set of desired centralized mo- ments. Since the k-th moment is the k-th power-sum of the Laplacian eigenvalues, we include the exponents 1/k in the above error function with the purpose of assigning the same dimension to the summands in (3). Then, the problem addressed in this paper is: Problem 1: Given an initially connected graph G(0), de- sign a distributed algorithm that iteratively adds or deletes links from G(s), so that the connectivity of G(s) is main- tained for all time s and the error function CME(G(s)) is locally minimized for large enough s. In what follows, we first propose a distributed algorithm to efficiently compute and update CME(G(s)) without any ex- plicit eigendecomposition (Section III). Then, in Section IV, we propose a greedy algorithm where the most beneficial edge addition/deletion is determined based on a distributed agreement over all possible actions that satisfy network connectivity (Theorem 2.3). In this framework, the time variable s increases by one whenever an action is taken (i.e., an addition or deletion of a link). For simplicity, we assume that actions are taken one at a time, although this assumption can be relaxed to accommodate more complex action schemes. III. DISTRIBUTED COMPUTATION OF SPECTRAL MOMENTS In what follows, we assume that the agents in the network have very limited knowledge of the network topology. In particular, we assume that every agent v only knows the topology of the second-order neighborhood subgraph around it, Gv 2 . (This is the case, for example, for many online social networks, where each individual can retrieve a list of his friends' friends.) Then, computing the first four Laplacian spectral moments relies on counting the presence of certain subgraphs, such a triangles and quadrangles, in every agent's neighborhood and averaging these quantities via distributed average consensus. In particular, since the matrix trace opera- tor is conserved under diagonalization (in general, under any similarity transformation) the first three spectral moments of the Laplacian matrix of a graph can be written as mk (LG) = 1 N tr Lk G = 1 n tr (DG − AG)k = 1 n k Xp=0 (cid:18)k p(cid:19)(−1)p tr (Ap GDk−p G ), (4) for k ≤ 3, where we have used the fact that the trace is preserved under cyclic permutations (i.e., tr ADD=tr DAD= tr DDA). We cannot use Newton's binomial expansion for the forth moment; nevertheless, we may still obtain the following closed form solution: m4 (LG) = 1 = 1 n tr (DG − AG)4 G(cid:1) − 4tr(cid:0)D3 GAG(cid:1) + 4tr(cid:0)D2 n (cid:2)tr(cid:0)D4 +2tr (DGAGDGAG) − 4tr(cid:0)DGA3 GA2 G(cid:1) G(cid:1) + tr(cid:0)A4 G(cid:1)(cid:3) . (5) Expanding the traces that appear in (4) and (5) we get GAp tr(cid:0)Dq G(cid:1) = n Xi=1 (deg vi)q(cid:0)Ap G(cid:1)ii and tr (DGAGDGAG) = n n Xi=1 Xj=1 (deg viaij) (deg vjaji) = n n Xi=1 Xj=1 (deg vi deg vj) aij = n Xi=1 deg vi Xj∈Ni deg vj, which substituted back in equations (4) and (5) give the following expression for k ≤ 3 mk (LG) = 1 n n k Xi=1 Xr=0 (cid:18)k r(cid:19)(−1)r (deg vi)k−r (cid:0)Ar G(cid:1)ii . (6) For k = 4, we can also simplify the Laplacian spectral moment, which now becomes m4 (LG) = 1 n n Xi=1 h(deg vi)4 − 4 (deg vi)3 (AG)ii + +4 (deg vi)2 (AG)2 deg vj− 3 Substituting the expressions for (AG)r ii form Lemma 2.1 and Corollary 2.2 in equations (6) and (7) we obtain the first four spectral moments of the Laplacian matrix LG as a function of the second-order neighborhood subgraphs only m1 (LG) = m2 (LG) = m3 (LG) = m4 (LG) = 1 n 1 n 1 n 1 n n (8a) (8b) n deg vi, Xi=1 Xi=1 h(deg vi)2 + deg vii , Xi=1 h(deg vi)3 + 3 (deg vi)2 − 2Tii , Xi=1 h (deg vi)4 + 4 (deg vi)3 + (deg vi)2 − n n (8c) (8d) − deg vi + (2 deg vi + 1) Xj∈Ni deg vj − 8Ti deg vi + 2Qi  . Note that the expressions for the spectral moments in equations (8) are all averages of locally measurable quan- tities (within a 2-hop neighborhood), namely, node degrees, triangles and quadrangles touching the node. Hence, we can apply consensus and use the result of Theorem 2.3 to obtain the first four moments in a distributed way. IV. DISTRIBUTED CONTROL OF SPECTRAL MOMENTS A. Possible Local Actions The possible actions (or control variables) we consider are local link additions and local link deletions. A link addition is local if it connects a node with another node within its second-order neighborhood. Since agents in the network only know their local neighborhood, a fully distributed algorithm must limit edge additions to be local. (One could extend the algorithm to allow connections between nodes being further than two hops away, but this option would require much more computation and communication.) Let N i 1(s) and N i d(s) , (cid:8)(i, j) ∈ E(s) j ∈ N i 2(s) denote the sets of neighbors and two-hop neighbors of node i at time s ≥ 0, respectively. Since any of the two nodes adjacent to a link can take an action to delete that link, we need to decide which of the two nodes has the authority to delete the link. To avoid ambigu- ities, we define the set of edges that node i has authority to remove as: E i 1(s), i > j(cid:9). Similarly, to disambiguate between nodes adding a (still non-existing) link between them, we define the set of potential edges that node i can create as: E i a(s) , 1(s), i > j(cid:9)2. In other words, a(s), or delete a node i can either add a link (i, j) ∈ E i link (i, j) ∈ E i d(s). Note that link deletions may violate network connectivity. In this case, those link deletions should be excluded from the set of allowable actions. In the next two sections we address the cases of link deletions and link additions separately. (cid:8)(i, j) ∈ E(s) j ∈ N i 2(s)\N i −4 (deg vi) (AG)3 ii + 2 deg vi Xj∈Ni iii . ii + (AG)4 (7) 2Note that since the indices of all nodes in the network are distinct, this definition results in a unique assignment of links to nodes. 1) Link Deletions: Network connectivity is typically in- ferred from the number of trivial eigenvalues of the Laplacian matrix. However, such approaches are not applicable in our framework, since we assume no global knowledge of the network topology G(s), but only knowledge of local neighborhoods. Instead, we employ finite-time-maximum consensus which is a distributed algorithm and converges to equal values on nodes belonging to the same connected component of a graph (Theorem 2.3). Therefore, if deletion of a link violates connectivity, both nodes adjacent to that link will lie in different connected components and will have different consensus values. In what follows, we extend this idea to simultaneously checking connectivity for all possible edge deletions in the graph using a single high-dimensional consensus algorithm. Consider node j that has authority to remove any of the links in the set E j d(s). Each one of these links needs to be checked with respect to connectivity and each connectivity verification relies on a scalar consensus update, according to Theorem 2.3. Therefore, checking all links in E j d(s) requires E j d(s) consensus updates.3 We associate with every link in E j d(s) a consensus variable, and stacking all these variables in a vector we obtain the state vector xjj (s) ∈ RE j d(s). Running a distributed consensus over the network, requires participation of all other nodes i 6= j. This is possible by defining the state variables xij (s) ∈ RE j d(s). All vectors xij (s) are initialized randomly and are updated by node i according to the following maximum consensus: Case I: If (i, j) 6∈ E i not neighbors, then d(s), i.e., if nodes i and j are d(s) ∪ E j xij(s) := max k∈N i 1 (s) {xij (s), xkj (s)} , (9) with the maximum taken elementwise on the vectors, Case II: If (i, j) ∈ E j and node j has authority over link (i, j), then d(s), i.e., if nodes i and j are neighbors [xij (s)](i,j) := and k∈N i max 1 (s)\{j}(cid:8)[xij (s)](i,j), [xkj (s)](i,j)(cid:9) , (10) [xij (s)](l,j) := max k∈N i 1 (s)(cid:8)[xij (s)](l,j), [xkj (s)](l,j)(cid:9) , (11) for l 6= i, where [xkj (s)](l,j) ∈ R denotes the entry of xkj (s) corresponding to the link (l, j), Case III: If (i, j) ∈ E i and node i has authority over link (i, j), then d(s), i.e., if nodes i and j are neighbors k∈N i max 1 (s)\{j}(cid:8)[xii(s)](i,j), [xki(s)](i,j)(cid:9) . [xii(s)](i,j) := (12) Once consensus (9) -- (12) has converged, node i compares the entries [xii(s)](i,j) and [xji(s)](i,j) for all (i, j) ∈ d(s). Since, violation of connectivity due to deletion of E i the link (i, j) would result in nodes i and j being in dif- ferent connected components of the network, [xii(s)](i,j) = 3We define by X the cardinality of the set X. 4 d for all j ∈ V ; Algorithm 1 Connectivity verification Require: xij ∈ RE i Require: Tij = [0 . . . 1i . . . 0]T , ∀ j ∈ V; 1: if ∃ j ∈ V such that min{Tij} = 0 then 2: 3: 4: else if min{Tij} = 1 for all j ∈ V then 5: 6: end if Update xij by (9) -- (12); Tij := maxk∈N 1 σ by (13); {Tij, Tkj}; Update E i i [xji(s)](i,j) implies that the reduced network is still con- nected. Hence, we can define a set E i σ(s) , (cid:8)(i, j) ∈ E i d(s)[xii(s)](i,j) = [xji(s)](i,j)(cid:9) , (13) containing the safe links adjacent to node i that if deleted, connectivity is maintained. 2) Connectivity Verification: The connectivity verification of link deletions, discussed in Section IV-A.1, is illustrated in Alg. 1. Convergence of the finite-time consensus (9) -- (12) is captured by a vector of tokens Tij(s) ∈ {0, 1}n, initialized as Tij(s) := [0 . . . 1i . . . 0]T for all j ∈ V and indicating that node i has initialized the consensus variables for link deletions for which node j is responsible. In particular, when all tokens of all nodes have been collected (line 4, Alg. 1), then consensus has converged and the set of safe σ(s) can be computed (line 5, Alg. 1). Note link deletions E i that node i does not need to know the neighbor sets of its non-neighbors in the network, neither their size. Instead, the vectors xij (s) are initialized both in values and dimension as soon as vectors xkj (s) are received from a neighbor 1(s). Clearly, xjj (s) are initialized first and then k ∈ N i propagated in the network via maximum consensus until the information they contain reaches node i. B. Most Beneficial Local Action As discussed in Problem 1, the objective of this work is to minimize the error function CME(G(s)). For this we propose a greedy algorithm, which for every time s selects the action that maximizes the quantity CME(G(s))−CME(G(s+1)), if such an action exists, and terminates if no such action exists. By construction, such an algorithm converges to a network that locally minimizes CME(G(s)), while in Section V, we show that it performs well in practice too. In what follows we first compute the effect of a link addition or deletion on the four first spectral moments. Although distributed consensus could be used to compute the new moments resulting from each possible action, as in Section III, this would clearly be computationally very expensive. Instead, we can achieve this goal locally and with minor computational overhead, based on the observation that the addition or removal of an edge (i, j) only influences the degrees of nodes i and j, as well as and the triangles and quadrangles touching their neighboring nodes. Hence, agents i and j can communicate to compute the net increment in the spectral moments due to the addition or deletion of edge (i, j). In particular, we get the following expressions for the increments in the first three moments ∆m ±(i,j) 1 = ± 2 n , ∆m ±(i,j) 2 = ∆m ±(i,j) 3 = 2 n 1 n [1 ± (di + dj + 1)] , (cid:2)(3 ± 6) (di + dj) ± 3(d2 i + d2 j ) + (6 ± 2) ∓ 6Tij(cid:3) where the notation ± (i, j) indicates a link addition (+) or deletion (−) and the dependence on time s has been dropped for simplicity. (Similarly, one can obtain a complicated closed-form expression for ∆m±(i,j) , which we omit due to space limitations.) Then, agent's i copy of the k-th spectral moment mi k(s) becomes 4 m±(i,j) k (s) = mi k(s) + ∆m±(i,j) k (s), and the associated centralized moment ¯m±(i,j) (s) can be computed using (2). Then, for all possible actions discussed in Section IV-A, agent i computes the error function k CME±(i,j)(s) = 4 Xk=0 (cid:20)(cid:16) ¯m±(i,j) k (s)(cid:17)1/k − ( ¯m∗ k)1/k(cid:21)2 . Then, the local most beneficial action to the target centralized moments, namely, the action that results in the maximum decrease in the error function CME(·), can be defined by4 νi(s) , max(cid:26)argmin where CMEi(s) denotes agent i's copy of CME(s), and the largest decrease in the error associated with action νi(s) becomes: (cid:0)CME±(i,j)(s) − CMEi(s)(cid:1)(cid:27) , j CMEi(s) = CME±(i,νi(s))(s) if minj(CME±(i,j)(s) − CME(s)) ≤ 0 and CMEi(s) = D, otherwise. Note that CMEi(s) is nontrivially defined only if the exists a link adjacent to node i that if added or deleted decreases the error function CME(·). Otherwise, a large value D > 0 is assigned to CMEi(s) to indicate that this action is not beneficial to the final objective. We can include all information of a best local action in the vector vi(s) , (cid:2)i νi(s) CMEi(s) ¯m±(i,νi(s))(s)(cid:3)T ∈ R7 containing the local best action (i, νi(s)), the associated distance to the desired moments CMEi(s), and the vector of centralized moments ¯m±(i,νi(s))(s) due to this action. In the following section we discuss how to compare all local actions vi(s) for all nodes i ∈ V to obtain the one that decreases the distance to the desired moments the most. 4The max in the expression bellow indicates that in case of ties in the min, the highest index node wins. 5 Algorithm 2 Globally most beneficial action Require: vi , [i νi CMEi ¯m±(i,νi)]T ; Require: Ti := [0 . . . 1i . . . 0]T ; 1: if min{Ti} = 0 then 2: 3: 4: else if min{Ti} = 1 and [vi]3 < D then 5: 6: else if min{Ti} = 1 and [vi]3 = D then 7: 8: end if vi := vj, with j = max{argmink∈N i Ti := maxj∈N i {Ti, Tj}; 1 1 Update Ni, ¯mi and CMEi according to (14) -- (17); No beneficial action. Algorithm has converged; {[vi]3, [vk]3}; C. From Local to Global Action To obtain the overall most beneficial action, all local actions need to be propagated in the network and compared against each other. For this we require minimal storage and communication as well as no propagation of any information regarding the network topology. As in Section IV-A, we achieve this goal using a finite time minimum consensus algorithm. In particular, the desired local actions vi(s) are propagated in the network, along with vectors of tokens Ti(s) ∈ {0, 1}n, initialized as Ti(s) := [0 . . . 1i . . . 0]T , indicating that node i has transmitted its desired action. During every iteration of the algorithm, every node i communicates with its neighbors and updates its vector of tokens Ti(s) (line 3, Alg. 2), as well as its desired action vi(s) with the action vj(s) correspond- ing to the node j that contains the smallest distance to the target moments [vj (s)]3, i.e., j ∈ argmink∈N1i(s){[vi(s)]3, [vk(s)]3}. In case of ties in the distances to the targets [vj(s)]3, i.e., if 1 (s){[vi(s)]3, [vk(s)]3} contains more than one argmink∈N i nodes, then the node j with the largest label is selected (line 2, Alg. 2). Note that line 2 of Alg. 2 is essentially a minimum consensus update on the entries [vi(s)]3 and will converge to a common outcome for all nodes when they have all been compared to each other, which is captured by the condition minn j=1 Tij(s) = 1 (lines 4 and 6, Alg. 2). When the consensus has converged, if there exists a node whose desired action decreases the distance to the target moments, i.e., if [vi(s)]3 < D (line 4, Alg. 2), then Alg. 2 terminates with a greedy action and node i updates its set of neighbors N i 1(s) and vector of centralized moments ¯mi(s) (line 5, Alg. 2). If the optimal action is a link addition, i.e., if [vi(s)]2 6∈ N i 1(s) ∪ {[vi(s)]2} . (14) On the other hand, if the optimal action is a link deletion, i.e., if [vi(s)]2 ∈ N i 1(s), then 1(s + 1) := N i N i 1(s), then 1(s + 1) := N i N i 1(s)\ {[vi(s)]2} . (15) In all cases, the centralized moments and error function are updated by ¯mi(s + 1) := [vi(s)]4:7 (16) Reset 3 Reset 1 Run 1 Run 2 Run 3 Reset 2 Fig. 1. Synchronization: Assume node i is in run 1. Necessary for node i to transition to run 2 is that all other nodes are also in run 1, since otherwise node i will be missing tokens from the nodes that are not in run 1 yet (currently in run 3) and Alg. 2 will not be able to converge. Once node i transitions to run 2, it initializes all variables for that run with the latest values from run 1, while it maintains the variables of run 1 for nodes that are still in run 1 and it clears all variables of run 3 since, no node is in this run any more. and CMEi(s + 1) := [vi(s)]3, (17) respectively, where [vi(s)]4:7 = [[vi(s)]4 . . . [vi(s)]7]T . Fi- nally, if all local desired actions increase the distance to the target moments, i.e., if [vi(s)]3 = D (line 6, Alg. 2), then no action is taken and the algorithm terminates with a network topology with almost the desired spectral properties. This is because no action exists that can further decrease the distance to the target moments. D. Synchronization Communication time delays, packet losses, and the asym- metric network structure, may result in runs of the algorithm starting asynchronously, outdated information being used for future decisions, and consequently, nodes reaching different decisions for the same run. In the absence of a common global clock, the desired synchronization is ideally event triggered, where by a triggering event we understand the time instant that a message Msg[i] has been received by 1. We achieve such a any of node i's neighbors j ∈ N i synchronization by labeling every algorithm run in the set {1, 2, 3} and requiring that all information exchange takes place among neighbors that are in equally labeled runs [21]. Essentially, "fast" nodes wait for their "slower" peers and, hence, all nodes are always synchronized in the sequence {1, 2, 3, 1, 2, 3, . . . } (Fig. 1). V. NUMERICAL SIMULATIONS In this section we illustrate our algorithm with several numerical examples. 1 = 1.8, ¯m∗ 2 = 7.56, ¯m∗ Example 1 (Star networks): Consider a star network on 10 nodes. The first four central moments of the associated Laplacian matrix are: ¯m∗ 3 = 54.14, and ¯m∗ 4 = 453.49. Our objective is to control the topology of a randomly initialized network on 10 nodes so that it eventually has the same set of moments as the given star network. We observe in Fig. 2 that our algorithm decreases the error function (blue line) to zero in finite time. Similar performances are observed when we repeat this procedure for star networks of any size. Furthermore, although we are con- trolling the first four moments solely, the resulting network structures are exactly the star topologies whose moments we were trying to approximate. The perfect reconstruction observed in this case is due to the fact that a star graph is a 6 Fig. 2. Convergence of the error function CME(·) for the star graph (blue plot) and the two-stars graph (red plot). The subgraph in the upper right corner shows the behavior of the error function in a neighborhood of zero. Observe that our algorithm can match the first four moments of the star network with zero error in finite time, but can not exactly match the moments of a the two-stars graph, although the final error is very small. Fig. 3. by our algorithm (b). Structures of the two-stars network (a) and the network returned extreme case in which the graph topology is uniquely defined by their eigenvalue spectrum. Moreover, if each agent in a star network has access to its second-order neighborhood, it has access to the complete star topology. Example 2 (Two-stars network): Although our approach works very well for star networks, the case of two-stars networks points out one of its weaknesses, namely, its lim- itation in modeling network communities. In this example, we consider two star graphs on 10 nodes each, and connect their two central hubs with a link. The resulting graph is the two-stars graph shown in Fig. 3(a). As before, we initialize our algorithm with a random graph on 20 nodes and try to approximate the first four central moments of the two- stars graph. In Fig. 2, we observe that the error function (red line) quickly reaches a neighborhood of zero but does not reach zero exactly. Therefore, although our algorithm tries to generate the two hubs in the two-star network, its local nature will not allow it recover the highly-structured two- stars graph. Instead, it returns the final network shown in Fig. 3(b). Nevertheless, the eigenvalue spectra between the desired two-star network and the network in Fig. 3(b) are still very similar, as shown in Fig. 4. Example 3 (Chain vs. ring networks): The objective of 7 Fig. 4. Empirical cumulative distribution functions for the eigenvalues of the two-stars graph (blue) and the graph returned by our algorithm (red). this example is to illustrate how two structurally very similar (but topologically different) target graphs, such as a chain and a ring, may affect the performance of our algorithm. In particular, if we run our algorithm to control the first four centralized moments of an initially random graph towards the moments of a chain graph, we observe how the error function converges exactly to zero in finite time. Furthermore, the final result of our algorithm is an exact reconstruction of the chain graph. Nevertheless, when transforming the target graph from a chain graph into a ring graph (by adding a single link), an exact reconstruction is very difficult. In Fig. 5, we illustrate some graphs returned by our algorithm for different initial conditions when we control the set of moments toward the moments of a ring network on 20 nodes. Observe that, although the algorithm tends to create long cycles and the majority of nodes have degree two, it fails to recreate the exact structure of the ring graph due to the local nature of the algorithm (as in Example 2). However, although the structure of the resulting networks is not exactly the desired ring graph, their spectral properties are remarkably close to those of a ring. In Fig. 6, we illustrate the empirical cumulative distribution functions of the eigenvalues of the ring graph (blue plot), versus the four empirical cumulative distribution functions corresponding to the graphs in Fig. 5. Example 4 (Small-Worlds): In our final example, we use our algorithm to control the moments of a randomly gener- ated graph to those of a small-world network. We consider small-world graphs as defined in [22], namely, we take a ring of n nodes, and connect each node in the ring with all the nodes in its 3-hop neighborhood. Then, we randomly rewire a fraction of the resulting edges with probability p as proposed by Watts and Strogatz [22]. Our objective is to approximate the first four centralized moments of a random instance of a small world graph with n = 40 nodes and link probability p = 1/n. We observed a fast convergence of the error to a neighborhood of zero, i.e., CME(27 iterations) = .0009, which suggests (although does not guarantee) a good approximation between the spectra of the target small-world graph and the graph returned by our algorithm. We repeated Fig. 5. Networks returned by our algorithm when trying to match the first four central moments of a ring on 20 nodes. Fig. 6. Empirical cumulative distribution of eigenvalues for the ring graph with 20 nodes (blue plot) and the graphs in Fig. 5(a) (red), Fig. 5(b) (green), Fig. 5(c) (magenta) and Fig. 5(d) (cyan). this process for a link probability p = 4/n and similar results were obtained. We should note, however, that although the spectral properties between the target small-world graphs and the graphs returned by our algorithm are remarkably similar (Fig. 7), we expect the structures to be quite different as in Example 3 (although this difference is not easy to observe from a direct visualization of both graph structures). VI. CONCLUSIONS AND FUTURE RESEARCH In this paper, we have described a fully decentralized al- gorithm that iteratively modifies the structure of a network of agents with the objective of controlling the spectral moments of the Laplacian matrix of the network. Although we assume that each agent has access to local information regarding the graph structure, we show that the group is able to collectively aggregate their local information to take a global optimal decision. This decision corresponds to the most beneficial 8 [10] N.A. Lynch, Distributed Algorithms, Morgan Kaufmann Publishers, 1997. [11] A. Fax, and R. M. Murray, "Information Flow and Cooperative Control of Vehicle Formations," IEEE Transactions on Automatic Control, vol. 49, pp. 1465-1476, 2004. [12] R. Olfati-Saber, and R. M. Murray, "Consensus Problems in Networks of Agents with Switching Topology and Time-Delays," IEEE Trans- actions on Automatic Control, vol. 49, pp. 1520-1533, 2004. [13] A. Ghosh, and S. Boyd, "Growing Well-Connected Graphs," Proc. of the 45th IEEE Conference on Decision and Control, pp. 6605-6611, 2006. [14] R. Grone, R. Merris, and V.S. Sunder, "The Laplacian Spectrum of a Graph," SIAM Journal Matrix Analysis and Applications, vol. 11, pp. 218-238, 1990. [15] Y. Kim, and M. Mesbahi, "On Maximizing the Second-Smallest Eigenvalue of a State Dependent Graph Laplacian," IEEE Transactions on Automatic Control, vol. 51, pp. 116-120, 2006. [16] M.C. DeGennaro, and A. Jadbabaie, "Decentralized Control of Con- nectivity for Multi-Agent Systems," Proc. of the 45th IEEE Conference on Decision and Control, San Diego, CA, Dec. 2006, pp. 3628-3633. [17] D. Kempe, and F. McSherry, "A Decentralized Algorithm for Spectral Analysis," Journal of Computer and System Science, vol. 74, pp. 70- 83, 2008. [18] N. Biggs, Algebraic Graph Theory, Cambridge University Press, 2nd Edition, 1993. [19] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of Groups of Mobile Autonomous Agents Using Nearest Neighbor Rules," IEEE Transactions on Automatic Control, vol. 48(6), pp. 988-1001, 2003. [20] J. Cortes, "Distributed algorithms for reaching consensus on general functions," Automatica, vol. 44(3), pp. 726-737, 2008. [21] M. M. Zavlanos, and G. J. Pappas, "Distributed Connectivity Control of Mobile Networks," IEEE Transactions on Robotics, vol. 24(6), pp. 1416-1428, 2008. [22] D.J. Watts, and S. Strogatz, "Collective Dynamics of Small World Networks," Nature, vol. 393, pp. 440-42, 1998. Fig. 7. world graphs in the example for p = 1/n (left) and p = 4/n (right). Empirical cumulative distrubution of eigenvalues for the small- link addition/deletion in order to minimize an error function that involves the first four Laplacian spectral moments of the network. The aggregation of the local information is achieved via gossip algorithms, which are also used to ensure network connectivity throughout the evolution of the network. Future work involves identifying sets of spectral moments that are reachable by our control algorithm. (We say that a sequence of spectral moments is reachable if there exists a graph whose moments match the sequence of moments.) Fur- thermore, we observed that fitting a set of low-order moments does not guarantee a good fit of the complete distribution of eigenvalues. In fact, there are important spectral parameters, such as the algebraic connectivity, that are not captured by a small set of spectral moments. Nevertheless, we observed in numerical simulations that fitting the first four moments of the eigenvalue spectrum often achieves a good reconstruction of the complete spectrum. Hence, a natural question is to describe the set of graphs most of whose spectral information is contained in a relatively small set of low-order moments. REFERENCES [1] N. Wiener, The Mathematics of Self-Organising Systems. Recent Developments in Information and Decision Processes, Macmillan, 1962. [2] H. Haken, Synergetics: An Introduction, 3rd Edition, Springer-Verlag, 1983. [3] M.O. Jackson, Social and Economic Networks, Princeton University Press, 2008. [4] V.M. Preciado, Spectral Analysis for Stochastic Models of Large-Scale Complex Dynamical Networks, Ph.D. dissertation, Dept. Elect. Eng. Comput. Sci., MIT, Cambridge, MA, 2008. [5] D.J. Aldous, Some Inequalities for Reversible Markov Chains, J. London Math. Soc. (2)25, pp. 564-576, 1982. [6] L.M. Pecora, and T.L. Carroll, "Master Stability Functions for Syn- chronized Coupled Systems," Physics Review Letters, vol. 80(10), pp. 2109-2112, 1998. [7] V.M. Preciado, and G.C. Verghese, "Synchronization in Generalized Erdos-R´enyi Networks of Nonlinear Oscillators," Proc. of the 44th IEEE Conference on Decision and Control, pp. 4628-4633, 2005. [8] M. Draief, A. Ganesh, and L. Massouli´e, "Thresholds for Virus Spread on Networks," Annals of Applied Probability, vol. 18, pp. 359-378, 2008. [9] V.M. Preciado, and A. Jadbabaie, "Spectral Analysis of Virus Spread- ing in Random Geometric Networks," Proc. of the 48th IEEE Confer- ence on Decision and Control, 2009. (to appear).
1910.10109
1
1910
2019-10-22T16:53:28
Distributed interference cancellation in multi-agent scenarios
[ "cs.MA", "cs.LG", "cs.RO", "eess.SY", "eess.SP", "eess.SY" ]
This paper considers the problem of detecting impaired and noisy nodes over network. In a distributed algorithm, lots of processing units are incorporating and communicating with each other to reach a global goal. Due to each one's state in the shared environment, they can help the other nodes or mislead them (due to noise or a deliberate attempt). Previous works mainly focused on proper locating agents and weight assignment based on initial environment state to minimize malfunctioning of noisy nodes. We propose an algorithm to be able to adapt sharing weights according to behavior of the agents. Applying the introduced algorithm to a multi-agent RL scenario and the well-known diffusion LMS demonstrates its capability and generality.
cs.MA
cs
DISTRIBUTED INTERFERENCE CANCELLATION IN MULTI-AGENT SCENARIOS Mahdi Shamsi, Alireza Moslemi Haghighi, Farokh Marvasti Multimedia and Signal processing Lab (MSL), Advanced Communications Research Institute (ACRI), EE Department of Sharif University of Technology, Tehran, I.R.Iran 9 1 0 2 t c O 2 2 ] A M . s c [ 1 v 9 0 1 0 1 . 0 1 9 1 : v i X r a ABSTRACT This paper considers the problem of detecting impaired and noisy nodes over network. In a distributed algorithm, lots of processing units are incorporating and communicating with each other to reach a global goal. Due to each one's state in the shared environment, they can help the other nodes or mislead them (due to noise or a deliberate attempt). Previous works mainly focused on proper locating agents and weight assignment based on initial environment state to minimize malfunctioning of noisy nodes. We propose an algorithm to be able to adapt sharing weights according to behavior of the agents. Applying the introduced algorithm to a multi-agent RL scenario and the well-known diffusion LMS demonstrates its capability and generality. Index Terms -- Distributed Algorithm, Noise Reduction, Distributed Estimation, Multi-agent Reinforcement Learning, Noise Propagation. havior, and hence performance of the nodes, can be changed. This could be under the influence of different factors, like noise increasing or an intervening procedure such as attacking and hacking. This article is organized as follows. In Section 2, we study on noise propagation in three typical scenarios over a graph. We begin with a discrete probabilistic non-linear state model and then simplify it to a linear sharing framework. Then we propose an algorithm for malfunctioning detection in a dis- tributed scenario. Section 3 is dedicated to distributed es- timation; the Adapt Then Combine (ATC) scenario is stud- ied as a prominent approach for diffusion Least Mean Square (LMS)[13, 14]. Capability of the proposed method is illus- trated by applying to the ATC with a high noisy node in differ- ent situations [of dense and sparse connection graph]. In Sec- tion 4, a manipulated RL environment is introduced to be as a multi-agent approach for studying an intervened scenario.At last, Section 5 concludes the paper. 1. INTRODUCTION 2. NOISE PROPAGATION In this correspondence, the problem of error propagation in a distributed algorithm is investigated. There is a variety of examples in which distributed algorithms are used such as distributed estimation[1, 2], sensor networks[3], distributed control systems[4, 5], swarm intelligence algorithms[6, 7], multi-agent reinforcement learning scenarios[8, 9] and signal processing on graph[10, 11, 12] just to name but a few. Con- sidering the general viewpoint of graph over networks; each algorithm in its core consists of nodes(agents) as the com- puting units and links as the communication path. It should be noted that distributed algorithms can provide us with ro- bustness, reliability and faster convergence in exchange for a larger number of low-cost processing units. A simplifying assumption, for developing and analyzing distributed algo- rithms, is considering the shared environment to be akin to all of the graph nodes[15]. Assuming a stationary behavior of an environment, several algorithms have been proposed for optimizing, locating and placing a node in the initial state. There are also certain ways of analyzing the environment for assigning weights to each node, Since there could be short- comings due to relying on each node's observed environment. However, in a non-stationary scenario, the environmental be- In this section, we introduce error propagation as a general issue in distributed algorithms. For the purpose of generality, some simplifications are applied to this procedure. From the control systems modeling perspective, all the distributed con- tents and functionalities are stated by overall system's state equations. Every node can be assumed an agent or an esti- mator. Hence the connecting links are interpreted as corre- sponding connections and sharing procedures. In this point of view, we are not only interested in system's steady state. The transient behavior of nodes are also a major concern. In this system, it is assumed that there are N nodes which are in corporation with each other to reach a global goal. In a general case, all of A, B, C and D are nonlinear operators. A general state equations are shown as (cid:126)x(n) = A((cid:126)x(n)) + B((cid:126)u(n)); (cid:126)y(n) = C((cid:126)x(n)) + D((cid:126)u(n)). By assuming a graph as a distributed platform, functional- ity of each can be analyzed in terms of signal flow graph paradigm. This assumption leads us to interpret each operator more clearly. Hence, with minor alterations, the operator A becomes the well-known adjacency matrix of the main graph. For the purpose of simplicity, these operators are assumed to be linear. Furthermore, it is sufficient to study information sharing procedures, which are commonly linear like in recent distributed estimation methods[1]. (cid:126)x(n) = A.(cid:126)x(n) + B.(cid:126)u(n); (cid:126)ai = (cid:126)ai mean((cid:126)ai) where (cid:126)a and (cid:126)ai are the ithrows of A and A (Adjacency ma- trix). Another simplification that we should mention is that we are using a symmetric directional graph. It means, each pair of connected nodes can communicate with each other. However, the effect of the shared value of each node in the destination node is determined by the number of incoming links to the latter one. Generally, in combination step of shar- ing procedures of distributed algorithms, all incoming esti- mated values are averaged. Thus, sum of elements in each row of A should be normalized to 1. As a desirable feature of distributed structure, at least in many cases, isomorphism of the main graph is considered in the following way; each two nodes can be connected indepen- dent of the others and all nodes have the same level of impor- tance. There are trends focusing on optimizing significance of nodes based on their processing power or environmental turbulence[15, 16]. These approaches mainly concentrate on proper locating of the agents[17]; in other words, optimizing the placement procedure. Hence, by assuming an arbitrary node labeled as i, all other nodes have the same expected data flow from i. Due to the isomorphism of the graph, with malfunctioning of an arbitrary node (which could be due to the high level of noise or hacking attacks), all the other nodes are supposed to re- ceive the same level of wrong (misleading) data on average. It is clear that, these methods consider a stationary condition. Hence, after proceeding through certain number of steps of the main function of the system, it seems reasonable to think of the present environmental state. For a better comprehension, and without loss of general- ity, we only consider the case of a single impaired agent. It can be easily extended to the larger number of damaged nodes because of the simplifying linearity assumption. It means we can study two arbitrary nodes in the graph and analyze the procedure of exchanging data. In order to predict the incom- ing data from the node i to the arbitrary destination node j, we should know expected number of paths between them. It can be done through three different cases. By defining p (cid:44) M−1 N−2 and s (cid:44) M N−1 where N and M are respectively number of all nodes and average number of neighbors of an arbitrary node, we have 3 cases as shown in the following table. In the 2nd case, the paths are supposed to be determined at the destina- tion node. It is claimed that, the third case can be interpreted as the impulse response of the overall system between two arbitrary nodes of the pre-described graph. Hence, one node can intro- duce a pandemic interference over the graph. It must be men- <i> K>1 case i 1 2 3 general no-loops no self-loops = expected #paths of length K η P (N − 2, k − 1) × s × pk−1 (cid:80)K−1 (N − 2)K−1 × sK−1 × p (cid:96)=0 (N − 2)K−(cid:96)−1 × sK−(cid:96)−1 × p Table 1: Expected #paths of length K between two arbitrary nodes [= η K ], in a graph with N nodes and, on average, M neighbors for each one; for all 3 cases: η = s. <i> <i> 1 tioned that, even in simple distributed methods, each node is continuously compensating the incoming distortion based on its predefined functionality. However we are insisting on their limited capability of compensation. In order to prevent noise propagation in a graph, we introduce a simple method of weighting and successor decision making on node elimina- tion. In each step, each node receive some data from its neigh- bors (including itself). Using a simple procedure of weighting it will then use all of the incoming estimations thoroughly; in which, a node attempts to reach a predefined goal via opti- mizing a cost function (the goal can also be non-stationary). Although different ordering of these two steps results in vari- ous algorithms, it would not harm the main body of our pro- posed algorithm. Additionally, we can assume a malfunction- ing node in some general graph. In the combination step, each node can determine the distance between its own estimation and its neighbors' shared estimations. Based on these dis- tances, it can assign a proper weight to each one. Hence it can eliminate detected malfunctioning nodes if it seems neces- sary. It can also put some sharing restrictions on the detected impaired nodes to isolate them from following the righteous agents. It can start dissembling and after being trusted, do its job (just as an example of smart simple hacking). The pro- posed algorithm is shown as in Alg.1. Based on the main tar- for t = 1, . . . , T do for i ∈ {1, . . . , N} do Adaptation: xi(t) = g(xi(t − 1), θi(t)) Combination: xi(t) = h(xj(t)j ∈ Ni) end end Algorithm 1: The Algorithm of Malfunctioning Detection: g(.) and h(.) are respectively adaption and combination op- erators; T and N are the number of iterations and the total number of nodes; xi(t), xi(t), θi(t) and Ni are the estimate of the ith node, its temporary version, its insight from the sharing environment at time t and the set of its Neighbors. get algorithm, the distance calculating function, the weighting method, and the eliminating strategy can be properly defined. 3. DISTRIBUTED ESTIMATION In this section, we illustrate the capability of our proposed al- gorithm for detecting noisy estimator in a distributed estima- tion method. We assume well-known ATC strategy[18]. The main algorithm, with the respect to Alg.1, can be summarized as follows[18] (cid:40) di(t) ← aT i,txopt + νi(t) ei(t) ← di(t) − aT i,txi(t − 1) xi(t) = xi(t − 1) − µi,tei(t)ai,t g(xi(t − 1), θi(t)) = (cid:40) h(xj(t)j ∈ Ni) = αi,j(t) ← ( ∀j ∈ Ni : ci,j(t) ← xi(t) =(cid:80) (cid:107)xi(t)−xj (t)(cid:107)2 )e ζ exp(αi,j (t)) (cid:80) cl,iexp(αi,k(t)) k∈Ni ci,lxl(t) l∈Ni where for the ith node at time instance t. It is an implementa- ai,t νi(t) µi,t ζ measurement vector measurement noise adaptation rate normalization coefficient e determining decision type description variance: σ2 i step-size related to σi uniform: e = 0 hard: e → ∞ soft: e ∈ (0,∞) tion of diffusion LMS algorithm which has given an outstand- ing performance[18]. It was mentioned that in each iteration, we can have an adaptation step and a combination step. How- ever, we should be cautious, since with low value of adapta- tion rate, possibly all of the estimators in each neighborhood have near estimations. Hence, simply feeding the distance calculator with their values can mislead the total procedure. In order to simulate the proposed algorithm, we assume a graph having N nodes with s as an existence probability of a link between each pair of nodes (ρ). The target signal has a length of L and is generated with normal distribution (with given sparsity of nonzero components: s). In fact, we just extend the adaptation time (Ta). In order to resolve this is- sue, each node starts its own simple adaptation step multiple times. After an agreed adaptation time slot, sharing method is run. As shown in Fig.1, the heavily-noisy estimator is dis- lodged from the combination step. In the both cases of dense and sparse graph, improvement is clear. Since the noisy one still has access to the intact estimations, it can follow the es- timation's trend, as the fluctuations can be seen in the Mean Square Deviation (MSD) curves. By tuning the weighting pa- rameters (ζ and m), it can be prohibited. 4. MULTI-AGENT RL In reinforcement learning scenario we will rely on some other mathematical foundations to be helped with, which in the fol- lowing paragraphs it will be explored in more details. In this (a) ρ = 0.1, σnoise = 0.04, N = 50, ζ = 0.015, e = 2. (b) Inact nodes connected to an im- paired node with uniform weights, ρ = 1, σnoise = 0.04, N = 10, e = 0. (c) ρ = 0.2, σnoise = 0.4, N = 100, ζ = 0.05, e = 8. (d) ρ = 1, σnoise = 0.04, N = 10, ζ = 0.015, e = 8. Fig. 1: Distributed Estimation Performance (ATC scenario), MSD vs #iteration; L = 100, s = 0.5, µ = 0.001, Ta = 10, σimpaired = 10m × σnoise, #simulation = 1000. case, exploring the search space while exploiting on the best strategy which has been found so far, will give the so-called agent the ability to adapt to its environment [19]. We will consider the classic RL framework in which an agent is in- teracting with a finite state Markovian environment on a dis- crete time scale [20]. Our final goal will be maximizing the expected of the utility function Q over all possible policies, considering different R(s, a) rewards for each pair of state- actions [21]. Bellman's equation describes the following in terms of both, the expected reward and expected outcome of the random transition[20]. The notation of π and γ allude respectively to the certain policy and the discount factor[19]. Based on the optimality equation(1), several algorithms have been proposed[20], which in this setting we are going to focus on one of the well-known methods, Q-Learning [19, 20], as shown by 2 = E[R(s, a)] + γEP [ max ∗ (cid:48) Q (s Qnew(st, at) ← (1 − α)Q(st, at) . . . (cid:48) (cid:48) t+1, a + α(R(st, at) + γ max ∗ {a(cid:48)∈A} Q {a(cid:48)∈A} Q(S )) (cid:48) )] , a (1) (2) In the case of finite state-action pairs we use the tool of Q- table for our convenience. Q-table is a simple representation of the Q-values in each pair of state-action. Since, in the be- ginning of the process our initialized Q-table acts randomly, our total regret [22] diverges linearly from its optimal state. Thus, to overcome this issue, another modification is to use an -decay exploration rate [22]. In this case, our initial ex- ploration rate will be reduced through the process of learning.  = min + (max − min) × e−#step×DecayRate In a multi-agent setting, we rely on multiple agents for com- pleting a given task. All of the above definitions could be extended for larger number of agents. There is just an extra point that here agents will interact with one another. Con- sidering the case of fully-connected network, all agents will participate for filling the Q-table. Passing the Q-values, will give them an access to their local neighborhoods. As a result, we expect to converge faster than before. In a simple case, each agent would fill its own Q-table with averaging on all observations they have been given. Finally, after a large num- ber of episodes we may expect to see that their Q-tables have converged to a single Q-table, which could be used for all of them afterwards. 4.1. Problem and Model definition: Given the uncertainties of the real-world problems we should always be prepared for some obstacles. For instance, in the case of multi-agent learning, one could mention the broken state of an agent as a critical situation. Since they are all transferring information and using those information for their actions, a major turbulence could be misleading. So, we can think of some adjustments applied to the prior methods. Here we are going to detect those broken agents and rooting them out from our decision-making, by a sort of swarm-intelligence algorithm. In this way of analysis, agents themselves will decide on that which agents are broken. Consider an arbi- trary agent i and its neighborhood as Ni, in the case of fully- connected network. Then for each j ∈ Ni, in addition to what their given observation is, we would also get their fakeness in- dices as well. Finally, agent i will decide based on its given information that which agent(s) is (are) malfunctioning. Here, we just consider the simple case of one broken agent. How- ever, the results could be generalized to more complex situa- tions. Furthermore, we would also assume that our algorithm will converge which, results in finding the correct target. (cid:40) f 0 i = fj (cid:44) Fakeness labels from nearby agents k = arg max{j∈Ni}(Qj − Qi) ; Qj − Qi > 0 N one ; o.w Then we do the majority vote. So, first for each agent in the system s, we count its appearance as a broken (fake) agent. Finally, we decide whether our maximum appearance should be reported, based on comparing its votes against the total number of votes. ∀n ∈ S; ni = 1(n=f 0 i ) + 1{n=fj} (cid:88) j∈Ni (cid:40) fi = k = arg max{n∈S}(ni) ; ki > N one ; o.w (cid:80) j∈Ni 2 1 Again, due to the randomness being involved in the beginning of the learning, we do not adjust our weights right after a sin- gle step. Instead, we wait for 10 steps as an example and then decide based on those 10 steps that which agents were behav- ing badly. This would help us to avoid random decisions and to reduce some weights unexpectedly. In order to average our observations we would also normalize them by reducing the weight of the broken agent linearly by the factor of 0 < λ < 1 It should be kept in mind that we consider the agent itself as one of its neighbors as well. g(Qm−1 i , θi(t)) = r ← R(st, at) + γ max{a(cid:48)∈A} Qm−1 i (st, at) = (1 − α)Qm−1 Qm i i (st, at) + αr (st+1, a(cid:48)) (cid:40) (cid:40) h(Qm i (st, at)j ∈ Ni) = fi ← [f akeness voting] 1 ; if: fi ∈ Ni ci,fi (m) ← 1−λ(cid:80) −1+(cid:80) j∈Ni (cid:80) i (st, at) =(cid:80) j∈Ni j∈Ni l∈Ni ci,j (m) ← 1+ Qm λ 1 1 ; ∀fi ∈ Ni \ fi j (st, at) ci,l(m) Qm For comparing our results, we have used the OpenAI gym package in python 3.7.2. The SnowFlake environment, with 8 × 8 grid is our main basis. We have also manipulated the environment for putting different agents in different starting points. As it could be seen from the table below, our im- paired diagnosis algorithm outperforms the classical approach in which we ignore the impaired agents. It should be noted that here we have the simple case of one broken agent, which is detected correctly. We also consider a task to be done when- ever there is an agent which has made it to the target point. Parameter Number of episodes Maximum number of steps Learning Rate Discount Factor Minimum Exploration Rate Maximum Exploration Rate Exploration Decay Rate Number of Agents λ success rate (with detection) success rate (without detection) case 1 1e6 1000 0.8 0.97 0.001 1 0.001 3 0.7 %84 %53 case 2 1e5 10000 0.8 0.97 0.001 1 0.001 3 0.9 %78 %59 case 3 1e6 1000 0.7 0.97 0.001 1 0.001 3 0.7 %71 %55 5. CONCLUSION By emphasizing on the role of non-stationarity in an interact- ing network, we introduced a novel approach for analyzing it. The main focus of our analysis was also on the problem of error diagnosis and canceling certain interferences caused by damaged agents in network. We also applied our proposed algorithm to two different frameworks with the same issue of an impaired node. In both cases of distributed estimation and multi-agent RL, by detecting and reducing the effect of the impaired node, we surpassed our prior performance. 6. REFERENCES [1] Federico S Cattivelli and Ali H Sayed, "Diffusion lms strategies for distributed estimation," IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1035 -- 1048, 2009. [2] Hadi Zayyani, Mehdi Korki, and Farrokh Marvasti, "A distributed 1-bit compressed sensing algorithm robust to impulsive noise," IEEE Communications Letters, vol. 20, no. 6, pp. 1132 -- 1135, 2016. [3] Sijia Liu, Sundeep Prabhakar Chepuri, Makan Fardad, Engin Mas¸azade, Geert Leus, and Pramod K Varshney, "Sensor selection for estimation with correlated mea- surement noise," IEEE Transactions on Signal Process- ing, vol. 64, no. 13, pp. 3509 -- 3522, 2016. [4] Xiaohua Ge, Fuwen Yang, and Qing-Long Han, "Dis- tributed networked control systems: A brief overview," Information Sciences, vol. 380, pp. 117 -- 131, 2017. [5] Dan Zhang, Sing Kiong Nguang, and Li Yu, "Dis- tributed control of large-scale networked control sys- tems with communication constraints and topology switching," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 47, no. 7, pp. 1746 -- 1757, 2017. [6] Aboul Ella Hassanien and Eid Emary, Swarm intelli- gence: principles, advances, and applications, CRC Press, 2018. Proceedings of the IEEE, vol. 106, no. 5, pp. 808 -- 828, 2018. [12] Nathanael Perraudin and Pierre Vandergheynst, "Sta- tionary signal processing on graphs," IEEE Transactions on Signal Processing, vol. 65, no. 13, pp. 3462 -- 3477, 2017. [13] Jie Chen, C´edric Richard, and Ali H Sayed, "Diffusion lms over multitask networks," IEEE Transactions on Signal Processing, vol. 63, no. 11, pp. 2733 -- 2748, 2015. [14] Reza Abdolee and Benoit Champagne, "Diffusion lms strategies in sensor networks with noisy input data," IEEE/ACM Transactions on Networking (TON), vol. 24, no. 1, pp. 3 -- 14, 2016. [15] Elaheh Mohammadi, Amin Gohari, and Farokh Mar- vasti, "A square root sampling law for signal recovery," IEEE Signal Processing Letters, vol. 26, no. 4, pp. 562 -- 566, 2019. [16] Flavio Zabini, Alex Calisti, Davide Dardari, and Andrea Conti, "Random sampling via sensor networks: Estima- tion accuracy vs. energy consumption," in 2016 24th European Signal Processing Conference (EUSIPCO). IEEE, 2016, pp. 130 -- 134. [17] Firdaus E Udwadia, "Methodology for optimum sensor locations for parameter identification in dynamic sys- tems," Journal of Engineering Mechanics, vol. 120, no. 2, pp. 368 -- 390, 1994. [7] Christian Blum and Gross Roderich, "Swarm intelli- gence in optimization and robotics," in Springer hand- book of computational intelligence, pp. 1291 -- 1309. Springer, 2015. [18] Sheng-Yuan Tu and Ali H Sayed, "Diffusion strategies outperform consensus strategies for distributed estima- tion over adaptive networks," IEEE Transactions on Sig- nal Processing, vol. 60, no. 12, pp. 6217 -- 6234, 2012. [8] Jakob N Foerster, Gregory Farquhar, Triantafyllos Afouras, Nantas Nardelli, and Shimon Whiteson, "Counterfactual multi-agent policy gradients," in Thirty-Second AAAI Conference on Artificial Intelli- gence, 2018. [9] Ryan Lowe, Yi Wu, Aviv Tamar, Jean Harb, Ope- nAI Pieter Abbeel, and Igor Mordatch, "Multi-agent actor-critic for mixed cooperative-competitive environ- ments," in Advances in Neural Information Processing Systems, 2017, pp. 6379 -- 6390. [10] Siheng Chen, Rohan Varma, Aliaksei Sandryhaila, and Jelena Kovacevi´c, "Discrete signal processing on graphs: Sampling theory," IEEE transactions on signal processing, vol. 63, no. 24, pp. 6510 -- 6523, 2015. [11] Antonio Ortega, Pascal Frossard, Jelena Kovacevi´c, Jos´e MF Moura, and Pierre Vandergheynst, "Graph sig- nal processing: Overview, challenges, and applications," [19] Richard S Sutton and Andrew G Barto, Reinforcement learning: An introduction, MIT press, 2018. [20] Marc G Bellemare, Will Dabney, and R´emi Munos, "A distributional perspective on reinforcement learning," in Proceedings of the 34th International Conference on Machine Learning-Volume 70. JMLR. org, 2017, pp. 449 -- 458. [21] Susanne Still and Doina Precup, "An information- theoretic approach to curiosity-driven reinforcement learning," Theory in Biosciences, vol. 131, no. 3, pp. 139 -- 148, 2012. [22] Ian Osband, Benjamin Van Roy, Daniel Russo, and Zheng Wen, "Deep exploration via randomized value functions," arXiv preprint, arXiv:1703.07608, 2017.
1310.3875
1
1310
2013-10-14T22:50:53
Cucker-Smale flocking with alternating leaders
[ "cs.MA" ]
We study the emergent flocking behavior in a group of Cucker-Smale flocking agents under rooted leadership with alternating leaders. It is well known that the network topology regulates the emergent behaviors of flocks. All existing results on the Cucker-Smale model with leader-follower topologies assume a fixed leader during temporal evolution process. The rooted leadership is the most general topology taking a leadership. Motivated by collective behaviors observed in the flocks of birds, swarming fishes and potential engineering applications, we consider the rooted leadership with alternating leaders; that is, at each time slice there is a leader but it can be switched among the agents from time to time. We will provide several sufficient conditions leading to the asymptotic flocking among the Cucker-Smale agents under rooted leadership with alternating leaders.
cs.MA
cs
Cucker-Smale flocking with alternating leaders Zhuchun Li and Seung-Yeal Ha 1 Abstract We study the emergent flocking behavior in a group of Cucker-Smale flocking agents under rooted leadership with alternating leaders. It is well known that the network topology regulates the emergent behaviors of flocks. All existing results on the Cucker-Smale model with leader-follower topologies assume a fixed leader during temporal evolution process. The rooted leadership is the most general topology taking a leadership. Motivated by collective behaviors observed in the flocks of birds, swarming fishes and potential engineering applications, we consider the rooted leadership with alternating leaders; that is, at each time slice there is a leader but it can be switched among the agents from time to time. We will provide several sufficient conditions leading to the asymptotic flocking among the Cucker-Smale agents under rooted leadership with alternating leaders. Cucker-Smale agent, alternating leaders, rooted leadership, flocking Index Terms I. INTRODUCTION The purpose of this paper is to study the emergent flocking phenomenon to the generalized Cucker- Smale (C-S) model with alternating leaders. Roughly speaking, the terminology "flocking" represents the phenomena that autonomous agents, using only limited environmental information, organize into an ordered motion, e.g., flocking of birds, herds of cattle, etc. These collective motions have gained increasing interest from the research communities in biology, ecology, sociology and engineering [1], [13], [20], [23], [27], [29], [30] due to their various applications in sensor networks, formation of robots and spacecrafts, financial markets and opinion formation in social networks. In [11], [12], Cucker and Smale proposed a nonlinear second-order model to study the emergent behavior of flocks. Let xi, vi ∈ Rd be the position and velocity of the i-th C-S agent, and ψij ≥ 0 be interaction weight between j and i-th agents. Then, the discrete-time C-S model reads as xi(t + 1) = xi(t) + hvi(t), i = 1, 2, . . . , N, N vi(t + 1) = vi(t) + h ψij(x(t)) [vj(t) − vi(t)] , (1) Xj=1 1 where h is a time-step. For (1), the "asymptotic flocking" means ψij(x(t)) = (1 + xi(t) − xj(t)2)β , β ≥ 0, sup t∈N xi(t) − xj(t) < ∞, lim t→∞ (vi(t) − vj(t)) = 0, ∀ i 6= j. The study of flocking behavior of multi-agent system based on mathematical models dates back to [20], [30], even before Cucker and Smale. However, the significance of C-S model lies on the solvability of the model and phase-transition like behavior from the unconditional flocking to conditional flocking, as 2. the decay exponent β increases from zero to some number larger than 1 The particular choice of weight function ψij in (1) is a crucial ingredient which makes this model attractive. We note that in the original C-S model (1), the agents are interacting under the all-to-all Z. Li is with the Department of Mathematics, Harbin Institute of Technology, Harbin 150001, China (e-mail: [email protected]). S.-Y. Ha is with the Department of Mathematical Sciences, Seoul National University, Seoul 151-747, Korea (e-mail: [email protected]). This work was carried out when Z. Li visited Seoul National University; he appreciated the support from PARC-SNU. 2 distance depending couplings ψij = ψji > 0 for all i 6= j. Later, Cucker-Smale's results were extended in several directions, e.g., stochastic noise effects [3], [10], [16], collision avoidance [2], [8], steering toward preferred directions [9], bonding forces [26], and mean-field limit [6], [18], [19]. In particular, an unexpected application was proposed by Perea, G´omez and Elosegui [27] who suggested to use the C-S flocking mechanism [11] in the formation of spacecrafts for the Darwin space mission. Recently, the C-S flocking mechanism was also applied to the modeling of emergent cultural classes in sociology and the stochastic volatility in financial markets [1], [15], [21]. In this paper, we consider the Cucker-Smale flocking under a switching of leadership topology with alternating leaders. It is well known that the interaction topology is an important component to understand the dynamics of multi-particle systems and vice versa. Biological complex systems are ubiquitous in our nature and indeed take various interaction topologies. The first work in relation with the C-S model other than all-to-all topology is due to J. Shen, who introduced the C-S model under hierarchical leadership [28]. A more general topology with leadership including hierarchical one was introduced by Li and Xue in [25], namely, the rooted leadership. Unfortunately, the analysis given in [25] cannot be applied to the continuous-time C-S model in a general setting. The continuous-time C-S model with a rooted leadership was studied in the framework of fast-slow dynamical systems in [17] for some restricted situation. Recently, a topology with joint rooted leadership was also considered in [24], in which a "joint" connectivity is imposed only along some time interval, instead of every time slices. Note that in previous works [25], [24] involving interaction topologies with leadership, the leader agent is assumed to be fixed in temporal evolution of flocks. This is not realistic. We can often observe that the leaders in migrating flocks can be changed during their migration. For example, as the large flocks of birds make a long journey from continent to continent, the leader birds located in the front of the flock endure larger resistance from the neighboring airs, e.g., wind. So leaders have to spend more energy than other followers. To save the energy of leader birds, leaders change alternatively. Of course, we can also find alternating leaders in our human social systems, for example, the periodic election of political leaders. Motivated by these situations, we study the asymptotic flocking behavior of the C-S model with alternating leaders. For the flocking analysis of the C-S model, most existing studies assume all-to-all and symmetric couplings so that the conservation of momentum is guaranteed, which is crucial in the energy estimates [11], [12], [18]. In contrast, when the interaction topology is not symmetric, there is no general systematic approach for flocking estimate. The induction method is applied to hierarchical leadership [7], [28], which relies on the triangularity of the adjacency matrix. Another useful tool, the self-bounding argument developed by Cucker-Smale in [11], [12], can be applied to different topologies; however, it requires a flocking estimate that relies on the topologies. For all-to-all coupling, the estimate is made on the matrix 2-norm through the spectrum of symmetric graph Laplacian. For rooted leadership, the authors in [25], [24] employed the (sp) matrices [31], [32] to study the infinity norm of a reduced Laplacian. Note that for all these special cases, the asymptotic velocity for flocking is a priori known, either the mean value of the initial state or just that of the leader. Thus, we can study the dynamics of newly defined variables, i.e., the fluctuations around the average velocity, or the states relative to the fixed leader, which can be bounded, to study the flocking behavior. However, in the case of alternating leaders, we do not have the accurate information on the asymptotic velocity of the flock and the dynamics of referenced variables (see (5)) cannot be given by nonnegative matrices as in [25], [24]. To overcome this difficulty, we consider the combined dynamics of the original system and the reference system. We employ the estimates in [4], [5] for the first-order consensus problem to find a priori estimate for the original system. From this, we can estimate the evolution of referenced velocity to support the self-bounding argument. The rest of this paper is organized as follows. In Section 2, we describe our model and present a consensus estimate that is useful in this work. In Section 3, we provide the flocking estimates for the discrete-time C-S model under rooted leadership with alternating leaders. In Section 4, we present some numerical simulations. Finally, Section 5 is devoted to the summary of this paper. Notation: Given x ∈ RN, we use the notations x∞ and x to denote the infinity norm (maximum norm) and 2-norm (Euclidean norm) of the vector respectively. For a N × N matrix A ∈ RN×N, we use 3 to denote the infinity norm, that is, the maximum absolute row sum of A, and for two N × N kAk∞ matrices A = (aij) and B = (bij), we use A◦ B to denote the element-wise product, i.e., A◦ B = (aijbij). II. PRELIMINARIES In this section we introduce the C-S flocking model under rooted leadership with alternating leaders. A useful estimate for the "flocking" matrix will be presented as well. A. Flocks with alternating leaders In this subsection, we present a brief description of the C-S flocking model under rooted leadership with alternating leaders. Consider a group of agents {1, 2, . . . , N}. For the description of interaction topology, we use graph the- ory [14] as follows. A digraph G = (V,E) (without self-loops) representing N particles with interactions, is defined by V := {1, 2, . . . , N}, E ⊆ V × V \ {(i, i) : i ∈ V}. We say (j, i) ∈ E if and only if j is a neighbor of i, i.e., j influences i. As an information flow chart, we may write j → i if and only if (j, i) ∈ E. A directed path from j to i (of length n + 1) comprises a sequence of distinct arcs of the form j → k1 → k2 → · · · → kn → i. On the other hand, once the directed neighbor graph G = (V,E) is chosen, the associated adjacency matrix, denoted by χ(G) = (χij), is given by χij =(cid:26) 1, if (j, i) ∈ E, if (j, i) /∈ E. Then, the C-S model on the digraph graph G is given by (1) with the second equation replaced by 0, vi(t + 1) = vi(t) + h χijψij(x(t)) [vj(t) − vi(t)] . N Xj=1 Xj=1 1 Thus, there is an interaction from j to i with strength ψij(x(t)) as long as it exists. In order to take the interaction weight ψij(x) into account, we refer to the matrix χ ◦ Ψx := (cid:0)χijψij(x(t))(cid:1) as the weighted adjacency matrix of the C-S system on the digraph G. Below, we use the symbol I to denote a finite set indexing all admissible digraphs Gp = (Vp,Ep) and let σ : N → I be a switching signal. At each time point t ∈ N, the system is registered on an admissible graph Gσ(t), and thus has a weighted adjacency matrix given by χσ(t) ◦ Ψx. In this setting, we write the system as the C-S system undergoing switching of the neighbor graphs with a switching signal σ: xi(t + 1) = xi(t) + hvi(t), i = 0, 1, . . . , N, N vi(t + 1) = vi(t) + h χσ(t) ij ψij(x(t)) [vj(t) − vi(t)] , (2) ψij(x(t)) = (1 + xi(t) − xj(t)2)β . We now introduce the definition of C-S model under rooted leadership with alternating leaders. For this we first present the rooted leadership [25]. Definition 2.1: 1) The system (2) is under rooted leadership at time t, if for the digraph Gσ(t), there exists a unique vertex, say rt ∈ V, such that the vertex rt does not have an incoming path from others, but any other vertex in V has a directed path from rt. The vertex rt represents the leader in the flock. 2) The system (2) is under rooted leadership with alternating leaders, if the system (2) is under rooted leadership at each time slice, but the leader rt is not fixed for all time. Note that the leader can be changed from time to time; thus, the asymptotic velocity is not a priori known, even if the flocking can be achieved. 4 B. Consensus estimates In this subsection, we present a convergence estimate given in [4] for the first-order consensus problem. Given a sequence of stochastic matrices (also known as Markov matrices [22]) F1, F2,· · · ∈ RN×N, for consensus we expect that the product Ft · · · F2F1 converges to a rank one matrix, i.e., has the same row vectors. For a single stochastic matrix F , under some connectivity condition of its associated graph, the matrix iteration F k converges to the rank one matrix 1π with π being the left-eigenvector of F , i.e., πF = π. To deal with the case of time-dependent state transition matrices, we introduce some notations following [4]. Let F be a stochastic matrix and we denote by ⌊F⌋ the row vector whose jth element is the smallest element of the jth column of S. Let [F ] = F − 1⌊F⌋, then we have k[F ]k∞ = 1 − ⌊F⌋1, where 1 = (1, 1, . . . , 1)T. In some sense, [F ] measures how much the matrix F is different with a rank one matrix. It is obvious that a product of stochastic matrices must be a stochastic matrix. For an infinite sequence of stochastic matrices F1, F2, . . . , the limit ⌊· · · Ft · · · F2F1⌋ := lim t→∞⌊Ft · · · F2F1⌋ always exists [4], even if the product Ft · · · F2F1 itself does not have a limit. In order to form a consensus, we expect the product Ft . . . F2F1 to converge to a rank one stochastic matrix, i.e., a matrix of the form 1c. If this is true, then the limit must be 1⌊· · · Ft · · · F2F1⌋. In the following, we will say that the matrix product Ft . . . F2F1 converges to 1⌊· · · Ft · · · F2F1⌋ exponentially fast at a rate no slower than λ if there exist nonnegative constants b and λ < 1 such that (3) We write A ≥ B if A − B is a nonnegative matrix. The following result gives a sufficient condition to the exponential convergence. (cid:13)(cid:13)Ft · · · F2F1 − 1⌊· · · Ft · · · F2F1⌋(cid:13)(cid:13)∞ ≤ bλt, t ≥ 1. Proposition 2.1: [4] (1) For any pair of stochastic matrices F1 and F2, we have (2) Let b and λ < 1 be nonnegative constants. Suppose that F1, F2, . . . is an infinity sequence of stochastic matrices with [F2F1] ≤ [F2][F1]; k[Ft · · · F2F1]k∞ ≤ bλt, t ≥ 0. Then, the matrix product Ft . . . F2F1 converges to 1⌊· · · Ft · · · F2F1⌋ exponentially fast at a rate no slower than λ. Therefore, if each of the matrices in the sequence F1, F2, . . . satisfies k[Fi]k∞ ≤ λ, then Ft . . . F2F1 does converge to 1⌊· · · Ft · · · F2F1⌋ exponentially. Since k[F ]k∞ = 1 − ⌊F⌋1, k[F ]k∞ < 1 if and only if the matrix ⌊F⌋ has at least one positive element, i.e., the matrix F has at least one nonzero column. For a stochastic matrix F = (Fij) ∈ RN×N, we define the associated digraph as G = (V,E) with V = {1, 2, . . . , N} and E = {(j, i) : Fij > 0}. We call a graph G is a strongly rooted graph if there exists some vertex j such that (j, i) ∈ E for all i 6= j. For such a j, we say that it is a strong root of the graph and the graph is strongly rooted at j. In what follows, we also say G is a rooted graph if there exists a vertex which has a path to any other agent; such a vertex is called the root of the graph. Then we arrive at the following result. Lemma 2.1: [4] The digraph associated to a stochastic matrix F is strongly rooted if and only if k[F ]k∞ < 1. We next introduce the composition of digraphs. By the composition of digraphs Gp with Gq, denoted by Gq ◦ Gp, we mean the digraph with the vertex set V and arc set defined in such a way so that (i, j) is an arc of the composition just in case there is a vertex k such that (i, k) is an arc of Gp and (k, j) is an arc of Gq. Denote their associated flocking matrices by Fp and Fq respectively. Then, we see that the flocking matrix associated to the digraph Gq ◦ Gp is exactly the matrix product FqFp. Proposition 2.2: [4] Let Gσ(1),Gσ(2), . . . , be a sequence of rooted graph, then for any t1 ∈ N, the graph Gσ(t1+(N−1)2) ◦ · · · ◦ Gσ(t1+2) ◦ Gσ(t1+1) is a strongly rooted graph. Based on this result, we can obtain a strongly rooted graph from the composition of rooted leadership with alternating leaders. In this section, we introduce the C-S flocking matrix and a reference system to study the C-S model with alternating leaders. III. FLOCKING ANALYSIS A. A reference system and the flocking matrix 5 We consider a group of particles {1, 2, . . . , N} whose dynamics is governed by (2). Let x = (x1, x2, . . . , xN )⊤ and v = (v1, v2, . . . , vN )⊤ ∈ (R3)N be the position and velocity vector of the flock, respectively. In order to simplify the notations, for a given solution {(x(t), v(t))} to system (2) under a switching signal σ, we write N ψij(t) := ψij(x(t)), di(t) := χσ(t) ij ψij(t). (4) Xj=1,j6=i In order to use a self-bounding argument, we introduce a reference system for the N-flocks. We use the last agent as the reference and set x := (x1, . . . , xN−1)⊤ = (x1 − xN , . . . , xN−1 − xN )⊤, v := (v1, . . . , vN−1)⊤ = (v1 − vN , . . . , vN−1 − vN )⊤. (5) It is obvious that the asymptotic flocking behavior is equivalent to the boundedness of x together with the zero convergence of v. If we set xN = 0 and vN = 0, then xi − xj2 = xi − xj2 ≤ 2(xi2 + xj2) ≤ 2x2, This means that the C-S communication weights satisfy 1 ≤ i, j ≤ N. 1 ψij(t) = (1 + xi(t) − xj(t)2)β ≥ Note that the dynamics of x(t) and v(t) are governed by 1 (1 + 2x(t)2)β . x(t + 1) = x(t) + hv(t), where the matrix Pσ(t) ∈ R(N−1)×(N−1) is given by v(t + 1) = Pσ(t)v(t), (Pσ(t))ij =( 1 − hdi − hχσ(t) hχσ(t) N i ψN i(t), ij ψij(t) − hχσ(t) N j ψN j(t), i = j, i 6= j, (6) (7) where i, j = 1, 2, . . . , N − 1. If the flock has a fixed leader, say N, then χσ(t) N j ≡ 0 for all j 6= N, and thus the matrix Pσ(t) is a nonnegative matrix provided a sufficiently small h. However, if the leader agent changes from time to time, we cannot expect the matrix Pσ(t) to be always a nonnegative matrix. Therefore, the approach in [25], [24] cannot be applied in this case. To carry out a flocking estimate, we will not use the explicit difference equation of v(t), instead we derive a direct estimate of v(t) through v(t). This is the key idea in this study apart from the previous works. To estimate v(t), we derive a compact form from the system (2) as follows: x(t + 1) = x(t) + hv(t), v(t + 1) = (Id − hLσ(t))v(t) =: Fσ(t)v(t), (8) where Lσ(t) ∈ RN×N is the weighted Laplacian of digraph Gσ(t), that is, · · · −χσ(t) 1N ψ1N (t) · · · −χσ(t) 2N ψ2N (t) ... · · · dN (t) · · · d1(t) 12 ψ12(t) −χσ(t) 21 ψ21(t) d2(t) · · · · · · −χσ(t) N 1 ψN 1(t) −χσ(t) N 2 ψN 2(t) Lσ(t) =  −χσ(t)   The matrix Fσ(t) := Id − hLσ(t) is called the (C-S) flocking matrix at time t associated to the neighbor graph Gσ(t). If we choose a small h > 0 such that all diagonal entries of Fσ(t) are nonnegative, then Fσ(t) is a stochastic matrix, i.e., a nonnegative matrix with each row sum being 1. 6 . B. Basic estimates In this subsection we present an estimate of v(t) through v(t). We first concentrate on the flocking matrix Fσ(t) that determines the dynamics of v(t). To do this, we will employ the estimates in [4] (see Subsection II-B). Note that for flocking under rooted leadership (see Definition 2.1), the neighbor graph is a rooted graph with the leader agent acting as the root. Thus, Proposition 2.2 and Lemma 2.1 imply that the product of (N − 1)2 flocking matrices must satisfy (cid:13)(cid:13)[Fσ(t1+(N−1)2−1) · · · Fσ(t1+1)Fσ(t1)](cid:13)(cid:13)∞ < 1. Inspired by this fact, we will present an estimate for the product of flocking matrices which can be applied to the analysis of the second-order C-S model. We first estimate the convergence of Fσ(t) · · · Fσ(1)Fσ(0) by Proposition 2.1. Proposition 3.1: Suppose that {(x(t), v(t))}t∈N is a solution of C-S model (2) with alternating leaders. (9) Assume and Then, we have x(t) ≤ B, t ∈ N, h < 1 N + 1 . (N −1)2(cid:3) , (cid:13)(cid:13)Fσ(t) · · · Fσ(1)Fσ(0) − 1⌊· · · Fσ(t) · · · Fσ(1)Fσ(0)⌋(cid:13)(cid:13)∞ ≤(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) t+1 (1+2B2)β . 1 where R = Proof: According to (6) and (9), for any t ≥ 0, we have 1 (1 + 2B2)β ≤ ψij(t) ≤ 1, 1 ≤ i, j ≤ N. Moreover, by the assumption (10), we have (Fσ(t))ii = 1 − hdi(t) ≥ 1 N + 1 > h (1 + 2B2)β , 1 ≤ i ≤ N. From (12) and (13) we see that under the assumptions (9) and (10), Fσ(t) is a stochastic matrix with nonzero entries not less than hR := (1+2B2)β . Consequently, all the nonzero elements of the matrix product Fσ(t) · · · Fσ(1)Fσ(0) must be not less than (hR)t+1. Note that if the system (2) is under rooted leadership at time t, then the neighbor graph Gσ(t) is a rooted graph with the leader acting as the root. We recall Proposition 2.2 to see that the composition of neighbor graph along a time interval of length h (10) (11) (12) (13) (N − 1)2 must be a strongly rooted graph. By Lemma 2.1, this means that any (N − 1)2-product of flocking matrices satisfies 7 or equivalently, (cid:13)(cid:13)[Fσ(t1+(N−1)2−1) · · · Fσ(t1+1)Fσ(t1)](cid:13)(cid:13)∞ 1 − ⌊Fσ(t1+(N−1)2−1) · · · Fσ(t1+1)Fσ(t1)⌋1 < 1. < 1, Thus, the matrix Fσ(t1+(N−1)2−1) · · · Fσ(t1+1)Fσ(t1) has at least one nonzero column. Because all of the nonzero elements of Fσ(t1+(N−1)2−1) · · · Fσ(t1+1)Fσ(t1) are not less than (hR)(N−1)2, we find that i.e., This implies that for all t ∈ N, 1 − ⌊Fσ(t1+(N−1)2−1) · · · Fσ(t1+1)Fσ(t1)⌋1 ≤ 1 − (hR)(N−1)2 (cid:13)(cid:13)[Fσ(t1+(N−1)2−1) · · · Fσ(t1+1)Fσ(t1)](cid:13)(cid:13)∞ ≤ 1 − (hR)(N−1)2 kFσ(t) · · · Fσ(1)Fσ(0)k∞ ≤(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) t+1 (N −1)2(cid:3) . . , (14) (15) We now combine (15) and Proposition 2.1 to obtain (11). Next, we use Proposition 3.1 to estimate the evolution of v(t). Proposition 3.2: Suppose {(x(t), v(t))}t∈N is a solution of C-S model (2) with alternating leaders. If (9) and (10) hold, then for the referenced velocity v(t) we have Proof: For the simplicity of notation, we denote the asymptotic velocity alignment state for the v(t)∞ ≤ 2(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) t+1 (N −1)2(cid:3) v(0)∞. (16) solution {(x(t), v(t))} as Then, it follows from (11) that we have v∞ = 1⌊· · · Fσ(t) · · · Fσ(1)Fσ(0)⌋v(0). v(t) − v∞∞ =(cid:12)(cid:12)Fσ(t) · · · Fσ(1)Fσ(0)v(0) − 1⌊· · · Fσ(t) · · · Fσ(1)Fσ(0)⌋v(0)(cid:12)(cid:12)∞ (N −1)2(cid:3) v(0)∞. Due to the definition of referenced variables (x(t), v(t)), we easily find ≤(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) t+1 v(t)∞ ≤(cid:12)(cid:12)(cid:0)v(t) − v∞(cid:1) −(cid:0)vN (t) − v∞(cid:1)(cid:12)(cid:12)∞ (N −1)2(cid:3) v(0)∞. Here, we use vN (t) itself to denote the N-duplication of vN (t) ∈ R3. ≤ 2(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) t+1 C. Flocking behavior 8 To carry out the flocking analysis, we use the spectral norm (or 2-norm) of vectors and matrices. However, the previous estimates for v(t) is given by the infinity norm. Due to the equivalence of norms in finite-dimensional space, there exists a constant λ ≥ 1, such that for all v ∈ (R3)N−1, (17) where · denotes the 2-norm of vector. Before we present the main result, we quote an elementary lemma from [11] without the proof. Consider the following algebraic equation: v∞ ≤ v ≤ λv∞, F (z) := zr − c1zs − c2 = 0. (18) Lemma 3.1: [11] Suppose that the coefficients and exponents in F satisfy c1, c2 > 0 and r > s > 0. Then the equation (18) has a unique positive zero z∗ satisfying z∗ ≤ max{(2c1) 1 r−s , (2c2) 1 r}, and F (z) ≤ 0 for 0 ≤ z ≤ z∗. We are now ready to present our main result on the Cucker-Smale flocking with alternating leaders. Theorem 3.1: Let the discrete-time Cucker-Smale model (2) be under rooted leadership with alternating leaders. Assume that the time step h fulfills (10), and one of the following three hypothesis holds: 1) s < 1; 2) s = 1 and 3) s > 1, and Here, v(0) < h(N−1)2−1 2√2(N − 1)2λ ; 1 s−1 (cid:18) 1 a(cid:19) 1 s−1 "(cid:18)1 s(cid:19) −(cid:18) 1 s(cid:19) s s−1# − b > 1 s−1 8λ2v(0)2s N 2 1 s−1 + a 4√2λv(0) N . a = 2√2λh−(N−1)2+1(N − 1)2v(0), b = 1 + √2x(0), s = 2β(N − 1)2. Then the system (2) or (8) has a time-asymptotic flocking: 1) there exists a constant B0 > 0 such that x(t) ≤ B0, ∀ t ∈ N; 2) v(t) exponentially converges to zero as t → ∞. Proof: Fix a discrete-time mark T ∈ N and define Moreover, there exists x∞ ∈ (R3)N−1 such that x(t) −→ x∞ as t → ∞. x∗ = max 0≤t≤T x(t), T∗ ∈ argmax0≤t≤Tx(t). (19) (20) (21) Then by Proposition 3.2, the estimate (16) holds for newly defined R := (1 + 2x∗2)−β, as long as we restrict t within [0, T ]. That is, By (17) we find v(t)∞ ≤ 2(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) t+1 (N −1)2(cid:3) v(0)∞, t ∈ [0, T ]. v(t) ≤ λv(t)∞ ≤ 2λ(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) t+1 ≤ 2λ(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) t+1 (N −1)2(cid:3) v(0)∞ (N −1)2(cid:3) v(0), t ∈ [0, T ]. 9 By the dynamics of referenced position x(t), i.e., (7), for t ∈ [0, T ], we have t−1 t−1 Pτ =0v(τ ) 2λ(cid:0)1 − (hR)(N−1)2(cid:1)(cid:2) τ +1 Pτ =0 x(t) ≤ x(0) + h ≤ x(0) + h ≤ x(0) + 2hλv(0) ≤ x(0) + 2hλv(0)(N − 1)2 ∞ ≤ x(0) + 2hλv(0)(N − 1)2(hR)−(N−1)2 = x(0) + (N −1)2(cid:3)v(0) (N −1)2(cid:3) Pτ =0(cid:0)1 − (hR)(N−1)2(cid:1)(cid:2) τ +1 Pτ =0(cid:16)1 − (hR)(N−1)2(cid:17)τ √2 2 a(1 + 2x∗2)β(N−1)2. ∞ In particular, for t = T∗, we have x∗ ≤ x(0) + √2 2 a(1 + 2x∗2)β(N−1)2 . Let Z := (1 + 2x∗2) 1 2 , then the above relation and (20) give Z ≤ 1 + √2x∗ ≤ aZ 2β(N−1)2 In order to apply Lemma 3.1 we define F (z) as follows: + b. (22) F (z) = z − azs − b, 1−s , 2b}, and then x∗ ≤ (cid:0) U0 1 (1) Assume s < 1. The relation (22) says that F (Z) ≤ 0. By appealing to Lemma 3.1 we have Z ≤ U0 2 . Note that U0 depends only on a and b, which with U0 ≤ max{(2a) are independent of the pre-assigned time T . Therefore, the bound x(T ) ≤ x(T∗) ≤ B0 :=(cid:0) U0 2 is uniform for all T = 0, 1, 2, . . . . That is, x(t) ≤ B0 for all t ∈ N. that v(t) exponentially converges to 0. Finally, for all t2 > t1, we have 0)−β and use Proposition 3.2 for any time t ∈ N to find Now, we choose B := B0, and R := (1 + 2B2 2−1 2 2−1 2 (cid:1) (cid:1) 1 1 s = 2β(N − 1)2. x(t2) − x(t1) ≤ t2−1 t2−1 t2−1 Pτ =t1 x(τ + 1) − x(τ ) ≤ h ≤ 2hλv(0) Pτ =t1 v(τ ) Pτ =t1(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) τ +1 (N −1)2(cid:3) Pτ =t1(cid:16)1 − (hR)(N−1)2(cid:17)(cid:2) τ +1 (N −1)2(cid:3) ∞ ≤ 2hλv(0) ≤ 2h1−(N−1)2R−(N−1)2λ(N − 1)2v(0)(cid:16)1 − (hR)(N−1)2(cid:17)[ Note that the right-hand side tends to zero as t1 → +∞ and is independent of t2, by Cauchy principle we deduce that there exists some x∞ ∈ (R3)N−1 such that x(t) → x∞ as t → +∞. (2) Assume s = 1. Then (22) becomes (N −1)2 ] t1 . which implies that x∗ ≤ Z ≤ aZ + b, √2 2 (cid:16)(cid:0) 1 − a(cid:1)2 − 1(cid:17)1/2 b . The right-hand side is positive by our hypothesis and thus gives a uniform bound for x(t). For the remaining parts we proceed as in case (1). zℓ z∗ zu Fig. 1. Shape of F . (3) Assume that s > 1. The derivative F ′(z) = 1 − sazs−1 has a unique zero at z∗ = ( 1 sa) 1 s s−1 − a(cid:0) 1 sa(cid:1) by our hypothesis (19). Since F (0) = −b < 0 and F (z) → −∞ as z → +∞ we see that the shape of F is as in Fig.1. For t ∈ N, let Z(t) = (1 + 2x(t∗)2) is defined as in (21), i.e., t∗ ∈ argmax0≤τ≤tx(τ ). For t = 0 we must have t∗ = 0 and F (z∗) = (cid:0) 1 sa(cid:1) s−1 − b > 0, 1 2 , where t∗ 2 ≤ 1 + √2x(0) = b ≤ ( 1 sa) 1 1 s−1 = z∗. Z(0) = (1 + 2x(0)2) This implies that Z(0) ≤ zℓ. Assume that there exists t ∈ N such that Z(t) ≥ zu and let t0 be the first such t. Then t0∗ = t0 ≥ 1 and for all t < t0, 1 (1 + 2x(t)2) x(t) ≤(cid:0) z∗ x(t0 − 1)2 ≤ zℓ 2 ≤ zℓ ≤ z∗, 2 (cid:1) 2−1 2 ≤ z∗ 2−1 2 . 1 2−1 2 . that is, In particular, On the other hand, Z(t0) ≥ zu gives Thus we have 10 1 s−1 and 2−1 2 . 2−1 x(t0)2 ≥ zu 2 ≥ z∗ 2 − zℓ z∗ 2 2 x(t0)2 − x(t0 − 1)2 ≥ 1 2 ≥ (z∗ − zℓ)z∗. (23) By the intermediate value theorem, there is a ξ ∈ [zℓ, z∗] such that F (z∗) = F ′(ξ)(z∗ − zℓ). Note that F ′(ξ) = 1 − saξs−1 ∈ [0, 1], therefore, z∗ − zℓ ≥ F (z∗). We combine (23) to obtain However, we have x(t0)2 − x(t0 − 1)2 ≥ 1 2 z∗F (z∗). (24) x(t0) − x(t0 − 1) ≤ x(t0) − x(t0 − 1) = hv(t0 − 1) ≤ 2hλv(0)∞ ≤ 2hλv(0). Therefore, 11 x(t0)2 − x(t0 − 1)2 = (x(t0) − x(t0 − 1))2 + 2 (x(t0) − x(t0 − 1))x(t0 − 1) We combine this inequality with (24) to obtain ≤ 4h2λ2v(0)2 + 4hλv(0)x(t0 − 1) ≤ 4h2λ2v(0)2 + 4hλv(0)(cid:16) z∗ 2 (cid:17) . 2−1 1 2 thus, we have 1 2 ≤ 8h2λ2v(0)2 + 4√2hλv(0)z∗, 2−1 2 (cid:17) z∗F (z∗) ≤ 8h2λ2v(0)2 + 8hλv(0)(cid:16) z∗ s−1 "(cid:18) 1 =(cid:18) 1 s(cid:19) a(cid:19) ≤ 8h2λ2v(0)2 (sa) a ≤ 8λ2v(0)2s F (z∗) N 2 s−1 1 1 1 s−1 s s−1# − b s(cid:19) −(cid:18)1 s−1 + 4√2hλv(0) 4√2λv(0) , 1 1 s−1 + N where (10) is used. This contradicts to our hypothesis (19). So we conclude that, for all T ∈ N, Z(t) ≤ zℓ 2 , which is a uniform bound for x(t). Again we can proceed as in case (1) to and then x(t) ≤ (cid:0) z∗ complete the proof. 2 (cid:1) 2−1 1 IV. SIMULATIONS In this section, we present some numerical simulations to show the flocking behavior in a C-S model with alternating leaders. For these simulations, we choose a flock consisting of three agents, labeled by V = {1, 2, 3}, and we take the parameters h = 0.2, and β = 1 4 . We consider the switching in three interaction topologies described by graphs G1 =(cid:0)V,{(1, 2), (1, 3)}(cid:1), G2 =(cid:0)V,{(2, 1), (2, 3)}(cid:1), G3 =(cid:0)V,{(3, 1), (3, 2)}(cid:1). This means that in Gi, the agent i acts as the leader and there are information flows from i to the other two agents. We choose the switching signal σ(t) as σ(t) = (t, mod 3) + 1, t is the discrete time mark. In other words, the sequence of neighbor graphs is given by G1 → G2 → G3 → G1 → G2 → · · · , (25) and at each time step, there is a switching in the neighbor graphs; that is, the dwelling time for each active graph is Td = h = 0.2. For the initial state, we choose the initial position x(0) ∈ (R3)3 with nine coordinates randomly distributed in an interval of length 10; while the coordinates of initial velocities were randomly chosen from an interval of unit length. In Figure 2 we show the evolution of relative positions xi = xi − x3 and the evolution of the norm of total relative velocity (v12 + v22) 2 . These simulations show the asymptotic (exponentially fast) flocking behavior of the C-S model with alternating leaders. 1 In Figure 3 (a), we also exhibit the evolution of velocities v1, v2, and v3 under the switching signal σ. Here, we use different colors to denote different coordinates, and use different markers to describe different agents. Figure 3 (a) indicates that each coordinate of their velocities asymptotically attains an alignment, i.e., they exhibit a velocity consensus asymptotically. To compare the relaxation process of the flocking state under different switching topology, we did some simulations with different switching signal. We chose the similar signal with a sequence (25) but with a different dwelling time Td for each neighbor graph. Precisely, we take Td = 1 seconds, Td = 3 seconds and Td = 7 seconds for the simulations exhibited in Figure 3 (b), (c) and (d), respectively. We observe that in any case the velocities attain a near alignment after t0 = 9 and keep like this. This means that the flocking state is robust about the alternating leaders. Moreover, we observe that the switching signal before the alignment influence the asymptotic value a lot. Since the leader in the first active interaction topology is agent 1, if the dwelling time is longer, the asymptotic velocity is more close to the initial value of the agent 1. 12 x k i 8 6 4 2 0 −2 0 101 100 ¡v 12 +v 22¢ 1 2 10−1 10−2 10−3 0 3 6 3 6 time 9 12 15 (a) The evolution of each coordinate of relative posi- tions xk 3 , i = 1, 2, k = 1, 2, 3. i = xk i − xk (b) The evolution of (v12 +v22) vi = vi − v3, i = 1, 2. 9 12 15 time 2 for the relative velocities 1 Fig. 2. The emergence of flocking in a 3-agent C-S model with alternating leaders V. CONCLUSION We studied the Cucker-Smale flocking under the rooted leadership with alternating leaders. This dy- namically changing interaction topology is motivated by the ubiquitous phenomena in our nature such as the alternating leaders in migratory birds on the long journey, the changing political leaders in human societies, etc. Our study showed that the flocking behavior can occur for such a dynamically changed leadership structure under some sufficient conditions on the initial configurations depending on the decay rate of communications and the size of flocking. REFERENCES [1] S. Ahn, H.-O. Bae, S.-Y. Ha, Y. Kim and H. Lim, Application of flocking mechanism to the modeling of stochastic volatility, Math. Models Methods Appl. Sci. 23 (2013) 1603-1628. [2] S. Ahn, H. Choi, S.-Y. Ha and H. Lee, On collision-avoiding initial configurations to Cucker-Smale type flocking models, Comm. Math. Sci. 10 (2012) 625-643. [3] S. Ahn and S.-Y. Ha, Stochastic flocking dynamics of the Cucker-Smale model with multiplicative white noises, J. Math. Phys. 51 (2010) 103301. [4] M. Cao, A. S. Morse and B. D. O. Anderson, Reaching a consensus in a dynamically changing environment: A graphic approach, SIAM J. Control Optim. 47 (2008) 575-600. [5] M. Cao, A. S. Morse and B. D. O. Anderson, Reaching a consensus in a dynamically changing environment: Vonvergence rates, meansurement delays, and asynchronous events, SIAM J. Control Optim. 47 (2008) 601-623. [6] J. A. Carrillo, M. Fornasier, J. Rosado and G. Toscani, Asymptotic flocking dynamics for the kinetic Cucker-Smale model, SIAM J. Math. Anal. 42 (2010) 218-236. [7] F. Cucker and J.-G. Dong: On the critical exponent for flocks under hierarchical leadership, Math. Models Methods Appl. Sci. 19 (2009) 1391-1404. [8] F. Cucker and J.-G. Dong, Avoiding collisions in flocks, IEEE Trans. Automatic Control 55 (2010) 1238-1243. [9] F. Cucker and C. Huepe, Flocking with informed agents, MathS in Action 1 (2008) 1-25. [10] F. Cucker and E. Mordecki, Flocking in noisy environments, J. Math. Pures Appl. 89 (2008) 278-296. [11] F. Cucker and S. Smale, Emergent behavior in flocks, IEEE Trans. Automat. Control 52 (2007) 852-862. 13 0.4 0.2 k v i 0 −0.2 −0.4 0 0.4 0.2 0 k v i −0.2 −0.4 0 0.4 0.2 k v i 0 −0.2 −0.4 0 0.4 0.2 k v i 0 −0.2 −0.4 0 3 6 time 9 12 15 (a) Td = h = 0.2 3 6 time 9 12 15 3 6 time 9 12 15 (b) Td = 1 3 6 time 9 12 15 (c) Td = 3 (d) Td = 7 Fig. 3. coordinates, respectively. The lines marked by star, circle and dot indicate the agent 1, 2 and 3, respectively. The velocity alignment in a 3-agent C-S model with alternating leaders. The lines in blue, red and black indicate x, y and z [12] F. Cucker and S. Smale, On the mathematics of emergence, Japan. J. Math. 2, (2007) 197-227. [13] F. Cucker, S. Smale and D. Zhou, Modeling language evolution, Found. Comput. Math. 4 (2004) 315 -- 343. [14] R. Diestel, Graph Theory, Graduate Texts in Mathematics. New York, U.S.A.: Springer-Verlag, 1997. [15] S.-Y. Ha, K. Kim and K. Lee, A mathematical model for multi-name Credit based on the community flocking, To appear in Quantitative Finance. [16] S.-Y. Ha, K. Lee and D. Levy, Emergence of time-asymptotic flocking in a stochastic Cucker-Smale system, Commun. Math. Sci. 7 (2009) 453-469. [17] S.-Y. Ha, Z. Li, M. Slemrod and X. Xue, Flocking behavior of the Cucker-smale model under rooted leadership in a large coupling limit, To appear in Quart. Appl. Math. [18] S.-Y. Ha and J.-G. Liu, A simple proof of Cucker-Smale flocking dynamics and mean field limit, Commun. Math. Sci. 7 (2009) 297-325. [19] S.-Y. Ha and E. Tadmor, From particle to kinetic and hydrodynamic description of flocking, Kinetic and Related Models 1 (2008) 415-435. [20] A. Jadbabaie, J. Lin and A. Morse, Coordination of groups of mobile autonomous agents using nearest neighbor rules, IEEE Trans. Autom. Control 48 (2003) 988-1001. [21] J. Kang, S.-Y. Ha, E. Jeong and K.-K. Kang, How do cultural classes emerge from assimilation and distinction? An extension of the Cucker-Smale flocking Model, To appear in J. Math. Sociology. [22] G. Latouche and V. Ramaswami, Introduction to Matrix Analytic Methods in Stochastic Modeling. PH Distributions, ASA SIAM, 1999. [23] N. E. Leonard, D. A. Paley, F. Lekien, R. Sepulchre, D. M. Fratantoni and R. E. Davis, Collective motion, sensor networks and ocean sampling, Proc. IEEE 95 (2007) 48-74. [24] Z. Li, S.-Y. Ha and X. Xue, Emergent phenomena in an ensemble of Cucker-Smale particles under joint rooted leadership, To appear in Math. Models Methods Appl. Sci. [25] Z. Li and X. Xue, Cucker-Smale flocking under rooted leadership with fixed and switching topologies, SIAM J. Appl. Math. 70 (2010) 3156-3174. [26] J. Park, H. Kim and S.-Y. Ha, Cucker-Smale flocking with inter-particle bonding forces, IEEE Tran. Automatic Control 55 (2010) 2617-2623. [27] L. Perea, G. G´omez and P. Elosegui, Extension of the Cucker-Smale control law to space flight formation, J. Guidance, Control and Dynamics 32 (2009) 526-536. [28] J. Shen, Cucker-Smale flocking under hierarchical leadership, SIAM J. Appl. Math. 68 (2007) 694-719. [29] J. Toner and Y. Tu, Flocks, herds, and Schools: A quantitative theory of flocking, Physical Review E. 58 (1998) 4828-4858. [30] T. Vicsek, A. Czir´ok, E. Ben-Jacob, I. Cohen and O. Schochet, Novel type of phase transition in a system of self-driven particles, Phys. Rev. Lett. 75 (1995) 1226-1229. [31] X. Xue and L. Guo, A kind of nonnegative matrices and its application on the stability of discrete dynamical systems, J. Math. Anal. Appl. 331 (2007) 1113-1121. [32] X. Xue and Z. Li, Asymptotic stability analysis of a kind of switched positive linear discrete systems, IEEE Trans. Autom. Control 55 (2010) 2198-2203. 14
1812.04750
2
1812
2019-02-22T03:41:18
An Exchange Mechanism to Coordinate Flexibility in Residential Energy Cooperatives
[ "cs.MA" ]
Energy cooperatives (ECs) such as residential and industrial microgrids have the potential to mitigate increasing fluctuations in renewable electricity generation, but only if their joint response is coordinated. However, the coordination and control of independently operated flexible resources (e.g., storage, demand response) imposes critical challenges arising from the heterogeneity of the resources, conflict of interests, and impact on the grid. Correspondingly, overcoming these challenges with a general and fair yet efficient exchange mechanism that coordinates these distributed resources will accommodate renewable fluctuations on a local level, thereby supporting the energy transition. In this paper, we introduce such an exchange mechanism. It incorporates a payment structure that encourages prosumers to participate in the exchange by increasing their utility above baseline alternatives. The allocation from the proposed mechanism increases the system efficiency (utilitarian social welfare) and distributes profits more fairly (measured by Nash social welfare) than individual flexibility activation. A case study analyzing the mechanism performance and resulting payments in numerical experiments over real demand and generation profiles of the Pecan Street dataset elucidates the efficacy to promote cooperation between co-located flexibilities in residential cooperatives through local exchange.
cs.MA
cs
An Exchange Mechanism to Coordinate Flexibility in Residential Energy Cooperatives Shantanu Chakraborty The University of Melbourne, Melbourne, Australia. [email protected] Centrum Wiskunde & Informatica, Amsterdam, The Netherlands. Pablo Hernandez-Leal and Michael Kaisers {Pablo.Hernandez,Michael.Kaisers}@cwi.nl 9 1 0 2 b e F 2 2 ] A M . s c [ 2 v 0 5 7 4 0 . 2 1 8 1 : v i X r a Abstract -- Energy cooperatives (ECs) such as residential and industrial microgrids have the potential to mitigate increasing fluctuations in renewable electricity generation, but only if their joint response is coordinated. However, the coordination and control of independently operated flexible resources (e.g., storage, demand response) imposes critical challenges arising from the heterogeneity of the resources, conflict of interests, and impact on the grid. Correspondingly, overcoming these chal- lenges with a general and fair yet efficient exchange mechanism that coordinates these distributed resources will accommodate renewable fluctuations on a local level, thereby supporting the energy transition. In this paper, we introduce such an exchange mechanism. It incorporates a payment structure that encourages prosumers to participate in the exchange by increasing their utility above baseline alternatives. The allocation from the pro- posed mechanism increases the system efficiency (utilitarian social welfare) and distributes profits more fairly (measured by Nash social welfare) than individual flexibility activation. A case study analyzing the mechanism performance and resulting payments in numerical experiments over real demand and generation profiles of the Pecan Street dataset elucidates the efficacy to promote cooperation between co-located flexibilities in residential cooperatives through local exchange. Index Terms -- Exchange Mechanism, Energy Cooperative, Multi-agent System, Flexibility, Market Design. I. INTRODUCTION Energy Cooperatives (ECs) of prosumers are gaining con- siderable traction due to their potentials for efficient energy management, reduced grid dependency, and increased local consumption of distributively generated renewable energy. Establishing a local market can facilitate the management of distributed renewable generation that needs to consume as locally as possible [1]. A generic prosumer marketplace can be envisaged as a multiagent system that hosts heterogeneous services with a large number of participant prosumers which take actions au- tonomously [2]. This autonomy and diversity form a complex system where efficient mechanisms such as local markets are crucial [3]. The necessity of establishing a local prosumer marketplace (in the sense of the scope and proximity of the served area) that fulfills the requirements of decentralized production and consumption is therefore of a paramount importance [4]. Flexibility, on the other hand, can be enabled by facilitating Demand Response [5], which is an important element in the prosumer-centric energy market. While previous works have highlighted the need for demand response (DR) markets they have not considered small-scale prosumers as market participants in a local market. One example considers stakeholders such as DSO, TSO (as buyers), aggregators and customers (as sellers) [6]. However, market interactions down to the level of prosumers are not considered. Another work presented an effort-based DR service where the DR partic- ipants are benefited against the time of their stalling effort and showed that by doing so, the system achieves socially efficient allocations [7]. However, the implications of such an innovative design on the real electricity market scenarios are not entertained. Coordination of flexible resources/devices while aggregating their flexibility usually requires a detailed understanding of the underlying characteristics [5] of those devices which may be hard to obtain in many scenarios and thus hinders the scalability of the system. A considerable amount of research is focused on the management of heterogeneous devices (e.g. PV generator, storages, gas micro-turbine) through a centralized controller [8], while hierarchical controls of microgrid through several levels of control architecture [9], [10] show promising applicability in this domain. Additionally, in order to opti- mally manage and control flexibility in demand side, previous works deploy aggregators [11], [12] that essentially combine the available flexibilities and trade them on the customers' behalf. However, this is not a straightforward process and may have negative impacts such as increasing the imbalance of Balancing Responsible Parties (BRPs) and leading to en- gaging in further coordination between the participants [13]. Moreover, the underlying loss emerging from the balancing activity incurred due to energy-only trading are socialized, which means prosumers are priced equally regardless of their marginal contributions to the overall loss. Hence, it is critically important to improve the fairness of the balancing cost attributions. Consequently, the need for a general and fair yet effective coordination and control scheme for flexible resources through local market design becomes crucial. • Proposing a real-time exchange mechanism that promotes efficient allocations in ECs, coordinating heterogeneous and individually-controlled flexible resources. • Proposing a payment structure -- integrated with the proposed mechanism -- that incentivizes the prosumers to participate in the exchange mechanism, rewards them according to their contributions to system loss reduction, In light of these related works and the narrative aforemen- tioned, this paper contributes to the state of the art by: and by doing so, residential community. increases the social welfare of the The rest of the paper is organized as follows: Section II describes the prosumer marketplace and outlines the oper- ation necessary for the exchange mechanism. The proposed control and exchanged mechanism is detailed in Section III. Section IV elaborates the prosumers' utility and the fairness of the mechanism. A simulation case study is presented in Section V. Finally, Section VI concludes the paper with a glimpse of possible follow-up research. II. PROSUMER MARKETPLACE AND OPERATION OUTLINE In this section, we describe a real-time exchange mechanism that operates on a local prosumer marketplace with associated market offers that are necessary for the market formation. Prosumers in a cooperative are represented by software agents, therefore, we will use the terms agent and prosumer inter- changeably. While we discuss it in the context of storage flexibility from batteries, it is applicable to the flexibility of demand response as well. In this section, we describe a real-time market with market offers that are necessary for residential ECs. The market while operating locally, facilitates trading energy and flexibility (of consumption, commonly known as Demand Response) among the prosumers. The prosumers of the cooperative are represented by software agents. Therefore, we will use the terms agent and prosumer interchangeably. The prosumers are assumed to be equipped with PV and Battery (as flexible resources). To this end, we formalize the market offers and associated commodities. A. Market offers A market offer o = (c, p, f ) is defined as a tuple comprising a commodity c ∈ C with a price tag p and a flag stating whether the offer is a bid (f = 1) or an ask (f = 0). The offer can be further extended by adding a quantity n, differentiating between limit orders and fill-or-kill orders l, and an expiry timestamp texp. B. Commodity classes A commodity, in general term, is a marketable item (typ- ically, a good or a service) produced to satisfy demand or need [14]. In the context of the electric power market, a commodity comprises power time series, giving rise to several interesting classes as services. • Energy: C = (q, t), where q and t are equal-length vectors of time and quantity respectively, defining a (possibly continuous) time series with ∀i : qi ≥ 0, with the convention that the last quantity is zero. • Demand Response: C = (q, t), where q and t are vectors of time and quantity respectively, defining a (possibly continuous) time series, possibly imposing the zero-sum i qi = 0 to make this class of commodities complementary to energy This constraint may simplify discrimination from energy commodities but may be counter-productive as it avoids demand response losses to constraint (cid:80) be included in the commodity. However, since losses can- not be standardized, demand response is rather amenable to negotiation than auction-based commodity trading. In this article, however, we limit the contribution to devising exchange mechanisms of Energy commodity while keeping the Demand Response activated by indirectly controlling the local flexibility. The market protocol proceeds in rounds where every agent submits a bid (or ask), allocations are computed by matching bids and asks, establishing the market equilibrium. In this paper, however, we have assumed all bids (and asks) are cleared by a local exchange market. The exchange market clears the offers in near real-time and provides the allocations back to the agents. The operation outline is detailed in the following section. C. Operation outline The high-level operational outline of the proposed mecha- nism is shown in Figure 1. In brief, the mechanism periodically accepts offers from prosumers, computes the allocated ex- change quantities by matching offers, and responds back to the prosumers with those allocations. The additional payments are calculated retrospectively after a predefined operation cycle the of T discrete time periods is completed. Specifically, algorithm proceeds as follows: • Step 1: For each time t ∈ T , repeat Step 1.1 to Step 1.5. -- Step 1.1: Collect the market offers from all prous- mers, segregating bids and asks based on the embed- ded f flag. -- Step 1.2: Tabulate the quantities with round-trip effi- ciencies of each flexible devices of sellers (detailed in Section III). -- Step 1.3: Determine the allocations, using the bids and efficiencies of the devices after applying the proposed exchange mechanism. -- Step 1.4: Respond back to the prosumers with the al- locations, where the prosumers realize the exchange and deploy batteries. -- Step 1.5: Transact the prosumer-specific residual net energy with the Grid. • Step 2: Determine the payments of prosumers as detailed in Section IV. The form of payment includes the transac- tions with the Grid, realized energy exchange with peer prosumers, and allocated flexibility activation. Next, we introduce the baseline cases of No flexibility and Individual control, and proceed to provide a brief description of the proposed exchange mechanism (i.e. Exchange and control), which is elaborated in the subsequent section. • No flexibility: Considers the simplest case where there is no exchange and the flexibility is deactivated (i.e., batteries are not considered). The net-demand is always resolved by interacting with the main Grid. • Individual control: The agents individually control their batteries by charging with excess PV and by discharging to serve their own load. Agents are not allowed to exchange energy. Fig. 1. High-level operational outline of the coordinating exchange mechanism: exchange and control (Section III) followed by payment computation (Section IV). • Exchange and control: Agents are allowed to exchange energy. We assume a centralized exchange is responsible for computing allocations from participants' offers (see Section III). An offer comprises the net demand and the round-trip efficiency of their flexibility (e.g., battery efficiency). By doing so, our proposed mechanism is able to improve allocative efficiency by resolving flexibility needs with the most efficient means. III. EXCHANGE AND CONTROL MECHANISM The optimal allocation for pooled resources is computed by solving a centralized Linear Programming problem. Let, exb(s) ∈ R+ be the energy traded from seller s ∈ S to buyer b ∈ B; where B and S are the set of all buyers and all sellers (both including the Grid {G}), respectively. Aligning with the commodity as Energy (defined in Section II-B), at any discrete time interval t, the buyers and sellers approach to the real-time exchange market by providing a quantity q as Eb(t) and Es(t), respectively. Therefore, for a buyer b the bid structure looks like c ← (q = Eb(t), t) and the market offer is o = (c, f = 0).1 Similarly, for a seller s, the bid structure and the market offer are represented by c ← (q = Es(t), t) and o = (c, f = 1), respectively. In addition to submitting the net demand to the centralized exchanger, the mechanism assumes that sellers submit the round-trip efficiency of their locally controlled flexible devices. Therefore, the bids are restructured as c ← (q =< Es(t), ηs >, t) where, ηs be the round-trip efficiency of the battery (or other flexible resources) of seller s ∈ S − G. The mechanism makes use of these submitted round-trip efficiencies to compute the allocation. The objective is to maximize the local energy exchange and thereby minimizing the Grid exchange. In order to do so, for a particular seller s, the exchanger s = ∞ when s := reformats ηs to ηb {G} or b := {G}. The transformation can be written as, ∀s ∈ S 1The price component p is omitted since the mechanism assumes clearing s, ∀b ∈ B and assigns ηb all bids and asks. (cid:26)ηs, ∞, ηb s = if b ∈ B − {G} otherwise. (1) After receiving the quantities as bids from prosumers, the exchange decides on the allocation that maximizes energy exchange locally (equivalently, minimizes energy transaction with the Grid2). The following objective function serves the purpose of minimization of the Grid exchange with improved allocative efficiencies s · exb(s). ηb (2) (cid:88) (cid:88) b∈B s∈S min ex The above objective function is subjected to the following balancing equations for buyers and sellers, respectively. Eb = Es = CM (b, s) · exb(s) ∀b ∈ B − {G} CM (b, s) · exb(s) ∀s ∈ S − {G}, (3) (cid:88) (cid:88) s∈S b∈B where CM is a "boolean" connectivity matrix representing possible trading restrictions due to the electrical network topology of the cooperatives. These constraints ensure that the demand (and the supply) is met entirely through the exchange with physically connected prosumers. The optimization problem (Eq. 2) with constraints (Eq.3) essentially forms to an assignment problem. In this paper, we assume that the network is not restrictive, and it is therefore modeled by a fully-connected topology i.e. CM (b, s) = 1,∀b ∈ B and ∀s ∈ S. Note that this mechanism is device- agnostic, is not considering the (locally-controlled) storages' internal specification in computing allocations. i.e., it The aforementioned optimization problem with associated constraints is solved by the Linear Programming technique. 2The mechanism does not actually allocate any Grid exchange with prosumers. Rather, it provides the optimal allocation among the prosumers. Having said that, such a network topology is virtually pos- sible by adapting advanced routing technology, e.g. Digital- Grid [15] that provides every prosumer the platform to ex- change power with every other prosumers in the cooperative facilitated by the installed Digital Grid Routers in suitable nodes. IV. PROSUMERS' UTILITY AND FAIRNESS OF THE MECHANISM In this section, we describe the utility of prosumers by applying the coordination mechanism and go on showing how the mechanism increases the utility of prosumers, improving the social welfare [16] and thereby resolving the conflict of interest of the prosumers. For ease of description, we number the mechanisms as No flexibility (0), Individual control (1), and Exchange and control (2), respectively. Let N be the number of prosumers and T be the current operation cycle. Further, let the demand and (PV) generation of agent i at time t be di(t) and pvi(t), respectively. The net demand at period t after applying mechanism m and deploying the local battery of agent i ∈ N is defined as: i,−i(t) + pbi(t), i (t) = di(t) − pvi(t) − Exm (4) Dm where Exm i,−i(t) is the total energy agent i received from other agents −i at time t utilizing mechanism m. Therefore, Exi essentially is the agent specific decision allocated by the exchange described in Section III. We suppose that surplus generated energy is not permitted (or at least not remunerated) to be fed into the grid, i.e. power flow from Grid G to agent i, Dm i (t) is positive, with excess energy spilled: i (t)]+, DmG,i(t) = [Dm (5) where [x]+ = max{x, 0}. Since mechanism 0 and mechanism i,−i(t) = 0 for all i ∈ N. 1 do not impose any exchange, Ex0,1 The dispatched battery power of agent i at t is pbi(t), where pbi(t) < 0 when the battery is discharged. When an agent switches from No flexibility mechanism, the system encounters losses due to the round-trip efficiency of activated batteries. The overall loss contributed by i after switching to mechanism m ∈ {1, 2} is given by (cid:0)D0 i (t)(cid:1) − θm i i (t) − Dm (Exi,−i(t) − pbi(t)) − θm i , (6) where θm is an offset power dispatched from/to the battery to i bring the final state of the charge to the initial one. Finally, total loss of the system using mechanism m is calculated as N(cid:88) i = − N(cid:88) Lm (cid:32) T(cid:88) Lm = pbi(t) + θm i . (7) (cid:33) In order to instill fairness in the mechanism, we adopt a measure, namely difference evaluation function, which has been widely employed in multiagent learning [17]. In this context, the difference evaluation function of an agent i defines the marginal contribution of i in reaching a joint system state (i.e. loss in the system), L utilizing mechanism m. Formally, (8) Lm i = Lm − Lm−i. We define a component function that rewards/penalizes an agent based on its marginal contribution to system loss (i.e. Lm i ). It can be shown from Eq. 7, that the component function links with the agent's individual battery activation and there- fore, provides a way to measure the effect of battery activation and consequent profit sharing with other agents. Formally, for agent i using mechanism m = 2,3 the component function goes Rm i = Lm i − wm i Lm, (9) where wm bution of i using the following softmax function i constitutes the weights proportional to the contri- (10) where (cid:80) wm i = i = 1, which makes (cid:80) , i wm i = 0. It is an important criterion to fairness argument as the total rewards must be shared among all participated agents. i Rm Finally, the utility of an agent i by applying mechanism m is defined as the negative cost it incurs from the (total) payment to the Grid, payment from/to the exchange (with other agents), and the reward defined in Eq. 9. For a constant price p, the utility function takes the following form i(cid:80) eLm j eLm i (cid:34) T(cid:88) T(cid:88) ui(m) = −p DmG,i(t) + α Exm i,−i(t) − (1 − α)Rm i , t t (11) where α = [0, 1) represents the price component (as a fraction of p) an agent pays for exchanged energy. The complementary price component, i.e. (1 − α)) scales the Reward and thereby controls the profit sharing between agents according to their flexibility activation. Inherently, the utilities of No flexibility and Individual control only contain the Grid payment com- ponent. Note, that the price p is set out by the Grid and is in our setting identical for all prosumers in the EC for a particular operation cycle T . The acceptability of the proposed mechanism depends on whether the proposed coordination mechanism (m = 2) satisfies individual rationality of agents, i.e. ui(m = 2) ≥ ui(m = k), (12) where k ∈ {0, 1}. The mechanism searches for the lowest α that satisfies the following constraint (cid:88) (cid:0)DkG,i(t) − DmG,i(t)(cid:1) + Rm i < α (cid:32)(cid:88) (cid:33) Exm i,−i(t) + Rm i , (13) 3Mechanisms 0 and 1 do not engage in exchange and hence do not require component function. (cid:35) T(cid:88) T(cid:88) t t Lm i = = i=1 i=1 t t t for m = 2, k ∈ {0, 1} and i = 1, . . . , N. Typical values of α stay within 0.75 ≤ α < 1.0. In order to validate the efficiency of the mechanisms in improving the social welfare, we define the following utilitarian social welfare function N(cid:88) i N(cid:89) swm = ui(m). (14) Moreover, we quantify the relative fairness of a mechanism based on the Nash social welfare criterion, an established concept of fairness [16], applied to the improvement above a baseline: fmk = (ui(m) − ui(k)) , (15) i where m (cid:54)= k. Utilizing Eq. (4 - 12), it can be shown that m = 2 improves both social welfare functions, i.e. Eq. 14 and Eq. 15, and hence balances efficiency and fairness. The next section supports this claim empirically. V. A CASE STUDY OF LOCAL ENERGY EXCHANGE In this section, we present experimental results of a case study applying the proposed mechanism. The experiments are conducted by taking samples of 10, 20 and 30 prosumers (so called "scalability") over 150 households from real residential data [18]. We present experiment results considering the loss reduction and the payments and social welfare after applying various mechanisms. We use 10 and 20 prosumers cases for Fig. 2. System loss reduction over Individual control with increasing diver- sities in terms of number of prosumers (10, 20) and round-trip efficiencies. loss reduction experiment, whereas 30 prosumers case is used for payment and social welfare experiment. The prosumers are assumed to be equipped with a battery4. In order to experimentally investigate the effect of "diversity" on system performance, the round-trip efficiencies of the flexible re- sources are varied by sampling from normal distributions. The PV generation patterns of a set of randomly chosen prosumers are shifted uniformly with a span of [0,6] hours in order 4A residential Lithium-ion battery of capacity 6.8kWh with rated discharg- ing and charging power of 3kW and 1.3kW, respectively. The SOC is allowed to operate within 10% to 90% of the capacity. The degradation rate of the battery is fixed as 0.1% of the capacity. to form a local prosumer marketplace, simulating diversified installation angles (e.g., east/west facing solar panels). The simulation period covers 7 days, during which the exchange is performed over each quarter-hourly interval. Fig. 3. Example battery power dispatch (of one prosumer) by applying Individual control and Exchange and control mechanism plotted over a day. The exchange mechanism yields a "shifting" in battery scheduling. A. Experiment: Loss Reduction Here, we analyze the performance of the proposed mecha- nism with respect to the loss reduction, as described in Eq. 7. The experiments are performed over a number of trials, where each trial contains an independently chosen subset of the prosumers - the dataset of prosumers contains 150 prosumers. The improvement in loss reduction using the Exchange and control mechanism over the Individual control mechanism (i.e. Lm=2 − Lm=1) for different number of prosumers with increased diversity -- measured by the variance in the dis- tribution of round-trip efficiency of batteries -- is depicted in Figure 2. The positive loss reduction indicates that the Exchange and control mechanism influences the flexibility activation indirectly and thereby results in a system-wise higher efficiency. As the scale of the EC grows, so does the dominance of Exchange and control mechanism over the Individual control. As for the experiment with "diversity", the Exchange and control mechanism takes the round-trip efficiencies into consideration and reduces the loss further with greater diversity. An agent-specific residual battery power dispatch patterns, resulted from the Individual control and the Exchange and control mechanisms for 7 days (plotted in scatter on a 24-hour window) are shown in Figure 3. The storage pattern, emerging from the Exchange and control mechanism, shows a "shifting" tendency from that of the Individual control mechanism, which is resulted from the agent-specific realized allocation. The experiments confirm that the proposed mechanism efficiently coordinates the local flexible resources while resulting in a higher loss reduction when compared to Individual control. B. Experiment: Payment and social welfare Lastly, we turn the analysis toward the payment strategy of the exchange mechanism, and how the strategy makes the mechanism preferable for all individual agents. Figure 4 case study over real demand/generation data for various scales of EC with infused diversifications from underlying flexible devices and a follow-up sensitivity analysis to achieve loss reduction and improvement in social welfare has validated the efficiency and applicability of the proposed exchange mechanism in a residential EC setting. ACKNOWLEDGMENT This research has received funding through the ERA-Net Smart Grids Plus project Grid-Friends, with support from the European Unions Horizon 2020 research and innovation programme, and is a part of Energy Transition Hub research at the University of Melbourne, Australia. REFERENCES [1] C. Rosen and R. Madlener, "Regulatory options for local reserve energy markets: Implications for prosumers, utilities, and other stakeholders," The Energy Journal, vol. 37, 2016. [2] J. Rodr´ıguez-Molina, M. Mart´ınez-N´unez, J.-F. Mart´ınez, and W. P´erez- Aguiar, "Business models in the smart grid: challenges, opportunities and proposals for prosumer profitability," Energies, vol. 7, no. 9, 2014. [3] F. Lezama, J. Soares, P. Hernandez-Leal, M. Kaisers, T. Pinto, and Z. Vale, "Local energy markets: Paving the path towards fully transactive energy systems." IEEE Transactions on Power Systems, 2018. [4] F. Hvelplund, "Renewable energy and the need for local energy markets," Energy, vol. 31, no. 13, pp. 2293 -- 2302, 2006. [5] M. Alizadeh, A. Scaglione, A. Goldsmith, and G. Kesidis, "Capturing aggregate flexibility in demand response," in 53rd IEEE Conference on Decision and Control, Dec 2014, pp. 6439 -- 6445. [6] D. T. Nguyen, M. Negnevitsky, and M. de Groot, "Pool-based demand response exchange; concept and modeling," IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 1677 -- 1685, Aug 2011. [7] F. N. Claessen, M. Kaisers, and H. L. Poutre, "Efficient balancing by effort-based activation of demand response services," in 2016 IEEE Innovative Smart Grid Technologies Conference Europe, 2016, pp. 1 -- 6. [8] H. Kanchev, D. Lu, F. Colas, V. Lazarov, and B. Francois, "Energy management and operational planning of a microgrid with a pv-based active generator for smart grid applications," IEEE Transactions on Industrial Electronics, vol. 58, no. 10, pp. 4583 -- 4592, Oct 2011. [9] J. M. Guerrero, J. C. Vasquez, J. Matas, L. G. de Vicuna, and M. Castilla, "Hierarchical control of droop-controlled ac and dc microgridsa general approach toward standardization," IEEE Transactions on Industrial Electronics, vol. 58, no. 1, pp. 158 -- 172, Jan 2011. [10] S. Chakraborty and T. Okabe, "Optimal demand side management by distributed and secured energy commitment framework," IET Genera- tion, Transmission & Distribution, vol. 10, pp. 3610 -- 3621(11), Novem- ber 2016. [11] A. Agnetis, G. Dellino, G. D. Pascale, G. Innocenti, M. Pranzo, and A. Vicino, "Optimization models for consumer flexibility aggregation in smart grids: The address approach," in IEEE First International Workshop on Smart Grid Modeling and Simulation, 2011, pp. 96 -- 101. [12] S. Ø. Ottesen, A. Tomasgard, and S.-E. Fleten, "Prosumer bidding and scheduling in electricity markets," Energy, vol. 94, pp. 828 -- 843, 2016. en- elec- https://ec.europa.eu/energy/en/studies/ ergy tricity study-effective-integration-distributed-energy-resources-providing-flexibility-electricity, 2015, accessed: 2017-10-04. distributed to of flexibility for system," [13] "Study integration providing resources the [14] A. O'Sullivan and S. Sheffrin, Economics: Principles in Action. Pren- on the effective tice Hall, 2003. [15] R. Abe, H. Taoka, and D. McQuilkin, "Digital grid: Communicative electrical grids of the future," IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 399 -- 410, June 2011. [16] H. Moulin, Fair division and collective welfare. MIT press, 2004. [17] M. Colby, T. Duchow-Pressley, J. J. Chung, and K. Tumer, "Local approximation of difference evaluation functions," in Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems, 2016, pp. 521 -- 529. [18] "Pecan street inc. dataport," http://www.pecanstreet.org/, 2017, accessed: 2017-03-07. Fig. 4. Prosumer utility improvements of Individual control (horizontal) and Exchange and control (vertical) over No flexibility baseline, with marginal cumulative distributions. Prosumers are above the dashed equal improvements line, hence the new Exchange and control mechanism dominates Individual control, while also vastly improving relative fairness f20 ≈ 8.89 · 1010 (cid:29) f10 ≈ 3.24 · 103. presents the relative increase in utility (i.e. decrease in cost) for each prosumer of an EC with 30 prosumers, comparing the improvements of Individual control and Exchange and control over No flexibility. As seen in the figure, (ui(2) − ui(0)) dominates over (ui(1) − ui(0)) by placing itself over the dashed line and by exhibiting a smoother cumulative distri- bution. Therefore, it implies that the social welfare functions defined in Eq. 14 and Eq. 15 are maximized by Exchange and control mechanism. The Nash social welfare function essentially balances the efficiency and the fairness. Therefore, it is evident that the Exchange and control mechanism is efficient and fair with the proposed payment structure. VI. CONCLUSION In this paper, our first contribution is a market mechanism -- operating on a near real-time prosumer marketplace -- that ensures efficient allocation of flexible energy resources in residential Energy Cooperatives (ECs). Our Exchange and control mechanism is device-agnostic as it does not require detailed modeling of the locally and independently controlled distributed flexible devices (e.g. batteries). The mechanism's payment function rewards participating prosumers based on their marginal contributions to the joint system states (i.e. loss reduction), which encourages the prosumers to participate in the exchange market while also resolving the conflict of interest between prosumers. This results in an improved utilitarian social welfare and improved fairness w.r.t. Nash social welfare. Due to the bidding and exchange execution in a near real-time fashion, the proposed mechanism inherently reduces the necessity of predicting demand and generation that are required for bidding in the day-ahead market. A detailed 0246810ui(1)−ui(0)0246810ui(2)−ui(0)Number of Prosumers: 30
1907.09198
1
1907
2019-07-22T09:31:09
Today Me, Tomorrow Thee: Efficient Resource Allocation in Competitive Settings using Karma Games
[ "cs.MA", "cs.AI", "cs.GT" ]
We present a new type of coordination mechanism among multiple agents for the allocation of a finite resource, such as the allocation of time slots for passing an intersection. We consider the setting where we associate one counter to each agent, which we call karma value, and where there is an established mechanism to decide resource allocation based on agents exchanging karma. The idea is that agents might be inclined to pass on using resources today, in exchange for karma, which will make it easier for them to claim the resource use in the future. To understand whether such a system might work robustly, we only design the protocol and not the agents' policies. We take a game-theoretic perspective and compute policies corresponding to Nash equilibria for the game. We find, surprisingly, that the Nash equilibria for a society of self-interested agents are very close in social welfare to a centralized cooperative solution. These results suggest that many resource allocation problems can have a simple, elegant, and robust solution, assuming the availability of a karma accounting mechanism.
cs.MA
cs
To appear in the Proceeding of the 22nd IEEE Intelligent Transportation Systems Conference, ITSC 2019. Today Me, Tomorrow Thee: Efficient Resource Allocation in Competitive Settings using Karma Games Andrea Censi, Saverio Bolognani, Julian G. Zilly, Shima Sadat Mousavi, Emilio Frazzoli 9 1 0 2 l u J 2 2 ] A M . s c [ 1 v 8 9 1 9 0 . 7 0 9 1 : v i X r a Abstract -- We present a new type of coordination mechanism among multiple agents for the allocation of a finite resource, such as the allocation of time slots for passing an intersection. We consider the setting where we associate one counter to each agent, which we call karma value, and where there is an established mechanism to decide resource allocation based on agents exchanging karma. The idea is that agents might be inclined to pass on using resources today, in exchange for karma, which will make it easier for them to claim the resource use in the future. To understand whether such a system might work robustly, we only design the protocol and not the agents' policies. We take a game-theoretic perspective and compute policies corresponding to Nash equilibria for the game. We find, surprisingly, that the Nash equilibria for a society of self-interested agents are very close in social welfare to a centralized cooperative solution. These results suggest that many resource allocation problems can have a simple, elegant, and robust solution, assuming the availability of a karma accounting mechanism. I. INTRODUCTION The very survival and success of a society with shared resources depends on the rules and protocols agents use to interact with each other. In designing the rules of these societies, there is always a trade-off concerning centralization, efficiency, robustness, and resiliency. A centralized system for resource allocation needs more infrastructure and is less robust and resilient, yet it is the most efficient. A distributed system is more resilient and privacy-preserving. In intelligent transportation systems, we can distinguish the "macro" level of the fleet, and the "micro" level of the vehicles. At the macro level, much research has shown how it is possible to obtain a substantial improvement in the efficiency of a transportation network [1], [2] by optimizing resource use through cooperative approaches; that is, one takes the perspective of a single agent which is able to control centrally a fleet of vehicles. At the micro level there are similar resource allocation problems. Because of the advent of self-driving cars to be used in autonomous mobility on demand networks, the 'micro' coordination problems become interesting, as we study how the codes, customs, and conventions of human drivers can be generalized to a scenario with both artificial and human agents. The authors are with the Institute for Dynamic Systems and Control (IDSC) and the Automatic Control Laboratory (IfA) at ETH Zurich, 8092 Zurich, Switzerland. E-mail: {acensi, bsaverio, jzilly, mousavis, efrazzoli}@ethz.ch c(cid:13)2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Fig. 1. We propose an innovative approach to the problem of resource allocation in a competitive setting based on the notion of "karma", an accounting system that summarizes the agent's actions in the past. The karma system allows agents to accept to give in at a particular interaction, while receiving a karma compensation. This allows an overall more efficient use of resources. Agents interact by meeting in pairs, e.g. {i, j}, and bid on the resource by sending messages {mi, mj} specifying how much karma they are willing to bid in that particular interaction. The agent with the larger bid wins and gets access to the limited resource which in this case is access to an intersection leading to no delay δ in travel time for the winner. The prototypical problem is intersection management. Deciding which car may pass first is a resource allocation problem, in which the resource is the use of the space inside the intersection in a given time interval. Similar resource allocation problems happen also in maneuvers outside of intersections, as drivers compete for the use of space, although the outcome is not as simple as a discrete decision as in intersection management. These interactions happen between independent agents, with competitive goals, and typically are not repeated, as it is rare to encounter the same vehicle again. Therefore, there is little incentive to give in at one interaction; at face value, this appear to be a non-repeated game. Typical human drivers do not act like self-interested agents. Humans have ways to communicate urgency and politely negotiate maneuvers while they drive. Ultimately this is due to the altruism and pro-sociality bias that evolved in our species [3]; the bias makes the single individual intrinsically happy to accommodate somebody who seems to be in a hurry. Our species thrived because individuals are not completely self-interested. When we lived in tribes, deviant antisocial behavior was easily spotted and repressed; now that our social groups are counted in the billions, a set of rules (laws) and corresponding incentives (punishments) help in aligning the individual and societal interests in the handling of common resources [4]. When driving, some of our behaviors derive from these incentives (we do not speed because we are afraid of tickets), but many polite behaviors are due to our visceral intrinsic motivation rather than extrinsic rewards/punishment. How can we ensure that a population of artificial agents, such as self-driving cars, can attain the same efficiency of a pro-social species like humans? In this paper, we consider the problem of resource allocation in a setting that we call Karma Game. The idea is that considerable gains can be realized if an agent is inclined to give in at one interaction, if it is compensated with "karma". Thus, we introduce karma as a way to account for an agent's past actions. (This concept is closer to how "karma" is used in video game mechanics, rather than to how it is understood in Indian religions.) We define a karma protocol with which agents can negotiate the use of resources. The protocol describes the exchange of bidding messages and how karma is updated based on the outcome of the interaction. The protocol does not need a third party, and the primitives needed to implement karma accounting and the interaction are those provided by many blockchains, such as Ethereum [5]. Having fixed the protocol, we study how a population of self-interested agents will use it, by computing the Nash equilibria for the resulting Karma game. We then compare the Nash equilibria of the distributed system with the baseline of the optimal centralized policies. We observe that the efficiency of the system is remarkably similar. The social welfare is thus closely aligned with the self-interest of the agents, assuming the agents have reasonable discount factors. An agent that does not care about the future and lives for the present will also create an inefficient society. II. RELATED WORK a) Intersection control: Traditional intersection control strategies have been substantially based on utilizing control devices such as traffic lights, in which an offline optimization based on historical data can be used to provide a control signal [6], [7]. The main drawback of this control strategy is that it cannot adapt to changes in request patterns and environment. Improving upon classical control strategies, communication-based schemes [8] are based on a competitive scenario, in which different vehicles aim at minimizing their own selfish cost. It is assumed that the urgency ui(t) is a piece of private information of each vehicle i, and is therefore not accessible to other vehicles. This kind of scenario is typically tackled via auctions, which can be designed in order to induce selfish agents to disclose their true urgency [9] -- [16]. For example, in [9], the earliest time-slot in an intersection is auctioned off by an intersection manager among all vehicles at the front of each lane. In [10], having an infinite budget, any agent in a lane can participate in a second-price auction to enhance the winning chance of the agent at the front. In [11], a mechanism based on a first-price auction is proposed for the management of intersections. Two scenarios for single intersection and a network of intersections are considered in [12], and a policy based on a combinatorial auction for assigning the reservations of time-space slots is presented. However, finding the winner of a combinatorial auction is NP-hard [17]. Finally, to schedule the intersection usage, [16] proposes a variant of the Vickrey-Clarke-Groove mechanism in which an intersection unit charges each agent at the front of any lane with a time-token based on its impact on others. Almost all works in the literature which proposed an auction-based approach for the intersection control are static, one-time decision problems. However since the urgencies and the agent's private information change over time, a sequence of decisions needs to be made, resulting in a dynamic resource allocation and a dynamic bidding process [18]. Thus, the utility function of each agent along with the social welfare are defined based on the discounted utility over time. We assume that in every interaction, vehicles are allowed to communicate a scalar message mi(t). The karma value of each agent is a public state ki(t). Both the outcome of the interaction (who goes first) and the update of the public state ki are determined based on a set of rules which are known and verifiable to all agents (as they only depend on public information: the states ki, kj and the messages mi, mj). b) Karma-like concepts: A "karma" system was in- troduced in [19] in the context of file-sharing to prevent "freeloading" in peer-to-peer networks. In this framework, karma represents the standing of each agent in the system, that increases when contributing and decreases when consuming a resource, and thereby incentivizes agents to contribute resources [20]. In this and similar systems, the "value" of the karma is fixed -- in our approach, the agents are free to assign a value to karma according to their goals and current state. We note that our approach departs from the auction-based schemes in the mentioned papers in that to maintain the fair- ness properties between wealthier drivers and those without many funds, it does not require any monetary transactions, and therefore does not require to attach an objective value to the cost incurred by the vehicles. We will discuss later how this sheds light on the true nature of this coordination problem. Any vehicle is assigned an initial karma level. In light of the budget-balance property of our mechanism, the total amount of karma remains constant over the whole transportation network. Also, unlike the assumption in [10], every agent is assumed to have a limited total karma at any time period, which neither is negative, nor exceeds a maximum value. c) Population games: This competitive scenario can be modeled as a repeated game (interactions) between randomly selected agents in a large population. For the analysis of the resulting game, we adopt the approach that is typically used in the study of population games [21], which has its underpinnings in the following abstractions: 1) populations are continuous rather than discrete; the payoffs to a given strategy therefore depend on society's aggregate behavior in a continuous fashion; 2) the aggregate behavior in a population game is described by a "social state", which specifies the empirical distribution of strategy choices (or types) in the population; for simplicity, this social state is generally finite-dimensional. The specific application that we are considering has however some peculiarities, compared to standard population games: for example, each agent's type is also determined by an exogenous time-varying signal (their urgency). Moreover, there is no natural revision protocol or adaptation, and therefore no evolution of the agents. We therefore prefer to present the resulting game in a self- contained and specialized form, without explicitly tapping into that literature for definitions or results. Notice that the game we are formulating is more general than the specific traffic interaction problem, although clearly inspired by that setup. III. RESOURCE ALLOCATION IN A "DRIVE-BY" SCENARIO In this section we introduce a deliberately simple model for vehicle-to-vehicle interaction at intersections. We strove to simplify the model to its core features, in order to isolate the essential phenomena in this problem. We understand the problem of vehicle-to-vehicle interaction at intersections as an example of a "drive-by" scenario, in which: 1) There is a large number of agents in the systems. 2) Agents interact with a random schedule. 3) Each agent interacts many times with other agents over its lifetime. 4) The value of a resource to an agent varies in time according to an exogenous factor. For vehicle-to-vehicle (V2V) interactions at intersection: 1) There is a large number of cars on the road. 2) Cars meet randomly at intersections. 3) Each car encounters many intersections over its lifetime. 4) The value of time saved to a car varies in time according to its urgency on that day. A. Formalization More formally, consider a population N of N vehicles. Each vehicle i ∈ N has an associated urgency process ui(t). The urgency ui at time t indicates the marginal value that agent i gives to a unitary delay in its trip. It is an exogenous process that is not affected by the behavior of the vehicles. The vehicles interact at intersections. Each interaction at time t involves only a pair of vehicles I(t) = {i, j} ⊂ N . Every time two vehicles interact, one of the two vehicles is necessarily delayed by a unitary delay, while the other vehicle does not incur any delay. We therefore have two possible outcomes o(t), that is o(t) ∈ O := {i, j}. Agent i (and, in a completely symmetric way, agent j) incurs a cost c : O × U → R+ that is a function of the outcome and of its own urgency, and is defined as (cid:40) ci(o, ui) = B. Assumptions ui, 0, if o = i; otherwise. (1) We propose the following assumptions about the model. Assumption 1 (Randomness of encounters). The sequence I(t) is random and identically distributed at all times t over the set {I ⊂ N ,I = 2}, and each vehicle has the same probability of belonging to I(t) at a given t. Assumption 2. The urgency processes ui(t) are identical for all vehicles i ∈ N . The urgency at each time t is independent and identically distributed, and takes values in U := {0, U}. We defer the discussion on how to relax these assumptions to Section VIII. For the most part, these assumptions are introduced for technical convenience, as they yield a simpler analysis, a computational advantage (see also Section VI), and a more immediate interpretation of the results. C. Performance measures The focus of this paper is on policies that allow to decide o(t) optimally, where the notion of optimality is to be defined hereafter. We define two measures of social cost for the entire popu- lation, which are associated to two different interpretations. The first measure simply quantifies the expected aggregate cost for the entire system at each interaction: W1 := E(cid:2)(cid:80) (cid:96)∈N c(cid:96)(o(t), u(cid:96)(t))(cid:3). The second measure quantifies the expected rate at which the variance (across agents) of the accumulated cost grows: W2 = lim t→∞ E [var a(t + 1) − var a(t)] (cid:1)2 where (cid:80) (cid:0)a(cid:96) − 1 (cid:80) defined element-wise as a(cid:96)(t) = (cid:80)t var a := 1 N (cid:96)∈N and a denotes the vector of accumulated costs of the agents, τ =0 c(cid:96)(o(t), u(cid:96)(t)). In these expressions, E [·] represents the expectation with respect to both the stochastic urgency processes and the interaction selection process (which are independent processes). k∈N ak N D. Centralized policies In this section, we derive the optimal centralized policies for the simplified intersection management problem that we presented, under the notions of social optimality that we described. These optimal centralized policies will constitute a baseline for the analysis of the policies that emerge in a distributed competitive setting. In a centralized setting, we are allowed to adopt causal policies of the kind o(t) = Π (cid:16)I(t),{u(τ )}t (cid:17) τ =0 ,{o(τ )}t−1 τ =0 , where by u(t), we indicate the past urgencies of all agents. Under Assumptions 1 and 2, the optimal policies for the two social costs W1 and W2 can be computed explicitly. Proposition 1. The social costs W1 and W2 are minimized, respectively, by the policies 1(t) ∈ arg min o∗ (cid:96)∈I(t) u(cid:96)(t) and 2(t) ∈ arg min o∗ (cid:96)∈I(t) a(cid:96)(t − 1) + u(cid:96)(t). (2) (3) If the arg min operation does not return a singleton, then any of the two choices is optimal. Here and thereafter, we assume that arg min ties are resolved via fair coin flipping. We also define a third centralized policy, which prioritizes the minimization of W1 (therefore obtaining the same value for W1 as o∗ 1) and, in case of ties between the urgencies ui and uj (where I = {i, j}), aims at minimizing the unfairness defined by W2: 1,2(t) ∈ arg min o∗ (cid:96)∈I(t) ui(t) = uj(t) ⇒ o∗ 1,2(t) ∈ arg min (cid:96)∈I(t) and u(cid:96)(t) a(cid:96)(t − 1) + u(cid:96)(t). (4) IV. RESOURCE ALLOCATION USING KARMA GAMES In this section, we formulate a mechanism for resource allocation based on the notion of karma. We only design the mechanism and not the agents' policy, which is going to be found automatically through optimization. A. Informal definition of karma interaction mechanism We assume that there is an integer counter ki(t) (karma) associated to each agent bounded by kmax. The agents exchange one message at each interaction. Each agent i can produce a message mi which contains a value not to exceed its current karma: 0 ≤ mi(t) ≤ ki(t). We give this message the semantics of how much karma the agent sees fit to bid on the current interaction. The agent that provides the highest message is allowed to use the resource (go first at the intersection) and must pay the other agent up to the karma value that it has bet. The karma transferred is reduced if the transfer would make the other agent overflow kmax. Suppose that agent i wins betting mi. Then the karma transferred is min(mi, kmax − kj). Remark 1. In this paper we do not delve into the technical implementation of such a scheme, but we would like to remark that it is possible to implement such a scheme, in a completely distributed way, without an arbiter to preside at each interac- tion, by using some of the cryptographic primitives associated to blockchain technology. The counters are implemented using public addresses. Non-refutable messages are implemented using cryptographic commitments. The resolution and the outcome can be easily implemented using the primitives of, for example, Ethereum's Solidity language. B. Formal definition of Karma Game We formalize the discussion so far by defining Karma Games in a way that is slightly more general. Definition 1 (Karma Game in Tabular Format). A Karma Game G is a tuple G = (cid:104)K,M,O,U, p, c, α, γ, φ(cid:105), where: • K is a set of possible public states (karma) of an agent; • M is a set of possible messages of an agent; • O is a set of possible outcomes of an interaction; • U is a set of possible exogenous states of an agent and • c : O × U → R+ is the instantaneous cost for each agent, which depends on the outcome of the interaction and on the exogenous state of the agent; p is a probability distribution on U; • 0 ≤ α < 1 is a discount factor; • γ : K×M×K×M → P(O) is the interaction outcome • φ : K×M×K×M×O → P(K) is the state transition function, as a probability distribution on O; function. The interpretation is as follows. Suppose an agent of karma ki(t) meets an agent of karma kj(t), and they exchange messages mi(t) and mj(t). The function γ gives a distribution on the possible outcome o(t) ∈ O given by o(t) ∼ γ(ki(t), mi(t), kj(t), mj(t)). As for the consequences, φ is the map that specifies the probability distribution of the next value of ki and kj: ki(t + 1) ∼ φ(ki(t), mi(t), kj(t), mj(t), o(t)). The cost for each agent is given by the following series, where time is to be interpreted as ranging over the instants in which the agent participated in an interaction: C = E(cid:104)(cid:80) (cid:105) t=0 αtc(o(t), u(t)) . (5) C. Vehicle interaction as a Karma Game We now put in the form of Definition 1, the model we described so far. K = M is the set of integers up to kmax: K = {0, 1, 2, . . . , kmax}. There are two possible outcomes of each interaction, as explained in Section III: O = {i, j}. For the outcome distribution γ(ki, mi, kj, mj), we have 0, 1, 0.5, if mi > mj, if mi < mj, if mi = mj, P(o = i) = where we defined mi = min(mi, ki). For the state transition function φ(ki, mi, kj, mj, o), we have that with probability 1 ki(t + 1) = ki − min( mi, kmax − kj), min(ki + mj, kmax), if o(t) = i, if o(t) = j. (cid:40) These rules guarantee that • the total amount of karma is conserved. • karma is bounded above by kmax and below by 0. The cost function c is the one already defined in (1). V. ACTING RATIONALLY IN A KARMA GAME We now turn attention to what is the rational behavior of an agent in a Karma Game. An agent's behavior is completely defined by its policy. Definition 2 (Agent policy). In a Karma Game, the agent's policy π is a probability distribution over the possible messages, which varies as a function of the agent's current urgency ui(t) and current karma ki(t): mi(t) ∼ π(ui(t), ki(t)). As an agent, we need to decide what message to send for each combination of urgency ui ∈ U and karma ki ∈ K. In game theory jargon, we speak of a set A of different agent "types"; in this case, A (cid:39) U × K. The traditional notion of "agent type" does not fully capture our setting; because following an interaction, the type of an agent changes as they gain/lose karma. Moreover, the urgency is an exogenous variable that nobody can predict. Still, we use "agent type" in the following. Under our assumptions, it is easy to compute the optimal policy for an agent if the urgency is zero. In that case, the optimal action for the agent is to send a message mi(t) = 0. That is because the agent is indifferent to losing or winning the interaction regarding the cost; and, regarding the karma, the agent prefers to lose the interaction hoping to gain some karma. If an agent has a nonzero urgency, how much karma should she bid today? This does not have an easy answer, except in special cases. For example, if the discount factor α is zero -- the agent does not care about the future, then the optimal policy is to send the maximum message mi(t) = ki(t). In all other cases, we need to characterize and compute Nash equilibria for this game. Figure 2(a) shows a representation of such an optimal policy obtained as a Nash equilibrium. A. Characterization of Nash equilibria for a Karma Game To characterize the equilibrium of the game, we must consider, in addition to the policy, a series of other related quantities. These are: • D ∈ P(K) is the stationary distribution of karma values. • T : K → P(K) is a transition function for the karma levels; Figure 2(e) shows a representation of such a transition function. • c : K → R+ is the expected cost of one interaction, as Figure 2(c) shows a typical stationary distribution. a function of the agent's karma. The transition function T immediately descends from the composition of φ with the policy π and the outcome distribution γ, assuming the karma distribution D for the other agents and p for all agents' urgencies. To express c, it is convenient to define the function ρ(ui, ki, mi) which gives the expected utility of choosing message mi for an agent of type ui, ki. ρ(ui, ki, mi) = Dkj puj· (cid:88) mj∈M (cid:34) (cid:88) (cid:88) uj∈U o∈O (cid:88) kj∈K (cid:88) k(cid:48)∈K πmj (uj, kj) γo(ki, mi, kj, mj)· c(o, ui) + α φk(cid:48)(ki, mi, kj, mj, o)θ(k(cid:48)) (cid:35) . (6) Figure 2(b) shows a representation of a typical ρ. Based on this definition, the expected cost of an interaction is c(ki) = pui πmi(ui, ki)ρ(ui, ki, mi). (7) (cid:88) (cid:88) ui∈U mi∈M We can now define the notion of Nash equilibrium for a Karma Game. Definition 3 (Nash equilibrium for a Karma Game). A policy π is a Nash equilibrium for the Karma Game G if there exist D, T, c that satisfy three properties: P1: Stationarity: D is the equilibrium distribution for the transition map T : D =(cid:80) τ∈K Dτ T (τ ). P2: Bellman: There exists a function θ : K → R+, representing the expected total cost for an agent as a function of the present value of the karma, that satisfies the Bellman- like equation θ(k) = c(k) + α Tτ (k)θ(τ ) (8) (cid:88) τ∈K for the expected interaction cost c defined in (7) and the discount factor α. P3: Rationality: The policy π must yield the best expected outcome: C(π) ≤ C(π(cid:48)) ∀π(cid:48), where C was defined in (5) and can be expressed as (cid:88) ki∈K C = Dkiθ(ki). The next section will be devoted to the numerical compu- tation of a Nash equilibrium for the Karma Game of interest and to the interpretation of the resulting policies and outcome. VI. COMPUTING NASH EQUILIBRIA OF KARMA GAMES In general, Nash equilibria can be computed by iterative algorithms. Starting with an initial policy, one computes the other unknown (stationary distribution, karma utility); then one re-computes the optimal policy. If the recomputed policy is different from the initial one, the delta is a profitable perturbation of the policy. Based on the perturbation, one can make a small update of the policy, and repeat the process until convergence. If this process converges to a distribution, then by definition, we have found a Nash equilibrium as defined above. However, there is in general no guarantee that the iterative process converges. A. Fixed point computation We show here how to rearrange the equations to put them in the form of a fixed point. Suppose we have a current guess of the policy π, the stationary distribution D, and the utility θ. Step 1: Compute the policy π from the previous policy, the stationary distribution D, and the expected utility θ. The policy is computed using (9) based on the values of ρ obtained from (6). Step 2: Compute the transitions T from the policy π and the stationary distribution D. Given the policy and the stationary distribution, we can compute the transitions of the system. For each type ui, ki, we know the distribution of the types it will encounter, and we know their policy. Thus, we can compute the outcomes, and the consequences of the outcomes in terms of what will be the next value of ki. (a) (b) (c) (d) (e) Fig. 2. For a Karma Game, the definition of a Nash equilibrium (Definition 3) involves a policy, from which one can derive the other quantities. (a): Optimal policy as mapping from current karma level to likelihood of sending a given message m; (b) The expected utility of sending each message m as a function of karma levels. (c) Stationary karma distribution across all agents; (d) The expected utility of possessing a certain karma level. (e) The transitions show the likelihood of transitioning from a certain karma level to another level. (a) Iteration #74 (b) Iteration #305 (c) Iteration #705 (d) Iteration #954 Fig. 3. Evolution of policy as the temperature decreases in the simulated annealing procedure. The policy becomes progressively more rational, until we find a Nash equilibrium. (a) (b) (c) (d) Fig. 4. We investigate the effect of discounting future rewards. Displayed are discounting values α in the set {0, 0.3, 0.7, 1.0}. As time discounting α increases from 0 to 1, the future is valued higher and higher and less karma is bid for the same karma levels. rewards. As T → 0, the policy tends to the deterministic policy, where we select the maximum of ρui,ki(·): π(ui, ki, m) T→0−→ if m maximizes ρui,ki (m), 1, 0, otherwise. (cid:40) In the simulations, we gradually decrease the temperature of the system in a series of "eras" (Figure 3). C. Equilibria parametrization in α The parameter α introduced as a cost discounting factor in (5) determines how much importance an agent assigns to future costs. In the limit α (cid:28) 1, the agent is only occupied with minimizing instantaneous costs. When α approaches 1, future costs are deemed almost as important as present costs. To determine the influence this factor has on agent policies, we ran experiments with different α values ranging from 0 to 1 in 0.05 increments. As an overview of the effect, we provide Figure 4 which depicts the gradual changes in policy as α is increased. Similarly we offer Figure 5 as an overview of the effect of time discounting on the best message to send given a karma level. One caveat that we have is that the Nash equilibria are not well defined when α = 1 as some of the series in the formalization do not converge. Still, we also include the results of the algorithm for α = 1. Similarly, we believe that for α → 1 there are numerical instabilities, and in fact we find that there are much larger oscillations. Rather than tuning the optimization parameters for each α, we keep the same parameters, and we still picture the results for α = 0.9 and α = 0.95, without fully believing they are Nash equilibria for the game. VII. POLICY COMPARISON In this section, we are interested in gaining an empirical understanding of different solutions to the proposed distributed interaction problem. a) Evaluation protocol: All simulations of interactions follow the same general procedure. As described in Section III, agents randomly meet in pairs and bid karma if they are urgent in order to pass first in an intersection. All experiments were conducted with 200 agents and a total of 1000 time periods. On each day, there are an average of 0.1 interactions per agent. Agents are urgent with magnitude 3 with probability 0.5 and not urgent (magnitude 0) again with probability 0.5. Each agent has an initial karma level uniformly randomly chosen between 0 and 12. Agents can, through interactions, attain a minimum karma level of 0 and a maximum karma level of 12. In the following, we compare various policies as well as the underlying parameters influencing the agents' policies. We consider two performance metrics which are finite-sample proxies for W1 and W2, respectively: • "Inefficiency": This is the average cost per interaction attained by the agent at the end of the simulation period. Note that this is not the α-discounted factor that each agent is trying to minimize; rather, this is the social welfare -- which roughly corresponds to the case α = 1. Fig. 5. Expected message value given a karma level for mixed policies for different α discounting factors of future costs. Strategies with small discounting factor spend almost all available karma on a message whereas strategies with a large discounting factor save karma for the future. Step 3: Compute the stationary distribution D from the transitions T . This is a standard step - given a transition matrix, compute the equilibrium distribution. It can be done by iteration or by solving an eigenvector problem. Step 4: Compute the expected utility θ from D and π. We can compute the expected utility using (8). The expected daily cost c(k) is computed by setting α = 0 in (6). B. Momentum and simulated annealing We found two simple devices that make the convergence robust, in the sense that the policy converges to the same so- lution no matter the initial conditions of the policy, stationary distribution, and karma utility. 1) Momentum: In Section VI-A, we have defined a way to update the policy π that we can abstract as a function Ψ such that: πnew t = Ψ(πt, Dt, θt). Define the "momentum" τ as a scalar 0 < τ ≤ 1. Then we update the policy as πt+1 = τ πnew t + (1 − τ )πt. For the set of simulations described below the optimization parameters were constant, but we did find in general that for different values of the model properties, the optimization parameters had to be optimized. 2) Simulated annealing: Let T > 0 be a temperature parameter. Rather than looking for a pure strategy, we set π(ui, ki, mi) ∝ exp(−ρui,ki (mi)/T ). (9) For large values of T , agents choose a random action. As T decreases, the agents choose more often actions with good 024681012Karma024681012Expected value of messageNash equilibria (mixed strategies) α = 0.00 α = 0.05 α = 0.10 α = 0.15 α = 0.20 α = 0.25 α = 0.30 α = 0.35 α = 0.40 α = 0.45 α = 0.50 α = 0.55 α = 0.60 α = 0.65 α = 0.70 α = 0.75 α = 0.80 α = 0.85 α = 0.90 α = 0.95 α = 1.00 The baselines provide a reference frame to interpret the results for the karma-based policies. We find many interesting nuggets. For example, bid1-always is very inefficient, as inefficient as baseline-random, but it is less unfair. This is because the karma accounting keeps track of previous times when the agent lost, thereby slightly reducing the unfairness even if the policy is trivial. Next consider the performance of bid1-if-urgent. This corresponds to a mechanism in which the agents use the karma message to reveal their urgency. Notwithstanding the fact that this is not an equilibrium for the game (this can be easily verified by noting that this is not a fixed point of the procedure discussed above), what we found surprising is that the efficiency is not as good as some of the Nash equilibria that we find. Next we consider the performance of the Nash equilibrium as a function of α. The sequence draws a hook in the inefficiency/unfairness space. The continuity of this curve also is good evidence that the procedure converged well (as noted before, for α ≥ 0.9 the convergence is not assured). We find the surprising result that for α ≥ 0.4, the Nash equilibria are better in efficiency than the bid1-if-urgent strategy. The reason is that the agents should bid more or less if their karma levels allow -- bidding only 1 is not the best strategy (neither for the agents nor society). For α < 0.4, the agents do worse. The α = 0 "there is no tomorrow" strategy (bid everything if urgent) is particularly bad for society, though not as bad as random: karma still allows some reparations to be made. We observe that for α > 0.4, the karma strategies beat the centralized-urgency strategy in unfairness. There is a minimum unfairness observed for α = 0.8 -- we are not sure how this relates to the parameters of the problem. In these experiments, for α = 0.85, the performance is closest to the centralized-urgency strategy in both inefficiency and unfairness, in fact surprisingly close. In conclusion, we obtain the surprising result that, for agents that are reasonably future-conscious, Nash equilibrium strategies beat heuristic solutions in both efficiency and fairness, and their performance is extremely close to the centralized solutions. VIII. CONCLUSIONS We have demonstrated how the efficient use of a shared infrastructure can emerge from simple coordination protocols among competitive agents, without the need of any monetary transaction or complex decision infrastructures, in sharp contrast to most of the literature. The enabler is the notion of karma: a public state that links the decision of the same agent at different times (as long as each agent reasonably values its own future cost). A solid understanding of the mechanisms that are necessary and sufficient for fair sharing of an infrastructure has the potential to guide the design of scalable solutions in many applications, and in particular for autonomous mobility. Fig. 6. Overview of efficiency and unfairness of random, centralized and karma-based strategies. Random solutions fare the worst in both domains whereas centralized solutions with access to all information are optimal to their respective objectives. Karma-based solutions describe a trend of better efficiency and fairness with increasing discount factor α up to a limit. • "Unfairness": This is the standard deviations of the costs at the end of the simulation period. b) Policies: In addition to the Nash equilibria found for sweeping α between 0 and 1, we consider these other policies, as they are useful reference points: • baseline-random: The winner is decided randomly. • bid1-always: The agents always bid 1. • bid1-if-urgent: The agents bid 1 if the urgency is nonzero, and zero otherwise. • centralized-cost: The policy (3). • centralized-urgency: The policy (2). • centralized-urgency-then-cost: The policy (4). c) Results: The overall results are shown in Figure 6. baseline-random (top right) obtains the worst results, as one might expect. centralized-urgency-then-cost (bottom left) obtains the best results for both fairness and efficiency, as expected. centralized-cost does well in terms of unfairness, as it tries to reduce the spread of the costs, but it is very inefficient. centralized-urgency obtains minimum inefficiency (as pre- dicted), but it does not do anything to reduce the spread of the costs, leading to a relatively high unfairness. 0.40.50.60.7Inefficiency (mean of cost)0.100.120.140.160.180.200.22Unfairness (std-dev of cost)baseline-randombid1-alwaysbid1-if-urgentcentralized-costcentralized-urgencycentralized-urgency-then-costbaseline-randombid1-alwaysbid1-if-urgentcentralized-costcentralized-urgencycentralized-urgency-then-costα = 0.00α = 0.05α = 0.10α = 0.15α = 0.20α = 0.25α = 0.30α = 0.35α = 0.40α = 0.45α = 0.50α = 0.55α = 0.60α = 0.65α = 0.70α = 0.75α = 0.80α = 0.85α = 0.90α = 0.95α = 1.00 [14] J. Raphael, E. I. Sklar, and S. Maskell, "An intersection-centric auction- based traffic signal control framework," in Agent-Based Modeling of Sustainable Behaviors, 2017, pp. 121 -- 142. [15] I. K. Isukapati and S. F. Smith, "Accommodating high value-of-time drivers in market-driven traffic signal control," in IEEE Intell. Vehicles Symp., 2017, pp. 1280 -- 1286. [16] M. O. Sayin, C.-W. Lin, S. Shiraishi, J. Shen, and T. Bas¸ar, "Information- driven autonomous intersection control via incentive compatible mechanisms," IEEE Trans. Intell. Trans. Sys., no. 99, pp. 1 -- 13, 2018. [17] N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic game theory. Cambridge University Press, 2007. [18] D. Bergemann and M. Said, "Dynamic auctions," Wiley Encycl. Operations Research and Management Science, 2010. [19] V. Vishnumurthy, S. Chandrakumar, and E. G. Sirer, "Karma: A secure economic framework for peer-to-peer resource sharing," in Workshop on Economics of Peer-to-peer Systems, vol. 35, no. 6, 2003. [20] F. D. Garcia and J.-H. Hoepman, "Off-line karma: A decentralized currency for static peer-to-peer and grid networks," in 5th International Networking Conference (INC05), 2004, pp. 325 -- 332. [21] W. H. Sandholm, Population Games and Evolutionary Dynamics, ser. Economic Learning and Social Evolution. MIT Press, 2010. REFERENCES [1] S. Samaranayake, K. Spieser, H. Guntha, and E. Frazzoli, "Ridepooling with trip-chaining in a shared-vehicle mobility-on-demand system," in 20th IEEE Intell. Transp. Syst. Conf., 2017, pp. 1 -- 7. [2] C. Ruch, S. Horl, and E. Frazzoli, "Amodeus, a simulation-based testbed for autonomous mobility-on-demand systems," in 21st IEEE Intell. Transp. Syst. Conf., 2018, pp. 3639 -- 3644. [3] R. Kurzban, M. N. Burton-Chellew, and S. A. West, "The evolution of altruism in humans," Annual Review of Psychology, vol. 66, no. 1, pp. 575 -- 599, 2015, pMID: 25061670. [4] E. Ostrom, Governing the commons. Cambridge University Press, 2015. [5] G. Wood et al., "Ethereum: A secure decentralised generalised transaction ledger," Ethereum project yellow paper, 2014. [6] D. I. Robertson, "Transyt: a traffic network study tool," Tech. rep., Rep. LR 253, 1969. [7] A. G. Sims and K. W. Dobinson, "The Sydney Coordinated Adaptive Traffic (SCAT) system philosophy and benefits," IEEE Trans. vehicular tech., vol. 29, no. 2, pp. 130 -- 137, 1980. [8] L. Chen and C. Englund, "Cooperative intersection management: A survey," IEEE Trans. Intell. Trans. Sys., vol. 17, no. 2, 2016. [9] H. Schepperle, K. Bohm, and S. Forster, "Towards valuation-aware agent-based traffic control," in Int. Joint Conf. Auton. Agents, 2007. [10] D. Carlino, S. D. Boyles, and P. Stone, "Auction-based autonomous intersection management," in 16th IEEE Intell. Transp. Syst. Conf., 2013, pp. 529 -- 534. [11] M. W. Levin and S. D. Boyles, "Intersection auctions and reservation- based control in dynamic traffic assignment," Transp. Res. Rec.: J. Transp. Res. Board, no. 2497, pp. 35 -- 44, 2015. [12] M. Vasirani and S. Ossowski, "A market-inspired approach for inter- section management in urban road traffic networks," J. Artif. Intell. Res., vol. 43, pp. 621 -- 659, 2012. [13] M. Mashayekhi and G. List, "A multi-agent auction-based approach for modeling of signalized intersections," in Workshop Synergies Between Multiagent Syst., Mach. Learn. Complex Syst., 2015.
1901.10564
2
1901
2019-02-04T21:46:45
Directed Formation Control of n Planar Agents with Distance and Area Constraints
[ "cs.MA", "eess.SY" ]
In this paper, we take a first step towards generalizing a recently proposed method for dealing with the problem of convergence to incorrect equilibrium points of distance-based formation controllers. Specifically, we introduce a distance and area-based scheme for the formation control of $n$-agent systems in two dimensions using directed graphs and the single-integrator model. We show that under certain conditions on the edge lengths of the triangulated desired formation, the control ensures almost-global convergence to the correct formation.
cs.MA
cs
Directed Formation Control of n Planar Agents with Distance and Area Constraints Tairan Liu, Marcio de Queiroz, Pengpeng Zhang and Milad Khaledyan Abstract -- In this paper, we take a first step towards general- izing a recently proposed method for dealing with the problem of convergence to incorrect equilibrium points of distance-based formation controllers. Specifically, we introduce a distance and area-based scheme for the formation control of n-agent systems in two dimensions using directed graphs and the single- integrator model. We show that under certain conditions on the edge lengths of the triangulated desired formation, the control ensures almost-global convergence to the correct formation. I. INTRODUCTION Formation control is an important problem in multi-agent coordination and cooperation where the objective is for agents to form a prescribed geometric shape in space. This requirement is intrinsic to tasks such as area coverage, perimeter protection, and co-transportation of large objects. One of two methods are typically used in formation control: i) regulate the relative position of certain agent pairs to prescribed values [1], [2], or ii) regulate a set of inter- agent distances (magnitude of the relative position vector) to prescribed values [3], [4]. The first method requires the agents to have a common global coordinate frame or that their local coordinate frames be aligned which may not be feasible in practice. On the other hand, the feedback variables in the second method can be calculated in each agent's local coordinate frame, which do not have to be aligned with a global coordinate frame or with each other. As a result, the desired formation is, at best, only acquired up to translation and rotation; i.e., the agents can converge to any formation that is isomorphic to the desired one. An important consideration in the distance-based method is how to prevent agents from converging to a formation that is equivalent but noncongruent to the desired one (see Section II-A for the formal definitions of equivalency and congruency). Such formations are undesirable because they do not have the same shape or orientation as the prescribed formation, although they satisfy the set of distance con- straints. In other words, the distance constraints do not uniquely define the relative positions of the agents and lead to positional ambiguities [5]. Rigid graph theory provides a partial solution to this problem by requiring the formation graph to be rigid [6], [7]. Specifically, imposing a minimum number of distances to be controlled reduces the undesirable Tairan Liu, Marcio de Queiroz, and Pengpeng Zhang are with the Department of Mechanical and Industrial Engineering, Louisiana State Uni- versity, Baton Rouge, LA 70803, USA (Email: [email protected]; [email protected]; [email protected]). Milad Khaledyan is with the Department of Electrical and Computer Engineering, Uni- versity of New Mexico, Albuquerque, NM 87131, USA (Email: [email protected]). "equilibrium points" to formations that are flipped/reflected versions of the desired one [5]. Then, the determining factor whether convergence is to a congruent formation or a flipped formation is the initial condition of the rigid formation. That is, rigidity distance-based formation controllers only have local stability properties. A few approaches have been recently proposed to address the aforementioned issues with distance-based controllers. In [8], a combination of inter-agent distance and angular con- straints was used to reduce the likelihood of convergence to noncongruent formations in two dimensions (2D). Although the region of attraction of the desired equilibrium can be somewhat enlarged by a proper choice of control gains, the stability of the control proposed in [8] is still local in nature. An extension of this work to 3D appeared in [9] by using area and volume constraints. The control method avoids flipped formations but introduces other undesired equilibrium points due to the multiple local minima of the proposed potential function. A related approach was introduced in [10] for the single-integrator agent model where the signed area of a triangle was employed as a controlled variable to prevent flipped formations. That is, the sign of the area enclosed by the formation along with the inter-agent distances were used to uniquely define the correct formation up to translation and rotation. The formation control law in [10] was based on the gradient of a potential function that incorporates distance error and signed area error terms and on the use of undirected graphs (i.e., bidirectional sensing and control). Convergence analyses were conducted for special cases of 3- and 4-agent planar formations. The purpose of this paper is to explore the approach intro- duced in [10] further. Specifically, we aim to generalize the approach to systems of n agents while introducing explicit, sufficient conditions for convergence to the 2D desired for- mation. The key to our solution is triangulating the directed formation graph to facilitate the use of interconnected system theory. The use of a directed graph has the added benefit of leading to a unidirectional formation controller. Under our solution, mild conditions are imposed on the edge lengths of the interconnected triangles, and the overall formation graph is required to be a Leader-First-Follower (LFF) type of minimally persistent directed graph [11]. We show that our gradient-type control law ensures convergence to the desired formation as long as the leader and first follower are not initially collocated. That is, no restrictions are placed on the initial conditions of the ordinary followers. The closed-loop system is proven to have an almost-global asymptotic equi- librium point corresponding to the desired formation. Thus, the collinear invariant set and flipped formation problems are hereby solved by the proposed control scheme. We note that our result is not a straightforward extension of [10] since the interconnected triangles form coupled nonlinear subsystems, which complicates the stability analysis of the overall system. II. BACKGROUND MATERIAL A. Undirected Graphs An undirected graph G is represented by a pair (V, E), where V = {1, 2, ..., n} is the set of vertices and E = {(i, j) i, j ∈ V, i 6= j} ⊂ V × V is a set of undirected edges. The total number of edges in E is denoted by a ∈ {1, ..., n(n − 1)/2}. The set of neighbors of vertex i ∈ V is represented by (1) Ni(E) = {j ∈ V (i, j) ∈ E}. If p = [p1, ..., pn] ∈ R2n where pi ∈ R2 is the coordinate of the ith vertex, then a framework F is defined as the pair (G, p). 1 2 R(p) = The edge function γ : R2n → Ra is defined as γ(p) = [...,pi − pj2, ...], (i, j) ∈ E (2) such that its mth component, pi − pj, relates to the mth edge of E connecting the ith and jth vertices. The rigidity matrix R : R2n → Ra×2n is given by ∂γ(p) ∂p (3) where we have that rank[R(p)] ≤ 2n − 3 [6]. Frameworks (G, p) and (G, p) are equivalent if γ(p) = γ(p), and are congruent if pi − pj = pi − pj, ∀i, j ∈ V [12]. w − z = T (w) − T (z), ∀w, z ∈ R2. An isometry of R2 is a map T : R2 → R2 satisfying [7] (4) This map includes rotation and translation of the vector w−z. Two frameworks are isomorphic if they are correlated via an isometry. It is obvious that (2) is invariant under isomorphic motions of the framework. A framework F = (G, p) is rigid in R2 if all of its motions satisfy pi(t) = T (pi), ∀i ∈ V and ∀t ∈ [0, 1]; i.e., the family of frameworks F (t) is isomorphic [6], [7]. Some related notions of rigidity are the following. A generic framework (G, p) is infinitesimally rigid if and only if rank[R(p)] = 2n − 3 [7]. A rigid framework is said to be minimally rigid if and only if a = 2n − 3 [5]. If the infinitesimally rigid frameworks (G, p) and (G, p) are equivalent but not congruent, then they are referred to as ambiguous [5] since the edge function cannot uniquely define the framework. Common types of ambiguities are shown in Figure 1. Note that reflected frameworks are an extreme form of flip ambiguity where more than one vertex is flipped. In fact, reflections are the only form of flip ambiguity that can occur in a triangular framework. B. Directed Graphs A directed graph G is a pair (V, Ed) where the edge set Ed is directed in the sense that if (i, j) ∈ Ed then i is the source vertex of the edge and j is the sink vertex. For i ∈ V , the out-degree of i (denoted by out(i)) is the number of edges in Ed whose source is vertex i and sinks are in V − {i}. Fig. 1. Types of ambiguous frameworks. For directed graphs, the notion of rigidity defined in Sec- tion II-A is not enough to maintain the formation structure (see [13] for an example), and two additional concepts are needed. The first one is the notion of a constraint consistent graph. As explained in [13], the intuitive meaning of constraint consistency is that every agent is able to satisfy all its distance constraints when all the others are trying to do the same. A sufficient condition for a directed graph (cid:0)V, Ed(cid:1) in R2 to be constraint consistent is that out(i) ≤ 2 for all i ∈ V (see Lemma 5 of [14]). The second concept is graph persistency, which has the meaning that, provided all agents are trying to satisfy their distance constraints, the structure of the agent formation is preserved [13]. A directed graph is persistent if and only if it is constraint consistent and its underlying undirected graph is infinitesimally rigid (see Theorem 3 of [14]). A persistent graph in R2 is said to be minimally persistent if no single edge can be removed without losing persistence. A necessary condition for a persistent graph in R2 to be minimally persistent is out(i) ≤ 2 for all i ∈ V , while a sufficient condition is minimal rigidity [14]. Starting from two vertices with an edge, a minimally persistent (resp., rigid) graph can be constructed by the Henneberg insertion of type I [15], i.e., iteratively adding a vertex with two outgoing (resp., undirected) edges. Henceforth, we refer to a graph constructed in this manner as a Henneberg graph. C. Signed Area The signed area of a triangular framework, S : R6 → R, is defined as [10] (p3 − p1)⊺ J (p3 − p2) (5) (6) det(cid:20) 1 p1 1 p2 S(p) = 1 2 where 1 1 2 p3(cid:21) = −1 0 (cid:21) . 0 1 J =(cid:20) This quantity is positive (resp., negative) if the vertices are ordered counterclockwise (resp., clockwise). Further, (5) is zero if any two vertices are collocated or the three vertices are collinear. A Henneberg framework can be divided into triangular sub-frameworks. Therefore, the signed area of a Henneberg framework with n vertices and directed edge set Ed, χ : R2n → Rn−2, is defined as det(cid:20) 1 χ(p) =(cid:20)..., ∀(k, i), (k, j) ∈ Ed − {(2, 1)} pk(cid:21) , ...(cid:21) , 1 pj 1 2 (7) pi 1 such that its mth component is related to the signed area of the mth triangle constructed with vertices i, j, and k. For example, the signed area of the framework in Figure 2a is given by the equation has no real solution if Λ > 0 and P > 0, or Λ > 0 and D > 0. Corollary 1: Consider the equation ax4 + bx3 + cx2 + dx + e = 0 (10) (p3 − p1)⊺ J (p3 − p2) , χ(p) =h 1 (p4 − p2)⊺ J (p4 − p3) , 1 2 1 2 2 (p5 − p3)⊺ J (p5 − p4)i, (8) where the three elements of χ(p) are positive, negative, and positive, respectively. For the framework in Figure 2b, it would be (p3 − p1)⊺ J (p3 − p2) , χ(p) =h 1 (p4 − p1)⊺ J (p4 − p2) , 1 2 1 2 2 (p5 − p3)⊺ J (p5 − p4)i. (9) where 1 2 1δ2 δ4 1γ 3 + δ2 2 − δ4 δ2 1 + δ2 a = − 2δ2 1(γ − 2)2 b =δ1(γ 2 − 4)q2δ2 1(cid:18) 3 c = − 2 1 1γ − 3δ2 1 − 2δ2 4 3 − δ4 1δ2 1 + 2δ2 1 + 2δ2 2 − δ4 δ2 1γ 3(2δ2 δ1γ 2(2δ2 d = 1δ2 1δ2 1 + 2δ2 2δ2 1δ2 2 + δ2 2 + 2δ2 3 − δ4 3(cid:19) γ 2 − 4δ2 1(cid:0)δ2 2 − 2δ2 3)× 2δ2 2 + 2δ2 3 3 3 − δ4 3(cid:1) γ 2 + δ2 q2δ2 e = − γ is a positive constant, and δ1, δ2, δ3 are the lengths of the edges of a triangle. If δ2 6= δ3 and 3 − δ4 2 + 2δ2 3 − δ4 3), 3 − δ4 2 − δ4 2δ2 1δ2 1 8 (11) (cid:12)(cid:12)(cid:12)(cid:12) δ2 3 − δ2 δ2 2 1 < 2√2, (cid:12)(cid:12)(cid:12)(cid:12) then there exists a γ > 0 such that (10) has no real solution for γ > max{γ, 2}. Proof: See Appendix VI-B. Fig. 2. Signed area examples. We introduce next is an extension of the concept of congruency that includes the signed area. Definition 1: Henneberg frameworks F = (G, p) and F = (G, p) where G = (V, E) are said to be strongly congruent if they are congruent and χ(p) = χ(p). We represent the set of all frameworks that are strongly congruent to F by SCgt(F ). It is obvious that frameworks that are congruent but not strongly congruent are reflected frameworks. Note that if F is a reflected version of F , then χ(p) = −χ(p). In summary, the signed area function will be used to rule out the the occurrence of framework ambiguities, especially reflections. Lemma 1: Henneberg frameworks F = (G, p) and F = (G, p) are strongly congruent if and only if they are equiv- alent and χ(p) = χ(p). Proof: See Appendix VI-A. D. Quartic Polynomials Lemma 2: [16], [17], [18], [19] For any quartic polyno- mial equation ax4 + bx3 + cx2 + dx + e = 0 where a 6= 0, Λ =256a3e3 − 192a2bde2 − 128a2c2e2 + 144a2cd2e − 27a2d4 + 144ab2ce2 − 6ab2d2e − 80abc2de + 18abcd3 + 16ac4e − 4ac3d2 − 27b4e2 + 18b3cde − 4b3d3 − 4b2c3e + b2c2d2, P =8ac − 3b2, D =64a3e − 16a2c2 + 16ab2c − 16a2bd − 3b4, Remark 1: The geometric meaning of condition (11) is discussed in Remark 3. Although the existence of the lower bound γ in Corollary 1 is guaranteed, a closed-form expres- sion for γ does not exist in general. However, γ can be easily determined by numerical means once δ1, δ2, and δ3 are selected. E. Stability Results Lemma 3: [20] Consider the system x = f (x, u) where x is the state, u is the control input, and f (x, u) is locally Lipschitz in (x, u) in some neighborhood of (x = 0, u = 0). Then, the system is locally input-to-state stable if and only if the unforced system x = f (x, 0) has a locally asymptotically stable equilibrium point at the origin. Lemma 4: [21] Consider the interconnected system Σ1: Σ2: x = f (x, y) y = g(y). (12) If subsystem Σ1 with input y is locally input-to-state stable and y = 0 is a locally asymptotically stable equilibrium point of subsystem Σ2, then [x, y] = 0 is a locally asymptotically stable equilibrium point of the interconnected system. III. PROBLEM STATEMENT pi = ui, i = 1, ..., N the kinematic equation Consider a system of N ≥ 2 mobile agents governed by (13) where pi ∈ R2 is the position of the ith agent relative to an Earth-fixed coordinate frame, and ui ∈ R2 is the velocity- level control input. The desired formation of agents is modeled by the di- rected framework F ∗ = (G∗, p∗) where G∗ = (V ∗, E ∗), i ∈ R2 denotes the dim(E ∗) = a, p∗ = [p∗ desired position of the ith agent. The fixed desired distance separating the ith and jth agents is defined as i, j ∈ V ∗ dji = p∗ i > 0, N ], and p∗ j − p∗ 1, ..., p∗ (14) We assume F ∗ is constructed to satisfy the following con- ditions: 3. Condition 1 out(1) = 0, out(2) = 1, and out(i) = 2,∀i ≥ Condition 2 If there is an edge between agents i and j, the direction must be i ← j if i < j. The above conditions imply that F ∗ should be a LFF- type minimally persistent formation [11], where agent 1 is the leader, agent 2 is the first follower, and agents i for i ≥ 3 are called ordinary followers. The actual formation of agents is modeled by F (t) = (G∗, p(t)) where p = [p1, ..., pN ]. Note that F and F ∗ share the same directed graph, which remains unchanged for all time. The physical meaning of (j, i) ∈ E ∗ in the actual formation is that agent j can measure its relative position to agent i, pj − pi, but not vice versa. The control objective of this paper is to ensure we propose the following control law u1 = 0 u2 = −α2z21 p21 uk = −αk (zki pki + zkj pkj ) − βk SijkJ ⊺ (pki − pkj) (22a) (22b) (22c) for 2 < k ≤ N, i < j < k, and (k, i), (k, j) ∈ E ∗. The control law is only a function of pki, pkj , dki, dkj and dji for i, j ∈ Nk(E ∗). Thus, the control law is distributed since it only requires the kth agent to measure its relative position to neighboring agents in the directed graph. The following theorem states our main result. Theorem 1: Let the initial conditions of the formation F (t) = (G∗, p(t)) be such that p1(0) 6= p2(0), and let F ∗ satisfy (15) (16a) (16b) which is equivalent to saying F (t) → SCgt(F ∗) as t → ∞, pj(t) − pi(t) → dji as t → ∞, i, j ∈ V ∗ and χ(p(t)) → χ(p∗) as t → ∞. The control objective will be quantified by two types of error variables. If the relative position of two agents is defined as pji = pj − pi, the distance error is given by [4] zji = pji2 − d2 ji. (17) The stacked vector of all distances errors is defined as z = [z21, ..., zji, ...],∀(j, i) ∈ E ∗. The area error is defined as [10] (18) ijk = S(p∗) k]. The stacked vector of all area errors ijk, (k, i), (k, j) ∈ E ∗ where Sijk = S(p) with p = [pi, pj, pk] and S ∗ with p∗ = [p∗ is given by S = [ S123, ..., Sijk, ...], ∀(k, i), (k, j) ∈ E ∗. inter-agent distances, a useful formula for calculating S ∗ is given by [22] Sijk = Sijk − S ∗ i , p∗ Since F ∗ is typically specified in terms of the desired j , p∗ ijk S ∗ ijk = ±qdijk (dijk − dji) (dijk − dki) (dijk − dkj ) (19) where dji + dki + dkj dijk = 2 . (20) Note that if the order of agents i, j, k is counterclockwise (resp., clockwise), then (19) takes the positive (resp., nega- tive) sign. IV. CONTROL LAW FORMULATION The control law will be dictated by the choice of potential function associated with the error variables (17) and (18). To this end, we consider the Lyapunov function candidate [10] Vk =  α2 4 αk z 2 21, 4 (cid:16)z 2 ki + z 2 kj(cid:17) + βk S 2 ijk, where αk and βk are positive constants, i < j < k, and (k, i) , (k, j) ∈ E ∗. Based on (21) and its time derivative, if k = 2 if 2 < k ≤ N (21) < 2√2, (23) ki − d2 d2 d2 ji kj (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) for all i, j, k such that 2 < k ≤ N , i < j < k, and (k, i), (k, j) ∈ E ∗. Then, the control (22) with if dki = dkj ji/4 , (24) if dki 6= dkj where γ is determined from Corollary 1, rendershz, Si = 0 asymptotically stable and ensures F (t) → SCgt(F ∗) as t → ∞. kj − d2 d2 d2 ji γ, βk αk >  Proof: The open-loop dynamics for (17) and (18) zji = 2p⊺ ji(uj − ui) (25) (26) are given by and · Sijk = 1 2 [(uk − ui)⊺J pkj + p⊺ kiJ(uk − uj)] , Vk = where (13) was used. Therefore, the time derivative of (21) becomes +zkj p⊺ if k = 2 α2z21 p⊺ 21(u2 − u1), αk(cid:2)zki p⊺ ki(uk − ui) kj(uk − uj)(cid:3) +βk Sijk(cid:2)(uk − ui)⊺J pkj kiJ(uk − uj)(cid:3),   21(cid:1) z21 = −2α2z21p212 = −2α2z21(cid:0)z21 + d2 if 2 < k ≤ N +p⊺ (28) where (17) was used. The solution to the above nonlinear ODE is Step 1: Consider the subsystem composed of agents 1 and 2 only. Substituting (22a) and (22b) into (25) yields (27) d2 21z21(0) d2 21 exp(2d2 it 21α2t) (z21(0) + d2 21) − z21(0) is clear 21,∞(cid:1) where 21 corresponds to agents 1 and 2 being collocated. 21, we can show from (29) that z21(t) > −d2 that z21 ∈ (cid:2)−d2 21 . (29) z21(t) = From (17), z21 = −d2 If z21(0) > −d2 ∀t > 0 as follows: 21 z21(0) d2 21 exp(2d2 z21(t) > −d2 ⇔ ⇔ z21(0) > z21(0) − d2 ⇔ d2 21 exp(2d2 ⇔ z21(0) > −d2 21. 21α2t) (z21(0) + d2 21 exp(2d2 21α2t)(cid:0)z21(0) + d2 > −1 21) − z21(0) 21(cid:1) 21α2t)(cid:0)z21(0) + d2 21(cid:1) > 0 (30) Now, after substituting (22a) and (22b) into (27), we obtain V2 = −α2 2z 2 21p212 ≤ 0. (31) 21 implies p21(t) > 0, we can see that V2 is negative definite 21 (or Since z21(t) > −d2 V2 = 0 only at z21 = 0. Therefore, and z21 = 0 is asymptotically stable for z21(0) > −d2 equivalently, p1(0) 6= p2(0)). Step 2: Consider that a third agent is added to the previous subsystem as shown in Figure 3. We can view this new system as the interconnected system ξ3 = f3(ξ3, Ξ2) Ξ2 = g3(Ξ2) (32b) where ξ3 := [z31, z32, S123] is the state of the error dynamics of agent 3 and Ξ2 = ξ2 := z21. From (35), we get (32a) Fig. 3. Three-agent system. (33) We seek to establish the input-to-state stability of (32a) with respect to input Ξ2 via Lemma 3. When Ξ2 = 0, we can see from (22b) that u2 = 0. Therefore, from (27) with k = 3 under the condition that Ξ2 = 0, we have that Substituting (22c) with k = 3 in (33) gives V3 =hα3 (z31 p31 + z32 p32)⊺ + β3 S123 (p31 − p32)⊺ Ji u3. V3 = −(cid:13)(cid:13)(cid:13)α3 (z31 p31 + z32 p32) + β3 S123J ⊺ (p31 − p32)(cid:13)(cid:13)(cid:13) . (34) If ξ3 = 0 is the only value at which V3 = 0, then (33) is negative definite and (32a) is input-to-state stable. It then follows that the origin of (32), i.e., [Ξ2, ξ3] = 0, is asymptotically stable according to Lemma 4. To this end, note that translational and rotational motions of the triangle will not change the value of V3 since it is a function of the relative position of agents and the triangle area [23], [24]. Thus, without the loss of generality, let p1 = [−d21/2, 0], p2 = [d21/2, 0], and p3 = [x, y] for simplicity. Then, V3 = 0 2 is equivalent to (cid:18)2x2 + 2y2 + (cid:18)2x2 + 2y2 + 21 21 and d2 2 − d2 d21 + 31(cid:19) x 32 − d2 2 (cid:0)2d21x − d2 31(cid:19) y d2 2 − d2 32 − d2 α3 (cid:18) d2 β3 y − d21S ∗ 32(cid:1) / (2d21) + 2 21 31 + d2 32(cid:1) = 0 (35) 123(cid:19) = 0. One solution to (35) is x =(cid:0)d2 31 − d2 and y = 2S ∗ (36) which corresponds to ξ3 = 0. We will show next that β3/α3 can be selected such that this is the only solution to (35). This proof will be conducted for two distinct cases: an isosceles triangle and the non-isosceles case. 123/d21, (Case 2a) Consider that the triangle is such that d32 = d31. (cid:18)2x2 + 2y2 + (cid:18)2x2 + 2y2 + 21 3d2 2 − 2d2 1 2 21 − 2d2 d2 d2 β3 2α3 + and 32(cid:19) x = 0 32(cid:19) y 21(cid:18)y − 1 2q4d2 32 − d2 21(cid:19) = 0. (37) The first equation of (37) implies x = 0 or x2 + y2 = 32 − 3 d2 4 d2 21. Substituting x = 0 into the second equation of (37) yields (cid:18)y − 1 21(cid:19)× 2q4d2 32 − d2 (cid:18)8y2 + 4q4d2 32 − d2 21y + 2β3 α3 d2 21(cid:19) = 0. d2 21 is less than 0. That is, inequality (39) will lead to x = 0 and y = 21y + 2β3 α3 It is easy to show that when , 21 21 > 4 d2 β3 α3 32 − 1 d2 d2 the discriminant of 8y2 + 4p4d2 32 − d2 2p4d2 3 4 into the second equation of (37) gives Now, substituting x2 + y2 = d2 32 − d2 d2 1 21 21 being the only solution to (38). 32 − α3q4d2 β3 32 − d2 21. α3 − 2(cid:19) = After squaring (41) and using (40) again to eliminate y, (38) (39) (40) (41) 2y(cid:18) β3 α3 − 2(cid:19)2 α3(cid:19)2 21(cid:18) β3 = we obtain 2x2(cid:18) β3 −"d2 21(cid:1) β3 α3 +(cid:0)8d2 32 − 6d2 {z φ(β3/α3) + 6d2 . 32# 21 − 8d2 } (42) Since the left hand side of (42) is nonnegative for any β3/α3, this equation has no solution if φ(β3/α3) > 0. This means that φ(β3/α3) should have no real roots, or β3/α3 should be chosen to be greater (resp., smaller) than the largest (resp., smallest) root. The discriminant of φ(β3/α3) is given by 3 d2 If 4 32 < d2 21 < 4d2 and φ(β3/α3) > 0. 21(cid:1)(cid:0)4d2 21(cid:1) . 32 − d2 32 − 3d2 (43) 32, then ∆ < 0 for any β3/α3 > 0 ∆ = 4(cid:0)4d2 32, then ∆ ≥ 0 and φ(β3/α3) has real roots. Since the smallest root is less than zero, the only option for ensuring φ(β3/α3) > 0 is to choose β3/α3 greater than the largest root, i.e., 21 ≤ 4 If d2 3 d2 > 3d2 21 − 4d2 32 − 3d2 β3 d2 α3 21 ≥ 4d2 Note that the case where d2 32 +p(4d2 21 21)(4d2 32 − d2 21) . (44) 32 is not possible since it contradicts the fact that d32 + d31 = 2d32 > d21. Combining the three cases, we see that (41) will have no solution if (44) holds. Finally, it is not difficult to show that (39) is a sufficient condition for (44). Therefore, for the isosceles triangle, the condition for ξ3 = 0 to be the only value where V3 = 0 is given by (39). (46a) 21d2 d4 21d2 2S ∗ 123 where 32 + 2d2 32d2 21 + 2d2 31 − d4 the triangle is not (Case 2b) Consider that isosceles (d32 6= d31). After substituting the first equation of (35) into the second one, eliminating x, and factoring the resulting polynomial of y, we obtain (cid:18)y − d21 (cid:19)(cid:0)c4y4 + c3y3 + c2y2 + c1y + c0(cid:1) = 0 (45) 21(cid:18) β3 α3 − 2(cid:19)2 c4 = − 2d2 − 4#× c3 =d21"(cid:18) β3 α3(cid:19)2 q2d2 32 − d4 α3(cid:19)3 21(cid:18) β3 21(cid:18) 3 1 c2 = − 2 31(cid:1) β3 21(cid:0)d2 − 4d2 α3 d21(cid:18) β3 α3(cid:19)2(cid:18)2d2 1 β3 α3 − 3d2 4 q2d2 32 − d4 21d2 21(cid:18) β3 α3(cid:19)3 c0 = − (cid:0)2d2 32 − d4 (46e) Note that the quartic polynomial in (45) is similar to (10). 31 − d4 α3(cid:19)2 31(cid:19)(cid:18) β3 31(cid:19)× 31 − d4 31(cid:1) . 31 − d4 32 − 2d2 32d2 1 8 21d2 21 − 2d2 31 − d4 31 − d4 d2 21 + d2 21 + 2d2 32 + 2d2 31 (46b) 31 (46d) 32 + 2d2 21 + 2d2 32 + d2 32 + d2 + d2 21d2 32d2 21d2 c1 = 21 d2 × (46c) 2 Thus, by Corollary 1, if (47) and β3/α3 > max{γ, 2} (see proof of Corollary 1 for detail 21 d2 31 − d2 d2 32 < 2√2 (cid:12)(cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12)(cid:12) of γ), the quartic polynomial has no real solution, and y = 2S ∗ 123/d21 is the only solution to (45). Step k: The process of adding a vertex k with two outgoing edges to any two distinct vertices i and j of the previous graph can be followed one step at a time, resulting at each step in the interconnected system ξk = fk(ξk, Ξk−1) Ξk−1 = gk(Ξk−1) (48a) (48b) where ξk := [zki, zkj, Sijk], (k, i), (k, j) ∈ E ∗ is the state of error dynamics of the kth agent and Ξk−1 := [ξ2, ..., ξk−1]. Note that the asymptotic stability of Ξk−1 = 0 for (48b) was already established in Step k − 1. Therefore, we only need to check the input-to-state stability of (48a) with respect to input Ξk−1. To this end, when Ξk−1 = 0, (27) becomes Vk =hαk (zki pki + zkj pkj)⊺ + βk Sijk (pki − pkj )⊺ Ji uk. Vk = −(cid:13)(cid:13)(cid:13)αk (zki pki + zkj pkj ) + βk SijkJ ⊺ (pki − pkj)(cid:13)(cid:13)(cid:13) Now, substituting (22c) into (49) gives Similar to Step 2, we can show that if the gain ratio βk/αk is selected according to (24) and the edges of triangle ∆ijk satisfy (23), then (50) is negative definite. As a result, (48a) is input-to-state stable and [Ξk−1, ξk] = 0 in (48) is asymptotically stable by Lemma 4. . (50) (49) 2 Repeating this process until k = N leads to the conclusion that [ξ2, ..., ξN ] = 0 is asymptotically stable, which implies z(t) → 0 and χ(p(t)) → χ(p∗) as t → ∞. Given that F ∗ and F (t) have the same edge set and F ∗ is minimally persistent by design, then we have that F (t) → SCgt(F ∗) as t → ∞ from Lemma 1. Remark 2: Theorem 1 only requires that the leader and first follower not be collocated at t = 0. If agents 1 and 2 were initialized at the same position, then u1 = u2 = 0 and they would remain at this position forever. In other words, the condition p1 = p2 is an invariant set. As for the ordinary followers, (22) guarantees formation acquisition regardless of their initial conditions. For example, if agents 2, 3, 4, and 5 in Figure 2 are all initially collocated, then u4 = u5 = 0 at t = 0 which means agents 4 and 5 will not move at first. However, u3 6= 0, so agent 3 will move. This results in u4 6= 0, causing agent 4 to move, and finally u5 becomes nonzero, so agent 5 moves. Remark 3: Condition (23) on the desired formation has the following geometric interpretation. Consider the three i = [−dji/2, 0], vertices in Figure 4 where, for simplicity, p∗ p∗ j = [dji/2, 0], and p∗ k = [x, y]. 1 1Translation and rotation of these vertices as a rigid body will not affect the following analysis since it is only dependent on their distances. kj (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Given that d2 ki − d2 d2 ji < 2√2 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ⇐⇒ (cid:12)(cid:12)(cid:12)(x + dji/2)2 + y2 − (x − dji/2)2 − y2(cid:12)(cid:12)(cid:12) < 2√2 ⇐⇒ 2xdji ⇐⇒ x < √2dji, d2 ji d2 ji < 2√2 (51) any point p∗ k inside the shaded region in Figure 4 satisfies (23). It is important to point out that (23) is sufficient but not necessary for stability. For example, consider a triangular formation with d21 = 1, d31 = 2.1, and d32 = 3, which does not satisfy (23). If however β3/α3 is selected in the range (10.42, 13.55), the stability result of Theorem 1 will hold. In fact, the gain ratio βk/αk and (24) impose a lower bound on the relative weight of the distance error and area error in the potential function (21) in order to guarantee stability. Fig. 4. Geometeric interpretation of (23). Remark 4: Mathematically, the role of the area-based term βk S 2 ijk is to guarantee the existence of a unique minimum for the potential function (21) in the Euclidean plane, and thus avoid the system from converging to an unde- sirable local minima. To illustrate this, consider a triangular formation where p1 = [−1, 0], p2 = [1, 0], p3 = [x, y], and d21 = d31 = d32 = 2, and let W = 1 32) be the potential function with only the distance error terms of (21) with k = 3. In Figure 5, we plot ln(W + 1) and ln(V3 + 1) versus p3 to have a better view of their minima.2 We can clearly see that W (p3) has two minima, corresponding to the desired position for agent 3 and its reflected position, whereas V3(p3) has a unique minimum. 31 + z 2 4 (z 2 V. CONCLUSIONS This paper presented a 2D formation control scheme that uses distance and signed area information to guarantee convergence to the desired formation shape. The asymptotic convergence result is valid under mild conditions on the 2Since functions ln(V + 1) and V are positively correlated, this variable change does not affect the function extrema. Fig. 5. Potential function V3(q3) and corresponding counter plot. a) Potential function W (q3) and corresponding counter plot; b) edge lengths of the triangulated-like framework and when the leader agent and the first follower are not collocated at time zero. The scheme is applicable to systems with any number of agents governed by the single-integrator model. VI. APPENDIX A. Proof of Lemma 1 (Proof of ⇒) If F and F are strongly congruent, then pi − pj = pi − pj, ∀i, j ∈ V and χ(p) = χ(p) by definition. Therefore, since E ⊂ V ×V , we know pi−pj = pi − pj, ∀(i, j) ∈ E, i.e., F and F are equivalent. (Proof of ⇐) If dim(V ) = 3, then framework equivalency and congruency are equivalent, so the conditions for strong congruency are trivially satisfied. If a vertex is added such that dim(V ) = 4, the result- ing framework would have two additional edges and one additional triangle. Consider without loss of generality the framework in Figure 6(a), where the area of the quadrilateral is given by SQ := S123 − S234. Since χ(p) = χ(p), we know that SQ(p) = SQ(p), so it follows from the general quadrilateral area formula [22] that 2 2 1 1 = − kp3 − p1k2 − kp4 − p2k2(cid:1)2i 1 4h4 kp3 − p2k2 kp4 − p1k2 −(cid:0)kp2 − p1k2 + kp4 − p3k2 4h4 kp3 − p2k2 kp4 − p1k2 −(cid:0)kp2 − p1k2 + kp4 − p3k2 Since F and F are equivalent, kp2 − p1k = kp2 − p1k, kp3 − p1k = kp3 − p1k, kp3 − p2k = kp3 − p2k, kp4 − p2k = kp4 − p2k, and kp4 − p3k = kp4 − p3k. Therefore, we have from (52) that kp4 − p1k = kp4 − p1k, so F and F are strongly congruent for dim(V ) = 4. Since the quadrilateral signed area formula in (52) applies to both convex and concave quadrilaterals, a similar analysis exists for all other cases, some of which are shown in Figure 6. − kp3 − p1k2 − kp4 − p2k2(cid:1)2i 1 (52) . REFERENCES [1] R. Olfati-Saber and R. M. Murray, "Consensus problems in networks of agents with switching topology and time-delays," IEEE Transac- tions on Automatic Control, vol. 49, no. 9, pp. 1520 -- 1533, 2004. [2] W. Ren and R. W. Beard, Distributed consensus in multi-vehicle cooperative control. Springer-Verlag London, 2008. [3] F. Dorfler and B. Francis, "Geometric analysis of the formation problem for autonomous robots," IEEE Transactions on Automatic Control, vol. 55, no. 10, pp. 2379 -- 2384, 2010. [4] L. Krick, M. E. Broucke, and B. A. Francis, "Stabilisation of infinitesi- mally rigid formations of multi-robot networks," International Journal of Control, vol. 82, no. 3, pp. 423 -- 439, 2009. [5] B. D. O. Anderson, C. Yu, B. Fidan, and J. M. Hendrickx, "Rigid graph control architectures for autonomous formations," IEEE Control Systems, vol. 28, no. 6, 2008. [6] L. Asimow and B. Roth, "The rigidity of graphs, II," Journal of Mathematical Analysis and Applications, vol. 68, no. 1, pp. 171 -- 190, 1979. [7] I. Izmestiev, "Infinitesimal rigidity of frameworks and surfaces," Lectures on Infinitesimal Rigidity, Kyushu University, Japan, 2009. [8] E. D. Ferreira-Vazquez, E. G. Hernandez-Martinez, J. J. Flores- Godoy, G. Fernandez-Anaya, and P. Paniagua-Contro, "Distance-based formation control using angular information between robots," Journal of Intelligent & Robotic Systems, vol. 83, no. 3-4, pp. 543 -- 560, 2016. [9] E. D. Ferreira-Vazquez, J. J. Flores-Godoy, E. G. Hernandez-Martinez, and G. Fernandez-Anaya, "Adaptive control of distance-based spatial formations with planar and volume restrictions," in Control Applica- tions (CCA), 2016 IEEE Conference on. IEEE, 2016, pp. 905 -- 910. [10] B. D. O. Anderson, Z. Sun, T. Sugie, S. Azuma, and K. Sakurama, "Formation shape control with distance and area constraints," IFAC Journal of Systems and Control, vol. 1, pp. 2 -- 12, 2017. [11] T. H. Summers, C. Yu, S. Dasgupta, and B. D. O. Anderson, "Control of minimally persistent leader-remote-follower and coleader forma- tions in the plane," IEEE Transactions on Automatic Control, vol. 56, no. 12, pp. 2778 -- 2792, 2011. [12] B. Jackson, "Notes on the rigidity of graphs," in Levico Conference Notes, vol. 4, 2007. [13] J. M. Hendrickx, B. D. O. Anderson, J. Delvenne, and V. D. Blon- del, "Directed graphs for the analysis of rigidity and persistence in autonomous agent systems," International Journal of Robust and Nonlinear Control, vol. 17, no. 10-11, pp. 960 -- 981, 2007. [14] C. Yu, J. M. Hendrickx, B. Fidan, B. D. O. Anderson, and V. D. Blondel, "Three and higher dimensional autonomous formations: Rigidity, persistence and structural persistence," Automatica, vol. 43, no. 3, pp. 387 -- 402, 2007. [15] S. Bereg, "Certifying and constructing minimally rigid graphs in the plane," in Proceedings of the Twenty-first Annual Symposium on Computational Geometry. ACM, 2005, pp. 73 -- 80. [16] I. N. Stewart, Galois theory, 4th ed. CRC Press, 2015. [17] L. E. Dickson, Elementary theory of equations. J. Wiley & Sons, Inc., 1914. [18] E. L. Rees, "Graphical discussion of the roots of a quartic equation," The American Mathematical Monthly, vol. 29, no. 2, pp. 51 -- 55, 1922. [19] D. Lazard, "Quantifier elimination: optimal solution for two classical examples," Journal of Symbolic Computation, vol. 5, no. 1-2, pp. 261 -- 266, 1988. [20] H. K. Khalil, Nonlinear control. Pearson Education, Harlow, UK, 2015. [21] H. J. Marquez, Nonlinear control systems: analysis and design. Wiley, Hoboken, NJ., 2003. [22] D. Zwillinger, CRC standard mathematical tables and formulae, 31st ed. CRC Press, 2002. [23] K. Sakurama, "Distributed control of networked multi-agent systems for formation with freedom of special euclidean group," in Decision and Control (CDC), 2016 IEEE 55th Conference on. IEEE, 2016, pp. 928 -- 932. [24] Z. Sun, B. D. O. Anderson, M. Deghat, and H. Ahn, "Rigid forma- tion control of double-integrator systems," International Journal of Control, vol. 90, no. 7, pp. 1403 -- 1419, 2017. Fig. 6. Convex and concave quadrilaterals with five edges. As more vertices are added, each additional vertex will create a quadrilateral, so above process can be repeated to show that F and F are strongly congruent for dim(V ) = n. B. Proof of Corollary 1 Based on Lemma 2, (10) has no real solution if the following quantities are positive: δ12 2 − δ2 16 2 + δ2 1 (cid:0)δ2 2 − δ2 3(cid:1) +(cid:0)δ2 Λ =γ 6 (γ − 2)2h−1 3(cid:1)2(cid:17) × 3(cid:1)2(cid:16)8δ4 1 −(cid:0)δ2 3(cid:1)2(cid:17) γ 7 + f1(δ1, δ2, δ3, γ)i (cid:16)δ4 1(cid:0)δ2 2 − δ2 1 − 2δ2 P = (γ − 2)2(cid:2)8δ6 1γ 3 + f2(δ1, δ2, δ3, γ)(cid:3) (53b) where f1(·) and f2(·) are polynomials in γ of, at most, degree 6 and 2, respectively. Given a polynomial p(γ) = anγn +Pn−1 i=0 aiγi where n ≥ 3 is an odd integer, we can see from Figure 7 that p(γ) = 0 has at least one real root. Denote the largest or the unique real root by γ ∗. Then, (53a) p(γ) > 0 ∀γ > γ ∗, p(γ) < 0 ∀γ > γ ∗, if an > 0 if an < 0. (54) Fig. 7. Odd degree polynomial. Consider that γ 6= 2 in (53a) and (53b). It follows from the conditions δ2 6= δ3 and (cid:12)(cid:12)(cid:0)δ2 1 − 2δ2 δ4 2 − δ2 3) + (δ2 2 + δ2 1(δ2 3 − δ2 3)2 = 1(cid:12)(cid:12) < 2√2 that 2(cid:1) /δ2 1 where γ ∗ (δ1 +δ2 +δ3)(δ1−δ2−δ3)(δ1 +δ2−δ3)(δ1−δ2 +δ3) < 0. Therefore, the coefficient of γ 7 in (53a) is positive, and Λ > 0 for γ > γ ∗ 1 is the lower bound from (54). Likewise, the coefficient of γ 3 in (53b) is positive, and P > 0 for γ > γ ∗ 2 is some lower bound. Thus, the overall sufficient condition for Λ > 0 and P > 0 is given by γ > max{γ, 2} where γ := max{γ ∗ 2 where γ ∗ 2}. 1 , γ ∗
1506.08133
1
1506
2015-06-25T15:32:13
A Study on the Effect of Exit Widths and Crowd Sizes in the Formation of Arch in Clogged Crowds
[ "cs.MA", "physics.soc-ph" ]
The arching phenomenon is an emergent pattern formed by a $c$-sized crowd of intelligent, goal-oriented, autonomous, heterogeneous individuals moving towards a $w$-wide exit along a long $W$-wide corridor, where $W>w$. We collected empirical data from microsimulations to identify the combination effects of~$c$ and~$w$ to the time~$T$ of the onset of and the size~$S$ of the formation of the arch. The arch takes on the form of the perimeter of a half ellipse halved along the minor axis. We measured the~$S$ with respect to the lengths of the major~$M$ and minor~$m$ axes of the ellipse, respectively. The mathematical description of the formation of this phenomenon will be an important information in the design of walkways to control and easily direct the flow of large crowds, especially during panic egress conditions.
cs.MA
cs
A Study on the Effect of Exit Widths and Crowd Sizes in the Formation of Arch in Clogged Crowds Francisco Enrique Vicente G. Castro and Jaderick P. Pabico Institute of Computer Science University of the Philippines Los Baños College 4031, Laguna {fevgcastro,jppabico}@uplb.edu.ph ABSTRACT The arching phenomenon is an emergent pattern formed by a c-sized crowd of intelligent, goal-oriented, autonomous, het- erogeneous individuals moving towards a w-wide exit along a long W -wide corridor, where W > w. We collected empir- ical data from microsimulations to identify the combination effects of c and w to the time T of the onset of and the size S of the formation of the arch. The arch takes on the form of the perimeter of a half ellipse halved along the minor axis. We measured the S with respect to the lengths of the major M and minor m axes of the ellipse, respectively. The mathematical description of the formation of this phe- nomenon will be an important information in the design of walkways to control and easily direct the flow of large crowds, especially during panic egress conditions. INTRODUCTION 1. A crowd is a large group of humans, usually numbering by the hundreds to tens of thousands, who are in the same phys- ical environment, such as a hallway, sharing a common pur- pose, such as exiting through a sole door along the hallway. Although the individuals in the crowd are sharing a common purpose, they may act differently in a crowd than when they are by themselves [17]. The general movement of a crowd is affected by a number of different individuals who are moving independently from each other, but sharing a common envi- ronment, and aiming to reach their respective destinations. The understanding of crowd movement is important to plan- ning and improving shared public places, not only to effec- tively and efficiently facilitate the comfortable movement of individuals, but also to guarantee the individual safety, espe- cially under conditions of danger when quick and orderly evacuation of a mass of individuals is desired. The patterns of behavior of individuals in a crowd is affected directly by the interactions and influences between the indi- viduals and their environment. Because data from real evac- uation is hard to measure and conducting experiments on humans has ethical questions, the characterization of the dynamic aspects of evacuation processes have been confined by experts (engineers, sociologists, and scientists alike) only through simulation and modeling. Because of this, several computer models have been proposed and utilized which aided in the understanding of crowd behaviors under normal, controlled egress, and panic situations. Of course, these models have been separately evaluated either by comparing the existing descriptive real-world data usually compiled by social scientists with the descriptive behavior of the model outputs, or by comparing the quantitative and qualitative outputs of the model with that of another model. One among the many models of crowd dynamics is the social force model (SFM) [17] which describes the motion of an individual as affected by both physical and psychological forces. SFM has been a popular model among researchers and planners because it was successful in describing phe- nomena observed in the real world, such as the “faster- is-slower” in escape panic and the “arching” phenomenon observed as a side-effect to “clogging” on exit ways. How- ever, when using SFM for crowds under low crowd density conditions, empirical results show that the simulated indi- viduals do not behave as expected. In other words, the simulated individuals act irrationally rather than rational ones, as we expect of humans under normal conditions. For example, the simulated individuals go directly and repeat- edly towards an object that blocks an exit way, instead of finding a way to go around the object and exit the hallway. This happens because the desired direction of the simulated individual is always towards the exit points, even in the pres- ence of obstacles between its current position and the exit points. The SFM has been used extensively by many researchers [15– 19] because of its capability to simulate the often observed human crowd phenomena such as flocking and bidirectional lane formation, among others. However, the simulated individuals under SFM do not exhibit some of the common human behaviors observed in a large crowd. These behaviors are: 1. Imitation. According to Festinger [8], there is a drive in a person towards its own self evaluation. This drive forces the person to belong to groups so that he can be associated with others. Thus, in a crowd of moving people, the individuals tend to move into groups whose members they believe would have the same opinion as theirs. 2. Contagion. Using the imitation behavior, people will also tend to “adopt” the behavior of others in the same group. Thus, if a group member senses that there is a discrepancy in a group with respect to behavior, opin- ions or abilities, that same member will reduce the discrepancy by adopting the most common behavior, opinion, or ability [8]. Similar to what Ngoho and Pabico [29] did in the past, Musse et al. [28] proposed a model based on the trajecto- ries of motion captured automatically from video sequences. While Ngoho and Pabico [29] captured the real-time trajec- tory of the velocity field (see for example Figure 1), Musse et al. [28] used an offline method to cluster similar trajecto- ries to extrapolate the velocity field. Because of these, researchers [10] recently proposed the social comparison theory (SCT) that algorithmically mimics the above-mentioned behaviors and was introduced as an alternative improvement to SFM. The key idea of SCT is that humans who lack the objective means to evaluate their current state, such as when in confusion, would com- pare themselves to others that they perceive are similar to themselves (i.e., both imitation and contagion behaviors). In our previous work [5], we used the SCT to design an arti- ficial individual whose behavior resembles that of a human when walking (or traveling) within a crowd. We included in the same model a “field of desire” to allow the simulated individual to change its desired direction of movement volun- tarily, based on its perception of the behavior and location of other individuals and obstacles along the hallway. The “field of desire” is a 100◦ field of vision facing the forward motion of the simulated individual, which the individual uses to obtain spatial information concerning its surround- ings and to choose the desired forward direction towards the exit goal. Our crowd of simulated individuals were able to exhibit the arching, clogging, and bursty exit phenomena usually observed in real crowd situations. The arch exhib- ited at the edge of the clogged crowd resembles that of a half ellipse, with the major axis parallel with the direction of the crowd flow, while the minor axis is coincident with the axis of the exit width. We present in this paper the result of the study we conducted to understand the interactive effects of crowd size c and exit width w in the formation of arch in a clogged crowd moving towards one exit door along and in the middle of a hallway. We will show by empirical means that the onset of arching has a negative correlation with the increasing w, while its slope tends to grow steeper as the c is increased. We will also show that the profile of the arch resembles a half ellipse whose major axis runs along the length of the hallway, while its minor axis is parallel to the width of the exit door. The major axis grows smaller as the exit width is increased, but grows bigger with the increase of the crowd size. The minor axis, on the other hand, grows bigger either as the crowd size is increased, or as the exit width is increased (of course limited only by the width of the hallway). 2. REVIEW OF LITERATURE The approaches used by researchers for crowd simulation maybe classified into two categories namely, macroscopic and microscopic. The macroscopic models are models that describe the dynamics of observable quantities of a crowd motion, such as density and velocity. Examples of such models are the ones used by Hughes [21], Huang et al. [20], and Treuille et al. [35] wherein they captured the density and velocity of the crowd using partial differential equations, the usual mathematical descriptions of the dynamics of fluid. Borrowing some ideas in gas-kinematic models, Helbing and Molnar [16] introduced the SFM to simulate pedes- trian flows, wherein a self-driven particle interacts through social rules and regulations, moves in its desired speed and direction, and attempts not to collide with obstacles, other particles, and surrounding barriers. Thus, in order to reach its destination faster, pedestrians take detours even if the taken route is crowded [18]. However, the choice of detour is dependent on the recent memory of what the traffic was like the last time they took the route, the figure of which was found by Ganem [11] to be polygonal in nature. In agreement with the SFM, Weidmann [38] observed that, as long as it is not necessary to go faster, such as going down a ramp, a pedestrian prefers to walk with his or her desired speed, which corresponds to the most comfortable walking speed. However, Weidmann [38] further observed that pedestrians keep a certain distance from other pedes- trians and borders. The distance between the pedestrians decreases as the density of the crowd increases. The pedes- trians themselves cause delays and obstructions. Arns [2] observed that the motion of the crowd is similar to the motion of gases and fluid, while [18] suggested that it is similar to granular flow as well. Helbing et al. [18], in his extension of the SFM, showed that many aspects of traffic flow can be reflected by self- driven many-particle systems. In this system, he identified the various factors that govern the dynamics of the particles such as the specification of the desired velocities and direc- tions of motion, the geometry of the boundary profiles, the heterogeneity among the particles, and the degree of fluc- tuations. One such observable pattern is the formation of lanes of uniform walking direction, formed because of the self-organization of the pedestrians [15]. Aside from the self-organizing behavior of the crowd, obstacles were also observed to both positively and negatively contribute to the flow of the traffic. During escape panic of large crowds, sev- eral behavioral phenomena were observed [17]: build up of pressure, clogging effects at bottlenecks, jamming at room widening areas, faster-is-slower effect, inefficient use of alter- native exits, initiation of panics by counter flows, and impa- tience. It was observed that the main contributing behaviors in these situations is a mixture of individual and grouping behavior. While macroscopic models describe the dynamics of the col- lective crowd, microscopic models describe the speed and position of each crowd member in a given time. Historically, Reynolds [31] is known to have pioneered the simulation of crowd in this manner. In his work, he simulated a flock of birds where each simulated bird is implemented as an independent individual that navigates according to its local perception of the dynamic environment. In a similar study in the years that follow, Tu and Terzopoulos [36] simulated schools of artificial fishes using perception to drive each fish’s Figure 1: An example output frame of the system developed by Ngoho and Pabico [29]. The upper left part contains the input image of student pedestrians with trackers (bounding boxes). The upper right part contains the trajectory of the pedestrians. The lower part contains the distance vs. time graph of the trajectory. This figure is in color in the electronic copy of this paper printed with permission from Ngoho and Pabico [29] and the Philippine Society of Information Technology Educators Foundation, Inc. (PSITE). locomotion while being constrained by underwater physics. The then novel programming of the fish’s motion and envi- ronment resulted into observed real-world school of fishes’ behaviors. Because of the success of microsimulation in exhibiting observed behaviors in animals, researchers in various fields of science (e.g., transportation science, computer gaming, artificial intelligence, and industrial robotics) adopted the programming method to simulate the motion and envi- ronment of human pedestrians in a crowd. The main purpose is to aid them in understanding some emergent crowd behaviors so that they can design better and safer walkways, or build realistic gaming elements, environments, and scenarios. During the advancement of the method itself, several enhancements to the model, as well as alter- natives, have been suggested. For instance, Kapadia et al. [22] proposed the use of what they called an “egocentric affordance field” to obtain the speed and the direction of each simulated pedestrian. On the other hand, Varas et al. [37] and Perez et al. [30] introduced cellular automata (CA) models to direct the motion of the simulated crowd member. Both works located their crowd members at cells of a grid wherein their respective coordinates are updated at discrete time intervals. The implementation of the CA model was so simple that Teknomo [33] implemented both the CA simulation and visualization using only a desktop electronic spreadsheet program. The simplicity of CA prompted other researchers [14, 26, 32] to further improve it using the prob- abilistic and statistical functions used in lattice-gas models to direct the motion of the simulated member in a cell. The lattice-gas model is known to be a special case of CA. Although the above models were already successful in sim- ulating observed phenomena in crowds, the behavior of the crowd member as an individual has not been fully inte- grated into these models. Because of this, Lerner et al. [24] proposed an approach for fitting human behaviors, such as talking on the phone, combing hair, and moving the head, into the simulated individual. In an attempt to simulate the collective behavior of humans in groups, Musse and Thalmann [27] used a hierarchical crowd organization with autonomous groups to simulate the grouping or flocking behavior in pedestrians. To be able to model and generate low-level behaviors for the simulated individuals, Golden- stein et al. [12] presented non-linear dynamic systems to model the interaction of the simulated individuals to its environment. Such low-level behaviors are real-time target tracking and obstacle avoidance in a highly dynamic envi- ronment. Later, the authors [13] used a hybrid low-level system integrating the non-linear dynamical systems with kinetic data structures to simulate a complex crowd envi- ronment that includes three-dimensional steering, crowding, and flocking within moving and non-moving obstacles. Recently, established works in the field of social psychology have been successfully incorporated into microsimulation models of the crowd, resulting into a much more realistic simulated collective behavior. Example of works go as far as 1895 such as that of Le Bon [23], and the newer ones such as that of Allport [1], Blumer [4], and Berk [3]. In these works, the authors discussed that people in crowds act similarly to one another, usually in a coordinated fashion that when viewed from a distance, it would appear that they are being choreographed by a single entity. However, in reality, the coordinated motion is achieved with little or no verbal communication at all. This somewhat homogeneous motion by the crowd is explained by Le Bon [23] as being directed by two processes, imitation and contagion that we discussed earlier in Section 1. The coordinated motion occurs in a “circular reaction” process, a type of interstimu- lation between two individuals a and b where the response of b to the stimuli from a reproduces a stimulation that is reflected back to a. The reflected stimulation reinforces a’s stimuli in return, thus resulting into a circular reaction process [4]. Following the adage that “similar people act in similar ways,” Allport [1] explained that the somewhat homogeneous motion of the crowd is the product of like- minded individuals. The likemindedness of the individuals in the crowd has been given a game-theoretic perspective by Berk [3]. Here, he said that the coordinated behavior of the crowd is consistent with that of an individual applying a minimax strategy. Given an action A being performed by the greatest number of individuals in a crowd, an indi- vidual c will see A as the action with least cost, and thus will perform it also. The individual that selects the action of the majority has to pay the least cost compared to that which follows the minority. One of the most recent models that incorporates works in social psychology, including that of cognitive sciences, is that of Fridman and Kaminka [10] where they used the ideas of SCT by Festinger [8]. In their work, they proposed an algo- rithmic framework for SCT which resulted into simulated crowd behavior that is more in tune with observed real-world crowd behavior compared to those techniques that do not incorporate the cognitive models. Because of this, we have decided to start with the SCT, but hybridized it with our own algorithm for mapping the perceived trajectory of an individual’s goal, limited by the individual’s field of vision (i.e., our “field of desire”) [5]. Our hybrid model was able to exhibit important crowd behaviors: arching, clogging, and bursty exit rates. We have also observed a new phenomenon we called double arching, which we will discuss in detail in another paper and forum. In this paper, we will explore the interactive roles of c and w to the formation of the arch using the hybridized microsimulation approach in the hope of exploiting the outcomes for designing better and safer walkways under various crowd egress situations. 3. METHODOLOGY 3.1 Programming the Individual In our approach, each simulated individual was programmed with the following general behaviors which were described originally by Wooldridge and Jennings [39], and then later on extended and explained further by Epstein [7], Franklin and Graesser [9], Torrens [34] and Macal and North [25]: 1. Autonomy: The individuals are autonomous units, and thus are not directed by any centralized control. They are capable of processing information and exchanging this information with other individuals in order to make independent decisions. They may freely interact with others in a few given situations, and this freedom does not affect their being autonomous. With this, we say that the individuals are active rather than purely passive (see discussion of “active” below). 2. Heterogeneity: We believe that individuals should be heterogeneous to allow the microsimulation to develop autonomous individuals. 3. Active: Being active means that the individuals influ- ence a simulation independently. The following active features can be identified: (a) Pro-active or goal-directed (b) Reactive or perceptive (c) Bounded rationality (d) Interactive and communicative Aside from the abovementioned general behaviors, we infuse the SCT by following the algorithmic approach of Fridman and Kaminka [10], which we describe here for clarity. The SCT follows a subset of axioms as follows: 1. When individuals can not objectively decide what to do next, they compare their current state with that of others. Each individual Pi is characterized by a tuple with k attributes P = haP k i, where each attribute ai j of individual Pi, ∀1 ≤ j ≤ k, corresponds to a point in a k-dimensional space. Each dimension corresponds to an attribute such as the coordinates of Pi in two-dimensional space, heading, height, gender, etc. 2 , . . . , aP 1 , aP 2. Individuals compare their state to individuals that are similar to them. We defined a similarity function Sim(Pi, Pj) which measures the similarity between the ith and jth individuals (i 6= j). The similarity function is given in Equation 1. For an individual Pi, we selected the individual with the highest similarity. 3. If there are differences in their state with the object of comparison, the individuals take steps to reduce the differences. If the similarity of the selected individual is below a given value, then Pi is triggered to do some- thing to reduce the difference. We measured the similarity between Px and Py indepen- dently along each dimension, such that the similarity in dimension ai is a function Sai (ax i ) : ai × ai → [0, 1]. A value of 1 indicates full similarity, while a 0 means dis- similarity. For example, one attribute of Px is its distance from Py, thus a value of 1 means they are positioned in the same location, while a 0 means they are far apart. i , ay Sim(Px, Py) = k X j=1 Saj (ax j , ay j ) × wj (1) Because our simulated individuals exhibit these behaviors, our simulation approach is more akin to modeling humans and objects in very realistic ways than other modeling approaches, such as those that aggregate mathematical equations to explain the dynamics of pedestrian movement (i.e., macrosimulations). Thus, our simulation can be used with higher confidence to perform what-if scenarios to aid, for example, university administrators and decision makers with regards to management policies, as well as infrastruc- ture development plans, for safer learning environments for the students and constituents (see for example Figure 2). Figure 2: Snapshots of example what-if scenario simulations on the effect of exit door configurations to student egress (students are shown as black circles with pointers to visualize heading) in a very large lecture hall: (a) Current exit door configuration which opens outward but hinders student flow; (b) Effect of moving the door hinge such that the exit door opens behind the student flow; and (c) Effect of increasing the effective width of the exit door by 50% and replacing the swinging door by a sliding door. This figure is in color in the electronic copy of this paper printed with permission from Castro and Pabico [6] and the Philippine Society of Information Technology Educators Foundation, Inc. (PSITE). 3.2 The Goal of the Individual In a two-dimensional flat world, let G be the goal of Pj (∀j) with set coordinates {(x1, y1), (x2, y2), . . . , (xn, yn)} repre- senting a line segment. This set is usually the location of a fixed-width exit door. Since all P aim to reach any one of the exit coordinates, a given Pi will face towards the direction of the nearest exit coordinates from its current coordinates. The Pi will scan its field of vision for the closest free space and move towards that space with its gaiting speed, which is currently set at one pace per simulation time step. In the future, we wish to vary this gaiting speed depending on the height of Pi. A free space is a location in the flat world that is not a wall, a Pj where j 6= i, or any other object. If other individuals are blocking Pi’s space within its field of vision, Pi stops at its current coordinates. It is possible that the individual might move away from the target exit coordinate if the chosen free space was at the edge of its field of vision. When that happens, the individual will still move to the free space, but after moving, it will redirect its heading towards the possibly new nearest exit coordinates. When the distance of the individual to the nearest exit coor- dinates is < 1, it considers itself as already exited and will move to the edge of the simulation world. Until this dis- tance has not been achieved, the individual will just repeat its decision making process as described above. 3.3 Interactive Effects of Crowd Size and Exit Width on Arching Profile We conducted experiments along a fixed-width hallway to determine the interactive effects of c and w to the time T of the onset of formation of the arch, as well as the dimen- sion of the arch’s profile at T . The arch profile is a half ellipse, halved across the major axis, and is measured with respect to the length of the minor and major axes. We experimented on five levels of c (200, 300, 350, 400, and 450 individuals) and seven levels of w (1, 3, 5, 7, 9, 11, and 13), resulting into 35 c–w combinations. We replicated each combination three (3) times to take into considera- tion random variabilities brought about by external factors that can not be modeled, such as the implementation of the random number generator of our host operating system and other systemic variabilities such as the occurrences of hard- ware interrupts during simulation that might have affected our measurements. The exit width is defined as the number of individuals in a straight line that can concurrently and comfortably yet tightly fit along the axis of the exit width. Similarly, the fixed-width hallway, set at 19, is also defined as the number of individuals along a straight line that can comfortably yet tightly fit in a straight line parallel to the corridor width. 4. RESULTS AND DISCUSSION Figure 3 shows an example profile of a crowd that exhibits arching near the exit door. We see here that the arch resem- bles a half ellipse with the ellipse’s major axis running along the direction of the crowd flow and perpendicular to the exit width, while the minor axis is parallel to the exit width. This result is a confirmation of the results of Epstein [7], Franklin and Graesser [9] and Helbing et al. [18]. 4.1 Arching Time Figure 4 shows the response of the onset of arching time T to the combination effect of varying c and w. We can see here that across different c, there is a recurrent pattern that the T decreases as the w is increased, but the amount of decrease is not the same between any c. To better quan- tify this observed decrease in T at increasing w, we con- ducted a regression analysis between T and w for each value of c. Equations 2 through 6 show these regressions, respec- tively for c = {450, 400, 350, 300, 200}. All coefficients are significantly different from zero at a confidence level of α = 0.01, while all R2 values are significantly different from zero at α = 0.05. This means that even though Equations 5 and 6 have low R2 values, these values are non zero. Looking at Figure 3: Profile of the crowd before the exit door as it forms an arch. This is a snapshot of the microsim- ulation when the c = 400 at w = 7. Notice that the major axis runs along the axis of the corridor, while the minor axis is parallel with the axis of the exit door. the respective slopes of the regression, we see here that as the c is decreased, the slope gets to zero. This means that at lower c values, the onset of the formation of the arch is becoming independent of the w. The w has a significant effect on T at higher c. Generally, however, T ∝ 1 c·w . T450 = −1.80w + 44.72, R2 = 0.97 T400 = −2.04w + 48.25, R2 = 0.92 T350 = −0.54w + 37.89, R2 = 0.95 T300 = −0.32w + 35.49, R2 = 0.66 T200 = −0.18w + 34.39, R2 = 0.34 (2) (3) (4) (5) (6) 4.2 Arch Profile Figure 5 shows the response of the lengths of the major and minor axes at varying values of c and w. Except for c at 450 and 400 individuals, the length of the major axis decreases as the c is decreased, and as the w is increased, while the length of the minor axis decreases as the c is decreased, and increases as the w is increased. Mathematically, M ∝ c w , while m ∝ c · w. We observed here from the figure that when the w = 9, the c = 400 plateaued at m = 19, while with M , the slope becomes positive. Similar behavior was observed for c = 450 but the plateauing and the sudden change of direction of the slope for m happened at w = 7. At these c values, the individuals have already reached the edge of the corridor that m cannot expand anymore. Since m is constrained to 19, the arch must accommodate more individuals, thus translating into the increase in M . However, had the hallway width been way more than 19, the same pattern would have been observed for all c. We confirmed this assertion when we rerun the simulation for c = {400, 450} and w = {9, 11, 13} at the same number of replicates. When we plotted the mean of each c × w combination across replicates, they fall reasonably well within the regression line that we obtained earlier, of course within some acceptable variance (i.e., the respective means’ ±1× standard deviations intersect with the regression line, see Figure 6). 5. SUMMARY AND CONCLUSION In this paper, we present the behavior for a simulated indi- vidual used in microsimulation of pedestrian crowd. The behavior is based on the SCT and “field of desire” hybrid technique in our attempt to provide cognitive behaviors to the simulated individual so that the crowd can exhibit crowd patterns that are observed in real-life, such as that of arching. With this programming, we experimented on the combination effect of c and w on T , and the arch pro- file described by M and m. Here, we found out that the T ∝ 1 w , and the m ∝ c × w. These results suggest that, intuitively, the w should be wide enough at higher c so that T will happen at the least possible time, and at the same time M will be shorter, and m will be longer (but still M > m). We believe, though, that when we find the values for c and w where M = m, then this is the combination when T will be the fastest. Thus, we will investigate this hypothesis in the future. c×w , the M ∝ c 6. ACKNOWLEDGMENT This research effort is under the research program Multi- agent Simulation of Student Egress from the ICS Mega Lecture Hall Under Normal, Controlled Emer- gency, and Panic Situations funded by the Institute of Computer Science, University of the Philippines Los Banos. References [1] Floyd Henry Allport. Social Psychology. Houghton Mif- flin, Boston, 1924. [2] Thomas Arns. Video films of pedestrian crowds, 1993. [3] Richard A. Berk. A gaming approach to crowd behavior. American Sociological Reviews, 39:355–373, 1974. [4] Herbert G. Blumer. Collective behavior. In A.M. Lee, editor, Principles of Sociology, pages 67–121. 1939. [5] Francisco Enrique Vicente G. Castro and Jaderick P. Pabico. Microsimulations of arching, clogging, and bursty exit phenomena in crowd dynamics. In Allan L. Sioson, editor, Proceedings of the 10th National Con- ference on Information Technology Education (NCITE 2012). Philippine Society of IT Educators Foundation, Inc., 2012. Figure 4: T as affected by c and w combination: (a) c = 450; (b) c = 400; (c) c = 350; (d) c = 300; and (e) c = 200. The blues squares are means of T at each c–w combination, averaged across all replicates. The blue lines are the respective regression lines. Figure 5: (a) M and (b) m as affected by c and w combination. Colored shapes are means while lines are regression fit at each c. Orange/triangle represents c = 450, blue/square c = 400, green/inverted triangle c = 350, red/triangle pointing right c = 300, and purple/diamond c = 200. Figure 6: (a) M and (b) m as affected by c and w combination when W = 35. [6] Francisco Enrique Vicente G. Castro and Jaderick P. Pabico. Microsimulations of arching, clogging, and bursty exit phenomena in crowd dynamics. Philippine Information Technology Journal, 6(1):11–16, 2013. [16] Dirk Helbing and Peter Molnar. Social force model for pedestrian dynamics. Physical Review E: Journal for Research in Statistical, Nonlinear and Soft-matter Physics, 51(5):4282–4286, 1995. [7] Joshua M. Epstein. Agent-based computational models and generative social science. Complexity, 4(5):41–60, 1999. [17] Dirk Helbing, Illes J. Farkas, and Tamas Vicsek. Simu- lating dynamical features of escape panic. Nature, 407 (6803):487–490, 2000. [8] Leon Festinger. A theory of social comparison pro- cesses. Human Relations, 7:117–140, 1954. [9] Stan Franklin and Art Graesser. Is it an agent, or just a program? A taxonomy for autonomous agents. In Proceedings of the Third International Work- shop on Agent Theories, Architectures, and Languages. Springer-Verlag, 1996. [10] Natalie Fridman and Gal A. Kaminka. Modeling pedes- trian crowd behavior based on a cognitive model of social comparison theory. Computational and Mathe- matical Organization Theory, 16:348–372, 2010. [11] Joseph Ganem. A behavioral demonstration of Fermat´s principle. The Physics Teacher, 36, 1998. [12] Siome Goldenstein, Edward Large, and Dimitris Metaxas. Non-linear dynamical system approach to behavior modeling. The Visual Computer, 15(7):349– 364, 1999. [13] Siome Goldenstein, Menelaos Karavelas, Dimitris Metaxas, Leonidas Guibas, Eric Aaron, and Ambarish Goswami. Scalable nonlinear dynamical systems for agent steering and crowd simulation. Computers and Graphics, 25(6):983–998, 2001. [14] R.Y. Guo and H.J. Huang. A mobile lattice gas model for simulating pedestrian evacuation. Physica A: Statis- tical Mechanics and its Applications, 387(2–3):580–586, 2008. [15] Dirk Helbing. Safety Management at Large Events: The Problem of Crowd Panic. Institute for Transport and Economics, Dresden University of Technology, 2006. [18] Dirk Helbing, Peter Molnar, Illes J. Farkas, and Kai Bolay. Self-organizing pedestrian movement. Environ- ment and Planning B: Planning and Design, 28:361– 383, 2001. [19] Colin M. Henein and Tony White. Agent-based mod- eling of forces in crowds. In Multi-agent and Multi- agent-based Simulation: Lecture Notes in Computer Science, volume 3415, pages 173–184. 2005. [20] Ling Huang, S.C. Wong, Mengping Zhang, Chi-Wang Shu, and William H.K. Lam. Revisiting hughes’ dynamic continuum model for pedestrian flow and the development of an efficient solution algorithm. Trans- portation Research Part B: Methodological, 43(1):127– 141, 2009. [21] Roger L. Hughes. A continuum theory for the flow of pedestrians. Transportation Research Part B: Method- ological, 36(6):507–535, 2002. [22] Mubbasir Kapadia, Shawn Singh, Billy Hewlett, and Petros Faloutsos. Egocentric affordance fields in pedes- trian steering. In Proceedings of the 2009 Symposium on Interactive 3D Graphics and Games, pages 215–223, 2009. [23] Gustave Le Bon. The Crowd: A Study of the Popular Mind. N.S. Berg, Dunwoody, Georgia, USA, 1968 edi- tion, 1895. [24] Alon Lerner, Eitan Fitusi, Yiorgos Chrysanthou, and Fitting behaviors to pedestrian Daniel Cohen-Or. simulations. In Proceedings of the 2009 ACM SIG- GRAPH/Eurographics Symposium on Computer Ani- mation, pages 199–208, 2009. [38] U. Weidmann. Transportation technique for pedes- trians. In Publication Series of the Institute of Trans- portation, Traffic Engineering, Roads and Railways, number 90. ETH Zurich, Switzerland, 1993. Translated from German. [39] Michael Wooldridge and Nicholas R. Jennings. Intel- ligent agents: Theory and practice. Knowledge Engi- neering Review, 10(2):115–152, 1995. [25] Charles M. Macal and Michael J. North. Tutorial on agent-based modelling and simulation. Journal Of Sim- ulation, 4:151–162, 2010. [26] Masakuni Muramatsu, Tunemasa Irie, and Takashi Nagatani. Jamming transition in pedestrian counter flow. Physica A: Statical Mechanics and its Applica- tions, 267(3–4):487–498, 1999. [27] Soraia R. Musse and Daniel Thalmann. Hierarchical model for real time simulation of virtual human crowds. IEEE Transactions on Visualization and Computer Graphics, 7(2):152–164, 2001. [28] Soraia R. Musse, Claudio R. Jung, Jr. Julio C.S. Jacques, and Adriana Braun. Using computer vision to simulate the motion of virtual agents. Com- puter Animation and Virtual Worlds, 18(2):83–93, 2007. [29] Louie Vincent A. Ngoho and Jaderick P. Pabico. Capturing the dynamics of pedestrian traffic using a machine vision system. Philippine Information Tech- nology Journal, 2(2):1–11, 2009. [30] Gay Jane Perez, Giovanni Tapang, May Lim, and Caesar Saloma. Streaming, disruptive interference and power-law behavior in the exit dynamics of confined pedestrians. Physica A: Statistical Mechanics and its Applications, 312(3–4):609–618, 2002. [31] Craig Reynolds. Flocks, herds and schools: A dis- tributed behavioral model. Computer Graphics (SIG- GRAPH), 21(4):25–34, 1987. [32] Yusuke Tajima and Takashi Nagatani. Scaling behavior of crowd flow outside a hall. Physica A: Statis- tical Mechanics and its Applications, 292(1–4):445–554, 2001. [33] Kardi Teknomo. Multi-agent mesoscopic pedestrian simulation. In Henry Adorna and Allan Sioson, editors, Proceedings of the 11th Philippine Computing Science Congress, 2011. [34] Paul Morrison Kevin Torrens. Simulating Sprawl: A Dynamic Entity-Based Approach to Modelling North American Suburban Sprawl Using Cellular Automata and Multi-Agent Systems. PhD thesis, University Col- lege London, London, 2004. [35] Adrien Treuille, Seth Cooper, and Zoran Popovi. Con- tinuum crowds. In Proceedings of the Annual Confer- ence on Computer Graphics and Interactive Techniques (SIGGRAPH 06), pages 1160–1168, 2006. locomotion, perception, behavior. [36] Xiaoyuan Tu and Demetri Terzopoulos. Artificial fishes: Physics, In Pro- ceedings of the 21st Annual Conference on Computer Graphics and Interactive Techniques (SIGGRAPH 94), pages 43–50, 1994. [37] A. Varas, M. Cornejo, D. Mainemer, B. Toledo, Cellular J. Rogan, V. Munoz, and J. Valdivia. automaton model for evacuation process with obstacles. Physica A: Statistical Mechanics and its Applications, 382(2):631–642, 2007.
1904.05429
1
1904
2019-04-08T12:24:47
A Multi-Agent based Approach for Simulating the Impact of Human Behaviours on Air Pollution
[ "cs.MA" ]
This paper presents a Multi-Agent System (MAS) approach for designing an air pollution simulator. The aim is to simulate the concentration of air pollutants emitted from sources (e.g. factories) and to investigate the emergence of cooperation between the emission source managers and the impact this has on air quality. The emission sources are controlled by agents. The agents try to achieve their goals (i.e. increase production, which has the side effect of raising air pollution) and also cooperate with others agents by altering their emission rate according to the air quality. The agents play an adapted version of the evolutionary N-Person Prisoners' Dilemma game in a non-deterministic environment; they have two decisions: decrease or increase the emission. The rewards/penalties are influenced by the pollutant concentration which is, in turn, determined using climatic parameters. In order to give predictions about the Plume Dispersion) model and an ANN (Artificial Neural Network) prediction model. The prediction is calculated using the dispersal information and real data about climatic parameters (wind speed, humidity, temperature and rainfall). Every agent cooperates with its neighbours that emit the same pollutant, and it learns how to adapt its strategy to gain more reward. When the pollution level exceeds the maximum allowed level, agents are penalised according to their participation. The system has been tested using real data from the region of Annaba (North-East Algeria). It helped to investigate how the regulations enhance the cooperation and may help controlling the air quality. The designed system helps the environmental agencies to assess their air pollution controlling policies.
cs.MA
cs
A Multi-Agent based Approach for Simulating the Impact of Human Behaviours on Air Pollution Informatica 39 (2015) 501 -- 505 501 Sabri Ghazi Laboratoire de gestion électronique du document, Computer Science department, University Badji Mokhtar, PO-Box 12, 23000,Annaba, Algeria E-mail: [email protected] Julie Dugdale University Grenoble Alps. LIG. France. Email: [email protected] Tarek Khadir Laboratoire de gestion électronique du document, Computer Science department, University Badji Mokhtar, PO-Box 12, 23000,Annaba, Algeria E-mail: [email protected] Keywords: Air Pollution, Multi-Agent Simulation, Agent-Based Simulation, Air Quality, N-persons Prisoners' Dilemma, Game Theory Received: [Enter date] This paper presents a Multi-Agent System (MAS) approach for designing an air pollution simulator. The aim is to simulate the concentration of air pollutants emitted from sources (e.g. factories) and to investigate the emergence of cooperation between the emission source managers and the impact this has on air quality. The emission sources are controlled by agents. The agents try to achieve their goals (i.e. increase production, which has the side effect of raising air pollution) and also cooperate with others agents by altering their emission rate according to the air quality. The agents play an adapted version of the evolutionary N-Person Prisoners' Dilemma game in a non-deterministic environment; they have two decisions: decrease or increase the emission. The rewards/penalties are influenced by the pollutant concentration which is, in turn, determined using climatic parameters. In order to give predictions about the concentration of pollutants: Particulates Matter (PM10), Sulphur Oxide and Dioxide (SOx), Nitrogen Oxides (NOx) and Ozone: (O3), a two stage prediction method is used, a GPD (Gaussian Plume Dispersion) model and an ANN (Artificial Neural Network) prediction model. The prediction is calculated using the dispersal information and real data about climatic parameters (wind speed, humidity, temperature and rainfall). Every agent cooperates with its neighbours that emit the same pollutant, and it learns how to adapt its strategy to gain more reward. When the pollution level exceeds the maximum allowed level, agents are penalised according to their participation. The system has been tested using real data from the region of Annaba (North-East Algeria). It helped to investigate how the regulations enhance the cooperation and may help controlling the air quality. The designed system helps the environmental agencies to assess their air pollution controlling policies. 1 Introduction The question about how humans should moderate their exploitation of environmental resources has occupied researchers for decades [1]. Promoting social and economic growth without affecting the environmental equilibrium is important for maintaining sustainable development. This paper addresses the relation between human behaviours and their impact on air quality in socio-environmental systems. Air pollution is a major concern in many cities in the world, especially in developing countries. It has a direct influence on our health and quality of life [2]. The degradation in air quality should be estimated before the establishment or the expansion of urban or industrial activities. Air pollution simulation and decision support tools can help decision-makers to establish policies for environmental management and to predict the impact of their decisions on the environment and ecosystem. Many modelling approaches have been proposed to study air pollution. Most of them, ([3], [4], [5]) to cite a few, are mainly focused on the physical and chemical aspects of air pollution; the concentration and dispersal of pollutant. These models do not take into consideration human- decision factors. Air pollution is by nature distributed and includes the interaction of individuals involved in the exploitation of a dynamic ecological resource which is the air. The anthropogenic activities (road traffic, industrial and agricultural activities) are among the major sources of air pollution. All of these activities are 502 Informatica 39 (2015) xxx -- yyy controlled by humans; therefore, including the human decision factors in the modelling of air pollution is essential. MAS (Multi-Agent System) based models are an appropriate method for modelling socio-environmental issues [6]. They allow us to model the behaviours of human actors sharing the exploitation of environmental resources. [7] presents a review of recent MAS models used to investigate socio-environmental problems. The models are classified according to: the decision making mechanism, the use or not of real data, the objective of the simulation, and the space and time representation. [8], [9] used a MAS approach to investigate the air pollution emission resulting from road activities; they used a traffic flow simulation and linked it to emission calculation. [10] used the same approach to study the effect of transport regulation on air pollution emission. [11] present a MAS designed for monitoring air quality in Athens, Greece. The MAS is a set of agents that control a network of sensors installed in an urban region. They verify and collect the data measured by sensors. [12] present a MAS to find the dispersion of air pollution in urban region. The pollution sources (polluters) are represented by homogeneous agents that emit pollution in their respective areas. Each agent pollutes with an emission rate. As the simulation runs, clusters are formed with different values of pollution concentration. At the end, a single cluster is formed, thus, the dispersion of pollution is estimated. The managers of emission sources share the exploitation of the air by emitting pollutants. We aim to simulate their different personalities (e.g. eco-friendly, selfish) and investigate the relationship between the emergence of cooperation and its impact on air quality. The main questions addressed in this paper are: How do emission source controllers cooperate, are they able to achieve their goals while preserving a reasonable air quality? What regulatory rules should be adopted to enhance the cooperation and sustain the air quality? To investigate these questions we have designed a MAS simulation tool that helps to investigate the emergence of cooperation and its effects on air quality. The proposed simulator models the population of emission source controllers as a network of agents playing an Evolutionary NPPD (N- Person Prisoners' Dilemma) game. Evolutionary NPPD has been widely used for studying the emergence of cooperative behaviour among a population of selfish agents, how agents exhibit altruistic behaviours and under which condition cooperation will be sustained. NPPD is a mathematical model, which models the conflict between players sharing the use of a common resource. Initially, it was formulated for two players where each one has to take two possible actions (defect or cooperate), and then receive a payoff according to their joint actions. A version for N-Persons has been proposed [13] where the payoff is calculated according to the number of agents choosing to cooperate; the payoff function is given in (1) the agent s ϵ{0,1} (where 0 means cooperate and 1 means defect), ncp is the number of players who chose to cooperate, N is the size of the player population and b is the defection temptation, the constant c is used to ensure that the cooperation reward is less than the defection reward. [14], [15], studied the emergence of cooperation in a NPPD. The authors used different agent personalities and neighbourhoods in order to investigate their impact on the evolution of the game outcome. The experiment used different agent types with different initial co-operators ratio; this showed that for the case where all agents are Pavlovians (repeating actions that give them more satisfaction), the aggregate outcome of the game can be predicted for any number of agents and any payoff function. The choice of the agent's neighbours also has a big influence on the game equilibrium. [16] investigated the effect of social welfare preference on the emergence of cooperation among agents placed on a BA [17] network. The authors proposed a model where some of the agents also take into consideration social welfare and not only their payoff received from the game. Agents do not only care about their own payoff, but also the payoff of their neighbours. Sabri Ghazi; Julie Dugdale; Tarek Khadir 𝑢(𝑛𝑐𝑝)= !∗!"#! −𝑐 𝑖𝑓 𝑠=0 !∗!"#! 𝑖𝑓 𝑠=1 (1) With 𝑏>𝑐>0 𝑎𝑛𝑑 𝑐>!!, s is the action taken by [18] describes the use of a NPPD game to investigate the cooperation in a socio geographic community. The use of NPDD for environmental modelling has proved to be suitable since the exploitation of a shared ecological resource can be formulated as a tragedy of the common [19]. Each actor tends to maximise its profits by exploiting a shared ecological resource. Thus, a tragedy of the common arises. [20] uses a PD model to review Porters' hypothesis, which studies the relationship between productivity and eco-friendly technologies. The work models how strict environmental regulations can enhance innovation for a less polluting technology. Firms have two actions which are: to invest in a new less polluting process or to continue using the old one and be penalised according to the governmental regulations. [21] used a version of NPPD to investigate the cooperation in international environmental negotiation to reduce CO2 emissions. [22] presents an evolutionary game theory approach to study the influence of the ecological dynamic and payoff structures over the emergence of cooperative behaviour between landowners. The landowners are modelled as selfish agents aiming to maximize their profit by managing the number of deer on their lands. The main novelty of our approach is the inclusion of human decisions as a key element for simulating the air pollution evolution. We model the managers of the emission sources of pollutants as autonomous agents. These agents aim to maximise their own profit and we investigate this effect on air quality. The designed system helps investigating the efficiency of the regulatory rules used by air pollution controlling agencies for maintaining the air quality. This is very A Multi-Agent based Approach for Air Pollution Informatica 39 (2015) 501 -- 505 503 important because it helps the environmental agencies to assess their air pollution controlling policies. simulation socio-environmental The paper is organised as follows: The methodology is presented in section (2) that describes a MAS approach for designing an air pollution agent based simulator. Subsection (2.1) presents the representation of space and time. Subsection (2.2) describes the dispersion model and the Artificial Neural Network (ANN) prediction model. Many conceptualizations have been proposed to represent a socio-environmental system [22]. Generally, a system can be represented as an interconnection of three components (or subsystems); each one is represented by a set of variables (attributes) forming its state at time t. The ecological component models the biotic (living) and abiotic (non-living) parts. The economic component represents the economic view point and groups the economic variables. The social component represents the human social networks such as decision-makers, firms, government agencies and consumers. A change in the state variable of each component affects other systems' state variables. For example, the increase in demand for a certain kind of fish, leads fishermen to intensify their exploitation; this in turn results in changes to the biodiversity. We present a generic formalization of a socio-environmental system. A coupled social and environmental system can be expressed as a set of economic, social and ecologic state variables. The state of the system at time step t can be formulated as (2). 𝐸𝑆𝑡=<𝐸𝑐𝑡,𝑆𝑐𝑡,𝐸𝑛𝑣𝑐𝑡> (2) 𝐸𝑐!=<𝐸𝑐!,!,…,𝐸𝑐!,!>,𝑆𝑐!=<𝑆𝑐!,!,…,𝑆𝑐!,!> 𝐸𝑛𝑣𝑐!=<𝐸𝑛𝑣𝑐!,!,…,𝐸𝑛𝑣𝑐!,!>(3) are: 𝐸𝑛𝑣𝑐!=<𝑐!,!,..𝑐!,!,𝑊𝑆!,𝐻𝑢!,𝑇!,𝑅𝐹!>(4) 𝑆!=<𝑒𝑟!,𝑡𝑐,𝑋,𝑌,𝑍> (5) ci,t is the concentration of the pollutant i, WS: wind speed, T: temperature, Hu: humidity and RF represents the rainfall, at time t. Assuming that the source of pollution at time t is modelled as: Where Ec, Sc and Envc represent, the sets of economic, social and environmental state variables, respectively: In our case, the environment state variables at time step t The source produces the pollutant tc with the rate er at the geo-position (X,Y,Z). Sources are controlled by agents. Every agent has to make a decision on which action to choose among all possible actions according to the state of the environment ES and its internal state at t. of an action is the change in the emission rate of the pollutant from the controlled source. We can define this as a function that takes the agent's action and as a result gives the new emission rate (6). Let A be the set of actions 𝐴= 𝑎!,𝑎!,…,𝑎! , the result Let 𝜋! be the action vector done by N agents at time t: 𝜋!=<𝐴!!,..𝐴!"> (7) 𝑄={𝑣𝑒𝑟𝑦_𝑏𝑎𝑑,𝑏𝑎𝑑,𝑎𝑣𝑒𝑟𝑎𝑔𝑒,𝑔𝑜𝑜𝑑,𝑣𝑒𝑟𝑦_𝑔𝑜𝑜𝑑}, 𝐹:𝐴→ℝ (6). Let Q be the set of possible air quality index values: each of these indexes has its numerical equivalent in terms of pollutant concentration, as shown in table 1. The agent decision-making mechanism is given in (2.3). A test scenario is presented in section (3). Results are detailed and discussed in section (4). The paper ends with conclusions and the possible further directions of our work. 2 Model Approach and architecture SOx µg 0 -- 30 30-60 60-125 125- 250 >250 Indices Category 1 2 3 4 5 Very Good Good Average Bad Very Bad NOx µg 0-45 O3 µg 0-45 PM10 µg 0-20 45-80 80-200 200- 400 >400 45-80 80-150 150- 270 >270 20-40 40-100 100-200 >200 Table 1: Air pollution quality 𝑇𝜋!,𝐸𝑆!,𝑐𝑢𝑟𝑟𝑒𝑛𝑡_𝑞 ⟶𝑛𝑒𝑤_𝑞, 𝑐𝑢𝑟𝑟𝑒𝑛𝑡_𝑞 𝑎𝑛𝑑 𝑛𝑒𝑤_𝑞∈𝑄 (8) The air quality can be modelled as a graph with T as transition function: T takes as arguments the state of the system ESt and the set of actions done by N agents and accordingly it moves the system from the current state (current_q) to a new state (new_q). Under some conditions current_q may be equal to new_q, which means that actions of the agents do not change the air quality under some climatic conditions. Our simulation approach can be schematised as shown in figure 1. Agents' actions affect the emission rate of the sources. Then the dispersion algorithm is used to compute the dispersion, the aggregated value of pollutant concentration is used with climatic parameters to forecast the next 2 hours air pollution concentration and air quality. According to these forecasts, agents are rewarded or penalised. Agents then adapt their strategies to earn more reward and reduce penalties. Dispersion models Emission rates Pollutants concentration Weather Parameters Prediction models point sourcei Emis sion sourcei Polluants Concentration & Air Quality Agenti Actions Rewards/ Penalties Environment Figure 1: The simulation process, using the dispersion model and the prediction model. 2.1 The spatial and temporal scale of the simulation model: The simulation uses a discrete representation of time where each simulation step represents by default 6 hours of real time. The simulation's duration is defined in the Informatica 39 (2015) xxx -- yyy 504 interface and depends on the objective of the simulation (short or long term prediction). Our model is based on the hypothesis that the action of the emission controllers (reducing or increasing emissions) has an impact within k time-steps. k is a parameter whose value is provided by the user according to the scenario and available data. Since the simulation step k can be changed, we can represent a long term simulation horizon by giving k a higher value. So for example we can represent 1 step as 24 hours meaning that industrial polluters can take several days to adjust their production volumes. Setting k even higher, such as 2 weeks or 1 month would require data, which is not available, to see the evolution of the AQ. represented as: 𝐵𝑋={𝑏𝑥!,…,𝑏𝑥!}, every box The environment is modelled as a set of 3D boxes, each one represents one km3 (see figure 3). It can be is localised in the geo-position point gp(x,y,z) and has attributes representing the concentration of air pollutants (cp0,…,cpv) and air quality, These attributes are used when agents are penalized according to the pollution level in the box where they are situated. In this case the position of the emission source in a box is relevant. Sources located in the same box are considered to be neighbours. 2.2 Dispersion and prediction models is frequently used The dispersion model helps to measure how the pollutant will spread in the air. It is calculated according to the distance from the point source, the wind speed and direction. We used a GPD (Gaussian Plum Dispersion model), which in atmospheric dispersion [24]. The dispersion model is run in a steady way, which means that no parameter (wind speed, emission rate and wind direction) is changed during the simulation step. This provides a series of snapshots of the situation at each step. These snapshots are then fed into the ANN model to obtain a prediction about the concentration. Since we cannot combine the two models in a continuous way our solution of taking a series of snapshots and feeding it to the ANN mimics a continuous process. The GPD simulates the dispersal from a point source emission according to the emission rate (9). !!!! !!!!∗𝑒! !!!∗!!!∗ (𝑒!(!!!! 𝐶𝑥,𝑦,𝑧,𝐻 = !"!,!∗! !!!! ))+ (𝑒!(!!!! !!!! )) (9) This means that the concentration of the pollutant at point (x,y,z) is calculated according to : eri,t: the emission rate in kilograms per hour of the source i in time step t. Ui: the wind speed in metres per second at time step t, σyσz: the standard deviation of the concentration distributions in a crosswind in a vertical direction, these two parameters are chosen according to the stability class 'C' in the Guifford-Pasquill scale [25], and H is the height of the source from the ground. The decay term D is given in [26] and computed according to (10). 𝐷= 𝑒 !/(!∗!!),𝑖𝑓 𝑅>0 1,𝑖𝑓 𝑅=0 , (10) Sabri Ghazi; Julie Dugdale; Tarek Khadir Where x is the downwind distance, u is the wind speed and R is the decay coefficient. The values for R are adopted from [27] for NOx (0.45 h-1) and SOx (0.31 h-1), PM10 is not considered (R=0 and D=1). For simplification and due to lack of wind direction data, we assume that the wind direction does not change during the simulation step. The resulting pollution level from each source is aggregated and the average of each box is computed. Then the dispersion value of the pollutant is passed to an ANN prediction model as described in [28]. The ANN prediction models are designed to give a forecast of the five air pollutants and the air quality. This includes an uncertainty aspect caused by the weather conditions [29]. The ANN predictor uses the aggregated air pollution concentration value given by the dispersion model of each source and the four climatic parameters: wind speed, humidity, temperature and rain fall. These parameters greatly influence the pollutant concentration in the air [30]. from O3 is a secondary pollutant, which means that it is the not emitted by photochemical interaction between SOx, COx, and organic components. Therefore, we used SOx and COx dispersion information to predict the O3 concentration. sources, but results For each pollutant a RBF (Radial Basis Function) network is designed and trained. The RBF is composed of three layers, the first layer is connected to the input of the network and its output is connected to the hidden layer, the neurones in the hidden layer have the RBF as the activation function. The outputs of the hidden layer are linearly combined to obtain the output of the network. Using a training data set, the objective is to find the optimal combination between the number of neurons in the hidden layer and the weight of each input. By increasing the number of the neurons in the hidden layer the algorithm [31] gives the optimal topology of the network. This is why many topologies are tested and only the best of them are taken. During the training step, each network receives as input a vector of the climatic condition parameters and the pollutant at time t. Each network generates the desired output that is the value of pollutant concentration at time t+PredictionHorizon. The forecast given by each network is passed as input to predict the air quality index using a MLP (Multi-Layered Perceptron). The MLP network is trained using the local air quality standards as shown in table 1. Air quality predictions for the different pollutants are obtained on a t+12 hours basis and give the most probable air quality category. The MLP model receives the predicted values of the five pollutants, COx, NOx, O3, PM10, and SOx, and predicts the index values for air quality ranging from 1 to 5, with 1 being very good and 5 being very bad. To train the MLP network we used back-propagation algorithm. The MLP network final topology, obtained after several trials, is: 5 neurons in the first hidden layer, 10 in the second and finally a linear neuron for the output layer. the concentration of Levenberg-Marquardt a A Multi-Agent based Approach for Air Pollution Informatica 39 (2015) 501 -- 505 505 The accuracy of the ANN models are given in table 2, and is calculated using one year's worth of data according to RMSE (Rooted Mean Squared Error) formulated in (11): 𝑅𝑀𝑆𝐸= (!!!!!)! !"#!!!!"# (11). Where lng is the length of the vectors, P and R are the predicted and measured values, respectively. The performances are computed using a validation data set that was not used in the training of the ANN models. Model PM10 SOX NOX COx O3 Topology [# of input neuron -# of hidden neuron] [10-320] [10-90] [10- 105] [10-45] [10-180] Validation error ( RMSE) 16.1945 µg/m 3 3.1618 µg/m3 9.7277 µg/m3 0.1220 µg/m3 39.8238 µg/m3 Table 2: Validation error of the ANN prediction models using the validation data set. 2.3 Decision-making mechanism Based on its internal state and the state of the environment, an agent has to choose an action to perform among all possible actions in order to reach its goals. This process is called decision-making. [32] presents a review of methods used for modelling decision-making in a coupled environmental and social system. Our system supports two cooperation strategies (centralized and evolutionary game) each one defines a decision- making mechanism. The centralized strategy (CS) is based on defining a central agent that represents the air pollution controlling agency. The central agent takes decisions according to the current air pollution level. The second strategy is based on an evolutionary game, where agents are rewarded and penalized according to the pollution levels; they make decisions according to their rewards. In our system, the cooperation strategy is defined within the simulation parameters. 2.3.1 Centralized Strategy (CS): The task of maintaining the air quality is assigned to an agent, which represents the air pollution control agency. It uses the GPD and ANN models to predict the air quality and pollutant levels, and according to the predictions it sends a reduce emission message to the emission agents. Then it will check the air quality. It will continue doing this until the air quality is improved to reach the air quality index goal. The central agent has absolute authority and its orders are executed by the emission source controllers. Agents communicate their emission rate at each simulation step to the central agent. This strategy is based on the communication between agents. We assume that agents are rational and have an environmental-responsible personality; this means they favour air quality improvement over their own interests and communicate their exact emission rate to the central agent. 2.3.2 Evolutionary Game Cooperating Strategy: each step of the simulation. A global goal GG can be In the EG strategy, every agent has its own goals (earning more rewards and keeping its emission rate high) and shares a global goal of maintaining air quality with other agents. The appreciation function defined as: 𝑎𝑝𝑝:𝑄→𝑅, allows comparing the air quality state at defined as (12). This means finding a set of actions 𝜋! to system to move to a new state of air quality 𝑞!!! that is 𝐺𝐺!={𝑇(𝜋!,𝑞!,𝑞!!!),𝑎𝑝𝑝𝑞!!! >𝑎𝑝𝑝𝑞!} (12) be performed by agents at time t, which allows the better than the current state. is Where: wi the weighting parameter where the payoff for the agent i for the time step t. An agent participates with other agents in the NPPD game, its own goal is to maximise its reward earned from the game. We adopted the approach of [33], where agents keep traces of their L previous steps (actions, rewards and its neighbours' rewards). To update the probabilities to increase or decrease the emission, we used [18] method. At each time step t the agent computes its weighted payoff, according to (13), and tries to maximise it (as its utility function) by taking it into consideration when computing its probability to increase or decrease its emission rate, respectively according to (14) and (15). (13) 𝑊𝑃!(𝑡)= 𝑤!∗𝑀!(𝑡) !!!! =1 and ∀ 𝑖,𝑗 (𝑖<𝑗→𝑤!>𝑤!), Mi(t) is 𝑤!"# !!!!"#!! 𝑃𝑐!𝑡+1 =𝑃𝑐!𝑡 +(1−𝑃𝑐!𝑡 ∗𝛼!𝑡 ,𝑖𝑓 𝑆!=0 𝑎𝑛𝑑 𝑊𝑃!(𝑡)>0 ∗𝑃𝑐!𝑡, 𝑖𝑓 𝑆!=0 𝑎𝑛𝑑 𝑊𝑃!(𝑡)≤0 𝑃𝑐!𝑡+1 = 1−𝛼!(𝑡) 𝑃𝑑!𝑡+1 =𝑃𝑑!𝑡 +(1−𝑃𝑑!𝑡 ∗𝛼!𝑡 ,𝑖𝑓 𝑆!=1 𝑎𝑛𝑑 𝑊𝑃!(𝑡)>0 𝑃𝑑!𝑡+1 = 1−𝛼!(𝑡) ∗𝑃𝑑!𝑡, 𝑖𝑓 𝑆!=1 𝑎𝑛𝑑 𝑊𝑃!(𝑡)≤0 0 𝑖𝑓 𝑋!,!=𝑋!,!!! 1 𝑖𝑓 𝑋!,!≠𝑋!,!!! Where: Pci and Pdi are respectively the probability to decrease (s=0) and increase (s=1) emissions for agent i, αi(t) is the learning rate of agent i at time step t, s is the strategy played at time t. The learning rate is updated according to (17): 𝐷!= 𝛼!𝑡+1 =𝛼!𝑡 +0.015 𝑖𝑓 𝐷!=0 𝛼!𝑡+1 =𝛼!𝑡 +0.010 𝑖𝑓 𝐷!>𝐿−1 𝛼!𝑡+1 =𝛼!𝑡 −0.010 𝑖𝑓 𝐷!≤𝐿−1 (17) (16) !!!!!! (15) (14) Where Di is the i-th agent actions homogeneity indicator, at time step t, Xi,j is j-th action of the agent i. Di is used to compare the last L actions of the agent. This is used to keep the agent from changing its actions. Agents are influenced by their neighbours, at each time; the average reward of the neighbours is calculated according to (18). 𝑛𝑃!(𝑡) = 𝑀!(𝑡))/𝑛𝑢𝑚𝑏𝑒𝑟𝑂𝑓𝑛𝑒𝑖𝑔ℎ𝑏𝑜𝑢𝑟𝑠! !"#$%&'(!%)*!!"#$%! !!! ( Where Mj(t) is the payoff of the neighbour j and numberOfneighboursi is the number of neighbours for the i-th agent. We keep a trace of the nP of the L previous (18) Informatica 39 (2015) xxx -- yyy Sabri Ghazi; Julie Dugdale; Tarek Khadir 506 (19) simulation steps and we compute their average in avgnP. The agent then uses the probabilities Pc, Pd and the average reward of its neighbours to choose an action according to (19): 𝑖𝑓 𝑆!𝑡 =0,𝑆!𝑡+1 = 1 ,𝑖𝑓 𝑊𝑃!<𝑎𝑣𝑔𝑁𝑃! 𝑎𝑛𝑑 𝑃𝑑!𝑡+1 >𝑃𝑐!𝑡+1, 𝑖𝑓 𝑆!𝑡 =1,𝑆!𝑡+1 = 0 ,𝑖𝑓 𝑊𝑃!<𝑎𝑣𝑔𝑁𝑃! 𝑎𝑛𝑑 𝑃𝑐!𝑡+1 >𝑃𝑑!𝑡+1, 0,𝑒𝑙𝑠𝑒 1,𝑒𝑙𝑠𝑒 At each simulation step, every agent gets a reward or penalty according to its actions and according to the pollution level. We have adopted the payoff curve (1) with b=2 and c=-0.5, but in the general case these parameters can be defined by the user. When the pollution level is higher than the maximum allowed value, the participation of the agent to the current level of the pollution 𝜎!(𝑡) is computed according to (20). !"!!!!"!"#,𝑃𝐿!𝑡 >𝑃𝐿!"# (20) 𝜎!𝑡 = !"!(!) Where, ERi(t) is the emission rate of the i-th agent at time t, PLe(t) is the pollution level of the pollutant e at time t and PLmax is the maximum allowed value for the pollutant level according to the regulation and local standards. The penalty for agent i at time step t is calculated according to (21): 𝐸𝑐𝑜𝐹𝑎𝑐𝑡𝑜𝑟!𝑡 =𝐸𝑐𝑜𝐹𝑎𝑐𝑡𝑜𝑟!𝑡−1 +(1− !!!!!) (21) Two penalising strategies were used; the first uses (21) and is a cumulative penalty. This means that the penalties from each step are kept and the agent is penalised as long as it continues to increase its emission. The second penalising method is not cumulative, and agents are penalised just according to the current simulation step. The reward of agent i, at the current time step t is computed according to (22), we compute the number of agents who choose to decrease their emission denoted ncp, after that we compute u use as defined in equation (1). 𝑀!(𝑡)= 𝑢𝑛𝑐𝑝 𝑖𝑓 𝑠!=0 𝑢𝑛𝑐𝑝 −𝐸𝑐𝑜𝐹𝑎𝑐𝑡𝑜𝑟!𝑡 𝑖𝑓 𝑠!=1 (22) 3 Simulation scenarios using data from the region of Annaba Annaba is a very industrialized region specialising in steel industries. The steel complex of Hadjar is located 12 kilometres south of the city of Annaba. The air pollution spreads over a radius of 6 km. According to [34], the complex annually releases into the atmosphere: 36890 tons of particles, 845 t of NOX, 30895 t of COx, 2260 t of SOx and 3093 t of NOx. The petrochemical station (ASMIDAL) produces fertilizers and pesticide products that have a big influence on air quality. 5 industrial zones, that contain hundreds of factories, are very close to the urban area and have a large impact on air pollution. The seaport is located in the centre of the city and attracts a lot of heavy transport, which also leads to deterioration in the air quality. The local pollution agency network provided hourly to from 01/01/2003 two-year period for a data parameters: Wind Speed 31/12/2004. The concentrations of air pollutants that have been continuously monitored are: Ozone (O3), Particulate Matter (PM10), Nitrogen Oxides (NOx), and Sulphur Oxides (SOx). The dataset also includes four meteorological (WS), Temperature (T) and relative Humidity (H). Daily rainfall measurements (RF) were also provided by the water management agency. The 2003 dataset was used for training the ANN and the 2004 dataset was used for validation; this helped us to assess the performance of the model. The pollutant concentration measurements are in microgram/m3 and they have been normalised using equation (23). 𝑉′!= !! (!"# (!!)!!"# (!!) (23) Where Vp is a parameter vector, min and max are functions that return the minimum and maximum values of the vector. Negative values, resulting from faulty measurements, were replaced using the mean of the previous and next values. It is impossible to discard faulty values since gaps in the time series will result in a data shift that affects the ANN training process leading to poor generalisation properties. Similarly, faulty (blank) measures for pollutants and weather parameters were replaced by an average of the v-q and u+q previous and future values respectively, with u being the faulty sample and q the number of values to take into consideration. This ensures the continuity and consistency of the time series and allows efficient the ANN predictors. Table 3 presents the statistical properties of the available data for different pollutants and weather parameters, for some parameters data are not available (N/A). training of We defined a simulation scenario for the Annaba region using the parameters in table 4. The goal levels for pollutants concentration were fixed according to the air quality index goal. For this scenario we aimed to reach a very good air quality level (Goal air quality index=1). The initial values (at t=0) for pollutant concentration and climatic parameters were fixed according to the dataset. Table 3: Statistical properties of the used dataset. (agents choosing For the EG strategies we fixed the initial proportion of cooperating agents to decrease emissions) to 0.5, this means that 50% of the agents decrease their emission at t=0. The value of this parameter was chosen following the work of [14] and [15]. The proportion will change during the simulation according to the game outcome. The prediction was for 2003 Parameter mean PM10 µg/m3 51.70 NOx µg/m3 14.50 SOx µg/m3 7.60 CO µg/m3 1.31 O3 µg/m3 N/A Wind Speed 2.65 µg/m3 Humidity (%) 63.52 Temperature 18.96 (°C) Rainfall (mm) N/A 2004 mean 27.76 N/A N/A N/A 42.27 2.12 71.92 16.82 2.96 2004 2003 STD STD 26.38 51.66 25.01 N/A 14.78 N/A N/A 0.52 N/A 64.58 1.27 1.78 14.33 16.50 6.30 7.76 N/A 9.27 Max value 508 435.0 190.0 12.2 688.0 9.6 93.0 42.1 73.9 A Multi-Agent based Approach for Air Pollution Informatica 39 (2015) 501 -- 505 507 to the random values used in the initialisation of some variables (neighbours rewards, first chosen action, weights, k last actions and rewards). The comparison is done according to the air quality index. Results are expressed in terms of the number of occurrences of air quality index as illustrated in figure 2, for example the number of times the air quality index equals 1 (very good). Figure 3, shows the evolution of the air quality index over time. The CS gives the best performance. With the CS the air quality index moves rapidly from bad to average and then to good and finally stabilises at very- good (which is the goal fixed in the simulation scenario). The EG-CP moves the index from bad to average, when the equilibrium is reached it stabilises in good and never reaches a very-good index. The EG-NCP strategy moves the air quality from bad to average and never improves. When penalties are not used (EG-NP) the air quality stabilises at bad. When cooperation is not used (NC), agents act selfishly and do not care about the pollution, therefore, the air quality oscillates between bad and very- bad. As the agents reach their maximum emission rate we can observe an oscillation, which is caused by the climatic conditions. The only thing that affects the pollutant concentration is the climatic conditions (the emission rate is constant); these have a big influence and are captured with the ANN model. 100 100 100 100 2000 (gram/hour). 20 µ gram/m3 30 µ gram/m3 45 µ gram/m3 45 µ gram/m3 0.5 the next 2 hours, the same as the simulation step. Each source emits according to its emission rate which cannot be higher than the maximum level defined in the simulation scenario. The position of sources was randomly generated and many sources are located in the same box. Value Parameter Name Polluting activities and Policy parameters Number of PM10 sources Number of SOX sources Number of NOx sources Number of CO sources Max emission rate Goal PM10 level Goal SOx level Goal NOx level Goal O3 level Number of memory steps (L) 4 steps Initial proportion of cooperating agents Environment parameters Number of boxes Temperature at t=0 Humidity at t=0 Wind Speed t=0 PM10 at t=0 SOX at t=0 NOX at t=0 CO at t=0 O3 at t=0 Air Quality at t=0 Total simulation time K Simulation step Prediction horizon 20 12.7 (°C) 71.0 % 2.4 m/s 13.0 µ gram/m3 17.0 µ gram/m3 2.0 µ gram /m3 0.5 µ gram /m3 29.0 µgram /m3 2 ( Good) 4900 hours 1 step = 2 hours Next 2 hours Table 4: Parameter values of the simulation scenario. 4 Results and discussion: We have built a simulator using the approach described above. We used the JADE agent framework [35] and ANN models from Encog [36]. We have defined 5 strategies: EG-CP (Evolutionary Game with Cumulative Penalty), EG-NCP (Evolutionary Game with No Cumulative Penalties), EG-NP (Evolutionary Game with No Penalty), CS (Centralized Strategy) and NC (No-Cooperation). The last one is used for comparison purposes. Using the parameters shown in table 4, we chose a strategy and ran the simulation 16 times. We then changed the strategy and ran the simulation again 16 times; since we have 5 strategies we obtain 80 simulations. The most explicative results are presented. For the CS and NC cases the simulator showed similar results for each run. For the EG strategies there were small differences between runs, especially concerning the proportion of cooperating agents. These changes are due Figure 2: Air quality index using 5 different cooperation strategies Figure 3: Air Quality index for 4900 hours. Informatica 39 (2015) xxx -- yyy Sabri Ghazi; Julie Dugdale; Tarek Khadir 508 Figure 4: Concentration of PM10 for the four tested cooperation strategies compared with the no-cooperation strategy. Figure 6: Proportions of cooperating agents for EG-CP, EG-NCP and EG-NP. Figure 5 : Concentration of SOX (a), NOx (b) and O3 (c) using the four strategies and the no-cooperation scenario. Figure 4 shows the evolution of the PM10 concentration during the simulation time. The PM10 concentration shows many peaks compared with the other pollutants under the same climatic conditions. This is due to the dry nature of the weather in the Annaba area, with wildfires, and sandstorms coming from the great Sahara desert. These events have a big effect on the PM10 concentration but not on the other pollutants. The CS strategy takes less time to control the pollution level and keep it below the goal level defined in the simulation parameters. All of the EG strategies take longer, keeping it close to the goal level, but without ever reaching it. The penalising regulations have a big effect on the PM10 level. As illustrated, the EG-CP (cumulative penalising method) controls the pollution better than the non-cumulative one, and both methods perform better than the no- penalising strategy. The no-cooperation is presented in order to show the impact of cooperation on the PM10 level. Figure 5 shows the evolution of the SOx, NOx and Ozone concentrations during the simulation time using four different cooperation strategies. The CS strategy gives the best performance since the pollution concentration rapidly decreases. The EG strategies show the same performance as for PM10 and the pollution level is widely influenced by the selected penalising method. The CP strategy appears to be the best one followed by the NCP. The pollution slowly decreases, but not enough to reach the goal level if penalisation is not used. Figure 7: The proportion of cooperating agents according to the emitted pollutant for the EG-CP strategy. A Multi-Agent based Approach for Air Pollution Informatica 39 (2015) 501 -- 505 509 5 Conclusions Figure 8, The proportion of cooperating agents for the EG-NCP strategy. Figure 9: The proportions of cooperating agents, for the 4 groups of agents, when penalisation is not used. The NC strategy gives the worst levels; when all agents are emitting pollution using their maximum emission rate, the pollutant level reaches alarming values and peak periods occur. Figure 6 shows how the penalising method affects the proportion of cooperating agents. For the case of EG-CP the game equilibrium is reached at time step 387 and stabilises when the proportion of cooperating agents is between 0.93 and 0.95. The EG-NCP strategy stabilises early at time step 196 and oscillates between a cooperation ratio of 0.73 and 0.80, after which the equilibrium is fixed at 0.77. The EG-NP is the slowest; the equilibrium is reached at time step 808 with a cooperation ratio of 0.57. This happens because the agents are not penalised since the strategy does not include penalising methods. Figures 7, 8 and 9 show, respectively, the proportion of cooperating agents according to the pollutant for the three penalising strategies EG-CP, EG-NCP and EG-NP. The PM10 agents gives the highest cooperation ratio. This is because many peaks occur with this pollutant and the others pollutants cooperating ratio (NOx and SOx) are influenced by the O3 concentration. The more the pollutant exceeds the allowed level, the greater the proportion of co-operators. The equilibriums are disturbed by the pollution level, because, when the pollution level reaches a level above the goal level, agents start being penalised, and thus they tend to cooperate more. Anthropogenic activities are among the main causes of pollution and environmental problems. These activities have to be included in the simulation models. Modelling the interaction between social and ecological components is a very important aspect. A MAS approach allows us to model the social network of human-beings sharing the exploitation of common environmental resources. Manipulating the behaviour at an individual and group level helps to gain more knowledge about the impact of human decision- making on pollution and makes the simulation more realistic. Studies treating air pollution are usually concerned with the physical aspects (concentration and dispersion of pollutant), and do not include human-decision factors on the emission sources.. In our approach, we model the decision-making activity of the air pollution emission source managers. This helps to investigate the conditions and regulations that may enhance and maintain the air quality. (CS) showed the strategy We used a two stage air pollution modelling method: a GPD dispersion model and an ANN forecasting model. The ANN predictor uses climatic parameters and dispersal information provided by the GPD model to make predictions. This helped to introduce the effect of uncertainty caused by the weather and made the simulation more realistic. Five cooperation strategies were tested. The centralized cooperation best performance, surpassing the reward/penalty strategies. However, the CS strategy needs an effective communication network between emission sources controllers and the regulation agency. Also, we assume that emission controllers communicate exactly their emission rate, which is not always the case. The reward/penalty strategies seem to be more realistic; penalising the polluting agents according to their participation during peak periods has a big influence on their behaviours. As shown in the simulation results, it helps reducing the pollution level and affects the evolution of the pollutant. Thus, air pollution regulations have a big impact on pushing the emission source controllers to take their polluting activity seriously; this is especially important during the peak periods where climatic conditions cause the pollutants to stagnate. To summarise our study helps to: (1) Model and introduce concerning emission sources and the process of simulating air pollution evolution. the possible cooperation between the actors concerned in managing the air quality. (3) Have a prediction about the efficiency of regulation rules for preserving the air quality. (4) Investigate the impact on air quality of the decision to expand or establish a new emission points. Our work aims to provide a decision-making tool to the air pollution control agencies that will help them evaluate the regulations and policies concerning air pollution control. The current version of the system deals only with point emission sources. In future decision-making (2) Evaluate human Informatica 39 (2015) xxx -- yyy Sabri Ghazi; Julie Dugdale; Tarek Khadir 510 and versions we aim to include line and area sources. Line sources model the road activities, whereas area sources model the waste management and agricultural sources of pollution. If data becomes available in future it could be interesting to experiment with different time representations. Fortunately the multi- agent system approach allows us to easily change to a different scale of time representation in the same simulation. We can envisage using one time representation for another monitoring. The first can help us to see long term impacts (e.g. investing in less polluting activities), and the second can help to see the short term changes. for decisions The simulator may also be enhanced by including topographic aspects of regions since this has a big influence on the dispersion of air pollutants. In addition, including more agent personalities and exploring other cooperation strategies are also among our future plans. Our system is designed in a generic way and it could be adapted for other types of pollution such as water pollution. This could be done by changing the current dispersion and the prediction models to a water pollution dispersion model. 6 References [1] Folke, Carl. Resilience: The emergence of a perspective systems analyses. Global environmental change, 16.3, 2006. pp. 253-267. social -- ecological [2] WHO (World Health Organisation), Ecosystems and Human Well-being: Health Synthesis . WHO Library Cataloguing-in-Publication Data, 2005. for [3] Kryza, M., Netzel, P., Drzeniecka-Osiadacz, A., Werner, M., & Dore, A. J. (2014). Forecasting the Ozone Concentrations with WRF and Artificial Neural Network Based System. In Air Pollution Modeling and its Application XXII Springer Netherlands, 2014, pp. 605-609. [4] Holmes, NS and Morawska, L., A Review of Dispersion Modelling and its application to the dispersion of particles: An overview of different dispersion models available. Atmospheric Environment, 40(30), 2006. pp. 5902-5928. [5] Lushi, Enkeleida, and John M. Stockie. An inverse Gaussian plume approach for estimating atmospheric pollutant emissions from multiple point sources. Atmospheric Environment, 44.8, 2010. pp. 1097-1107. [6] Aulinas Montse, Turon Clàudia and Sànchez- Marrè Miquel. Agents as a Decision Support Tool in Environmental Processes:The State of the Art. Whitestein Series in Software Agent Technologies and Autonomic Computing. 2009. pp. 5 -- 35. [7] Ghazi, Sabri, Khadir, Tarek, Julie Dugdale. Multi-Agent Based Simulation of Environmental Pollution Issues: A Review. Highlights of Practical Applications of Heterogeneous Multi- Agent Systems. The PAAMS Collection. Springer International Publishing, 2014. pp. 13- 21. [8] Hülsmann, F., Gerike, R., Kickhöfer, B., Nagel, K., & Luz, R. . Towards a multi-agent based modeling approach for air pollutants in urban regions. In Proceedings of the Conference on "Luftqualität an Strassen, 2011. pp. 144-166. [9] Kickhöfer, B., Hülsmann, F., Gerike, R., & Nagel, K. Rising car user costs: comparing aggregated and geo-spatial impacts on travel demand and air pollutant emissions. Smart Transport Networks: Decision Making, Sustainability and Market structure, NECTAR Series on Transportation and Communications Networks Research, 2012, pp.180-207. [10] Kickhöfer, B., & Nagel, K. Towards high- resolution first-best air pollution tolls. Networks and Spatial Economics, 2013. pp. 1-24. [11] Papaleonidas Andonis, Iliadis Lazaros. Hybrid and Reinforcement Multi Agent Technology for Real Time Air Pollution Monitoring. Artificial Intelligence Applications and Innovations IFIP Advances in Information and Communication Technology Volume 381, 2012, pp. 274-284. [12] Ahat M., Ben Amor S., Bui M., Lamure M., Marie-Françoise Courel. Pollution Modeling and Simulation with Multi-Agent and Pretopology. Complex Sciences, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Volume 4, 2009, pp.225-231. [13] Boyd, Robert, Richerson, Peter J. The evolution of reciprocity in sizable groups. Journal of Theoretical Biology, vol. 132, no 3, 1988, pp. 337-356. [14] Szilagyi Miklos N., An Investigation of N-person Prisoners' Dilemmas. Complex Systems, 14, 2003. pp. 155 -- 174. [15] Szilagyi Miklos N., Somogyi Iren, The Shape of Payoff Functions in N-person Games, Journal of Game 1(3), doi: 10.5923/j.jgt.20120103.02. 2012,10-14 Theory. [16] Xianyu, Bo, and Ping Chen. Does Social Welfare Preference Always Promote Cooperation on Barabási and Albert Networks ?. Computational Economics, 37.3, 2011, pp. 249-266. [17] Barabási, Albert-László, and Réka Albert. in random networks. Emergence of scaling science 286.5439, 1999: 509-512. [18] Conrad Power, A Spatial Agent-Based Model of N-Person Prisoner's Dilemma Cooperation in a Socio-Geographic Community, of Artificial Societies and Social Simulation vol. 12, 2009, http://jasss.soc.surrey.ac.uk/12/1/8.html. Journal [19] Hardin, Garrett. The tragedy of the commons. 18, no. Science, 162, 1968. pp. 1243-1248. [20] Osang, Thomas, and Arundhati Nandy. Environmental regulation of polluting firms: Porter's hypothesis revisited. Brazilian Journal of Business Economics. 3.3, 2003. pp. 128-148. A Multi-Agent based Approach for Air Pollution Informatica 39 (2015) 501 -- 505 511 memory, learning and dynamic preferential selection in spatial prisoner's dilemma game. In Journal of Physics: Conference Series, IOP Publishing, Vol. 96, No. 1, 2008, p. 012107. du lapin rejetées par [34] Tadjine, A., Djebar, H., & Courtois, A. Toxicité des poussières le complexe sidérurgique d'Annaba sur quelques paramètres hématologiques Europeus. Environnement, Risques & Santé, 7(3), 2008, 209-215. [35] Bellifemine, Fabio, POGGI, Agostino, et RIMASSA, Giovanni. JADE -- A FIPA-compliant agent framework. In : Proceedings of PAAM. 1999. p. 33. [36] Heaton, J. ,Encog: Library of Interchangeable Machine Learning Models for Java and C#. Journal of Machine Learning Research, 16, 2015., 1243-1247. [21] Lange Andreas, , Vogt Carsten, , Cooperation in international environmental negotiations due to a preference Journal of Public Economics, Volume 87, Issues 9 -- 10, September 2003, pp. 2049 -- 2067. for equity, [22] Touza, J., Drechsler, M., Smart, J. C., & Termansen, M. Emergence of cooperative behaviours the management of mobile ecological resources. Environmental Modelling & Software, 45, 2013. pp. 52-63. [23] De Vries, HJM Bert. Environmental Modelling. : Principles of Environmental Sciences. In Springer Netherlands, 2009. pp. 345-373. in [24] Stockie, John M. The mathematics of atmospheric dispersion modeling., Siam Review, 53.2, 2011. pp. 349-372. [25] Hanna, Steven R., Gary A. Briggs, and Rayford P. Hosker Jr. Handbook on atmospheric diffusion. No. DOE/TIC-11223. National Oceanic and Atmospheric Administration, Oak Ridge, TN (USA). Atmospheric Turbulence and Diffusion Lab., 1982. [26] User's guide for the industrial source complex (ISC3) dispersion models volume II -description of model algorithms, U.S. Environmental Protection 1995, http://www.epa.gov/scram001/userg/regmod/isc3 v2.pdf (visited on 11/22/2014). Agency, [27] Behera, Sailesh N. , Sharma, Mukesh. Degradation of SO2, NO2 and NH3 leading to formation of secondary inorganic aerosols: An environmental chamber study. Atmospheric environment, vol. 45, no 24, 2011 pp. 4015- 4024. in for [28] Ghazi, Sabri,, Khadir Med Tarek. Combination of artificial neural network models for air quality predictions for the region of Annaba, Algeria. International Journal of Environmental Studies, 69.1, 2012.pp. 79-89. [29] Pelliccioni, Armando et Tirabassi, Tiziano. Air dispersion model and neural network: A new perspective the simulation of complex situations. Environmental modelling & software, vol. 21, no 4, (2006). pp. 539-546. integrated models [30] Khedairia, S., Mohamed Khadir T.. Impact of clustered meteorological parameters on air pollutants concentrations region of Annaba, Algeria, Atmospheric Research 113, 2012. pp. 89-101. [31] Chen, S., Cowan, C.F., and Grant, P. M., Orthogonal Least Squares Learning Algorithm for Radial Basis Function Networks, IEEE Transactions on Neural Networks, 2(2), 1991, 302-309. [32] Li An, Modeling human decisions in coupled human and natural systems: Review of agent- based models, Ecological Modelling 229, 2012, 25 -- 36. [33] Zhao-Han Sheng., Hou, Y. Z., Wang, X. L., & Du, J. G. ,The evolution of cooperation with the in
1812.01130
1
1812
2018-12-03T23:14:59
A Unified Approach to Dynamic Decision Problems with Asymmetric Information - Part I: Non-Strategic Agents
[ "cs.MA", "math.OC" ]
We study a general class of dynamic multi-agent decision problems with asymmetric information and non-strategic agents, which includes dynamic teams as a special case. When agents are non-strategic, an agent's strategy is known to the other agents. Nevertheless, the agents' strategy choices and beliefs are interdependent over times, a phenomenon known as signaling. We introduce the notions of private information that effectively compresses the agents' information in a mutually consistent manner. Based on the notions of sufficient information, we propose an information state for each agent that is sufficient for decision making purposes. We present instances of dynamic multi-agent decision problems where we can determine an information state with a time-invariant domain for each agent. Furthermore, we present a generalization of the policy-independence property of belief in Partially Observed Markov Decision Processes (POMDP) to dynamic multi-agent decision problems. Within the context of dynamic teams with asymmetric information, the proposed set of information states leads to a sequential decomposition that decouples the interdependence between the agents' strategies and beliefs over time, and enables us to formulate a dynamic program to determine a globally optimal policy via backward induction.
cs.MA
cs
A Unified Approach to Dynamic Decision Problems with Asymmetric Information - Part I: Non-Strategic Agents Hamidreza Tavafoghi, Yi Ouyang, and Demosthenis Teneketzis Abstract We study a general class of dynamic multi-agent decision problems with asymmetric information and non-strategic agents, which includes dynamic teams as a special case. When agents are non-strategic, an agent's strategy is known to the other agents. Nevertheless, the agents' strategy choices and beliefs are interdependent over times, a phenomenon known as signaling. We introduce the notions of private information that effectively compresses the agents' information in a mutually consistent manner. Based on the notions of sufficient information, we propose an information state for each agent that is sufficient for decision making purposes. We present instances of dynamic multi-agent decision problems where we can determine an information state with a time-invariant domain for each agent. Furthermore, we present a generalization of the policy-independence property of belief in Partially Observed Markov Decision Processes (POMDP) to dynamic multi-agent decision problems. Within the context of dynamic teams with asymmetric information, the proposed set of information states leads to a sequential decomposition that decouples the interdependence between the agents' strategies and beliefs over time, and enables us to formulate a dynamic program to determine a globally optimal policy via backward induction. 8 1 0 2 c e D 3 ] A M . s c [ 1 v 0 3 1 1 0 . 2 1 8 1 : v i X r a A preliminary version of this paper will appear in the Proceeding of the 57th IEEE Conference on Decision and Control is with the Department of Mechanical Engineering at (CDC), Miami Beach, FL, December 2018 [1]. H. Tavafoghi the University of California, Berkeley (e-mail: [email protected]). Y. Ouyang is with Preferred Networks America, Inc. (e-mail: [email protected]). D. Teneketzis is with the Department of Electrical Engineering and Computer Science at the University of Michigan, Ann Arbor (e-mail: [email protected]) This work was supported in part by the NSF grants CNS-1238962, CCF-1111061, ARO-MURI grant W911NF-13-1-0421, and ARO grant W911NF-17-1-0232. November 23, 2018 DRAFT 2 A. Background and Motivation I. INTRODUCTION Dynamic multi-agent decision problems with asymmetric information have been used to model many situations arising in engineering, economic, and socio-technological applications. In these applications many decision makers/agents interact with each other as well as with a dynamic system. They make private imperfect observations over time, and influence the evolution of the dynamic system through their actions that are determined by their strategies. An agent's strategy is defined as a decision rule that the agent uses to choose his action at each time based on his realized information at that time. In this paper, we study a general class of dynamic decision problems with non-strategic agents. We say an agent is non-strategic if his strategy (not his specific action) is known to the other agents. In a companion paper [2] we study dynamic decision problems with strategic agents where an agent's strategy is his private information and not known to the other agents. We consider an environment with controlled Markovian dynamics, where, given the agents' actions at every time, the system state at the next time is a stochastic function of the current system state. The instantaneous utility of each agent depends on the agents' joint actions as well as the system state. At every time, each agent makes a private noisy observation that depends on the current system state and past actions of all agents in the system. Therefore, agents have asymmetric and imperfect information about the system history. Moreover, each agent's information depends on other agents' past actions and strategies; this phenomenon is known as signaling in the control theory literature. In such problems, the agents' decisions and information are coupled and interdependent over time because (i) an agent's utility depends on the other agents' actions, (ii) the evolution of the system state depends, in general, on all the agents' actions, (iii) each agent has imperfect and asymmetric information about the system history, and (iv) at every time an agent's information depends, in general, on the agents' (including himself) past actions and strategies. There are two main challenges in the study of dynamic multi-agent decision problems with asymmetric information. First, because of the coupling and interdependence among the agents' decisions and information over time, we need to determine the agents' strategies simultaneously for all times. Second, as the agents acquire more information over time, the domains of their strategies grow. November 23, 2018 DRAFT 3 In this paper, we propose a general approach for the study of dynamic decision problems with non-strategic agents and address these two challenges. We propose the notion of sufficient information and provide a set of conditions sufficient to characterize a compression of the agents' private and common information in a mutually consistent manner over time. We show that such a compression results in an information state for each agent's decision making problem. We show that restriction to the set of strategies based on this information state entails no loss of generality in dynamic decision problems with non-strategic agents. We identify specific instances of dynamic decision problems where we can discover a set of information states for the agents that have time-invariant domain. Within the context of dynamic teams, we further demonstrate that the notion of sufficient information leads to a sequential decomposition of dynamic teams. This sequential decomposition results in a dynamic program the solution of which determines the agents' globally optimal strategies. B. Related Literature The Partially Observed Markov Decision Processes (POMDPs), i.e. centralized stochastic control problems, present the simplest form of dynamic decision problems with single agent [3], [4]. To analyze and identify properties of optimal strategies in POMDPs the notion of information state is introduced as the agent's belief about the current system state conditioned on his information history. The information state provides a way to compress the agent's information over time that is sufficient for the decision-making purposes. When the agent has perfect recall, this information state is independent of the agent's strategies over time; this result is known as the policy-independence belief property [3]. Dynamic multi-agent decision problems with non-strategic agents are considerably more dif- ficult compared to their centralized counterparts. This is because, due to signaling, they are (in general) non-convex functional optimization problems (see [5] -- [8]). The difficulties present in these problems were first illustrated by Witsenhausen [9], who showed that in a simple dynamic team problem with Gaussian primitive random variables and quadratic cost function where signaling occurs, linear strategies are suboptimal (contrary to the corresponding centralized problem where linear strategies are optimal). Subsequently, many researchers investigated control problems with various specific information structures such as: partially nested ( [10] -- [15] and references therein), stochastic nested [16], randomized partially nested [17], delayed sharing ( [11], [18] -- [20] and references therein), information structures possessing the i-partition property November 23, 2018 DRAFT 4 or the s-partition property [21], the quadratic invariance property [22], and the substitutability property [23]. Currently, there are three approaches to the analysis of dynamic multi-agent decision problems with non-strategic agents: the agent-by-agent approach [24], the designer's approach [25], and the common information approach [26]. We provide a brief discussion of these approaches here. We discuss them in details in Section VI-B, where we compare them with the sufficient information approach we present in this paper and show that our approach is distinctly different from them. The agent-by-agent approach [24], is an iterative method. At each iteration, we pick an agent and fix the strategy of all agents except that agent, and determine the best response for that agent and update his strategy accordingly. We proceed in a round robin fashion among the agents until a fixed point is reached, that is, when no agent can improve his performance by unilaterally changing his strategy. The designer's approach [25], considers the decision problem from the point of view of a designer who knows the system model and the probability distribution of the primitive random variables, and chooses the control strategies for all agents without having an information about the realization of the primitive random variables. The common information approach [26], assumes that at each time all agents possess private information and share some common information; it uses the common information to coordinate the agents' strategies sequentially over time. C. Contribution We develop a general methodology for the study and analysis of dynamic decision problems with asymmetric information and non-strategic agents. Our model includes problems with non- classical information structures [19] where signaling is present. We propose an approach that effectively compresses the agents' private and common information in a mutually consistent manner. As a result, we offer a set of information states for the agents which are sufficient for decision making purposes. We characterize special instances where we can identify an information state with a time-invariant domain. Based on the proposed information state, we provide a sequential decomposition of dynamic teams over time. We show that the methodology developed in this paper generalizes the existing results for dynamic teams with non-classical information structure. Our results in this paper, along those appearing in the companion paper [2] present a set of information states sufficient for decision making in strategic and non-strategic November 23, 2018 DRAFT 5 settings. Therefore, we provide a unified approach to decision making problems that can be used to study dynamic games and dynamic teams as well as dynamic games among teams of agents. D. Organization The rest of the paper is organized as follows. In Section II, we describe the model and present few examples. In Section III, we discuss the main challenges that are present in dynamic multi-agent decision problems with non-strategic agents. We present the sufficient information approach in Section IV. We present the main results of the paper in Section V. We discuss an open problem associated with the sufficient information approach in Section VI-A. In Section VI-B, we compare the sufficient information approach with the existing approaches in the literature. We provide a generalization of the sufficient information approach in Section VII. We present an extension of our results to infinite-horizon dynamic multi-agent decision problems with non- strategic agents in Section VIII. We conclude in Section IX. The proofs of all the theorems and lemmas appear in the Appendix. Notation t t t t t , . . . ,X N (resp. functions f 1 t , . . . ,X N t t (·), . . . ,f N t ) (resp. ft(·) := (f 1 Random variables are denoted by upper case letters, their realizations by the corresponding lower case letters. In general, subscripts are used as time index while superscripts are used to index agents. For t1≤ t2, Xt1:t2 (resp. ft1:t2(·)) is the short hand notation for the random variables (Xt1,Xt1+1, ...,Xt2) (resp. functions (ft1(·), . . . ,ft2(·))). When we consider a sequence of random variables (resp. functions) for all time, we drop the subscript and use X to denote X1:T (resp. f (·) to denote f1:T (·)). For random variables X 1 t (·)), t (·))) to denote the vector of the set we use Xt := (X 1 of random variables (resp. functions) at t, and X−n t ) (resp. := (X 1 t (·))) to denote all random variables (resp. functions) f−n at t except that of the agent indexed by n. P(·) and E(·) denote the probability and expectation of an event and a random variable, respectively. For a set X , ∆(X ) denotes the set of all beliefs/distributions on X . For random variables X,Y with realizations x,y, P(xy) := P(X = xY = y) and E(Xy) := E(XY = y). For a strategy g and a belief (probability distribution) π(·)) to indicate that the probability (resp. expectation) depends on the π, we use Pg choice of g and π. We use 1{X=x} to denote the indicator function for event X = x. For sets A and B we use A\B to denote all elements in set A that are not in set B. For random variables X and Y we write X dist.= Y when X and Y have an identical probability distribution. (·) := (f 1 t (·), . . . ,f n−1 π(·) (resp. Eg (·),f n+1 (·), . . . ,f N t (·), . . . ,f N t , . . . ,X n−1 t ,X n+1 , . . . ,X N t November 23, 2018 DRAFT II. MODEL 6 1) System dynamics: Consider N non-strategic agents who live in a dynamic Markovian world over a horizon T :={1,2, ...,T}, T <∞. Let Xt ∈Xt denote the state of the world at t∈T . At time t, each agent, indexed by i∈N :={1,2, ...,N}, chooses an action ai t denotes the set of available actions to him at t. Given the collective action profile At := (A1 t ), the state of the world evolves according to the following stochastic dynamic equation, t, where Ai t∈Ai t , ...,AN Xt+1 = ft(Xt, At, W x t ), (1) 1:T−1 is a sequence of independent random variables. The initial state X1 is a random where W x variable that has a probability distribution η ∈ ∆(X1) with full support. At every time t ∈ T , before taking an action, agent i receives a noisy private observation t ∈ Y i Y i t of the current state of the world Xt and the action profile At−1, given by Y i t = Oi t(Xt, At−1, W i t ), (2) 1:T , i ∈ N , are sequences of independent random variables. Moreover, at every t ∈ T , where W i all agents receive a common observation Zt ∈ Zt of the current state of the world Xt and the action profile At−1, given by Zt = Oc t (Xt, At−1, W c t ), (3) 1:T , and W i 1:T , i ∈ N are mutually independent. 1:T , is a sequence of independent random variables. We note that the agents' actions where W c At−1 is commonly observable at t if At−1 ⊆ Zt. We assume that the random variables X1, W x agents' aggregate information is given by Ht :=(cid:81) 1:T−1, W c 2) Information structure: Let Ht ∈ Ht denote the aggregate information of all agents at time t. Assuming that agents have perfect recall, we have Ht = {Z1:t, Y 1:N 1:t−1}, i.e. Ht denotes the set of all agents' past observations and actions. The set of all possible realizations of the τ <t Ai τ. At time t ∈ T , the aggregate information Ht is not fully known to all agents; each agent may have asymmetric information about Ht. Let Ct := {Z1:t} ∈ Ct denote the agents' common information about Ht and P i t denote agent i's private information about t and Ct denote the set of all possible realizations of agent i's private and common Ht, where P i information at t, respectively. In this paper, we discuss several instances of information structures τ≤t Zτ ×(cid:81) τ ×(cid:81) 1:t−1}\Ct∈ P i 1:t i∈N(cid:81) i∈N(cid:81) t :={Y i 1:t,Ai , A1:N τ≤t Y i November 23, 2018 DRAFT that can be captured as special cases of our general model. 7 3) Strategies and Utilities: Let H i i at t, where Hi i's strategy gi := {gi that determine agent i's action Ai t :={Ct,P i t}∈ Hi t denote the information available to agent t denote the set of all possible realizations of agent i's information at t. Agent t), t ∈ T , t, t ∈ T }, is defined as a sequence of mappings gi t : Hi t → ∆(Ai t of his history at t∈ T . t∈ Hi t for every realization hi Agent i's instantaneous utility at t depends on the state of the world Xt and the collective t(Xt, At). Therefore, agent i's total utility over the horizon action profile At and is given by ui T is given as U i(X1:T , A1:T ) := (cid:88) t∈T ui t(Xt, At). (4) We assume that agents are non-strategic. That is, each agent's, say i's, i∈N , strategy choice gi is known to other agents. We note that these non-strategic agents may have different utilities over time. Therefore, the model includes a team of agents sharing the same utilities (see Sections V) as well as agents with general non-identical utilities. In [2] we build on our results in this paper to study dynamic decision problems with strategic agents where an agent may deviate privately from the commonly believed strategy, and gain by misleading the other agents. To avoid measure-theoretic technical difficulties and for clarity and convenience of exposition, we assume that all the random variables take values in finite sets. Assumption 1. (Finite game) The sets Xt, Zt, Y i t, Ai t, i ∈ N , t ∈ T , are finite. Special Cases: We present several instances of dynamic decision problems with asymmetric information that are special cases of the general model described above. 1) Real-time source coding-decoding [27]: Consider a data source that generates a random sequence {X1,...,XT} that is k-th order Markov, i.e. for every sequence of realizations x1:T , P{Xt+k:T = xt+k:Tx1:t+k−1} =P{Xt+k:T = xt+k:Txt:t+k−1} for t≤ T − k. There exists an encoder (agent 1) who observes Xt at every time t; the encoder has perfect recall. At every time t, based on his available data {X1,...,Xt}, the encoder transmits a signal Mt ∈ Mt through a noiseless channel to a decoder (agent 2), where Mt denotes the transmission alphabet. At the receiving end, at every time t, the decoder wants to estimate the value of Xt−1−δ (with delay δ) as Xt−1−δ based on his available data M1:t−1; we assume that the decoder has perfect recall. The November 23, 2018 DRAFT 8 total distortion function given by (cid:80)T encoder and decoder choose their joint coding-decoding policy so as to minimize the expected t=2+δ dt(Xt, Xt), where dt(·,·) denotes the instantaneous distortion function. To capture the above-described model within the context of our model, we need to define an augmented system state Xt that includes the last max(k, δ + 1) states realizations as Xt :={Xt−max(k,δ+1)+1,...,Xt}. Moreover, the encoder's (agent 1's) observation is given by Y 1 t = t ) = (Mt, Xt−1−δ). The encoder's and decoder's instantaneous t ( Xt, At−1) = Xt and the decoder's (agent 2's) observation is given by Y 2 t = O1 t ( Xt,At−1) = Mt−1, where (A1 O2 utility are given by a distortion function uteam t ,A2 t ( Xt,At) = dt(Xt−1−δ, Xt−1−δ). 2) Delayed sharing information structure [18] -- [20], [28]: Consider a N-agent decision prob- lem where agents observe each others' observations and actions with d-step delay. We note that in our model we assume that the agents' common observation Zt at t is only a function of Xt and and At−1. Therefore, to describe the decision problem with delayed sharing information structure within the context of our model we need to augment our state space to include the agents' last d observations and actions as part of the augmented state. Define Xt := {Xt, M 1 t } t , ..., M d t := {At−i, Yt−i} ∈ At−i × Yt−i, i ∈ N ; that is, M i as the augmented system state where M i serves as a temporal memory for the agents' observations Yt−i and actions At−i at t−i. Then, we have Xt+1 = {Xt+1, M 1 } and Zt ={M d t } ={Yt−d, At−d}. t+1} = {ft(Xt, At, W x t , ..., M d−1 t ), (Yt, At), M 1 t+1, ..., M d t+1, M 2 t , M 2 t t 3) Real-time multi-terminal communication [29]: Consider a real-time communication system with two encoders (agents 1 and 2) and one receiver (agent 3). The two encoders make distinct t of a Markov source. The encoders' observation are conditionally observations X 1 independent Markov chains. That is, there is an unobserved random variable variable R such that P{X 1 t and X 2 1,X 2 1,R} =P{X 1 P{X 1 1R}P{X 2 t+1X 1 1R}P{R}, and t , R} =P{X 1 t , X 2 t+1, X 2 t+1X 1 t , R}P{X 2 t+1X 2 t , R}. Markov source X 1 t , X t 2 X 1 t X 2 t Encoder 1 1:t,M 1 g1 t(X 1 1:t−1) Encoder 2 1:t,M 2 g1 t(X 2 1:t−1) M 1 t M 2 t Channel 1 t M 1 t (Y 1 t−1) Q1 Channel 2 t M 2 t (Y 2 t−1) Q2 Y 1 t Receiver Xt Y 2 t g3 t(Y 1:2 1:t−1) Each encoder encodes, in real-time, its observations into a sequence of discrete symbols and November 23, 2018 DRAFT 9 t(··), i = 1, 2. sends it through a memoryless noisy channel characterized by a transition matrix Qi The receiver wants to construct, in real time, an estimate Xt of the state of the Markov source based on the channels' output Y 1 1:t. All agents have the same instantaneous utility given by a distortion function dt(Xt, Xt). 1:t,Y 2 4) Optimal remote and local controller [30], [31]: Consider a decentralized control problem for a Markovian plant with two controllers, a local controller (agent 1) and a remote controller (agent 2). A2 t Plant ft(Xt, A1 t , A2 t ) A1 t Remote Controller gt(Y1:t, A2 1:t−1) Xt Local Controller Yt Xt gt(X1:t, Y1:t, A1 1:t−1) The local controller observes perfectly the state Xt of the Markov chain, and sends his obser- vation through a packet-drop channel to the remote controller. The transmission is successful, i.e. Yt = Xt, with probability p > 0 and is not successful, i.e. Yt =∅, with probability 1−p≥ 0. We assume that the local controller receives an acknowledgment every time the transmission is successful. The controllers' joint instantaneous utility is given by a uteam (Xt,A1 t t ). t ,A2 III. STRATEGIES AND BELIEFS In a dynamic decision problem with asymmetric information agents have private information about the evolution of the system, and they do not observe the complete history {Ht, Xt}, t∈T . Therefore, at every time t∈T , each agent, say agent i∈N , needs to form (i) an appraisal about the current state of the system Xt and the other agents' information H−i (appraisal about the history), and (ii) an appraisal about how other agents will play in the future (appraisal about the future), so as to evaluate the performance of his strategy choices. t When agents are non-strategic, the agents' strategies g1:N 1:T are known to all agents. Therefore, agent i ∈ N can form these appraisals by using his private information H i t along with the commonly known strategies g−i. Specifically, agent i can utilize his own information H i t at t ∈ T , along with (i) the past strategies g1:t−1 and (ii) the future strategies gt:T to form these appraisals about the history and the future of the overall system, respectively. As a result, the November 23, 2018 DRAFT outcome of decision problems with non-strategic agents can be fully characterized by the agents' strategy profile g.2 10 However, we need to know the entire strategy profile g for all agents and at all times to t, at any time form these appraisals so as to evaluate the performance of an arbitrary strategy gi t∈T and for any agent i∈N . Therefore, we must work with the strategy profile g as a whole irrespective of the length of the time horizon T . Consequently, the computational complexity of determining a strategy profile that satisfies certain conditions (e.g. an optimal strategy profile in teams) grows doubly exponentially in T since the domain of agents' strategy (i.e. Hi t) and the number of temporally interdependent decision problems (one for each time instance) grows with T . As a result, the analysis of such decision problems is very challenging in general [32]. An alternative conceptual approach for the analysis of decision problems is to define a belief system µ along with the strategy profile g. For every agent i ∈ N , at every time t ∈ T , t } conditioned on the realization of hi t) as the agent i's belief about {Xt,P −i define µi t, t(hi hi t)(xt,p−i) := Pg1:t−1{Xt = xt,P −i t}. The belief µi t provides an intermediate that is, µ(hi instrument that encapsulates agent i's appraisal about the past. Therefore, agent i can evaluate the t) along with the future strategy profile t using only the belief µi performance of any action ai t)(xt,p−i) is dependent on g1:t−1 in general since the probability gt:T . However, the belief µ(hi t} depends on g1:t−1. Therefore, the introduction of a hi distribution Pg1:t−1{Xt = xt,P −i t = p−i belief system offers an equivalent problem formulation that does not necessarily break the inter- temporal dependence between g1:t−1 and gt:T and does not simplify the analysis of decision problems. t = p−i t t t(hi Nevertheless, the definition of a belief system has been shown to be suitable for the analysis of single-agent decision making problems (POMDP) for the following reasons. First, in POMDPs, under perfect recall, the probability distribution Pg1:t−1{Xt = xtht} is independent of g1:t−1; this is known as the policy-independence property of beliefs in stochastic control. Second, the complexity of the belief function does not grow over time since at every time t the agent only needs to form a belief about Xt, which has a time-invariant domain. As a result, we can sequentially decompose the problem over time to a sequence of static decision problems with time-invariant complexity; such a decomposition leads to a dynamic program. At each stage 2We discuss the decision problems with strategic agents in the companion paper [2].When agents are strategic each agent may have incentive to deviate an any time from the strategy the other agents commonly believe he uses if it is profitable to him (see [2] for more discussion). November 23, 2018 DRAFT t ∈ T of the dynamic program, we specify gt by determining an action for each realization of the belief µt(·) fixing the future strategies gt+1:T . Therefore, the computational complexity of the analysis is reduced from being exponential in T to linear in T . 11 Unfortunately, the above approach for POMDPs does not generalize to decision problems with many agents. This is because of three reasons. First, with many agents, currently in the literature, there exists no information state for each agent that provides a compression of the agent's information, in a mutually consistent manner among the agents, that is sufficient for decision making purposes. Therefore, an agent's, say agent i's, strategy gi t has a growing domain over time. Second, at every time t∈T , each agent i∈N needs to form a belief about the system state Xt as well as the other agents' private information P −i that has a growing domain. Therefore the complexity of belief functions grows over time. Third, in decision problems with many agents, the policy-independence property of belief does not hold in general and the agents' beliefs at (·) are every time t depend on the past strategy profile g1:t−1. Therefore, the agents' beliefs µ1:N correlated with one another. This correlation depends on g1:t−1, and thus, it is not known a priori. Consequently, if we follow an approach similar to that of POMDP to sequentially decompose the problem, we need to solve the decision problem at every stage for every arbitrary correlation among the agents' belief functions, and such a problem is not tractable.3 Hence, the methodology proposed for the study of POMDPs is not directly applicable to decision problems with many agents and non-classical information structures. t t In the sequel, we propose a notion of sufficient private information and sufficient common information as a mutually consistent compression of the agents' information for decision making purposes. Therefore, we address (partially) the first two problems on the growing domain of the agents' beliefs and strategies. We provide instances of decision problems where we can discover time-invariant information state for each agent. We then utilize the agents' sufficient common information as a coordination instrument, and thus, capture the implicit correlation among the agents' beliefs over time. Accordingly, we present a sequential decomposition of the original decision problems such that at every stage the complexity of the decision problem is similar to that of a static decision multi-agent problem and the size of state variable at every stage is proportional to the dimension of the sufficient private information; thus, we (partially) address the third problem discussed above. 3Alternatively, one can consider arbitrary correlation among the agents' information rather than their beliefs. This is the main idea that underlies the designer's approach proposed by Winstenhausen [25]. Please see Section VI-B for more discussion. November 23, 2018 DRAFT 12 IV. SUFFICIENT INFORMATION We present the sufficient information approach and characterize an information state that results from compressing the agents' private and common information in a mutually consistent manner. Therefore, we introduce a class of strategy choices that are simpler than general strategies as they require agents to keep track of only a compressed version of their information over time. We proceed as follows. In Section IV-A we provide conditions sufficient to determine the subset of private information an agent needs to keep track of over time for decision making purposes. In Section IV-B, we introduce the notion of sufficient common information as a compressed version of the agents' common information that along with sufficient private information provides an information state for each agent. We then show, in Section V, that this compression of the agents' private and common information provides a sufficient statistic in dynamic decision problems with non-strategic agents. In Section VII, we provide a generalization of sufficient information approach presented here. A. Sufficient Private Information The key ideas for compressing an agent's private information appear in Definitions 1 and 2 below. To motivate these definitions we first consider the decision problem with single agent, that is, a Partially Observed Markov Decision Process (POMDP), which is a special case of the model described in Section II where N = 1, H 1 t and Ct = ∅ for all t ∈ T . t = P 1 In a POMDP, the agent's belief about the system state Xt conditioned on his history realization t is an information state. We highlight the three main proprieties that underlie the definition of hi information state in POMDP (see [33], [34]): (1) the information state can be updated recursively, that is, at any time t the information state at t can be written as a function of the information state at t − 1 and the new information that becomes available at t, (2) the agent's belief about the information state at the next time conditioned on the current information state and action is independent of his information history, and (3) at any time t and for any arbitrary action the agent's expected instantaneous utility conditioned on the information state is independent of his information history. We generalize the key properties of information state for POMDPs, described above, to decision problems with many agents. We propose a set of conditions sufficient to compress the agents' private information in two steps. First, we consider a decision problem with many agents where there is no signaling among them. Motivated by the definition of information state November 23, 2018 DRAFT 13 in POMDPs, we describe conditions sufficient to determine a compression of the agents' private information (Definition 1). Next, we build on Definition 1 as an intermediate conceptual step, and consider the case where agents are aware of possible signaling among them. Accordingly, we present a set of conditions sufficient to determine a compression of the agents' private information in decision problems with many agents (Definition 2) . Therefore, we first characterize subsets of an agent's private information that are sufficient for the agent's decision making process when there is no signaling among the agents. Definition 1 (Private payoff-relevant information). Let P i,pr t (P i that agent i ∈ N forms at t ∈ T based on his private information P i Ct. We say P i,pr profile (A1:N t , Ct) denote a private signal t and common information is a private payoff-relevant information for agent i if, for all open-loop strategy 1:T ) and for all t ∈ T , 1:T = a1:N t = ¯ζ i t (i) it can be updated recursively as (ii) for all realizations {ct, pi t(P i,pr t−1 , H i t\H i t−1) if t(cid:54)= 1, P(A1:N 1:T =a1:N pi,pr t+1 t,ct,at =P(A1:N 1:T =a1:N t = ¯φi P i,pr t} it satisfies 1:T )(cid:110) 1:t )(cid:110) (cid:111) (cid:12)(cid:12)(cid:12)pi (cid:12)(cid:12)(cid:12)ct,pi (cid:111) (cid:12)(cid:12)(cid:12)pi,pr t pi,pr t+1 1:T )(cid:110) 1:t)(cid:110) 1:T =a1:N , (cid:111) ,ct,at t} > 0, (cid:12)(cid:12)(cid:12)ct, pi,pr t (cid:111) . , at (iii) for all realizations {ct, pi t} ∈ Ct × P i t such that P(A1:N 1:T ){ct, pi E(A1:N 1:t−1=a1:N ui t(Xt,At) t,at = E(A−i 1:t−1=a−i ui t(Xt,At) By assuming that all other agents play open-loop strategies we remove the interdependence between agents −i's strategy choices and agent i's information structure, thus, we eliminate signaling among the agents. Fixing the open-loop strategies of agents −i, agent i faces a , t ∈ T , is a private payoff- centralized stochastic control problem. Definition 1 says that P i,pr relevant information for agent i if (i) it can be recursively updated, (ii) P i,pr includes all t+1 and (iii) agent i's instantaneous conditional expected information in P i utility at any t ∈ T is only a function of Ct,P i,pr t at t. These three conditions are similar to properties (1)-(3) for an information state in POMDP, but they concern only agent t} of his private and common i's private information P i t t that is relevant to P i,pr instead of the collection H i , and his action Ai t = {Ct,P i t t t November 23, 2018 DRAFT 14 information.4 While the definition of private payoff-relevant information suggests a possible way to compress the information required for an agent's decision making process, it assumes that other agents play open-loop strategies and do not utilize the information they acquire in real-time for decision making purposes (i.e. no signaling). However, open-loop strategies are not in general optimal for agents −i. As a result, to evaluate the performance of any strategy choice gi agent i needs also to form a belief about the information that other agents utilize to make decisions. Definition 2 (Sufficient private information). We say Si sufficient private information for the agents if, t = ζ i t (P i t , Ct; g1:t−1), i ∈ N , t ∈ T , is (i) it can be updated recursively as Si t = φi t(Si t−1, H i t\H i t−1; g1:t−1) for t ∈ T \{1}, (5) (ii) for any strategy profile g and for all realizations {ct, pt, pt+1, zt+1, at} ∈ Ct×Pt×Pt+1×Zt+1 of positive probability, Pg1:t (cid:110) (cid:12)(cid:12)(cid:12)pt,ct,at (cid:111) (cid:110) (cid:12)(cid:12)(cid:12)st,ct,at (cid:111) st+1,zt+1 =Pg1:t st+1,zt+1 , (6) where s1:N τ = ζ 1:N τ (p1:N τ ,cτ ;g1:τ−1) for τ ∈ T ; (iii) for every strategy profile g of the form g :={gi t : S i t∈T ; Eg1:t−1 (cid:110) for all realizations {ct,pi for τ ∈ T ; ui t(Xt,At) t}∈Ct×P i t), i∈N,t∈T } and at∈At, (cid:111) (cid:12)(cid:12)(cid:12)ct,pi =Eg1:t−1 t,at t ×Ct → ∆(Ai (cid:110) ui t(Xt,At) (cid:12)(cid:12)(cid:12)ct,si (cid:111) t,at , t of positive probability where s1:N τ = ζ 1:N τ (p1:N τ (7) ,cτ ; g1:τ−1) (iv) given an arbitrary strategy profile g of the form g := {gi t), i∈N , t∈T }, i∈N , and t∈T , Pg1:t−1 (cid:110) (cid:111) (cid:12)(cid:12)(cid:12)pi s−i t t,ct =Pg1:t−1 s−i t t,ct , t : S i t ×Ct → ∆(Ai (cid:111) (cid:110) (cid:12)(cid:12)(cid:12)si (8) 4We note that we interpret a centralized control problem as a special case of our model where N =1, H 1 t =Pt and Ct =∅ for all t∈T , Definition 1 coincides with the definition of information state for the single agent decision problem. We would like to point out that conditions (i)-(iii) can have many solutions including the trivial solution P i,pr t =P i t . 5 November 23, 2018 DRAFT for all realizations {ct,pi for τ ∈ T . t}∈Ct×P i t of positive probability where s1:N τ = ζ 1:N τ (p1:N τ 15 ,cτ ; g1:τ−1) There are four key differences between the definition of sufficient private information and that of private payoff relevant information. First, we allow that the definition and the update rule t to depend on the agents' strategies g1:t−1. Second, comparing to of sufficient information Si part (ii) of Definition 1, part (ii) of Definition 2 requires that sufficient information St includes all information relevant to the realization of Zt+1 in addition to the information relevant to the realization of St+1. As we discuss further in Section VI, this is because when signaling occurs in a multi-agent decision problems agents need to have a consistent view about future commonly observable events. Third, comparing part (iii) of Definition 2 to part (iii) of Definition 1, we note that the probability measures in Definition 2 depend on the strategy profile g instead of the ope-loop strategy profile (A1:N 1:T ). Fourth, in part (iv) of Definition 2 there is an additional t must be rich enough so that condition requiring that agent i's sufficient private information Si he can form beliefs about agents −i's sufficient private information S−i ; such a condition is absent in Definition 1. 1:T = a1:N t In general, the notion of sufficient private information S1:N is more restrictive than that of , t ∈ T , needs to satisfy the private payoff relevant information P 1:N,pr additional condition (iv), and furthermore, open-loop strategies are a strict subset of closed loop strategies. Definition 2 provides (sufficient) conditions under which agents can compress their private information in a "mutually consistent' manner. We would like to point out that conditions (i)-(iv) of Definition 2 can have many solutions including the trivial solution Si . This is because, S1:N t t t t .6 t = P i B. Sufficient Common Information Based on the characterization of sufficient private information, we present a statistic (com- pressed version) of the common information Ct that agents need to keep track of over time for decision making purposes. Fix a choice of sufficient private information S1:N t to be the set of all t. Given the agents' strategy profile g, let γt : Ct → possible realizations of Si ∆(Xt × St) denote a mapping that determines a conditional probability distribution over the i=1 S i t , t ∈ T . Define S i t, and St :=(cid:81)N 6We do not discuss the possibility of finding a minimal set of sufficient private information in this chapter, and leave it for future research as such investigation is beyond the scope of this chapter. November 23, 2018 DRAFT 16 system state Xt and all the agents' sufficient private information St conditioned on the common information Ct at time t as γt(ct)(xt, st) = Pg1:t−1{Xt = xt, St = stct}, (9) for all ct ∈ Ct, xt ∈ Xt, st ∈ St. We call the collection of mappings γ := {γt, t ∈ T } a sufficient information based belief system (SIB belief system). Note that γt is only a function of the common information Ct, and thus, it is computable by all agents. Let Πγ t := γt(Ct) denote the (random) common information based belief that agents hold under belief system γ at t. We can interpret Πγ t as the common belief that each agent holds about the system state Xt and all the agents' (including himself) sufficient private information St at time t. We call the SIB belief Πt a sufficient common information for the agents. In the rest of the paper, we write Πt and drop the superscript γ whenever such a simplification in notation is clear. Moreover, we use the terms sufficient common information and SIB belief interchangeably. C. Sufficient Information based Strategy t The combination of sufficient private information S1:N and sufficient common information (the SIB belief) Πt offers a mutually consistent compression of the agents' private and common t) for information. Consider a class of strategies that are based on the information given by (Πt, Si each agent i∈N at time t ∈ T . We call the mapping σi t) a Sufficient Information Based (SIB) strategy for agent i at time t. A SIB strategy σi t determines a probability t). A SIB strategy is distribution for agent i's action Ai a strategy where agents only use the sufficient common information Πt = γt(Ct) (instead of complete common information Ct), and the sufficient private information Si t , Ct; g1:t−1) 1:T} is (instead of complete private information P i called a SIB strategy profile σ. The set of SIB strategies is a subset of general strategies, defined in Section II, as we can define, t = ζ i t ). A collection of SIB strategies {σ1 t at time t given his information (Πt, Si t : ∆(Xt × St)× S i t (P i 1:T , ..., σN t → ∆(Ai g(σ,γ),i t (hi t) := σi t(πγ t , si t) ∀t∈T (10) We note that from Definition 2 and (9), the realizations πt and s1:N Therefore, strategies g(σ,γ),i for t = 1, g(σ,γ),i 1) = σi at t only depends on g1:t−1. , defined above via (10) needs to be determined iteratively as follows; )); ...; 1 , ζ i 1, C1)); for t = 2, g(σ,γ),i 2, C2; g(σ,γ) 2) = σi 2(πγ 1(πγ 1(P i 2(P i 2 , ζ i (hi 1 t t (hi 2 1 November 23, 2018 DRAFT for t = T , g(σ,γ),i t∈T and i∈N . t (hi t) = σi t(πγ t , ζ i 2(P i t , Ct; g(σ,γ) t−1 )). Therefore, strategy g(σ,γ),i t 17 is well-defined for all D. Sufficient Information based Update Rule When the agents play a SIB strategy profile σ, it is possible to determine the SIB belief Πt recursively over time based on Πt−1 and the new common information Zt via Bayes' rule. Let : ∆(Xt−1×St−1)×Zt → ∆(Xt×St) describe such a update rule for time t + 1 ∈ T /{1} so ψσt−1 that t Πt = ψσt−1 t (Πt−1, Zt). (11) We note that the SIB update rule ψσt−1 depends on the SIB strategy profile σt−1 at t−1. In the rest of the paper, we drop the superscript σ whenever such a simplification in notation is clear. t E. Special Cases We consider the special cases (1)-(3) of the general model we presented in Section II, 1:T ; we discuss the application of sufficient and identify the sufficient private information S1:N information approach to special case (4) in Section VII. t = {X1:t} and P 2 2) Delayed sharing information structure: We have P i t = X ={Xt−max(k,δ+1)+1,...,Xt} and S2 1) Real-time source coding-decoding: The encoder's and decoders' private information are t = { X1:t−1−δ}, respectively. The agents' common information is given by P 1 t = ∅ satisfy given by Ct ={M1:t−1}. We can verify that S1 the conditions of Definition 2 ; this is similar to the structural results in [27, Sections III and VI]. Consequently, the common information based belief is Πt =Pg{Xt−max(k,δ+1)+1:tM1:t−1}. t−d+1:t} and Ct ={Y1:t−d, A1:t−d}. Since we do not assume any specific structure for the system dynamics and the agents' observations, agent i's complete private information P i is payoff-relevant for him. Therefore, t t . Consequently, we have Πt = Pg{Xt,Yt−d+1:t,At−d+1:tY1:t−d,A1:t−d}. The above we set Si sufficient information appears in the first structural result in [18]. t ={X 1 t = (X 1 1:t−1}, 1:t−1}), t ; this sufficient information corresponds to 1:t,M 1 t ,P{RX 1 1:t,M 2 1:t−1M 1 1:t−1}, P 2 3) Real-time multi-terminal communication: We have P 1 t ={Y 1 1:t, X1:t−1}, and Ct =∅. It is easy to verify that S1 P 3 S2 t = (X 2 the structural results that appear [29]. 1:t,Y 2 t ,P{RX 2 1:t−1}), and S3 1:t},P{Y 2 1:t−1M 2 t = P 3 1:t},P{Y 1 t ={X 2 t ={Y i t−d+1:t,Ai t = P i November 23, 2018 DRAFT 18 V. MAIN RESULTS In this section, we present our main results for the analysis of dynamic decision problems with asymmetric information and non-strategic agents using the notion of sufficient information. We first provide a generalization of the policy-independence property of beliefs to decision problems with many agents (Theorem 1). Second, we show that the set of SIB strategies are rich enough so that restriction to them is without loss of generality (Theorem 2). That is, given any strategy profile g, there exists a SIB strategy profile σ such that every agent gets the same flow of utility over time under σ as the one under g. Third, we consider dynamic team problems with asymmetric information. We show that using the SIB strategies, we can decompose the problem sequentially over time, formulate a dynamic program, and determine a globally optimal policy via backward induction (Theorem 3). Theorem 1 (Policy-independence belief property). (i) Consider a general strategy profile g. If agents −i play according to strategies g−i, then for every strategy gi that agent i plays, Pg(cid:110) xt, p−i t = Pg−i(cid:110) xt, p−i t . (12) (ii) Consider a SIB strategy profile σ along with the associated update rule ψ. If agents −i play according to SIB strategies σ−i, then for every general strategy gi that agent i plays, t (cid:111) (cid:12)(cid:12)(cid:12)hi (cid:12)(cid:12)(cid:12)hi (cid:111) t (cid:110) (cid:110) t (cid:111) (cid:12)(cid:12)(cid:12)hi (cid:12)(cid:12)(cid:12)hi (cid:111) t . Pσ−i,gi ψ xt, p−i t =Pσ−i ψ xt, p−i t (13) Theorem 1 provides a generalization of the policy-independence belief property for the central- ized stochastic control problem [3] to multi-agent decision making problems. Part (i) of Theorem 1 states that, under perfect recall, agent i's belief is independent of his actual strategy gi. Part (ii) of Theorem 1 refers to the case where agents −i play SIB strategies σ−i and update their SIB belief according to SIB update rule ψ. The update rule ψ is determined based on (σ−i, σi) via Bayes' rule, where σi denotes the SIB strategy that agents −i assume agent i utilizes. Equation (13) states that even if agent i unilaterally and privately deviates from his SIB strategy, his belief is independent of his actual strategy gi, and only depends on the other agents's strategy σ−i as well as the other agents' assumption about the SIB strategy σi (or equivalently the SIB update November 23, 2018 DRAFT 19 rule ψ).7 In POMDPs it is shown that restriction to Markov strategies is without loss of optimality. We provide a generalization of this result to decision problems with many agents. We show that restriction to SIB strategies is without loss of generality in non-strategic settings given that the agents have access to a public randomization device. We say that the agents have access to a public randomization device if at every time t ∈ T they observe a public random signal ωt that is completely independent of all events and primitive random variables in the decision problem and is uniformly distributed on [0,1], and is independent across time. As a result, in general, at every t∈T , all agents can condition their actions on the realization of ωt as well as their own information. In other words, a public randomization device enables the agents to play correlated randomized strategies. We denote by σi t, ωt) agent i's SIB strategy using the t(Πt, Si public randomization device for every i ∈ N and t ∈ T . Theorem 2. Assume that the non-strategic agents have access to a public randomization device. Then, for any strategy profile g there exists an equivalent SIB strategy profile σ that results in the same expected flow of utility, i.e. (cid:40) T(cid:88) Eg (cid:41) (cid:40) T(cid:88) (cid:41) ui τ (g1:N τ (H 1:N τ ),Xτ) = Eσ u1:N τ (σi τ(Πτ,S1:N τ , ωτ ),Xτ) , (14) τ =t for all i∈N and t∈T . τ =t We provide an intuitive explanation for the result of Theorem 2 below. For every agent i ∈ N , his complete information history H i t at any time t ∈ T consists of two components: (i) one component captures his information about past events that is relevant to the continuation decision problem; and (ii) another component that, given the first component, captures the information about past events that is irrelevant to the continuation decision problem. We show that the combination of sufficient private information Si t and sufficient common information Πt contains the first component. Nevertheless, in general, the agents can coordinate their action by incorporating the second component into their decision since their information about the past T that is not captured by events is correlated. Let Ri t )} t } are jointly independent of {(Πt, Si t denote the part of agent i's information H i t), ..., (Πt, SN (Πt, Si t). We show that the set of {R1 t , ..., RN 7The results of Theorem 1 provides a crucial property for the analysis of decision problems with strategic agents. This is because it ensures that an agent's unilateral deviation does not influence his belief (see the companion paper [2] for more details). November 23, 2018 DRAFT 20 t , ..., RN t }. Using the signals { R1 t , ..., RN t , ..., RN (Lemma 2 in the Appendix). Therefore, at every time t ∈ T , we can generate a set of signals t }, one for each agent, using the public randomization device ω so that they are { R1 identically distributed as {R1 t } along with the information t) for every agent i ∈ N , we can thus recreate a (simulated) history that is identically state (Πt, Si distributed to H i t. This implies that, given a public randomization device ω, it is sufficient for each agent i ∈ N to only keep track of (Πt, Si t, and play a SIB strategy σi to achieve an identical (in distribution) sequence of outcomes per stage as those under the strategy profile g. t) instead of his complete history H i The result of Theorem 2 states that the the class of SIB strategies characterizes a set of simpler strategies where the agents only keep track of a compressed version of their information rather than their entire information history. Moreover, the restriction to the class of SIB strategies is without loss of generality. Thus, along with results appearing in the companion paper [2], the result of Theorem 2 suggests that the sufficient information approach proposed in this paper presents a unified methodology for the study of decision problems with many non-strategic or strategic agents and asymmetric information. We would like to discuss the implication of Theorem 2 for two special instances of our model. First, when N = 1, there is no need for a public randomization device since the single decision maker does not need to correlate the outcome of his randomized strategy with any other agent. Therefore, the result of Theorem 2 states that the restriction to Markov strategies in POMDPs is without loss of generality. Second, when N > 1 and the agents have identical utilities, i.e. dynamic teams, utilizing a public randomization device does not improve the performance. This is because, in dynamic teams a randomized strategy profile is optimal if and only if it is optimal for every realization of the randomization. Therefore, the restriction to SIB strategies in dynamic teams is without loss of optimality. Using the result of Theorem 2, we present below a sequential decomposition of dynamic teams over time. We formulate a dynamic program that enables us to determine a globally optimal strategy profile via backward induction. Theorem 3. A SIB strategy profile σ is a globally optimal solution to a dynamic team problem with asymmetric information if it solves the following dynamic program: VT +1(πt+1) := 0, ∀πt+1,∀i ∈ N ; (15) DRAFT November 23, 2018 at every t ∈ T , and for every πt, (πt,·)∈ arg max σ1:N t α1:N :S1:N t ) t →∆(A1:N Eπt max t →∆(A1:N ) t α1:N :S1:N Eπt (cid:8)uteam (cid:8)uteam t t t (πt,α1:N,Zt+1))(cid:9), t (πt,α1:N,Zt+1))(cid:9). 21 (16) (17) (Xt,α1:N (S1:N )) + Vt+1(ψσt t Vt(πt) := (Xt,α1:N (S1:N )) + Vt+1(ψσt t The results of Theorems 2 and 3 extend the results of [18], [26] for the study of dynamic teams in two directions. First, they state that restriction to the set of SIB strategies is without loss of generality, while the results of [18], [26] only state that this restriction is without loss of optimality. Second, the definition of Common Information Based strategies, first presented in t , i ∈ N (or all their private [18], [26], requires the agents to use all of their private information P i memory that is a predetermined function of their private information if they do not have perfect recall); the result of Theorem 3 holds for SIB strategies where the agents' private information is effectively compressed , thus, it generalizes/extends the definition of CIB strategies proposed in [18], [26]. A. Constructive algorithm VI. DISCUSSION The sufficient information approach described in Sections IV and V, presents a generalization of the notion of information state to dynamic multi-agent decision problems with non-classical information structure. Nevertheless, we would like to point out that our approach does not address all the issues present in the study of dynamic multi-agent decision problems. We discuss the main limitation of our approach below. In POMDPs, an information state with time-invariant domain can be determined by forming the probability distribution over the system state conditioned on the current information. Our approach does not offer an explicit constructive algorithm that determines a mutually-consistent set of information states, one for each agent, with time-invariant domains in dynamic multi-agent decision problems. Specifically, Definition 2 describes only a set of sufficient conditions that one can use to evaluate whether a specific compression of agents' private information is sufficient for decision making purposes; it does not offer a constructive algorithm to determine a compression of the agents' private information that leads to an information state with time-invariant domain. Given a set of sufficient private information with time-invariant domain for the agents, we achieve, through the formation of SIB beliefs, a compression of the agents' common information November 23, 2018 DRAFT 22 that results in a set of information states with time-invariant domains. In Sections II and IV, we presented instances of multi-agent decision problems where we can discover a set of information states with time-invariant domains. Nonetheless, it is not clear if such a set of mutually-consistent information states with time-invariant domains exist for every dynamic multi-agent decision problem. Therefore, an interesting, but challenging, future direction would be to identify classes of dynamic decision problems with non-classical information structure where we can guarantee the existence of a set of mutually-consistent information states with time-invariant domains, and prescribe a constructive methodology for their identification. Moreover, we would like to point out that the sufficient information approach presented here provide sufficient conditions that can be used to evaluate an educated-guess one may have for specific multi-agent problems. B. Comparison with other Approaches The sufficient information approach proposed in this paper shares similarities and also has differences with existing conceptual approaches to the study of dynamic multi-agent decision problems. Below, we briefly discuss these approaches and compare them with the sufficient information approach. 1) Comparison with Agent-by-Agent Approach: The agent-by-agent approach proceeds as follows: start with an initial guess of a strategy profile g for all agents. At each iteration, select one agent, say agent i. and update his strategy to a best response strategy given the strategy g−i of all other agents. Repeat the process until a fixed point is reached, that is, when no agent can improve performance by unilaterally changing his strategy. If the above-described iterative process converges, the resulting strategy profile determines an agent-by-agent optimal strategy profile; however, such an agent-by-agent optimal strategy profile, in general, is not a globally optimal strategy profile [24]. This is because the multi-agent decision problems are, in general, not convex in the agents' strategies [5]. Therefore, the above-described iterative process does not necessarily converge, or it may converge to a locally optimal strategy profile that is not a globally optimal strategy profile. In contrast to agent-by-agent approach, the sufficient information approach determines a globally optimal strategy profile for multi-agent decision problems with non-strategic agents. The agent-by-agent approach can be used to discover qualitative properties of optimal strate- gies. Specifically, we fix the strategies of all agents except one, say agent i, to an arbitrary set of strategies g−i, and solve for agent i's best response; to determine agent i's best response we November 23, 2018 DRAFT 23 need to solve a POMDP, where the system state and system dynamics, in general, depend on g−i. If agent i's best response possesses a property that holds for every choice of g−i, then a globally optimal strategy for agent i possesses the same property. In contrast to the agent-by- agent approach where one need to solve a POMDP parameterized by g−i, to discover qualitative properties of a globally optimal strategy profile using the sufficient information approach we only need to check the set of conditions appearing in Definition 2 (or equivalently a more general Definition 3 that will appear in Section VII). Moreover, using the sufficient information approach we can discover qualitative properties of optimal strategies that cannot be discovered by the agent-by-agent approach. For instance, consider the following example. Example. Consider a team problem with two agents and observable actions, where agent 2's t,Wt). Each agent action A2 t does not affect the evolution of Xt for all t, i.e. Xt+1 = ft(Xt,A1 t ). An i, i = 1, 2, has an imperfect private observation of state Xt at t given by Y i t = Oi t for agent i at t depends, in general, on his complete information arbitrary choice of strategy gi 1:t, A1:t−1}. Therefore, following the agent-by-agent approach, if agent i's history given by {Y i τ for some τ, 1 ≤ τ ≤ t − 1, then agent j's, j (cid:54)= i, best response strategy depends on A2 also depends on A2 1:t−1 as irrelevant information for decision making purposes for agents 1 and 2. However, using the sufficient information approach we can simply show that a globally optimal strategy profile depend only on P{XtY i τ. Consequently, the agent-by-agent approach fails to characterize A2 t(Xt, W i 1:t} for agent i. 1:t,A1 2) Comparison with the Designer's Approach: The designer's approach was originally pro- posed by Witsenhausen in [25], and was further investigated in [35]. This approach considers the decision problem from the point of view of a designer (she) who knows the system model and the probability distribution of the primitive random variables, and chooses control/decision strategies for all agents; she chooses these strategies without having any observation/knowledge about the realizations of primitive random variables (i.e. she chooses these strategies before the system evolution starts). Therefore, the designer effectively solves a centralized panning problem. The designer's approach proceeds by: (i) formulating the centralized planning problem as a multi- stage, open-loop stochastic control problem in which the designer's decision at each time is a set of control strategies for all agents; (ii) using the standard techniques in centralized stochastic control to obtain a dynamic programming decomposition of the decision problem. Each step of the resulting dynamic program is a functional optimization problem. November 23, 2018 DRAFT 24 The designer's approach breaks the interdependencies between the agents' decision and infor- mation over time by transferring all the complexity that arises due to non-classical information structure and signaling to a larger information state which at each time is given by a probability distribution on Ht, the domain of which increases with time as agents have perfect recall.8 There- fore, the sequential decomposition resulting from the designer's approach is not, in general, very practical for the study of multi-agent dynamic decision problems with asymmetric information. In contrast to the designer's approach, the sufficient information approach provides a sequential decomposition of the decision problem over time where at each time t each agent makes decision based on only a compression of his information H i t. Therefore, it leads to a dynamic program where the state variable at each step of the program is a probability distribution on St instead of a probability distribution on Ht in the designer's approach. 3) Comparison with the Common Information Approach: The common information approach, proposed in [18], [26], addresses some of the drawbacks of designer's approach by modeling the decision problem as a closed-loop centralized planning problem (POMDP) in which a coordinator observes perfectly the common information Ct at each time t and, based on this knowledge, chooses a set of partial control strategies/prescriptions that determine how each agent takes an action based on his private information at time t. The coordinator's information state at time t is his belief on (Xt, Pt) conditioned Ct. As shown in [26], the dynamic programming decomposition achieved by the common information approach is simpler than that achieved by the designer's approach. In the common information approach the agents' private information remains intact. Therefore, the resulting decomposition is not very practical whenever the agents' private information grows in time (see special cases 1,3 and 4 in Section II). Furthermore, the common information approach becomes identical to the designer's approach whenever the agents do not share any common information over time (see special case 3). In the sufficient information approach, we provide conditions sufficient to identify mutually- consistent compressions of the agents' private information that are sufficient for decision making purposes and do not result in any loss in system performance. Thus, the sufficient information approach gives rise to a dynamic program that is simpler than the one resulting from the common information approach. As we show in Section VII, these conditions are the core of sufficient information approach; they are generalized by Definition 3 to captures a mutually-consistent 8An instance where the domain of the control law is time-invariant is presented in [35]. November 23, 2018 DRAFT 25 joint compressions of the agents' private and common information. Moreover, in the model of Section II, we do not assume that the agents share a common objective. Therefore, we do not reformulate the original multi-agent decision problem as a centralized planning problem from the coordinator's point of view when signaling occurs. Alternatively, we provide conditions sufficient to identify compression of the agents' information in a mutually-consistent manner on individual level. As a result, our approach is applicable to both strategic and non-strategic settings (see our companion paper [2] for strategic settings). VII. GENERALIZATION In the sufficient information approach presented in Section IV, we treat the agents' private information and common information separately. This is because the main challenge in the study of dynamic decision problems with non-strategic agents is due to the presence of the agents' private information. Nevertheless, such a separate treatment of private and common information is not necessary. Using the same rationale that leads to Definition 2, we present below a set of conditions sufficient to characterize a mutually consistent compression of agents' information, without separating private and common components, that is sufficient for decision making purposes. Definition 3 (Sufficient information). We say Li sufficient information for the agents if, t = ζ i t (P i t , Ct, g1:t−1) ∈ Li t, i ∈ N , t ∈ T , is (i) it can be updated recursively as t = φi Li t(Li t−1, H i t\H i t−1, g1:t−1) for t ∈ T \{1}, (18) (ii) for any strategy profile g and for all realizations {ct, pt, pt+1, zt+1, at} ∈ Ct×Pt×Pt+1×Zt+1 with positive probability, Pg1:t (cid:110) lt+1 (cid:12)(cid:12)(cid:12)pt,ct,at (cid:111) (cid:110) (cid:12)(cid:12)(cid:12)lt,at (cid:111) =Pg1:t lt+1 where l1:N τ = ζ 1:N τ (p1:N τ ,cτ ;g1:τ−1) for τ ∈ T ; (iii) for every strategy profile g of the form g := {gi , (19) t), i ∈ N,t ∈ T } and at ∈ At, (cid:111) (cid:12)(cid:12)(cid:12)ct,pi t : Li t → ∆(Ai (cid:110) (cid:111) (cid:12)(cid:12)(cid:12)li ui t(Xt,At) =Eg1:t−1 t,at ui t(Xt,At) t,at , (cid:110) t∈T ; Eg1:t−1 November 23, 2018 (20) DRAFT for all realizations {ct,pi for τ ∈ T ; t}∈Ct×P i t of positive probability where l1:N τ = ζ 1:N τ (p1:N τ 26 ,cτ ; g1:τ−1) (iv) given an arbitrary strategy profile g of the form g := {gi t → ∆(Ai t), i ∈ N , t ∈ T }, t with positive probability where l1:N τ = ζ 1:N τ (p1:N τ (21) ,cτ ; g1:τ−1) t : Li (cid:12)(cid:12)(cid:12)li (cid:111) , t (cid:110) (cid:111) (cid:12)(cid:12)(cid:12)pi (cid:110) t}∈Ct×P i Pg1:t−1 l−i t t,ct =Pg1:t−1 l−i t i∈N , and t∈T , for all realizations {ct,pi for τ ∈ T . The conditions of Definition 3 are similar to those of Definition 2, but they concern agents' private and common information rather than just their private information. Throughout the paper, we do not make any assumption that the agents' private observations are necessarily disjoint. t = ∅, for all i ∈ N and t ∈ T , in which case Therefore, one can define P i Definition 3 would be the same as Definition 2. Consequently, all the results appearing in this paper (Theorems 1-6) also hold for sufficient information characterized by Definition 3. t and C i t = H i We show below that the set of information states (Si t, Πt), i ∈ N} proposed in Section IV satisfies the conditions of Definition 3. Therefore, Definition 3 provides a generalization of the sufficient information approach presented in Section IV as it does not require to compress the agents' private and common information separately. Theorem 4. The set of information states Li t := (Si t, Πt), i ∈ N , t ∈ T , satisfies Definition 3. Compared to Definition 2, Definition 3 provides conditions sufficient for a mutually-consistent joint compression of the agents' private and common information. However, similar to the discussion in Section VI-A, it does not provide a constructive algorithm to determine a set of sufficient information Li t, i ∈ N , t ∈ T , with time-invariant domain. Remark 1. In view of Definition 3, one can replace condition (ii) of Definition 2 with a weaker one that requires that St include all the information necessary to form a belief about the realizations (of parts) of Zt+1 only if (those parts of) Zt+1 affect the realization of Πt+1 given Πt. Using Definition 3 we identify a set of sufficient information for special case 4 described in Section II. November 23, 2018 DRAFT 27 Special Case: 4) Optimal remote and local controller: We have Ct ={Y1:t}, P 1 1:t−1}\Ct, and P 2 t = {A2 1:t−1}. Let τ ≤ t denote the last time the data transmission was successful between the local and remote controllers. We can restrict attention, without loss of optimality, to the class of pure t ={Xt,{Pg{Xt = xtXτ},∀xt∈Xt}} strategies for both controllers. Therefore, one can show that L1 t ={Pg{Xt = xtXτ},∀xt∈Xt} satisfy the conditions of Definition 3; this is similar to the and L2 structural results in [30], [31]. t ={X1:t,A1 VIII. EXTENSION TO INFINITE HORIZON In the model of Section II, we assume that the horizon T is finite. We present a model similar to that of Section II with infinite horizon, i.e. T = ∞, and provide the extensions of our results to dynamic decision problems with infinite horizon. Infinite Horizon Dynamic Decision Problem: There are N non-strategic agents who live in a dynamic Markovian world over an infinite horizon. Consider a time-invariant model where the system state, actions, and observations spaces are finite and time-invariant, i.e. X∞ = Xt, A∞ = At, Z∞ = Zt, and Y∞ = Yt for all t ∈ N. Let Xt ∈ X∞ denote the system state at t ∈ N. Given the agents' actions At at t, the system state evolution is given by Xt+1 = f∞(Xt, At, W x t ), (22) where {W x t , t ∈ N} is a sequence of independent and identically distributed random variables. The initial state X1 is a random variable with probability distribution η ∈ ∆(X∞) with full support that is common knowledge among the agents. At every time t ∈ N, each agent i ∈ N , receives a noisy observation Y i t given by t = Oi∞(Xt, At−1, W i Y i t ), (23) t , t ∈ N, i ∈ N} is a sequence of independent and identically distributed random where {W i variables. In addition, at every t ∈ N all agents receive a common observation Zt ∈ Z∞ given by Zt = Oc∞(Xt, At−1, W c t ), (24) DRAFT November 23, 2018 28 ∞(cid:88) t , t ∈ N} is a sequence of independent and identically distributed random variables; t , t ∈ N, i ∈ N} and the initial state X1 are t , t ∈ N}, and {W i t , t ∈ N}, {W c where {W c the sequences {W x mutually independent. Similar to the model of Section II, let P i t and Ct denote agent i's, i ∈ N , private and common information at t ∈ N, respectively. Agent i has a time-invariant instantaneous utility function δt−1ui∞(Xt, At), and his total discounted utility is given by U i in(X, A) := δt−1ui∞(Xt, At), (25) where δ denotes the discount factor. t=1 We provide an extension of our results to infinite horizon dynamic decision problems with non- strategic agents. For that matter, we first present a generalization of the definition of sufficient private information to infinite horizon decision problems. t, i ∈ N , t ∈ N, is a Definition 4 (Time-invariant sufficient private information). We say Si time-invariant sufficient private information if it is a sufficient private information and has a time-invariant domain denoted by S i∞, i ∈ N . We note that for the special cases presented in Section IV, the characterized sufficient private information is time-invariant. Following an argument similar to the one presented in Section V, we extend the result of Theorem 2 to infinite horizon dynamic decision problems with non-strategic agents. Theorem 5. Consider an infinite horizon dynamic decision problem with non-strategic agents having access to a public randomization device. Then, for any arbitrary strategy profile g there exists an equivalent stationary SIB strategy profile σ that results in the same expected flow of utility, i.e., (cid:40) ∞(cid:88) Eg (cid:41) (cid:40) ∞(cid:88) (cid:41) δt−1ui∞(g1:N τ (H 1:N τ ),Xτ) = Eσ∞ δt−1ui∞(σ1:N τ (Πτ,S1:N τ , ωτ ),Xτ) , (26) τ =t for all i ∈ N and t ∈ N. τ =t Next, we consider the case where agents share the same objective ui∞(·,·) = uteam∞ (·,·) for all i ∈ N ., i.e. an infinite horizon dynamic team problem. It is shown that in infinite horizon November 23, 2018 DRAFT 29 POMDPS we can restrict attention, without loss of generality, to stationary Markov policies [3]. We provide a generalization of this results to dynamic multi-agent decision problems below. Given a set of time-invariant sufficient private information, let Πt ∈ ∆(X∞×S∞) denote the SIB belief about (Xt, St) at time t. We call the mapping σi∞ : ∆(X∞ × S∞) × S i∞ → ∆(Ai∞) t, i ∈ N , t ∈ N, is a time-invariant sufficient private a stationary SIB strategy for agent i if Si information. Similarly, given a stationary SIB strategy profile σ∞, we define a stationary SIB update rule as a time-invariant mapping ησ∞∞ : ∆(X∞ × S∞) × Z∞ → ∆(X∞ × S∞), that recursively determines the SIB belief via Bayes' rule for all t ∈ N. Similarly, let σi∞(Πt, Si t, ωt) denote agent i's stationary SIB strategy using the public randomization device for every i∈N and t∈T , when the agents have access to a public randomization device ωt for every t∈T . We provide a sequential decomposition similar to that of Theorem 3 for infinite horizon dynamic teams below. Theorem 6. A stationary SIB strategy profile σ∞ is an optimal solution to an infinite horizon dynamic team problem with asymmetric information if it solves the following Bellman equation: (cid:8)uteam∞ (Xt,α1:N (S1:N t )) + V∞(η∞(πt,α1:N,Zt+1))(cid:9), Eπ V∞(πt) := max α1:N :S1:N∞ →A1:N∞ (27) for all πt ∈ ∆(X∞ × S∞). The result of Theorem 6 provide a generalization of Bellman equation for POMDPS (see [3, Ch. 8]) to decision problems with many agents and asymmetric information. IX. CONCLUSION We presented a general approach to study a general class of dynamic multi-agent decision making problems with non-strategic agents. We proposed the notion of sufficient information that enables us to compress effectively the agents' (private and common) information in a mutually consistent manner for decision making purposes. We showed that the restriction to the class of SIB strategies are without loss of generality. Accordingly, we provided a sequential decomposition of dynamic decision problems with non-strategic agents, and formulated a dy- namic program to determine a globally optimal strategy profile in dynamic teams. The proposed sufficient information approach presented in this paper generalizes a set of existing results in the literature for the study of dynamic multi-agent decision making problems with non-strategic agents. Our results in this paper, along with those appearing in the companion paper [2], provide November 23, 2018 DRAFT 30 a unified appraoch to study dynamic decision problems with non-strategic agents (teams) and strategic agents (games). For future directions, we will investigate the problem of determining a constructive algorithm that enables us to identify sufficient (private) information in a systematic way. REFERENCES [1] H. Tavafoghi, Y. Ouyang, and D. Teneketzis, "A sufficient information approach to decentralized decision making," in 57th IEEE Conference on Decision and Control (CDC), 2018. [2] H. Tavafoghi, Y. Ouyang, and D. Teneketzis, "A unified approach to dynamic multi-agent decision problems with asymmetric information - part i: Strategic agents," working paper, 2018. [3] P. Kumar and P. Varaiya, Stochastic Systems: Estimation Identification and Adaptive Control. Prentice-Hall, Inc., 1986. [4] D. P. Bertsekas, Dynamic Programming and Optimal Control, vol. 1. Belmont, MA: Athena Scientific, 1995. [5] A. Mahajan, N. C. Martins, M. C. Rotkowitz, and S. Yuksel, "Information structures in optimal decentralized control," in 51st IEEE Conference on Decision and Control (CDC), pp. 1291 -- 1306, 2012. [6] A. A. Kulkarni and T. P. Coleman, "An optimizer's approach to stochastic control problems with nonclassical information structures," IEEE Transactions on Automatic Control, vol. 60, no. 4, pp. 937 -- 949, 2015. [7] L. Lessard and S. Lall, "Convexity of decentralized controller synthesis," IEEE Transactions on Automatic Control, vol. 61, no. 10, pp. 3122 -- 3127, 2016. [8] S. Yuksel and N. Saldi, "Convex analysis in decentralized stochastic control and strategic measures," in 55th IEEE Annual Conference on Decision and Control (CDC), pp. 6050 -- 6055, 2016. [9] H. S. Witsenhausen, "A counterexample in stochastic optimum control," SIAM Journal of Optimal Control, vol. 6, no. 1, pp. 131 -- 147, 1968. [10] Y.-C. Ho and K.-C. Chu, "Team decision theory and information structures in optimal control problems -- part i," IEEE Transactions on Automatic Control, vol. 17, no. 1, pp. 15 -- 22, 1972. [11] A. Lamperski and J. C. Doyle, "On the structure of state-feedback lqg controllers for distributed systems with communication delays," in 50th IEEE Conference on Decision and Control and European Control Conference (CDC- ECC), pp. 6901 -- 6906, 2011. [12] L. Lessard and A. Nayyar, "Structural results and explicit solution for two-player LQG systems on a finite time horizon," in 52nd IEEE Conference on Decision and Control (CDC), pp. 6542 -- 6549, 2013. [13] P. Shah and P. Parrilo, "H2-optimal decentralized control over posets: A state-space solution for state-feedback," vol. 58, pp. 3084 -- 3096, Dec. 2013. [14] A. Nayyar and L. Lessard, "Structural results for partially nested LQG systems over graphs," in American Control Conference (ACC), 2015, pp. 5457 -- 5464, 2015. [15] L. Lessard and S. Lall, "Optimal control of two-player systems with output feedback," IEEE Transactions on Automatic Control, vol. 60, no. 8, pp. 2129 -- 2144, 2015. [16] S. Yuksel, "Stochastic nestedness and the belief sharing information pattern," IEEE Transactions on Automatic Control, vol. 54, no. 12, pp. 2773 -- 2786, 2009. [17] Y. Ouyang, S. M. Asghari, and A. Nayyar, "Stochastic teams with randomized information structures," in 56th IEEE Conference on Decision and Control (CDC), 2017. November 23, 2018 DRAFT 31 [18] A. Nayyar, A. Mahajan, and D. Teneketzis, "Optimal control strategies in delayed sharing information structures," IEEE Transactions on Automatic Control, vol. 56, no. 7, pp. 1606 -- 1620, 2011. [19] H. Witsenhausen, "Separation of estimation and control for discrete time systems," Proceedings of the IEEE, vol. 59, no. 11, pp. 1557 -- 1566, 1971. [20] P. Varaiya and J. Walrand, "On delayed sharing patterns," IEEE Transactions on Automatic Control, vol. 23, no. 3, pp. 443 -- 445, 1978. [21] T. Yoshikawa, "Decomposition of dynamic team decision problems," IEEE Transactions on Automatic Control, vol. 23, no. 4, pp. 627 -- 632, 1978. [22] M. Rotkowitz and S. Lall, "A characterization of convex problems in decentralized control," IEEE Transactions on Automatic Control, vol. 50, no. 12, pp. 1984 -- 1996, 2005. [23] S. M. Asghari and A. Nayyar, "Dynamic teams and decentralized control problems with substitutable actions," 2016. [24] Y. Ho, "Team decision theory and information structures," Proceedings of the IEEE, vol. 68, no. 6, pp. 644 -- 654, 1980. [25] H. S. Witsenhausen, "A standard form for sequential stochastic control," Mathematical Systems Theory, vol. 7, no. 1, pp. 5 -- 11, 1973. [26] A. Nayyar, A. Mahajan, and D. Teneketzis, "Decentralized stochastic control with partial history sharing: A common information approach," IEEE Transactions on Automatic Control, vol. 58, no. 7, pp. 1644 -- 1658, 2013. [27] H. Witsenhausen, "On the structure of real-time source coders," The Bell System Technical Journal, vol. 58, no. 6, pp. 1437 -- 1451, 1979. [28] B. Kurtaran, "Corrections and extensions to" decentralized stochastic control with delayed sharing information pattern"," IEEE Transactions on Automatic Control, vol. 24, no. 4, pp. 656 -- 657, 1979. [29] A. Nayyar and D. Teneketzis, "On the structure of real-time encoding and decoding functions in a multiterminal communication system," IEEE Transactions on Information Theory, vol. 57, no. 9, pp. 6196 -- 6214, 2011. [30] Y. Ouyang, S. Asghari, and A. Nayyar, "Optimal local and remote controllers with unreliable communication," in 55th IEEE Conference on Decision and Control (CDC), pp. 6024 -- 6029, 2016. [31] S. M. Asghari, Y. Ouyang, and A. Nayyar, "Optimal local and remote controllers with unreliable uplink channels," IEEE Transactions on Automatic Control, forthcoming. [32] D. S. Bernstein, R. Givan, N. Immerman, and S. Zilberstein, "The complexity of decentralized control of markov decision processes," Mathematics of operations research, vol. 27, no. 4, pp. 819 -- 840, 2002. [33] A. Mahajan and M. Mannan, "Decentralized stochastic control," Annals of Operations Research, vol. 241, no. 1-2, pp. 109 -- 126, 2016. [34] S. Yuksel and T. Bas¸ar, Stochastic Networked Control Systems: Stabilization and Optimization under Information Constraints. Springer Science & Business Media, 2013. [35] A. Mahajan and D. Teneketzis, "Optimal design of sequential real-time communication systems," IEEE Transactions on Information Theory, vol. 55, no. 11, pp. 5317 -- 5338, 2009. November 23, 2018 DRAFT APPENDIX 32 Proof of Theorem 1. We prove the result of part (i) by induction. For t = 1 the result holds since the agents have not taken any action yet. Suppose that (12) holds for t− 1. Then, Pg(cid:8)xt, xt−1, h−i t hi hi (cid:88) (cid:88) (cid:9) = Pg(cid:8)xt, xt−1, h−i (cid:9) = xt,at−1}Pg(cid:8)xt,xt−1,h−i xt,at−1}P{xtxt−1,at−1}Pg(cid:8)xt−1,h−i t−1,a−i t−1hi t−1,ai xt−1 xt−1 t t (cid:9) t−1hi t−1,yi t,zt t−1,a−i (cid:9)(cid:105) t−1, a−i t−1, y−i t hi t−1, ai t−1, yi t, zt (cid:9) xt, at−1}P{xtxt−1, at−1}g−i t−1(h−i t−1)(a−i xt, at−1}P{xtxt−1, at−1}g−i t−1(h−i t−1)(a−i t−1) t−1, yi t, zthi t−1, ai t−1 t−1,yi t,zt t−1,ai t−1)Pg(cid:8)xt−1, h−i Pg(cid:8)xt−1, h−i Pg(cid:8)yi t−1hi t, zt t−1, yi t−1, ai t, zthi t−1, ai t−1, ai t−1 (cid:9) t−1 t−1, yi t, zthi (cid:9)(cid:105) (cid:9) (cid:105) (cid:9) in the nominator of the expression above. We . (28) t−1 t−1}P{xtxt−1, a−i t−1, ai t−1}g−i t−1(h−i t−1)(a−i t−1}P{xtxt−1, a−i t−1, ai t−1}g−i t−1(h−i t−1)(a−i t−1)Pg(cid:8)xt−1, h−i t−1)Pg−i(cid:8)xt−1, h−i t−1hi t−1hi t−1, ai t−1 t−1, ai t−1 t t t t = = = = xt−1 xt−1 xt−1 P{y−i Pg(cid:8)xt,h−i (cid:88) (cid:104)P{y−i (cid:88) (cid:104)P{y−i (cid:88) (cid:104)P{y−i (cid:88) Consider the term Pg(cid:8)xt−1, h−i Pg(cid:8)xt−1, h−i (cid:104)P{yi (cid:88) (cid:104)P{yi (cid:88) =Pg−i(cid:8)xt−1, h−i t, zthi t−1, yi t, ztxt, a−i t, ztxt, a−i t, zthi t−1, ai t−1, ai t−1, ai t−1, ai t−1, yi a−i t−1,xt a−i t−1,xt have, xt−1 = = t (cid:9) (cid:9) t−1 h−i t−1,xt November 23, 2018 where the second equality follows from the induction hypothesis (12) for t−1. Consequently, we also have, Pg(cid:8)yi t,zthi (cid:88) Pg−i(cid:110) (cid:9) = (cid:88) Pg(cid:110) h−i t−1,xt t−1,ai t−1 t, zt, xt−1, h−i yi t−1hi t−1, ai t−1 by (29) = (cid:111) =Pg−i(cid:8)yi t,zt,xt−1,h−i yi t−1hi t−1,ai t−1 t,zthi t−1,ai t−1 (cid:111) (cid:9) (cid:9)(cid:105) (cid:9)(cid:105) (29) (30) DRAFT Substituting (29) and (30) in (28), t Pg(cid:8)xt,h−i (cid:104)P{y−i (cid:88) =Pg−i(cid:8)xt,h−i xt−1 = t t (cid:9) (cid:9) hi t t hi xt, at−1}P{xtxt−1, at−1}g−i t−1(h−i t−1)(a−i t−1) 33 (cid:9) (cid:105) Pg−i(cid:8)xt−1,h−i Pg−i(cid:8)yi t−1,yi t, zthi t,zthi t−1, ai t−1,ai t−1 t−1 (cid:9) which establishes the induction step for t. Given the result of part (i), the result of part (ii) follows directly from the definition of SIB strategies (10) and SIB update rule (11). To provide the proof for Theorem 2, we need the following result. Lemma 1. Given a SIB strategy profile σ and update rule ψ consistent with σ, ψ{st+1, πt+1pt, ct, at} =Pσ Pσ ψ{st+1, πt+1st, πt, at}, (31) for all st+1, πt+1, st, πt, at. Proof of Lemma 1. Let gσ denote the strategy profile, given by (10), that corresponds to SIB strategy profile σ. We have, = zt+1 using update rule (11) = Pσ ψ{st+1,πt+1pt,ct,at,πt} (cid:105) ψ{st+1, zt+1pt, ct, at, πt}1{πt+1=ψt+1(πt,zt+1)} (cid:105) ψ{st+1,πt+1pt,ct,at} πt=γt(ct) Pσ (cid:104)Pσ (cid:88) (cid:104)Pσ (cid:88) (cid:104)Pσ (cid:88) ψ{st+1, zt+1st, ct, at, πt}1{πt+1=ψt+1(πt,zt+1)} by (6) = zt+1 = ψ{st+1, zt+1, yt+1, xt+1, xtst, ct, at, πt}1{πt+1=ψt+1(πt,zt+1)} (cid:105) yt+1,xt+1,xt,zt+1 by system dynamics (1) and (2) = November 23, 2018 DRAFT (cid:88) (cid:104)Pσ ψ{st+1st, ct, at, πt, zt+1, yt+1, xt+1, xt} yt+1,xt+1,xt,zt+1 (cid:104)(cid:16)(cid:89) by (5) = 1{sj t+1=φj t+1(sj t ,{yj t+1,zt+1,aj t};gσ)} (cid:17) yt+1,xt+1,xt,zt+1 j P{zt+1, yt+1at, xt+1}P{xt+1xt, at}Pσ{xtst, ct, at, πt}1{πt+1=ψt+1(πt,zt+1)} 34 (cid:105) (cid:105) (cid:88) (cid:88) (cid:88) 1{sj t ,{yj P{zt+1, yt+1at, xt+1}P{xt+1xt, at}Pσ ψ{xtst, ct}1{πt+1=ψt+1(πt,zt+1)} t};gσ)} by Bayes' rule t+1=φj t+1(sj t+1,zt+1,aj (cid:104)(cid:16)(cid:89) (cid:17) ψ{xt, stct} P{zt+1, yt+1at, xt+1}P{xt+1xt, at}Pσ ψ{stct} 1{πt+1=ψt+1(πt,zt+1)} Pσ (cid:17) (cid:104)(cid:16)(cid:89) (cid:80) P{zt+1, yt+1at, xt+1}P{xt+1xt, at} πt(xt, st) 1{πt+1=ψt+1(πt,zt+1)} t+1=φj t+1(sj t+1,zt+1,aj t};gσ)} t ,{yj 1{sj = = (cid:105) (cid:105) πt(xt, st) xt yt+1,zt+1,xt+1,xt j yt+1,zt+1,xt+1,xt j = ψ{st+1, πt+1st, πt, at}. Pσ Proof of Theorem 2. Consider an arbitrary strategy profile g. We prove the existence of SIB strategy profile that is equivalent to g by construction. With some abuse of notation, let σi(Πt, Si t, ωt) denote agent i's strategy using the public randomization device ωt. We construct a SIB strategy profile σt that has the following properties: (a) the induced distribution on {Πt+1, St+1} under σ coincides with one under g, i.e. Pσ1:t {πt+1, st+1} = Pg1:t {πt+1, st+1} . (32) (b) the continuation payoff for all the agents under σ is the same as that under g, i.e. for all November 23, 2018 DRAFT i ∈ N , (cid:40) T(cid:88) τ =t Eg (cid:41) ui τ (Xτ , gτ (Hτ )) (cid:40) T(cid:88) τ =t = Eσ 35 (cid:41) ui τ (Xτ , στ (Πτ , Sτ , ωτ )) . (33) We prove condition (a) by forward induction and condition (b) by backward induction. We note that condition (a) is satisfied for t = 1, since at t = 1 no action has been taken. Moreover, condition (b) is satisfied for t = T + 1 since there is no future. Assume that condition (a) is satisfied from 1 to t, t ∈ T . We construct σt below such that condition (a) is satisfied at t+1. To construct σt, we first define below a random vector R1:N , and (ii) H i every i∈N , (i) R1:N is independent of Πt and S1:N t. along with Πt and Si t t t based on H 1:N , such that for t can be reconstructed using Ri t t We proceed as follows. For every time t ∈ T , let (πt, s1:N sufficient common information and private information, respectively. Let Hi denote the set of all histories of agent i at time t, where Hi ble realizations of agent i's history at time t. Conditioned on the realization of (πt, si {p(hi,k for agent i. Define the random variable Ri ) denote the realization of the agents' t , ..., hi,Hi } t denote the number of possi- t), let t that leads to (πt, si t) t)} denote the probability mass function on Hi t), 1 ≤ k ≤ H i t := {hi,1 t on [0, 1] as follows: πt, si t t t t 1) and conditioned on the event 0≤ Ri t t≤ p(hi,1 t≤p(hi,1 t πt,si t) (cid:111) 0≤Ri πt,si t) = p(hi,1 t πt,si t), , Ri t is uniformly distributed on [0,p(hi,1 t P(cid:110) (cid:110) (cid:111) (34) πt,si t)]. (35) t, 2) For 1 < k ≤ Hi P(cid:110) k−1(cid:88) (cid:104)(cid:80)k−1 j=1 t≤ k(cid:88) (cid:111) t ≤(cid:80)k j=1 p(hi,j t πt,si t) (cid:105) t) ≤ Ri t πt,si . t) (cid:110)(cid:80)k−1 t),(cid:80)k j=1 p(hi,j t πt,si j=1 p(hi,j and conditioned on the event j=1 p(hi,j distributed on t πt,si p(hi,j t πt,si t)≤ Ri = p(hi,k t πt,si t), (cid:111) j=1 p(hi,j t πt,si t) , Ri t is uniformly Therefore, Ri t is uniformly distributed on [0, 1] and is independent of (Πt, Si t). Furthermore, November 23, 2018 DRAFT for any realization (πt, si t, ri t) we can uniquely determine hi,l t where t ≥ k−1(cid:88) l := min{k : ri p(hi,j t πt, si t)}. 36 (36) j=1 Therefore, the random variable Ri t takes finite values. and (ii) when H i t defined above, satisfies the mentioned-above conditions (i) We show below that Ri t is independent of St. Lemma 2. The random variable Ri Proof of Lemma 2. Consider an arbitrary realization (h1 t ,πt, rN ...,(sN responds to hi t )) denote the realization of ((S1 t , Πt, R1 t as it is defined above for every i ∈ N . For every i ∈ N we have, t, i ∈ N , is independent of Πt and St for all t ∈ T . t ). Let ((s1 t, πt, ri t ,...,H N t )) where (si t ) of (H 1 t , Πt, RN t,...,hN t ), ..., (SN t,πt, r1 t ), T ) cor- Pg{ri tπt, st} = Pg{rtπt, si t, s−i T } = Pg{ri t, s−i Pg{s−i πt, si t} t} = πt, si t t Pg{s−i t ri t, πt, si Pg{s−i t}Pg{ri πt, si t} t tπt, si t} (πt, si replace t) by hi t, ri t = Pg{s−i t tπt, si t}Pg{ri hi t} Pg{s−i πt, si t} t (37) The last equality holds because H i (34)-(36). Moreover, t is uniquely determined by (Πt, Si t, Ri t) and vice versa; see Pg{s−i t ht} by (8) = Pg{s−i t st, ct} = Pg{s−i tct} , si tct} = Pg{si t (cid:80) t (s−i πg , si t) t t (s−i πg , si t) s−i t t = P{s−i t st, πg t }. (38) Combining (37) and (38) Pg{ri tπt, st} = Pg{s−i t si t, πg Pg{s−i t }Pg{ri tπt, si t} t} πt, si t = Pg{ri tπt, si t} = Pg{ri t} (39) where the last equality is true since by definition Ri t is independent of Πt and St for all i ∈ N . (39), Ri t is independent of (Πt, Si t). Therefore, by Using the result of Lemma 2, we prove that for every i∈N , (i) R1:N is independent of Πt t along with Πt and Si t. t can be reconstructed using Ri , and (ii) H i and S1:N t t In the following, we construct a SIB strategy profile σt equivalent to gt as follows. Let R1:N (ωt) denote a random vector the agents construct using the public randomization device ωt that has t November 23, 2018 DRAFT an identical joint cumulative distribution to that of R1:N of R1:N is independent of St and Πt. t t 37 . Note that by Lemma 2, the distribution Define, Then, σi t(Πt, Si t, ωt) := gi t(F −1 tSi Ri t,Πt ( Ri t(ωt), Πt, Si t)). (40) Pg1:t{πt+1, st+1Ht} =Pg1:t{πt+1, st+1Πt, St, Rt} distribution= Pg1:t{πt+1, st+1Πt, St, Rt} =Pσ1:t{πt+1, st+1Πt, St, Rt}. Taking the expectation of the left and right hand sides with respect to ωt and Rt, respectively, and using the fact that Rt(ωt) and Rt are independent of St and Πt (Lemma 2), we obtain Pσ1:t {πt+1, st+1Πt, St} = Pg1:t {πt+1, st+1Πt, St} w.p.1. (41) By the induction hypothesis, we have Pσ1:t−1 {πt, st} = Pg1:t−1 {πt, st}. Therefore, taking the expectation of both sides of (41) with respect to Πt, St, we establish that condition (a) holds for time t + 1. Next, we prove condition (b) by backward induction. We have, Eg{ui t(Xt, At)Ht} =Eg{ui distribution= Eg{ui =Eσ{ui t(Xt, At)Πt, St, Rt} t(Xt, At)Πt, St, Rt} t(Xt, At)Πt, St, Rt} (42) Using (42) for t = T , we have condition (b) is satisfied for t = T . Now we assume that condition (b) is satisfied from t + 1 to T , t ∈ T . We prove that condition (b) is satisfied at t. Using condition (a) at time t, i.e Pσ1:t−1{st, πt} = Pg1:t−1{st, πt}, the induction hypothesis on condition (b) for t + 1 along with equation (42) for t, and the fact that Rt and Rt are identically distributed and independent of Πt and St, we obtain (cid:41) (cid:40) T(cid:88) Eg (cid:41) (cid:40) T(cid:88) ui τ (Xτ , gτ (Hτ )) = Eσ ui τ (Xτ , στ (Πτ , Sτ , ωτ )) . τ =t τ =t November 23, 2018 DRAFT 38 Proof of Theorem 3. By the result of Theorem 2, we can restrict attention to SIB strategies with public randomization device without loss of generality. Moreover, since by Assumption 1 all space are finite, we can restrict attention to SIB strategies (with no public randomization device) without loss of generality. The proof of Theorem 3 then follows from an argument identical to the one given for dynamic programming for POMDP (see [3, Ch. 6.7]). t t ,S 1:N The dynamic program described by (15-17) can be viewed as a solution to the following decision problem that is equivalent to the original dynamic team problem. Consider a "super agent" that knows the functional forms of system dynamics and the agents' utilities, and the set of spaces Xt,A1:N for all t. The super agent coordinates the agents' decisions at each time as follows. The super agent observes πt (which is common knowledge among all agents) but of the agents' sufficient private information. Based on his does not know the realizations s1:N (πt,·), one information, the super agent chooses a joint set of prescriptions/partial functions σ1:N t) for ∀t, i. The for each agent, that determine agent i's action for every realization si dynamic program described by (15-17) determines an optimal solution for the above-described super agent, and thus, equivalently, determine the optimal strategy for the original dynamic team problem.9 t as σi t(πt, si t t Proof of Theorem 4. We show below that Li (i)-(iv) of Definition 3. t := (Si t, Πt), i ∈ N , t ∈ T satisfies conditions and Πt can be updated recursively via update rules φ1:N t Condition (i) is satisfied since both S1:N and ψt, respectively, for every t ∈ T . Condition (ii) is satisfied by Lemma 1. To prove condition (iii), we have t P{xtct, st} = Therefore, (cid:80) P{xt, stct} P{xt, stct} = P{xtπt, st}. xt (43) 9The above interpretation of the dynamic program from the point of view of a super agent is similar to the coordinator problem formulated in [18], [26]. November 23, 2018 DRAFT 39 Eg−i 1:t−1 ui t(Xt,At) t,at = Eg−i 1:t−1 ui t(Xt,At) t,at ui t(Xt,At) t, at (cid:111) (cid:12)(cid:12)(cid:12)ct,si (cid:41) (cid:110) (cid:111)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)ct, si (cid:12)(cid:12)(cid:12)Xt,at (cid:111)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)πt, si (cid:12)(cid:12)(cid:12)Xt,at (cid:12)(cid:12)(cid:12)πt,pi (cid:111) t,at (cid:41) t, at (cid:110) (cid:40) (cid:40) Eg−i 1:t−1 Eg−i 1:t−1 (cid:111) by (7) = (cid:12)(cid:12)(cid:12)ct,pi (cid:110) 1:t−1 Eg−i by (43) = Eg−i 1:t−1 ui t(Xt,At) = Eg−i 1:t−1 ui t(Xt,At) (cid:110) s−i t (cid:110) (cid:111) by (7) (cid:111) (cid:110) (cid:110) (cid:12)(cid:12)(cid:12)pi (cid:12)(cid:12)(cid:12)si t Condition (iv) holds since, (cid:110) (cid:111) (cid:12)(cid:12)(cid:12)pi Pg−i 1:t−1,gi 1:t−1 l−i t t,ct = Pg−i 1:t−1 t,ct = Pg−i 1:t−1 s−i t t,ct = Pg−i 1:t−1,gi 1:t−1{stct} 1:t−1{si Pg−i tct} by (43) = Pg−i 1:t−1 s−i t,πt = Pg−i 1:t−1 l−i t (cid:111) (cid:110) (cid:110) (cid:12)(cid:12)(cid:12)si (cid:12)(cid:12)(cid:12)li (cid:111) t Proof of Theorem 5. Consider the SIB strategy σt constructed in the proof of Theorem 2 for every t ∈ N. We show below that σt satisfies (26). By the proof of Theorem 2, condition (32) holds for all t ∈ N. To prove (26), we show that (cid:41)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≤  δt−1ui∞(g1:N τ (H 1:N τ ),Xτ) − Eσ∞ δt−1ui∞(σ1:N∞ (Πτ,S1:N τ ),Xτ) (44) τ =t τ =t Let M = maxat,xt,i ui∞(xt, at). For every  > 0, choose T ∈ N such that δT 1−δ M ≤  2. Then, (cid:41) (cid:40) ∞(cid:88) under strategy σt, t ∈ N, we have (cid:40) ∞(cid:88) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Eg for all  > 0. for any arbitrary strategy g,(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)Eg (cid:40) ∞(cid:88) τ =T (cid:41)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≤  2 δt−1ui∞(g1:N τ (H 1:N τ ),Xτ) . (45) Therefore, for every t < T , condition (44) is satisfied by (45) and the triangle inequality. November 23, 2018 DRAFT For t > T , consider a finite decision problem with horizon T resulting by the truncation of the original infinite-horizon decision problem at T . Then, by Theorem 2, (cid:40) T(cid:88) Eg (cid:41) (cid:40) T(cid:88) 40 (cid:41) τ (g1:N ui τ (H 1:N τ ),Xτ) = Eσ u1:N τ (σi τ(Πτ,S1:N τ ),Xτ) , (46) τ =t τ =t for all i∈N and t∈T . Combining (46) with the result for t > T , we show that (26) is satisfied for t. Proof of Theorem 6. By Theorem 5, we can restrict attention to stationary SIB strategies with public randomization device without loss of generality. Moreover, since by Assumption 1 all space are finite, we can restrict attention to SIB strategies (with no public randomization device) without loss of optimality. Consequently, following the same rationale as the one given in the proof of Theorem 3, the result of Theorem 6 follows from an argument identical to the one given for dynamic programming in infinite-horizon Markovian Decision Processes (see [3, Ch. 8.2 and Ch.8.3]). November 23, 2018 DRAFT
1709.04622
4
1709
2018-08-23T04:20:34
An Agent-based Modelling Framework for Driving Policy Learning in Connected and Autonomous Vehicles
[ "cs.MA", "cs.RO" ]
Due to the complexity of the natural world, a programmer cannot foresee all possible situations, a connected and autonomous vehicle (CAV) will face during its operation, and hence, CAVs will need to learn to make decisions autonomously. Due to the sensing of its surroundings and information exchanged with other vehicles and road infrastructure, a CAV will have access to large amounts of useful data. While different control algorithms have been proposed for CAVs, the benefits brought about by connectedness of autonomous vehicles to other vehicles and to the infrastructure, and its implications on policy learning has not been investigated in literature. This paper investigates a data driven driving policy learning framework through an agent-based modelling approaches. The contributions of the paper are two-fold. A dynamic programming framework is proposed for in-vehicle policy learning with and without connectivity to neighboring vehicles. The simulation results indicate that while a CAV can learn to make autonomous decisions, vehicle-to-vehicle (V2V) communication of information improves this capability. Furthermore, to overcome the limitations of sensing in a CAV, the paper proposes a novel concept for infrastructure-led policy learning and communication with autonomous vehicles. In infrastructure-led policy learning, road-side infrastructure senses and captures successful vehicle maneuvers and learns an optimal policy from those temporal sequences, and when a vehicle approaches the road-side unit, the policy is communicated to the CAV. Deep-imitation learning methodology is proposed to develop such an infrastructure-led policy learning framework.
cs.MA
cs
An Agent-based Modelling Framework for Driving Policy Learning in Connected and Autonomous Vehicles … … Varuna De Silva, Xiongzhao Wang, Deniz Aladagli, Ahmet Kondoz, Erhan Ekmekcioglu Institute for Digital Technologies, Loughborough University, London, UK Email: [email protected], [email protected], [email protected], and [email protected] framework exchanged with other vehicles and Abstract -- Due to the complexity of the natural world, a programmer cannot foresee all possible situations, a connected and autonomous vehicle (CAV) will face during its operation, and hence, CAVs will need to learn to make decisions autonomously. Due to the sensing of its surroundings and information road infrastructure, a CAV will have access to large amounts of useful data. While different control algorithms have been proposed for CAVs, the benefits brought about by connectedness of autonomous vehicles to other vehicles and to the infrastructure, and its implications on policy learning has not been investigated in literature. This paper investigates a data driven driving policy learning through an agent-based modelling approaches. The contributions of the paper are two-fold. A dynamic programming framework is proposed for in-vehicle policy learning with and without connectivity to neighboring vehicles. The simulation results indicate that while a CAV can learn to make autonomous decisions, vehicle-to-vehicle (V2V) communication of this capability. Furthermore, to overcome the limitations of sensing in a CAV, the paper proposes a novel concept for infrastructure-led policy learning and communication with autonomous vehicles. In infrastructure-led policy learning, road-side infrastructure senses and captures successful vehicle maneuvers and learns an optimal policy from those temporal sequences, and when a vehicle approaches the road-side unit, the policy is communicated to the CAV. Deep-imitation learning methodology is proposed to develop such an infrastructure-led policy learning framework. information improves Keywords -- Agent-based learning; reinforcement driving policy; data driven control; imitation learning learning; I. INTRODUCTION The emergence of connected and autonomous vehicles (CAVs) marks a new phase of innovation in automotive and transportation industries since the development of personal automobiles [1]. Once technologically matured, CAVs would be able to move autonomously without the aid of a human driver and be able to communicate with other vehicles and traffic infrastructure. The promised benefits of CAVs are numerous, such as, reduced congestion, better fuel efficiency, reduced environmental pollution, reduced number of traffic related casualties and increased personal independence. The continuing evolution of sensor technologies, high speed communication infrastructure, machine learning and artificial intelligence will eventually bring us the above benefits. A CAV is composed of four major technological components. The first is the perception system, which is responsible for sensing the environment to understand its surroundings. The second component is the localization and mapping system that enables the vehicle to know its current location. The third component is responsible for the driving policy. The driving policy refers to the decision making capability of a CAV under various situations, such as negotiating at roundabouts, giving way to vehicles and pedestrians, and overtaking vehicles. Finally, the CAVs will be connected. It is expected that the CAVs will be connected to the surrounding vehicles: vehicle to vehicle connectivity (V2V), to the infrastructure: Vehicle to Infrastructure (V2I) and to anything else such as the internet: Vehicle to Anything (V2X), through wireless communications links [2]. While there are many challenges still to be addressed for high speed wireless connectivity for vehicular applications [3], the IEEE802.11p Wireless Access in Vehicular Environments (Wave) is considered the most relevant standard that currently caters to the requirements of such applications [4]. to The connectedness of the CAV's can be useful for many important functions related intelligent mobility. One important use case is to exchange sensor data between vehicles for improved perception of the surroundings [5], which enables to reduce the accidents. Connected vehicles also enables centralized traffic control to ease congestion in smart city applications [6]. For example in Compass4D, a pilot project funded by the EU, it was demonstrated that 15% reductions in fuel efficiency can be achieved through V2I communication to control the flow of traffic [7]. Another interesting application of connectivity is in "vehicle platooning", where a group of vehicles with common interests maintain a small and constant distance to each other [8]. Connectivity is also a key enabler of intelligent mobility applications such as ubiquitous taxi services. Furthermore, various infotainment applications such as music/video streaming or in-car WiFi connectivity, are expected to be delivered to the CAVs through high speed wireless internet connectivity [4]. All the above examples lead to a significant amount of data that are been collected and shared between CAVs. This leads to the question, whether CAV could learn interesting patterns from these data? Could a CAV autonomously evolve to make better decisions over time? Data driven approaches are emerging within the scope of CAV research to utilize this data in effective ways. In [9], authors propose a data-driven control algorithm derivation for .. 1 P a g e connected vehicle to account for unknown system dynamics such as human factors. In this paper we investigate opportunities that arise from the proliferation of data within a CAV. In particular, this paper focuses on optimal policy learning in autonomous vehicles over its life time. For example, how could it make better decisions to reach its destination while avoiding crashes with other objects or road side infrastructure? We consider a use case where a CAV is able to make driving decisions based on information shared by other CAVs. The proposed framework is based on agent based learning paradigm where a CAV is modelled as a rational agent that tries to maximize its utility. Furthermore, an learning and communicating framework is proposed based on deep- imitation learning. infrastructure-led policy The rest of this paper is organized as follows: Section II provides an overview of the agent based learning paradigm; Section III describes the experimental setup and the results; and Section IV concludes the paper with reference to some future work. II. RELATED WORK In this section we will discuss work related to driving policy learning in connected autonomous vehicles. This section is organized as follows: Section A describes work related to policy learning in CAVs, including applications of Vehicle-to- Infrastructure (V2I) communication. Section B describes the foundations of imitation learning and its applications in driverless vehicle technology. A. Policy Learning in CAVs Policy learning is the process by which an autonomous vehicle comes to learn which action to take given a particular situation. The situation or the state in which the CAV is operating is identified through sensing the environment and understanding it. the cases of Different types of control problems were formulated for CAVs considering range-limited V2V communication and input saturation to minimize the errors of distance and velocity and to optimize the fuel usage [9]. In [9] authors employed an adaptive dynamic programming technique, to derive the optimal controllers without relying on the knowledge of system dynamics. The effectiveness of the proposed approaches in [9] was demonstrated via the online learning control of the connected vehicles in platform for traffic microsimulation. Reinforcement learning was utilized for longitudinal control of autonomous vehicles [10]. A deep Reinforcement learning algorithm based on neural network-based Q-function approximation was proposed for ramp merging process for autonomous vehicles [11]. The ramp merging process involves interactions with other vehicles whose behaviors dynamic and varied and which influences the actions of the merging vehicles. Similarly, reinforcement learning based controllers were proposed for autonomous vehicles for tasks such as lane changing [12] and overtaking decisions[13]. While policy learning in CAV is an emerging area of research, agent-based models are utilized for various control … … functions in vehicle control. A learning based cruise control algorithm was proposed in [14]. B. Applications of Deep Imitation Learning Imitation learning is the process of learning by imitating certain set of actions. Imitation learning from human drivers for the task of lane keeping assistance in highway and country roads using grayscale images from a single front view camera was proposed in [15]. The employed method in [15] utilizes convolutional neural networks (CNN) to analyze the images to develop an appropriate policy to adhere to the lanes. Deep imitation learning was proposed as a method to model the defensive behavior of football players [16]. In [16], Multiview video based player tracking data are collected and the team behavior is learnt. For this purpose, a recurrent neural network, specifically a Long-Short Term Memory (LSTM) network is trained with sequences of player tracking data. C. Contributions of this Paper While different aspects of control systems have been developed for CAVs, the advantages of connectedness of vehicles and its implications for policy learning has not been investigated in literature. The contributions of this paper are twofold: firstly, we propose a dynamic programming approach for policy learning in an autonomous vehicle and compare it with a situation where the vehicles are connected to each other to share sensor information. Secondly, we propose a framework for policy learning at to be communicated to approaching vehicles. This way road-side units at which many examples of successful vehicle maneuverers can be observed, could be utilized for the safety of CAVs. road-side units, and for policies III. AGENT BASED MODELLING FRAMEWORK FOR CAVS In this section we will discuss the agent based learning framework that will be used for algorithm development in this paper. A. Foundations of Reinforcement Learning In the recent past, reinforcement learning has been utilized in attractive research projects. DeepMind, a modern technique research organization hosted in London, which concentrates on data mining and machine learning, has made landmark progress on reinforcement learning research. The world champion in 'Go', Lee Sedol was beaten by the deep mind developed program called AlphaGo [17]. Fig. 1 illustrates the fundamental process of reinforcement learning. Actions taken in the current environment would transfer the agent to a different state, and a reward would be given based on how good the action was. A utility function that assigns a different reward value for each possible actions in the same state, could be used to evaluate the best action in that particular state. This interaction scenario gives a general idea of reinforcement learning and builds the foundation cooperating with Markov Decision Processes (MDP) and Bellman equations [18]. .. 2 P a g e … … IMMEDIATE REWARDS FUNCTION TABLE I. Condition (State/Action) Alive or Goal Shift to right or left Crash or Bump Speed less than limit and alive or goal Speed less than limit with bump or crash Speed over limit B. Micro-simulation Framework for CAV Policy Learning Value 0.1 -0.1 -10 speed/10 - speed - 2×speed The CAV is simulated as a car that acquires sensor data of its surroundings and exchanges speed information with other vehicles in its surroundings through V2V communication. Each vehicle is simulated as a point on a 2D grid and ignores any spatial parameters such as the size of the vehicle. Fig. 2 illustrates the environmental scanner implemented on the CAV, which simulates a 7 directional scanner. the structure of At a given state, the agent can take nine (3x3) actions, which control the movement direction and speed. They are the three direction actions: maintain current direction, which mean no change in the status of vehicle, move left and move right and the three speed actions: maintain, increase and reduce the speed of agent. Other decisions, such as making turns at intersections or stop at target point, will not be considered in the current study. The immediate reward function for the agent is summarized in Table I. The prototype environment simulates a straight road that is 66 units long with two lanes of 1 unit width. The movement of each agent is simulated as a maze walk, where they move number of units at each time step according to the current speed. There would be a number of other randomly located vehicles, acting as obstacles for the intelligent agent, trying to move to the same destination. In this experiment we consider only one intelligent agent that adapts its decisions over time and the rest of the vehicles will move at a constant speed over a single simulation. The simulation set the lane above, which is the left-hand lane as a normal speed route, vehicles would move at one speed unit, and the other lane is for overtaking, where vehicles would have one speed unit higher. The intelligent agent would be able to change directions and speeds as discussed before. To simulate V2V communication, if the radar detects an obstacle vehicle through its environmental scanner, the agent will request for the speed of the vehicle. The obstacle vehicle would give its speed-reading to the agent, which enables the agent to use additional information to define the state of the environment. Fig. 1. The reinforcement learning interaction between the agent and its environment. to Markov decision processes are fundamental the development of active reinforcement learning algorithms. The state transition in RL can be described as a Markov process, where the future states are dependent on the current state only and are independent of the states in the past. An active reinforcement learning approach known as Q-value iteration is used to find the optimal reward function and the transition model. Q-value iteration uses direct rewards value as samples, and update the corresponding Q-value by a proportional summation with the initial value, which depends on learning rate 𝛼𝛼 as given below: 𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠=𝑅𝑅(𝑠𝑠,𝑠𝑠,𝑠𝑠′)+𝛾𝛾∙𝑠𝑠𝑠𝑠𝑚𝑚𝑎𝑎′ 𝑄𝑄(𝑠𝑠′,𝑠𝑠′). 𝑄𝑄(𝑠𝑠,𝑠𝑠)←(1−𝛼𝛼)∙𝑄𝑄(𝑠𝑠,𝑠𝑠)+𝛼𝛼∙𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠. to maximize its discounted future reward. 𝛾𝛾 is the discount Where R(s,a,s') is the immediate reward value given when an action a is taken at state s, which moves the agent to state s'. Q(x,y) in (1) and (2) refers to the expected future reward if action y is taken at state x. The agent acts in a rational manner factor. A dynamic programming approach is used to solve the above equations in an iterative manner. (1) (2) Fig. 2. The structure of the environmental scanner on the simulated CAV. Physical infrastructure with sensing Scene Perception and positive example identification Deep imitation learning for Data-driven driving policy Policy uploading to vehicles approaching infrastructure Fig. 3. System architecture for proposed Data-driven Vehicle-Infrastructure Policy Communication Scheme. .. 3 P a g e … … Fig. 4. An example sequence of states when a vehicle is trying to join a motorway/freeway. C. Deep Imitation Learning for Infrastructure-led Policy Learning The above sections described how a CAV with sensing and V2V communication ability could be trained to learn behavior over time. While such a model is suitable for simple scenarios like straight line driving, CAV's often come to deal with more tricky scenarios such as negotiations at roundabouts, joining motorways (freeways) and giving way to pedestrians etc. Moreover, most of such negotiating situations could be unique in its appearance with a unique local context attached to it. E.g. there could be tricky points such as give-way situations, which may go unnoticed to the driver / CAV if it has not come across it before. Could the road-side infrastructure located at such points, look at the traffic scenarios and learn the optimal behavior of a vehicle that is approaching it? If this is possible, then, when a vehicle is approaching the tricky point of negotiation, the infrastructure could instruct the CAV of the best policy. To handle such situations, in this section, we propose a novel algorithm for infrastructure-led policy learning. The system architecture for the proposed scheme for policy learning and communication is illustrated in Fig. 3. According to Fig. 3, the cameras and sensors based at key junctions and intersections will capture the passing vehicles and pedestrians. The captured data will be analyzed to recognize vehicle, pedestrians and other objects of interest. A sequential data classifier will classify positive negotiations from negative negotiations. The positive negotiations are temporal sequences of events without any casualties or collisions. Once positive sequences of events are identified, the event sequences are utilized to learn an optimal policy for vehicle control. The optimal policy is learnt through imitation learning. Recurrent neural networks provide a framework to efficiently learn patterns in sequential data streams. In particular, Long-Short Term Memory (LSTM) networks are suitable variation of recurrent neural networks that does not suffer from the vanishing gradient problem associated with vanilla recurrent neural networks. An example sequence of a positive outcome is depicted in Fig. 4. The sequence of steps taken by the marked car is a successful sequence of actions that a driver could follow to join the motorway. Our proposal is that, similar outcomes can be collected and the sequential pattern can be learnt. To learn the sequential patterns, and to come up with an optimal policy, the state of the environment will be encoded in a vector that represents the distance and speed of each vehicle in its surrounding, and fed in to the LSTM network. The output of the LSTM network will be the speed and angle of the vehicle at each time step. The pattern learnt, will yield in an optimal policy. Now when a CAV that has not experience this setting in the past comes to negotiate at this junction, the learnt policy can be transferred to it. This way we can overcome the requirement for a CAV to experience situations multiple times to learn a policy. Fig. 5. A sequence sample of agent actions. D. Simulation Framework for Infrastructure-led Policy Learning To illustrate the benefits of the proposed infrastructure-led policy learning scheme, we develop an experimental testbed based on a micro simulation framework and a python/Keras based neural network setup. While we do not have in possession a suitable data set, it is assumed that through sensing and perception an output similar to figure 4 can be obtained. Therefore, for the purpose of this simulation, the Simulation of Urban Mobility (SUMO) open source platform is utilized [19]. The output of the SUMO platform is dumped in XML format, which is processed to identify appropriate sequences of events, surrounding vehicles, and speed, and position of vehicles. Several positive outcomes are collected, and encoded, and fed to the LSTM network as training data. Once the network is trained, it will be used to predict the sequential actions of a CAV that is intending to join the motorway. .. 4 P a g e IV. EXPERIMENTAL RESULTS AND DISCUSSIONS testbed, the experimental This section describes simulation results and the discussion of the results. A. Experimental Conditions the For evaluating dynamic programming-based policy learning method for CAV, a simulation environment has been implemented in Matlab 2017a environment. Three different experiments are performed to test the fundamental process of decision making. The learning rate α and discount factor γ is set to 0.4 and 0.95, respectively. The maximum speed of the agent is set at 3 units per time step. (a) (b) (c) Fig. 6. Simulation results for comparison between the agent performance with and without V2V communication. (a) Average time to reach destination. (b) Amount of crashes (c) Frequency of quick finish (reach destination<40 time units). … … The infrastructure-led policy learning scheme is simulated with SUMO micro-simulation platform (version 0.32.0) and the LSTM network is implemented based on the Keras/python package. B. Simulation Results Fig. 5 shows a sequence of changes between agent and obstacle vehicles at different time steps. The orange square represents the location of agent; blue squares are the moving obstacle vehicles. The numbers above each picture are demonstrating the current speed of agent, seven readings from each direction, and the action it made to move it from previous states. From the initial five pictures, it shows that the agent tried to increase the speed and move to overtake other objects. From the last three pictures and changing speed values, it can be seen that a decision was taken to decrease the speed and follow the other vehicles, as there is no possible way to overtake them. In the next set of results, we compare between the two situations where the agent learns with just the environment scanner and when the agent has access to speed information of the through V2V communication. Firstly, let's consider the average time cost, i.e. the number of time steps that the agent took to get from the starting point to its target successfully. surrounding exchanged vehicles As the graph in Fig. 6(a) illustrates the time consumption to get to the destination gradually decreases as the number of iterations of experiment increases. This means that the agent self learns to make better decisions as it experiences more situations. It takes Approximately 25 units of time in average to reach the destination after 100,000 iterations of Q-learning. The pattern of the agent with vehicle communication, to share speed information of the surrounding neighbors, demonstrate to converge quickly than the scenario without the V2V communication. At the same time the time consumption to reach the destination gradually decreases too. In Fig. 6(b), the probability of crashing illustrates the rate of agent having crashes with other vehicle or bumping to the wall. It clearly present that after a period of Q-learning, the agent would have the ability to avoid obstacles, while its moving and reduces the possibility of having crashes with others. Fig. 6(b) also presents that with V2V communication, the agent keeps a lower possibility of crashing, compared to agent without V2V communication, which has a higher potential to crash Lastly, Fig. 6(c) shows the percentage of time an agent takes a faster route, which costs less than 40 units of time. The initial results of the infrastructure-led policy learning framework can be illustrated as given in Fig. 7(a)-(c). Fig. 7(a) illustrates the LSTM network architecture that is trained for the scenario. The Fig. 7(b)-(c) illustrate two different instances of a vehicle trying to join a motorway. In the two different instances illustrated, we compare the variation of speed of the vehicle as given by the micro-simulation platform and the speed predicted by the proposed LSTM network at different time steps. .. 5 P a g e (a) (b) (c) Fig. 7. Simulation results for infrastructure-led policy learning of a vehicle joining a motorway: (a) The LSTM network architecture and the variation of speed as approaching and joining the motorway. (b) test scenario 1. (c) test scenario 2. … … C. Discussion of Results The above results illustrate a significant improvement and an efficiency of learning after the first two thousand iterations. In the following iterations, the pattern of changing is slowing down. While the process of decision-making in the agent improves over the iterations, the agent with vehicle speed communication seems to have a better performance than the agent with only the environmental scanner. the additional parameters obtained In summary, agent with V2V communication would have a better efficiency in learning to make better driving policies. With through V2V communication, the agent could perform better as it can explore of more states, due to unknown policies of the states it never reached before. Thus, the speed information shared by the vehicles acts as an important additional dimension which significantly improves the decision making capability of the simulated CAV. Considering with the complexity of state locating, the agent with vehicle speed communication has approximately twice the number of dimensions to represent its state of the environment. As the simulation conditions become complex, such as for V2I communication or when considering real CAVs, this would lead to bottlenecks in terms of computational complexity. Deep reinforcement learning promises to tackle such situations of very high dimensions. For the infrastructure-led policy learning framework, while the results illustrated in Fig. 7 are encouraging, the results could be improved further by tuning the structure of the LSTM network and increasing the number of training data sequences. It has to be noted, that only a simple LSTM network was setup in this case to prototype the idea. V. CONCLUSIONS AND FUTURE WORK The connected autonomous vehicles (CAVs) operate by sensing its surroundings and exchanging information from other vehicles and infrastructure. This paper investigated the possibility for CAVs to learn from these data sources and derive its own safe driving policies. A reinforcement learning framework is presented in the paper, which simulates the self- evolution of a CAV over its lifetime. The results indicated that overtime the CAVs are able to learn useful policies to avoid crashes and achieve its objectives in more efficient ways. Vehicle to vehicle communication enables additional useful information to be acquired by CAVs, which in turn enables CAVs to learn driving policies more efficiently. Furthermore, the paper proposed an infrastructure-led policy learning and communication framework based on deep imitation learning. The initial validation results based on a microsimulation platform and a LSTM network were encouraging. The future work will investigate complex driving policies such as roundabout negotiations, cooperative learning between CAVs and deep reinforcement learning to traverse larger state spaces. Furthermore, we will validate the infrastructure-led policy learning framework with real world datasets on vehicle tracking. .. 6 P a g e REFERENCES [1] T. Koslowski, "Your Connected Vehicle Is Arriving," MIT Technology Available: Review. https://www.technologyreview.com/s/426523/your-connected-vehicle- is-arriving/. [Accessed: 31-Aug-2017]. [Online]. [2] G. Pau, "Quickly Home Please: How Connected Vehicles Are Revolutionizing Road Transportation," IEEE Internet Computing, vol. 17, no. 1, pp. 80 -- 83, Jan. 2013. [3] N. Lu, N. Cheng, N. Zhang, X. Shen, and J. W. Mark, "Connected Vehicles: Solutions and Challenges," IEEE Internet of Things Journal, vol. 1, no. 4, pp. 289 -- 299, Aug. 2014. [4] R. Coppola and M. Morisio, "Connected Car: Technologies, Issues, Future Trends," ACM Comput. Surv., vol. 49, no. 3, p. 46:1 -- 46:36, Oct. 2016. [5] B. Reichelt, H. Ussler, O. Michler, J. Holfeld, S. Eckelmann, and T. Trautmann, "Model-based generation and validation of different sensor information contributing to a fusion algorithm in connected vehicles," in 2017 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS), 2017, pp. 339 -- 344. J. Hu, L. Kong, W. Shu, and M.-Y. Wu, "Scheduling of connected autonomous vehicles on highway lanes," in 2012 IEEE Global Communications Conference (GLOBECOM), 2012, pp. 5556 -- 5561. [6] [7] R. King, "Traffic management in a connected or autonomous vehicle environment," in Autonomous Passenger Vehicles, 2015, pp. 1 -- 20. [8] D. Jia, K. Lu, J. Wang, X. Zhang, and X. Shen, "A Survey on Platoon- Based Vehicular Cyber-Physical Systems," IEEE Communications Surveys Tutorials, vol. 18, no. 1, pp. 263 -- 284, Firstquarter 2016. [9] W. Gao, Z. P. Jiang, and K. Ozbay, "Data-Driven Adaptive Optimal Control of Connected Vehicles," IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 5, pp. 1122 -- 1133, May 2017. [10] Z. Huang, X. Xu, H. He, J. Tan, and Z. Sun, "Parameterized Batch Reinforcement Learning for Longitudinal Control of Autonomous Land … … Vehicles," IEEE Transactions on Systems, Man, and Cybernetics: Systems, pp. 1 -- 12, 2017. [11] P. Wang and C. Y. Chan, "Formulation of deep reinforcement learning architecture toward autonomous driving for on-ramp merge," in 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), 2017, pp. 1 -- 6. [12] F. Liu, Y. Li, L. Zuo, and X. Xu, "Research on Lane Change Decision for Autonomous Vehicles Based on Multi-Kernels Least Squares Policy Iteration," in 2017 9th International Conference on Intelligent Human- Machine Systems and Cybernetics (IHMSC), 2017, vol. 1, pp. 385 -- 389. [13] X. Li, X. Xu, and L. Zuo, "Reinforcement learning based overtaking decision-making for highway autonomous driving," in 2015 Sixth International Conference on Intelligent Control and Information Processing (ICICIP), 2015, pp. 336 -- 342. [14] J. Wang, X. Xu, D. Liu, Z. Sun, and Q. Chen, "Self-Learning Cruise Control Using Kernel-Based Least Squares Policy Iteration," IEEE Transactions on Control Systems Technology, vol. 22, no. 3, pp. 1078 -- 1087, May 2014. [15] C. Innocenti, H. Lindén, G. Panahandeh, L. Svensson, and N. Mohammadiha, "Imitation learning for vision-based lane keeping assistance," in 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), 2017, pp. 425 -- 430. [16] H. M. Le, P. Carr, Y. Yue, and P. Lucey, "Data-Driven Ghosting using Analytics Conference, 2017. Deep Imitation Learning," in MIT Sloan Sports [17] "DeepMind's work Available: [Accessed: 01-Sep-2017]. in 2016: a round-up," DeepMind. [Online]. https://deepmind.com/blog/deepmind-round-up-2016/. [18] R. S. Sutton and A. G. Barto, Reinforcement Learning. MIT Press, 1998. [19] "DLR - Institute of Transportation Systems - SUMO -- Simulation of Available: Urban http://www.dlr.de/ts/en/desktopdefault.aspx/tabid-9883/16931_read- 41000/. [Accessed: 10-Apr-2018]. MObility." [Online]. .. 7 P a g e
1604.04727
1
1604
2016-04-16T11:37:50
Tasks for agent-based negotiation teams: Analysis, review, and challenges
[ "cs.MA", "cs.AI" ]
An agent-based negotiation team is a group of interdependent agents that join together as a single negotiation party due to their shared interests in the negotiation at hand. The reasons to employ an agent-based negotiation team may vary: (i) more computation and parallelization capabilities, (ii) unite agents with different expertise and skills whose joint work makes it possible to tackle complex negotiation domains, (iii) the necessity to represent different stakeholders or different preferences in the same party (e.g., organizations, countries, and married couple). The topic of agent-based negotiation teams has been recently introduced in multi-agent research. Therefore, it is necessary to identify good practices, challenges, and related research that may help in advancing the state-of-the-art in agent-based negotiation teams. For that reason, in this article we review the tasks to be carried out by agent-based negotiation teams. Each task is analyzed and related with current advances in different research areas. The analysis aims to identify special challenges that may arise due to the particularities of agent-based negotiation teams.
cs.MA
cs
Tasks for Agent-Based Negotiation Teams: Analysis, Review, and Challenges Victor Sanchez-Anguixa, Vicente Juliana, Vicente Bottia, Ana Garc´ıa-Fornesa aDepartamento de Sistemas Inform´aticos y Computaci´on Universitat Polit`ecnica de Val`encia Cam´ı de Vera s/n, 46022, Valencia, Spain Abstract An agent-based negotiation team is a group of interdependent agents that join together as a single negotiation party due to their shared interests in the nego- tiation at hand. The reasons to employ an agent-based negotiation team may vary: (i) more computation and parallelization capabilities; (ii) unite agents with different expertise and skills whose joint work makes it possible to tackle complex negotiation domains; (iii) the necessity to represent different stake- holders or different preferences in the same party (e.g., organizations, countries, married couple, etc.). The topic of agent-based negotiation teams has been re- cently introduced in multi-agent research. Therefore, it is necessary to identify good practices, challenges, and related research that may help in advancing the state-of-the-art in agent-based negotiation teams. For that reason, in this ar- ticle we review the tasks to be carried out by agent-based negotiation teams. Each task is analyzed and related with current advances in different research areas. The analysis aims to identify special challenges that may arise due to the particularities of agent-based negotiation teams. Keywords: Negotiation teams, automated negotiation, agreement technologies, multiagent systems. 1. Introduction According to Pruitt [1], negotiation can be defined as a process in which a joint decision is made by two or more parties. The parties first verbalize contra- dictory demands and then move towards agreement by a process of concession- making or search for new alternatives. Therefore, automated negotiation con- sists of an automated search process for an agreement between two or more parties where participants exchange proposals. Email addresses: [email protected] (Victor Sanchez-Anguix), [email protected] (Vicente Julian), [email protected] (Vicente Botti), [email protected] (Ana Garc´ıa-Fornes) Preprint submitted to Elsevier April 19, 2016 The work in automated negotiation has taken two alternative and comple- mentary paths: game-theoretic approaches and heuristic approaches. Game theory researchers focus on reaching solutions at equilibrium under varied as- sumptions like unbounded computational resources, complete information, or some statistical information regarding the strategies and preferences of the other parties [2, 3, 4]. Unfortunately, some of these assumptions may not be present in some real world applications. For instance, computational resources are of extreme im- portance for agents since they may be scarce and shared among different tasks (e.g., time, memory usage, etc.). Thus, negotiation should not always assume unbounded computational resources. Additionally, since agents are heteroge- neous, not all of the agents know the same strategies. Identifying which sets of strategies are known by each agent may be a hard task that can only be success- ful after several negotiations. The same goes for the knowledge regarding the opponents' preferences, reservations values, and so forth. Only after several in- teractions and negotiations with the opponents, the agent may be able to come with an approximate model of the other agents. Hence, models that tackle un- certainty and limit the use of computational resources are mandatory for some situations. Heuristic models usually avoid the aforementioned assumptions. In result, they usually do not find equilibriums, but they obtain satisfactory re- sults [5, 6]. From this point, this work assumes the heuristic perspective when computational models for automated negotiation are mentioned. Most of the research in automated negotiation has concentrated on bilateral bargaining and multi-party negotiations where parties are composed of single individuals. However, most real life negotiations, especially in business and politics, involve negotiation teams [7, 8, 9]: multi-individual parties that act together as a single negotiation party. The use of negotiation teams in auto- mated negotiation and multi-agent systems is relatively new [10, 11, 12, 13, 14]. Hence, a proper review needs to be done in order to identify the tasks and spe- cial challenges that may arise in negotiation teams' settings. The main goal of this article is analyzing the tasks to be carried out by agent-based negotiation teams, reviewing how current works may contribute to the consecution of such tasks, and identifying special challenges that may arise due to the particularities of agent-based negotiation teams. We also hope that this present work may help new researchers in the area to have a global perspective on the problems that may arise in agent-based negotiation teams. The remainder of this paper is organized as follows. In Section 2 we start by introducing negotiation teams from the point of view of the social sciences. We identify the main aspects that characterize human negotiation teams and, after that, we relate those aspects with the topic of agent-based negotiation teams. Then, we present an analysis on the tasks to be carried out by agent-based negotiation teams in Section 3. Finally, we conclude by overviewing the work presented in this article. 2 2. Motivation As a first introspective to negotiation teams, we describe the phenomenon from the point of view of the social sciences. Then, we relate the essential aspects identified in the social sciences with agent-based negotiation teams. 2.1. Human Negotiation Teams A negotiation team is a group of two or more interdependent persons who join together as a single negotiating party because their similar interests and objectives relate to the negotiation, and who are all present at the bargaining table [7, 9]. Hence, a negotiation team is a negotiation party that is formed by multiple individuals instead of just one individual. As a negotiation party, the team negotiates with other parties in order to reach a final agreement. In what kind of scenarios may a negotiation be involved? There are several scenarios and their importance range from day to day negotiations to crucial negotiation in real life like business and politics. For instance, we can think of the following negotiation cases where teams usually participate in real life: • In one scenario, a human organization like a company desires to sell a product line to another company [8]. It is usual for each company to send a negotiation team composed of different experts coming from different organizational departments. This team is entrusted with the task of un- derstanding the complex scenario at hand and obtaining the most in the final agreement. • Similarly to the scenario mentioned above, negotiations in politics also involve negotiation teams. We could for instance think of the negotiations carried out between Cambodia, Laos, Thailand and Vietnam for promot- ing cooperation on water resources [15]. In these negotiations, each na- tional party formed a negotiation team. Each team was formed of different specialists whose common goal was the quality of the final agreement for its country. • Imagine that a married couple wants to purchase a car [8]. For that matter, the couple has to negotiate with a car seller the purchasing conditions like price, payment method, and extras. Clearly, this is an agreement that is signed between two parties: the couple, and the car seller. However, one of the parties is clearly composed of two individuals (i.e., the couple is composed of the husband and the wife) that share the same goal (i.e., buy a car). • Suppose that a group of four friends decides to travel together. If a travel needs to be arranged, the group of friends needs to find an adequate destination, some nice accommodation, and flights that take the group to the city of their holidays. Additionally, it may even be interesting to include some pre-arranged social activities like visits to museums, visits to monuments, some sport activities, and so forth. There may be several 3 travel agencies that offer such services, and the group of friends may need to negotiate with some of them to get a travel package that satisfies their needs. As in the previous scenarios, the group of friends is one single negotiation party that is composed of multiple individuals that share a common objective (i.e., go on a trip together). Thus, it can be appreciated that negotiation teams are quite common in real life negotiations. Despite their importance in real negotiations, teams have not been studied by social sciences to the same extent as dyadic negotiations [16, 17, 18]. However, what are the reasons to send a negotiation team to the negotiation table instead of a single negotiator? The first reason that may come to our minds is that the more individuals the better task performance in negotiation. Thompson et al. [7] showed in several experiments involving human negotiation teams that as long as one of the parties is a negotiation team, better joint outcomes (i.e., integrative outcomes) were obtained. This is partially explained due to the fact that when teams are present at the negotiation table, parties are more inclined to exchange information [7]. However, as pointed out by Mannix [19], greater numbers may not pay off unless coordination is present among team members. Another reason to employ a negotiation team is skill distribution and infor- mation distribution [8, 19, 20]. With this, we mean that different team members may have different and complementary profiles needed to tackle properly the ne- gotiation problem. Thompson [20] recommends that managers should recruit negotiation teams composed of experts in negotiation, experts in the subject to be negotiated, and individuals with a variety of interpersonal skills. Mannix [19] states that negotiation teams require a diverse set of knowledge, abilities, or expertise in complex negotiations, and the correct assessment of such skills is pointed out as one of the keys for success in a negotiation. Skill distribution and complementary skills are of vital importance when using some classic team negotiation tactics like the good cop/bad cop persuasion tactic [21]. Finally, other authors consider that another reason to send a negotiation team to the negotiation table is the party being formed by different stakeholders [19, 22]. For instance, Mannix [19] points out union negotiation as an example of negotiations where parties are formed by different interests that have to be represented in the negotiation table. Halevy [22] also remarks the importance that despite negotiation teams being a single negotiation party, they are hardly ever a unitary player. In fact, a negotiation team is usually a multi-player party with different and possibly conflicting interests. 2.2. Agent-Based Negotiation Teams Up to this point, we have strictly considered human negotiation teams. How- ever, are negotiation teams feasible and needed for automated negotiation and electronic applications? We argue that the answer to such question is positive. Agent-based systems are not alien to negotiation scenarios where it may be in- teresting to employ negotiation teams. For instance, imagine a tourism e-market 4 application. It is usual for groups of friends/families, or even strangers, to or- ganize their holidays as a group. Nevertheless, travelers usually have different preferences regarding trip conditions (e.g., cities to visit, hotel location, leisure activities, number of days to spend, budget limitations, etc.). Humans may be slow at coming with a proper negotiated deal that accounts for everyone's preferences. This task may not be only slow, but also tedious since conflict may be present. On top of that, human negotiators have been documented to be content even with deals that are far from the optimal solution. This phe- nomenon is what is known in the literature as leaving money on the table [20]. As a way for overcoming these problems, agents representing each traveler could form a team in an electronic market to quickly obtain a good trip package for the group. Software agents should be quicker than humans as long as they can handle the negotiation domain and they should prevent human negotiators from carrying out tedious tasks. The application of negotiation teams is not limited to the aforementioned example. It can be extrapolated to other domains such as electronic farming cooperatives, customer coalitions, organizational merging be- tween virtual organizations, negotiation support systems for labor negotiations, and so forth. A trusted mediator who can perfectly aggregate preferences can be thought of as a possible mechanism to coordinate a negotiation team in the tourism e- market example. Nevertheless, there are several reasons that preclude us from aligning ourselves with this kind of coordination mechanisms. The first reason is that privacy is usually a concern among users in electronic applications. In fact approximately 90% of the users in electronic applications care to some degree about the amount of information that they filtrate in electronic applications, and only 10% do not care about letting others manage their information [23]. Hence, one cannot expect that every team member may be willing to share its full preferences to a mediator. The other important issue is the fact that even though there may be some degree of cooperation among team members, one should not forget that the team is a multi-player party and opportunistic behavior may be present. In that case, preference aggregation is a dangerous mechanism since it may be quite prone to being manipulated and exaggerated for one's own benefits. Therefore, new negotiation models are needed to coordinate agent-based negotiation teams. Making an analogy with the human counterpart, we can define an agent- based negotiation team as a group of two or more interdependent agents that join as a single negotiation party because of their shared interests in the nego- tiation. The reasons to use an agent-based negotiation team are also analogous to the human case. First, more agents in the team may mean more computa- tion capabilities and, thus, more extensive and parallelized exploration of the negotiation space. Second, we can also assume that different and heterogeneous agents may have different experiences, they may offer different services/skills, and they may implement different algorithms, which in the end may result in the team being able to tackle complex negotiation problems more efficiently. Third and lastly, the team may really represent a multi-player party whose preferences need to be satisfied as much as possible by the final agreement. 5 Another related topic is one-to-many and many-to-many negotiations [24, 25, 26, 27, 28, 29, 30]. One-to-many and many-to-many negotiations are concepts that address the number of parties involved in the negotiation. In one-to-many negotiations, one party negotiates simultaneously, in with multiple parties. It can be a party negotiating in parallel negotiation threads for the same good with different opponent parties [26, 27, 29, 30] or a party that negotiates simultane- ously with multiple parties like in the Contract-Net protocol, and the English and Dutch auction [24, 25, 28]. Many-to-many negotiations consider the fact that many parties negotiate with many parties, the double auction being the most representative example [28]. Differently to the aforementioned concepts, negotiation teams are not related with the cardinality of the parties but the nature of the party itself. When addressing a negotiation team, we consider a negotiation party that is formed by more than a multiple individuals whose preferences have to be represented in the final agreement. This complex negoti- ation party can participate in bilateral negotiations, one-to-many negotiations, or many-to-many negotiations. The reason to model this complex negotiation party instead of as multiple individual parties is the potential for cooperation. Despite having possibly different individual preferences, a negotiation team usu- ally exists because there is a shared common goal among team members which is of particular importance (e.g., going on a trip together in the case of the group of travelers, selling the product line in the case of the human organization, purchasing a car in the case of the married couple, and obtaining a beneficial agreement for their country/region in the case of politics). Nevertheless, human negotiation teams do not always guarantee a better outcome than individuals. The performance of the team is directly related to coordination among team members. A team that is not capable of achiev- ing such coordination may fail at the negotiation. In fact, Behfar et al. [18] study the causes that pose problems for human negotiation teams: logistics and communication problems (e.g., communications inefficiencies), substantive dif- ferences (e.g., confusion about goals, conflicting interests), inter-personal and personality differences (e.g., different negotiation styles), and confusion about team roles (e.g., unclear decision rights). The same authors also identify those strategies that help to overcome the aforementioned problems and lead teams towards success: time and logistics management (e.g., coordinating strategies during negotiation by stepping away from the table), team communications (e.g., preparing with teammates), within-team negotiations (e.g., team problem solving, managing conflicting interests), and defining leadership and team roles (e.g., defining decision rights). To put it briefly, communications, coordination, intra-team negotiation, and clear rules of the game lead human negotiation teams to success. We believe that those key elements are also important in agent-based negotiation teams. For that reason, we identify and describe the communications, coordination and negotiation tasks that may help agent-based negotiation teams to perform successfully. Solutions for each task are reviewed, and special challenges that may arise are also pointed out. This present work can be categorized as a review paper from the point of view of those areas that may be relevant to agent-based negotiation teams. In 6 the automated negotiation literature, one can find different descriptive studies and reviews that have appeared in the last few decades. Kraus [5] presents a re- view of negotiation and cooperation in multi-agent systems by analyzing works in game-theory, large scale mechanics, operation research, and heuristics. Beam et al. [31] presented another point of view of the research in automated negotia- tion. Their study focused on challenges for electronic commerce and, therefore, the article contained state-of-the-art sections concerning negotiation support systems, automated intelligent agents in negotiation, auction mechanisms, and electronic marketplaces. Later, Guttman et al. [32] overview the use of negoti- ating agents and agent technologies in electronic marketplaces while putting a special emphasis on some of the most important tasks needed in electronic mar- ketplaces: product brokering, merchant brokering, and negotiation. Similarly to Kraus [5], Jennings et al. [6] offer a review of some of the most important works in negotiation, advances, and challenges in game-theoretic models, heuris- tic models, and argumentation frameworks. Another review regarding agents in electronic commerce is presented by Lomuscio et al. [33]. The authors present a taxonomy to classify negotiation in electronic commerce attending to crite- ria like the cardinality of the negotiation (i.e., number of parties involved), the characteristics of the agents (e.g., role, rationality, knowledge, bidding strategy, etc.), the characteristics of the environment, the type of information exchanged, and event parameters. The taxonomy is applied to several well-known negotia- tion frameworks in the literature. He et al. [34] review agent-based approaches to electronic commerce from the point of view of business-to-consumer (B2C) and business-to-business (B2B) markets. In the former case, the authors review different approaches in one of the following tasks: need identification, product brokering, buyer coalition formation, merchant brokering, and negotiation. In the latter case, different approaches are reviewed in tasks such as partnership formation, brokering, and negotiation. In [35], Lopes et al. propose the nec- essary tasks for the complete implantation of a general negotiation framework. Later, Luo et al. [36] propose a software methodology for the design of negoti- ation models in different scenarios. In the article, they review and standardize different high impact negotiation models. All of the aforementioned works have reviewed different advances and particularities of the research in automated negotiation. However, none of them has focused on the specific problem of negotiation teams and the special challenges associated to the topic. 3. Tasks for Negotiation Teams In this section, we describe the different tasks that an agent-based negotia- tion team may need to carry out in different scenarios. For each task, a review of related literature is carried out and the special challenges that are present in the negotiation team setting are highlighted. Some authors [35] have suggested the following tasks for negotiating agents: Identify social conflict, identify negotiation parties, structuring personal infor- mation, analysis of the opponents, define a protocol and select a negotiation strategy, negotiation (i.e., exchange of offers, argumentation, learning, etc.), 7 and re-negotiation. We argue that the tasks proposed by other authors are the correct steps to be followed by negotiating parties. However, some additional tasks, mainly those involving team coordination, are introduced to cope with the team scenario. It should be noted that depending on the application domain, some of the tasks described may not be necessary. The tasks have been organized in a workflow as it can be observed in Fig- ure 1. In the schema, we distinguish between tasks that are carried out with opponents (task with opp.), tasks that mainly concern interactions with team members (team task), tasks that only involve one individual agent (individual task), and tasks that involve team members, opponents, and the individual. The workflow is therefore divided into Identify Problem (individual task), Team For- mation (team task), Opponent Selection (team task), Understand Negotiation Domain (team task), Agree Negotiation Issues (Task with Opponents), Plan Ne- gotiation Protocol (team task), Agree External Negotiation Protocol (task with opponents), Decide Intra-team Strategy (team task), Select Individual Strategy (individual task), and Negotiation & Adaptation (team, individual and oppo- nents). The workflow aims to be as general as possible so that it could be adapted to a wide variety of domains. Hence, some of the tasks proposed may not be necessary and they can be skipped in some of the domains (e.g., select- ing an opponent when there is one single opponent and it is known from the domain). Next, we describe all of the tasks in detail. 3.1. Identify Problem The first step consists of identifying a situation that requires negotiation. The agent has to look in its environment for partners, and, in the process, determine whether a conflict exists or not. As stated by Lopes et al. [35], most artificial intelligence researchers have focused on how to reach an agreement, but very few have studied the problem of detecting conflict. The final product of this task is a list of potential team members, a list of potential opponents, and, possibly, a list of potential competitors. Next, we review different solutions in the literature to this problem. 3.1.1. Domain Specific Conflict Detection In multi-agent literature, one can identify works where conflict detection mechanisms are designed for specific domains like cooperative planning or air traffic management [37, 38, 39, 40]. In [37, 40], virtual cylinders delimit the protected and alert zone of each aircraft. Conflict is detected whenever the cylinders of two different aircrafts overlap. Chu et al. [38] propose a conflict detection mechanism for collaborative planning between pairs of agents. The agents work towards a shared plan by exchanging plan proposals and beliefs. One agent is able to detect whether or not a conflict exists by checking proposals and beliefs with respect to its own belief base. Similarly, Barber et al. [39] pro- pose a conflict detection mechanism when agents integrate their individual plans into a global plan. More specifically, conflict is detected at the goal level (i.e., incompatible goals) or planning level (i.e., threats between actions) by means of 8 Figure 1: A general workflow of tasks for agent-based negotiation teams. the use of PERT diagrams. In other applications like electronic commerce, con- flict/negotiation comes inherently linked to the role of the agent: buyers want to buy at lower prices, while sellers want to maximize their profit. However, these mechanisms are specific and cannot be adapted to other potential domains. 3.1.2. Domain Independent Conflict Detection Research into domain independent mechanisms that allow conflict detection is a topic that needs further research. This research is especially important if one attempts to design general negotiators for different domains. Some re- searchers like Lopes et al. [41] have employed libraries of axioms (i.e., libraries of rules) that allow agents to compare their own plans and intentions with those expected plans and intentions of other agents. A conflict is detected when one's own intentions are not compatible with predicted intentions of other agents. Similarly, it may be possible to express axioms for detecting potential partners. The main disadvantage of this approach is that libraries of axioms are static, usually provided by experts, and they cannot learn from new situations. 9 INDIVIDUAL TASKTEAM TASKTASK WITH OPP.IDENTIFY PROBLEMTEAM FORMATIONOPPONENT SELECTIONUNDERSTAND NEGOTIATION DOMAINAGREE NEGOTIATION ISSUESPLAN NEGOTIATION PROTOCOLAGREE NEGOTIATION PROTOCOLDECIDE INTRA-TEAM STRATEGYSELECT INDIVIDUAL STRATEGYNEGOTIATION & ADAPTATION 3.1.3. Looking for Partners and Opponents Unless the multi-agent system is a closed one, it is necessary to look for potential partners and opponents. The search process may be a necessary step for the aforementioned conflict detection mechanisms. One interesting technol- ogy is searching/communicating in social networks and markets [42, 43]. Sarne et al. [42] present an efficient algorithm for cooperative search in electronic markets. An agent or a group of agents look for goods in the marketplace to fulfill different goals. The algorithm takes into account purchase opportunities (i.e., the probability of finding a certain good) and the cost associated with finding new opportunities. For that matter, the agents employ distributions over opportunities in the electronic market. The search is capable of being partitioned in autonomous searches that aim to cover the different goals of the agent/group. While the search algorithm is interesting due to the fact that it considers search costs, obtaining distributions over partners/opponents for a specific task/negotiation may be difficult, especially if the negotiation task is new for the agent. Del Val et al. [43] present a decentralized service discovery system in social networks. The algorithm for service discovery is not based on previous information or statistics that require training, but similarity between agents. The similarity measure is calculated considering the semantic descrip- tions of the agents. Similarity measures may be employed to look for negotiation partners and opponents. However, it requires that agents make public certain semantic information regarding their profiles. Special Challenges Domain independent conflict resolution is a topic that needs further research. Mechanisms proposed in the literature have the disadvantage of being generated according to the knowledge of experts. Thus, they may not be robust to unex- pected scenarios unless learning mechanisms are used. One way to address this issue may be case-based reasoning [44]. Instead of using axioms, the agent may have a database of past conflict situations. If the current situation is similar enough to a past conflict situation, it can be considered that conflict may exist in the present. Once unexpected scenarios arise, it is possible for the agent to store the current situation as a new case. In future events, the new information may be used to predict new similar scenarios. The same mechanism may be used for detecting potential partners. 3.2. Team Formation Once the agent has studied which agents may be considered as potential partners, and which agents may be considered as opponents, the agent faces the challenge of determining whether or not benefits arise from forming a negotiation team. In some situations, it may be mandatory for the agent to be part of a negotiation team. In fact, the team may even be static (i.e., a married couple negotiating with a seller over an apartment). If that is the case, identifying negotiation partners, and forming a negotiation team are tasks that can be skipped. Nevertheless, some scenarios may be less rigid and the agent may 10 be able to form a negotiation team from the list of potential partners. Thus, the agent should analyze which team he expects to be the optimal negotiation team according to the list of potential partners. If it is expected that no team reports more benefits for the agent than negotiating individually, the agent should decide to negotiate as a single individual party. Next, we review those mechanisms that have been classically used to distribute agents into groups. 3.2.1. Coalition Formation Allocating agents into optimal groups has been a field of study for coali- tion formation [45, 46, 47, 48, 49]. A coalition is a short-lived group of agents that joins together for the accomplishment of a certain goal. The problem of coalition formation is usually divided into three main problems [50]: coalitional value calculation, coalition structure generation, and payoff distribution. The first problem, coalitional value calculation, consists of computing every possible coalition of agents and its associated value. Once every possible coalitional value is computed, the next task consists of dividing agents into disjoint coalitions that maximize the social welfare of the system. Finally, the payoff generated by the coalition is divided among the agents that are part of the group. In a team negotiation process, payoffs may be difficult to anticipate since the outcome of a negotiation is uncertain. On top of that, the result of the negotiation may be an object whose payoff may not be divided among team members. For instance, in the case of the traveling friends, the final result of the negotiation is the travel. Even though the cost of the travel may be divided among team members, how do you expect to divide the benefits of other factors of the negotiation such as the payment method, arranged foods, hotel location, and so forth? Thus, those works that focus on optimally dividing payoffs [46, 47, 48] may not be so interesting from the point of view of agent- based negotiation teams. On the other hand, efficiently calculating coalitional values and coalition structures [45, 51, 49] may come handy in negotiation team formation. This is especially true if the formation task is supported by some kind of centralized au- thority (i.e., a mediator, the electronic commerce site, etc.). Sandhlom et al. [45] present a coalition formation algorithm for problems where computing the cost of the coalitional value is exponential and agents have to pay for resources asso- ciated to the computation. Thus, as less computational resources are dedicated to the calculation of the coalitional value, less optimal solutions are obtained. The setting is similar in negotiation team formation. The exact value of the coalitional value cannot be calculated since it is uncertain and the actual value depends on the result of the negotiation. Therefore, approximated methods or heuristics should be used to approximately assess the quality of a coalition. In [11], results suggest that team performance is usually improved as team mem- bers' preferences are more similar. Thus, methods like similarity heuristics may be useful to calculate coalitional values when negotiation teams are concerned. Rahwan et al. [51] present a distributed anytime algorithm for computing coali- tional structures. The main advantage of this approach comes from the fact that despite being an anytime algorithm, it can guarantee a bounded solution with 11 respect to optimality. This feature makes it applicable for negotiation teams in marketplaces, where the number of potential partners may be too large for non-anytime methods. Another relevant work for agent-based negotiation teams is constrained coalition formation [49]. In this framework, not every coalition is possible due to constraints imposed by the application domain. Therefore, one should avoid generating and using coalitions which are not allowed. For instance, in a group travel electronic market, some agents may not be willing to travel with other agents (e.g., due to past experiences). Coalition formation algorithms are usually (not necessarily always) employed in a semi-centralized way, even when calculations can be distributed. These algorithms are usually applied by a centralized authority that manages all of the coalitional needs of the agents in the system. The authority distributes all the agents in coalitions with the aim of maximizing the social welfare of the system, which may be different to the social welfare of individual agents. Thus, this kind of mechanism is usually employed in settings where such a central authority exists (e.g., an electronic marketplace). 3.2.2. Buyer Coalitions Another trend of research in coalition formation are buyer coalitions [52, 53, 54, 55, 56]: groups of buyers that join together in order to take advantage from volume discounts. In [52], the authors show the incentive for buyers to form coalitions that take advantage of volume discounts. Additionally, they discuss the advantages and disadvantages of different protocols for the formation of customer coalitions (i.e., pre-negotiation and post-negotiation). Yamamoto et al. [53] present an algorithm for customer coalition formation in marketplaces where agents are able to make bids on different items. A me- diator gathers the bids (i.e., price) and groups together buyers that prefer the same item. Then, the surplus is divided fairly inside the coalition so that the coalition is stable (i.e., agents do not have incentive to leave the coalition and join another one). Later, Li et al. [55] study the problem of forming customer coalitions and distributing the surplus. They study the problem from the point of view of incentive compatibility (i.e., whether buyers have incentive to express their real reservation prices) and coalition stability. Several mechanisms are proposed for the problem, and experiments show a positive correlation between incentive compatibility and coalition stability. Ito et al. [54] present customer coalition models for agents that participate in a marketplace where buyers with the same needs are grouped together and they express their purchase desires in terms of reservation prices. On the other hand, sellers have deadlines to sell their products and they can cooperate with other sellers in case that stock requirements are not met. When a seller's deadline is reached, the seller negotiates with the coalition and buyers can decide whether or not to purchase the product. In [56], the authors propose a customer coalition formation mechanism for marketplaces where agents can buy bundles of items. An empty group is vir- tually formed for each seller. Each buyer agent searches for the optimal bundle that it can get by itself. The agent can register in those groups that are part of 12 its optimal bundle. Then, buyer agents negotiate among them to form coalitions that take the most from the purchase options. In general, the relationship between buyer coalitions and negotiation teams is strong: both are groups that engage in some kind of negotiation as a single party. The main disadvantage of current buyer coalition approaches is the fact that most works in group buying have focused on single attribute transactions where only price is involved or coalitions of buyers where bundles of items are involved. In most of these approaches, payoffs can be split and shared, and they do not consider qualitative attributes like cities, types of accommodation, and so forth. Therefore, complex multi-attribute negotiations are not supported by current group buying approaches. Additionally, it should be noted that even though every buyer coalition may be considered a type of negotiation team at some point, not every negotiation team is a buyer coalition. For instance, let us imagine the negotiation between a union and the manager of an enterprise. The union may send a negotiation team formed by different experts or different stakeholders (i.e., representatives for different types of workers) to negotiate with managers. In this case, the goal is not obtaining volume discounts as group buyers' case. Moreover, buyer coalitions may be highly dynamic formations that may change when better coalitional options arise. That is not the case of the group of traveling friends or the union, where once the team has been formed; it usually remains static during the negotiation process. 3.2.3. Cooperative Team Formation Another field relevant to this task is cooperative team formation [57, 58, 59, 60]. When teams are formed, agents with different skills, necessary for achiev- ing the common and shared goal, are sought. Team members with different skills/expertise may be desirable for complex negotiation domains. Neverthe- less, cooperative team literature in multi-agent systems usually assumes that team members share the same goal and all of them work towards the achieve- ment of such common goal. For that purpose, team members share an overall plan that they follow together, share knowledge of the environment, share in- tentions, and share skills needed to achieve the common goal [61]. Cohen et al. [57] present a framework where teams are groups of agents with a shared mental state that are committed to accomplish a joint goal. Speech acts are used as a mechanism to form and disband teams. If an agent requests another agent to perform a certain action, and it is followed by an accept mes- sage, both agents are considered to follow a joint goal and they cooperate for the realization of such goal. Dignum et al. [58] present a team formation framework based on persuasive dialogues and speech acts. An initiator agent forms an abstract plan. In the first stage, the agent gathers information on agents that may contribute to the plan attending to their abilities. Then, the initiator agent engages in persuasive dialogues with a subset of agents willing to work together towards the joint goal. The objective of the persuasion dialogue is to ensure that other agents are committed to the joint goal. Forming teams according to agents' skills should be a useful approach in situations where negotiation teams need different agent 13 profiles to tackle the negotiation domain (e.g., experts in different areas, different services, etc.). Persuasion is also useful, especially in open environments where agents do not necessarily hold the same beliefs, goals, and intentions. In [59], a framework for dynamic team formation in a network of agents is presented. Each agent has a certain skill, and the agents are connected with a limited number of agents, forming a network. In this scenario, teams have to be formed dynamically in order to carry out tasks that are needed for the global goal of the network. Those agents that are not active can start the team formation process and look for teammates. However, an agent can only be part of a team if it is connected with at least one agent of the team. Networks are realistic structures in open systems, where agents do not know every single agent in the system, but a set of agents with whom it usually interacts. Thus, mechanisms such as the one presented in [59] offer realistic group formation principles for negotiation teams in open multi-agent systems. Badica et al. [60] present a framework for the formation of dynamic work- flows of experts and services in environmental management applications. The organization of experts into workflows is carried out by multi-issue negotiations that take into account the fact that experts may have previous commitments that limit their availability for team tasks. Negotiations are cooperative in the sense that the goal of all of the agents is a successful management in an envi- ronmental incident. In most of the aforementioned frameworks, team members are usually fully cooperative with each other. Once agents commit to a joint goal, they cooper- ate and coordinate towards the consecution of that goal. Team members in a negotiation team may have different sub-goals or preferences despite sharing a common goal. Hence, team members may not be fully cooperative with other fellow team members, since other individual sub-goals may be at stake during the negotiation (e.g., trip conditions in the traveling friends' scenario). It should be highlighted that team formation algorithms are usually (not necessarily always) initiated by a single agent that asks for help to other agents on a specific goal/task. Hence, these mechanisms may be more appropriate in applications where a centralized authority does not exist and agents are more willing to fully cooperate. Special Challenges The ideal formula for negotiation team formation may depend on the type of application that needs to be constructed. In any case, we argue that the afore- mentioned approaches may need to consider the following issues when forming a negotiation team: • Electronic commerce has given more social power to consumers, which now can find new sellers at a relatively low cost [62] and access informa- tion more easily. Not only that, but reputation models [63] and gossiping [64, 65] (i.e., exchanging information among known agents) may give an additional coercive power to consumers over sellers. In both cases, an opin- ion is formed about sellers which is based on the experiences/knowledge of 14 the different agents in the society. This may produce sellers that are more willing to act cooperatively. Otherwise, sellers may be negatively rated by buyers. Thus, it is expected that, the larger the negotiation team, the greater social power it will be able to exert, and the more cooperative the seller will be. • Even though it seems intuitive that the larger a negotiation team is, the better, this may not be always true. If the preferences of the team mem- bers are compatible and very similar, adding new team members to a negotiation team may only result in greater social power. As stated, if the preferences of the team members are very dissimilar, adding new team members may result in lower team performance [11]. Thus, despite the fact that larger teams may be able to bring together more social power, intra-team conflict may deteriorate the quality of the final agreement to a point that greater social power does not compensate. Generally, it is not possible to exactly know the preferences of potential team members prior to the negotiation itself. Nevertheless, past experiences with negotiation partners [66] and recommender techniques like collaborative filtering [67] may help to accomplish the task of assessing which negotiation partners are more similar. In the former case, the agents use the history of past negotiations (negotiation outcome, and one's own utility function) with another agent to build a possibility distribution over the space of negotia- tion outcomes. Then, the expected utility of the negotiation with the agent is calculated and the agent negotiates with those agents whose expected utilities are higher. The same mechanism can be employed by one agent to determine which prospective teammates are the most similar. In the latter case, collaborative filtering consists of recommendation techniques for very large data sets. The rationale behind this technique is that if two agents have the same opinion on an issue, they are more likely to have a more similar opinion in other issues than randomly chosen agents. Thus, based on a history of past purchases/deals, it may be possible to deter- mine whether or not two agents are similar. However, this information is usually provided/used by an authorized third party (e.g., an electronic marketplace). • Related to the previous issue, more team members or stakeholders may bring additional negotiation attributes to the negotiation table. The first effect over the negotiation is that the negotiation domain becomes larger and possibly computationally harder to work with. Despite this computa- tional disadvantage, it may introduce negotiation attributes that are only interesting to a sub-group of the agents that participate in the negotia- tion. If the opponent is not interested in these attributes, it may make trade-offs easier. In contrast, if a negotiation attribute is introduced to satisfy a sub-group of the team members and the issue is important for the opponent, it may result in higher preference conflict with the opponent (i.e., a new issue which is important for the opponent and whose team preferences on issue values are opposite to those of the opponent). Hence, 15 it may be more difficult to find an agreement. In general, additional is- sues in the negotiation may be a double-edged sword that can report both benefits and disadvantages. • One of the problems that negotiation teams may face is tackling negoti- ation domains that are inherently complex. This means that the nature of the domain is hard to understand and it requires the expertise of dif- ferent agents. For instance, when an organization negotiates in a complex negotiation, it sends a negotiation team composed of different experts. These experts may come from the different departments of the organiza- tion (e.g., marketing, human resources, research & development, etc.) and have different backgrounds that enrich the understanding of the problem. Information regarding agent roles and/or agent identities [68] may come handy to determine which potential team members are more fit for the negotiation problem. • Different agents may provide different social relationships to the team's social network. Social networks may directly impact upon the performance of teams [69] since it can provide with extra information for the team. They may provide new information and team members that are beneficial for the team. 3.3. Opponent Selection Once the team has been formed, it is necessary to find suitable opponents from the list of prospective opponents. The team should decide which opponents they are going to face. If enough computational resources are available, all of the opponents can be selected and negotiations can be carried out in parallel. However, if computational resources are scarce, a subset of the opponents has to be selected. 3.3.1. Opponent Evaluation Mechanisms As introduced earlier, each individual agent can calculate the expected util- ity of a negotiation with an opponent based on past outcomes and situations [66]. Another classic method to evaluate opponents is trust and reputation [63]. Trust is built as an evaluation mechanism based on one's own past transac- tions/interactions, while reputation is built based on the aggregated opinions of agents in the society. The rationale behind trust and reputation is that op- ponents that respect trade conditions (e.g., dispatch dates, payments, etc.) are positively evaluated, whereas agents that violate trade conditions (e.g., delays) or misbehave are evaluated negatively. Generally, agents should select oppo- nents that are evaluated positively by trust and reputation mechanisms. 3.3.2. Discussion in Groups The expected utility of negotiating with an opponent and trust evaluations are calculated from the point of view of one agent. Since the team is composed by more than a single agent, the opinions of different agents may need to be 16 aggregated. In fact, there may be intra-team conflict since teammates' opinions on opponents may vary due to different experiences and preferences. In case of conflict, agents need to resort to other mechanisms for aggregating the opinions of teammates. One of these classic mechanisms is voting [70]. Classic voting schemes like majority voting and Borda count have the advantage of aggregating opinions with a few interactions. However, they may not be expressive enough to determine the best option for the negotiation team. For instance, if one of the teammates has bad expe- riences with certain vendor but other teammates have good and more recent experiences, the team may determine to discard the opinion of the former team member. Deliberation and persuasion in groups can discover and clear these differences [71, 72]. Deliberation is a discussion to decide a course of action among a group of agents. McBurney et al. [71] introduce the first formalization for deliberation dialogues in multi-agent systems. The interaction protocol for agents usually starts when agents have to decide on a course of action. Then, agents inform about the goals of the dialogue and the criteria that are relevant to the goals of the deliberation. After that, agents in the deliberation can enter a cycle where they are allowed to propose actions to be taken by the group, comment on actions proposed in the dialogue from different perspectives, revise the deliberation goals, recommend on actions that should be taken by the group, and confirm the acceptance of recommended actions. Heras et al. [72] propose a persuasion framework for groups of agents that have to make a decision. In the framework, agents argue using case-based reasoning with two purposes. The first purpose consists of learning new solutions to domain problems, which are later used in dialogues to propose course of actions. The second purpose is learning how to argue from previous dialogues. Special Challenges Despite the fact that mechanisms exist that allow agents to evaluate oppo- nents and discuss as a group on a course of action, as far as we are concerned it has not been applied to the evaluation of negotiation opponents. Comparing voting schemes and persuasion/deliberation, computation time may have a key on deciding on which technology should be chosen. If time is limited, voting schemes may be more appropriate when comparing a large number of negoti- ation opponents since they may require fewer messages. On the other part, if time is not of extreme importance in the process, deliberation and argumenta- tion are more expressive and allow discovering scenarios like the one commented above. 3.4. Understand the Negotiation Domain Understanding together the negotiation domain is a task of extreme im- portance. Not only does it allow team members to get a grasp of other team members' preferences, but it makes it possible for team members to tackle cor- rectly the negotiation when the domain is complex and requires expertise in different knowledge areas. 17 Even assuming that team members have similar backgrounds, it is still im- portant to understand the negotiation domain together. Let us imagine that a group of friends (e.g., Alice, Bob and Charlie) decides to go on a travel together and have fun. What is the meaning of "having fun"? Clearly, it may be different meaning for each friend: Alice thinks that if the city offers lots of adventure sports then the travel is fun, Bob thinks that having fun also involves finding a place with considerable night life, whereas Charlie is happy with any plan as long as it does not involve much money. From this situation, it can be inferred that the price, adventure activities included in the travel package, and the night life activities are relevant negotiation issues for the team in the negotiation at hand. 3.4.1. Discussion in groups The technologies that can give support to these processes are varied. As stated, persuasion and deliberation in groups can help to manage conflict when deciding on a course of action [71, 72]. The object of discussion in this phase is those issues that are relevant for the team during the negotiation. Differently to the deliberation regarding opponent selection, in this case the available options and possible negotiation issues are not fully known beforehand. Thus, they have to be discovered during the argumentation process. 3.4.2. Belief Merging Other technologies like belief merging [73, 74, 75] may also prove useful for obtaining a shared model of the negotiation domain. Belief merging consists of joining together the knowledge that comes from different sources. If no incon- sistency is present among the different data sources, information can be easily aggregated. However, if some piece of information is inconsistent among differ- ent data sources, special mechanisms have to be employed. Booth et al. [73] present a belief merging algorithm for information com- ing from multiple data sources. It is assumed that one of the data sources is completely reliable (e.g., trivial information) with respect to the others. Con- sistent information is added as new knowledge, while inconsistent information undergoes a contraction process where it is incrementally reduced to pieces of consistent information by means of negotiation. For the application of this so- lution in a negotiation team, the sources of information can be considered the different agents in the team. The use of negotiation results convenient since in a negotiation team, each data source corresponds to a different party. The result of belief merging is information which can be used as shared mental model for the team. Qi et al. [74] present another framework that merges different sources of information by means of negotiation among inconsistent sources. The main difference between this framework and the previous one is that the authors consider the fact that knowledge bases may have different priorities. These priorities represent different degrees of confidence in the different sources of information. This mechanism can represent the fact that in a negotiation team, the information of some team members may be more reliable in some areas. 18 However, it should be noted that most belief merging methods are not strategy-proof [75, 76]. A belief merging method is strategy-proof when it is robust against attempts of manipulation by agents. An agent may try to ma- nipulate the belief merging process if it expects to increase its utility by acting that way. In [75], the authors study the restricted conditions under which several families of belief merging operators are strategy-proof. Special Challenges Identifying negotiation issues that are relevant for the team is not the only task necessary to completely understand the negotiation domain. Identifying which attributes are predictable and compatible for the team, and which at- tributes are not predictable is also crucial. On the one hand, a negotiation issue is predictable and compatible among team members if the preferences of all of the team members over issue values are known and compatible. For instance, in a team of buyers, it is logical that all team members prefer low prices over high prices. In this type of negotiation issues, there is full potential for cooper- ation among team members since increasing the utility for a team member (i.e., decreasing the price) results in other team members staying at the same utility level or increasing their utility. On the other hand, a negotiation issue is not predictable among team members if nothing can be inferred about which issue values are preferred by team members. The issue may be compatible among team members (i.e., same ranking of preferences over issue values) or not, but it is not possible to know the nature of the negotiation issue unless team members are willing to share information. Using information regarding which issues are predictable and unpredictable among team members may be useful for deciding on which negotiation strategy is used among team members. For instance, in [12] the authors present an agent-based negotiation team model that, as long as the negotiation domain is exclusively composed by compatible and predictable issues, it is capable of guaranteeing unanimity regarding team decisions at each round of the negotiation. Another interesting issue is how team members analyze if they have incentive to share all of the information regarding the negotiation domain. An agent may be willing to share a piece information only if it expects that it is going to report higher utility than hiding the piece of information. Such et al. [77] propose disclosure mechanisms based on human psychology that allow agents to determine when sharing private information results in greater utility. However, research in this topic is still in early stages and it has not been applied to negotiation teams. 3.5. Agree Negotiation Issues Since the previous stage produced a list of issues which are relevant for the team members, the next stage consists of agreeing a final list of negotiation issues with the opponent. The opponent may have its own list of issues relevant to the negotiation. Thus, a final list of issues to be negotiated should be agreed between both parties. 19 From the initial set of negotiation issues proposed by the team, some of the issues may not be negotiable since the opponent does not offer that service. For example, if the team members had originally concluded that negotiating packages of adventure activities is a relevant issue to the team but a travel agency does not work with such packages, the issue cannot be included in the negotiation. Additionally, some negotiation issues that were not included in the list proposed by the team may be included in the final list since they are relevant to the opponent. As for those negotiation issues present in the lists proposed by team members and the opponent, it may also be necessary to agree on the issue domain (i.e., the values that the negotiation issue can take). Similarly to the agreement on the list of issues, the final domain value may not contain all of the values proposed by both parties (i.e., Rome cannot be a value for the city of destination if the travel agency does not offer flights to Rome). Special Challenges Despite being an important process in the pre-negotiation, very little atten- tion has been paid to agreeing negotiation issues between parties. In fact, most researchers in negotiation assume that the list of negotiation issues and their domains are already agreed in their negotiation models. Faratin [78] mentions in his thesis the possibility of adding and removing non-core issues during the negotiation. While core negotiation issues remain static during the negotiation process, involved parties may be able to add or remove non-core negotiation issues as the negotiation process advances. However, the list of non-core is- sues is assumed to be known by both parties and the development of an issue- manipulation algorithm was appointed as future work. We acknowledge that this is a process that needs to be researched in the future. 3.6. Plan Negotiation Protocol After the list of issues for the negotiation process is set, the different parties have to agree a negotiation protocol unless the protocol is already set by a third party or by the system. In that case, this task and the next task can be skipped. There are different negotiation protocols that may be applied for a specific situation. For instance, if the negotiation team engages with an opponent in a bilateral negotiation, both parties could employ the classical alternating offers protocol [79], extensions of such protocol like the k-alternating offers proto- col [80], protocols based on fuzzy tradeoffs [81], two-stage protocols based on optimization and concession [82], or complex mediated protocols like [83, 84]. The team as a whole may have different opinions and knowledge about the available protocols. In fact, some of the team members may not even know some of such protocols. In that case, those protocols cannot be used by the team since some of its players do not know the rules and decision making strategies to face such games. 20 3.6.1. Discussion in Groups In this phase, if more than an applicable protocol is known by all of the team members, they should decide as a group which protocols are preferred by the team (i.e., a ranking of the known protocols). Again, the team may resort to voting [70], and argumentation and deliberation [71, 72]. Special Challenges The main challenge in this task is how agents evaluate the different protocols available in the literature. As far as we are concerned, there is not an exhaustive study that analyzes which protocols are more convenient in different situations. Such a study would be necessary to provide agents with the mechanisms to make informed decisions on the negotiation protocol. 3.7. Agree Negotiation Protocol Considering that the team has already decided on which negotiation pro- tocols are preferred by team members (e.g., some ranking over the negotiation protocols), they should agree with the opponents on the negotiation protocols that are to be followed for interacting. Again, opponents may not know how to play some games, making some of the options not feasible. Some protocols known by the opponent may not be known by all of the team members. Over the list of protocols that are known by both parties, both parties may have differ- ent preferences and knowledge regarding the different protocols. This decision between both parties is going to involve some kind of simple negotiation (i.e., we do not expect the number of possibilities to be large) or discussion among both parties. In some cases, besides the negotiation protocol, some parameters of the protocol have to be decided also by both parties (i.e., who is the initiat- ing party in the alternating offers protocol [79], the number of offers allowed in the k-alternating offers protocol [80], who acts as trusted mediator in mediated protocols like [83, 84], etc.). Despite not being explicitly covered by any work, we consider that most negotiation models can be easily adapted to this task. 3.8. Decide Intra-team Strategy Negotiation protocols define the rules of interaction to be followed by the different parties. In a single player party, the decisions are individually taken by one agent. However, when the party is formed by multiple individuals, it is necessary to decide on how, when, and what decisions are taken, and who takes those decisions. This is what is termed as an intra-team strategy or negotiation team dynamics. For example, in the case of the alternating offers protocol [79], each party should decide on which offer is sent to the opponent party, whether or not to ac- cept the offer proposed by the other party, and when one should withdraw from the negotiation process. Thus, any intra-team strategy for teams participating in the alternating offers protocol should decide on those issues. Obviously, for different negotiation protocols, different decisions have to be taken and an intra-team strategy that has been proposed for a particular negoti- ation protocol may not be directly applied to other type of negotiation protocol. 21 Thus, usually negotiation protocols and intra-team strategies are tightly cou- pled. 3.8.1. Simulation Studies One of our hypotheses is that there is not a single intra-team strategy that is capable of outperforming the rest of intra-team strategies for every possible scenario. Depending on the goal of the team (e.g., social choice performance measure), and depending on the conditions of the negotiation some intra-team strategies may perform better than others. By conditions of the negotiation we refer to those factors, either external (e.g., the number of competitors, the number of prospective negotiation partners, etc.) or internal (e.g., team size, similarity among team members' preferences, deadline length, etc.) that can affect the negotiation. Usually, the number of variables is so large that it makes a theoretical analysis not feasible. Thus, some researchers have employed ex- tensive simulations to assess which strategies would work better in certain con- ditions [85, 86, 87, 88]. Oliver et al. [85], Matos et al. [86], Tu et al. [87], and Gerding et al. [88] propose evolutionary strategies in bilateral negotiations that converge towards reasonably good strategies in different environments. Never- theless, some specific conditions of the negotiation have to be known beforehand to evolve appropriate strategies. 3.8.2. Role Allocation It may be the case that some intra-team strategies additionally require role/task assignment (e.g., information retrieval, monitoring the market, etc.). Nair et al. [89] propose a framework that is capable of evaluating different role allocation and reallocation policies in cooperative teams by means of distributed Partially Observable Markov Decision Processes. This approach may be valid for intra-team strategies that require different roles. However, rewards steaming from role allocation may be uncertain in a negotiation team since agents are het- erogeneous and they may not know each other. Additionally, it is a cooperative approach that does not take into account the preferences of agents over tasks. Hoogendorn et al. [90] present a negotiation framework for the allocation of tasks between agents. An agent can place requests for task distribution among other agents. Then, agents bid for being assigned to the tasks of their interest. A negotiated approach is more convenient when agents are heterogeneous and they have different preferences with respect to roles. However, in this approach only bids are considered to assign tasks to agents. It does not take into account other factors like past experiences, trust and reputation, etc. Special Challenges Despite the fact that extensive simulations have been carried out in nego- tiations with single individual parties, no extensive study exists for the team case. The only exception is the work presented in [14, 11], where intra-team strategies are studied under varied negotiation conditions (i.e., deadline length, team member similarity, etc.). The work focuses on intra-team strategies where 22 only predictable and compatible issues among team members are considered. Thus, it is acknowledged that more work is required in these lines. With respect to role allocation, it should be pointed out that team mem- bers may also have their own individual goals. Teams with mixed motives have not been extensively studied in multi-agent literature, with the exceptions of [91] present a framework where agents have to reconcile [91, 92]. Grosz et al. conflict between team commitments and individual actions. If an individual action reports benefits and it is inconsistent with a committed team action, the agent can choose to decommit and pursue its own self-interest. Authors propose the use of social norms, with associated punishments and rewards, to make team commitments prevail. However, social norms are difficult to deploy in a negotiation team unless a central authority exists. Even so, it may not be possible to determine whether or not team members are collaborating since other agents' preferences are not known. Paruchuri et al. [92] present an ex- tension of Partially Observable Markov Decision Processes to the team case. However, instead of modeling a single reward for the team, individual rewards are also modeled. This way, they can take into account agents' selfishness. The frameworks attempts to calculate optimal group policies that maximize the re- wards of team members as much as possible. Nevertheless, rewards steaming from role allocation are difficult to anticipate. Therefore, it is necessary to fur- ther study to what extent team members would fully collaborate in negotiation team's tasks in spite of their own utility. For example, how interesting is for a team member to look for new outside options for the team when current ones report high utility for himself? A self-interested team member may decide to neglect its search tasks and continue with present outside options if it considers that new outside options will not increase its current welfare. We consider that this is a promising line of work that needs more attention. 3.9. Select Individual Strategy Each team member should plan its individual strategy before heading into the negotiation. An intra-team strategy defines mechanisms for team decision- making but they do not define how individual team members behave when playing those mechanisms. It is up to the agent to decide how to act inside it can be more or less cooperative. The agent should also decide the team: its attitude with the opponent. The two aforementioned factors will define the initial negotiation strategy of each team member. Generally, the selection of the initial negotiation strategy is based on what is expected about the opponent and teammates. As stated in the previous section, one of our hypotheses is that the conditions of the negotiation environment play a key role in selecting which intra-team strategies are more appropriate for each specific situation. Thus, team members should also decide on their individual strategy based on the knowledge about conditions of the negotiation. We consider that the mechanisms employed in other domains involving single player parties are also applicable in this task. Hence, no special challenge arises. 23 3.10. Negotiation & Adaptation The final phase is the negotiation itself. During this phase, team members should follow the planned intra-team strategies, individual strategies, and ne- gotiation protocols. However, negotiation is a dynamic process that may not work as planned (e.g., opponents not behaving as one initially thought, team members performing below/above one's expectations, team members leaving the team, etc.). Therefore, it may be necessary that each team member adapts its own negotiation strategy, and that the team replans some of the aspects related to team composition and team dynamics. Special Challenges We argue that some of the special challenges that arise in a negotiation team during the negotiation are: • Team membership: As stated, team membership may be dynamic. In fact, how dynamic a negotiation team is may depend on the domain ap- plication. Domains where team members are more self-interested, and less bonds exist between team members (e.g., team of buyers) may result in more dynamic negotiation teams than domains where team members are more cooperative and there are human bonds behind team membership (e.g., group of travelers, human organizations, etc.). In any case, in both situations the problem of dynamic membership may arise. For instance, new buyers may appear in the electronic market that may join the team to take advantage of larger price discounts. Similarly, a new traveler de- cides to travel during holidays and his user states the desire of joining the pre-existing group of travelers. Cases of team member's withdrawal are also possible. For instance, one of the buyers participates in other buyers' coalitions and decides to close a deal, making its membership in the rest of the buyers' coalitions no longer necessary. • Negotiation issues: As stated, both parties agreed to negotiate over some initial issues. For some reasons (e.g., computational issues, computational tractability, etc.), they may have decided to leave some less relevant issues out of the negotiation table. However, at some points of the negotiation an impasse [93, 94] may occur in the negotiation. A negotiation impasse occurs when the parties are unable to reach an agreement and the per- spectives of reaching one are very negative. They are in a deadlock. A possible solution for such problematic situation is what is known as issue linkage [95, 96, 97]. Basically, when parties negotiate on one issue, adding another issue and linking its value to the value of the initial issue can increase the probability of finding an agreement. The new issue may be added to reduce intra-team conflict (e.g., how costs are split in the team), or they may be added to reduce conflict with the opponent (e.g., include a payment method issue and maximize the preferences of the opponent in the new issue). This adaptation heuristic during the negotiation may be positive for cases that are prone to fail. However, as suggested by [96, 97], 24 issue linkage may also have negative effects since it may also reduce the agreement space. As of today, issue linkage is an area that has not been widely studied in automated negotiation, where it has been assumed that issues remain static during the negotiation process. Hence, it is an area that requires further exploration, especially for the team case since conflict may appear at the team level and the opponent level. • Intra-team strategy and individual strategy adaptation: As stated, intra- team strategies define what decisions are taken by the team, how decisions are taken, and when those decisions are taken. In case that some nego- tiation conditions change, it may be wise for team members to change their current intra-team strategy to match accordingly the new changes. Obviously, changes in the intra-team strategy and environment's condi- tion also call for an adaptation in team members' individual strategies. In this sense, there have been some works that advocate for a change in individual agents' strategies in automated negotiation. We can dis- tinguish between works where individual agents adapt their behavior at- tending to environmental conditions like outside options and competitors [98, 99, 100, 101, 102, 103] and works where individual agents adapt their behavior during the negotiation attending to the attitude of the opponent [104, 105, 106, 107, 108]. Sim et al. [98] introduce market driven agents. These agents adapt their concession strategies based on market conditions like eagerness, trading time, trading opportunities and trading competition. Later, Ren et al. [101] improve market driven agents by considering not only current market options, but also future opportunities. Differently from other approaches, in [103] the authors propose bilateral negotiation strategies for multi-issue negotiations that account for market conditions. A stochastic Markov chain is proposed in An et al. [100] with the goal of modeling market dynamics in single-issue negotiations. In their model, they assume that agents have a probability distribution over future trading opportunities, reservation prices, and deadlines. A sit-and-wait strategy is also assumed so at the first negotiation step both partners offer their highest utility value and no new bid is offered until the first private deadline, where the agent offers its reservation value. Opponent offers are accepted based on the prediction of new and better offers in the future. Li et al. [99] present a bilateral negotiation framework where the reservation price is updated based on the information of current trading opportunities and future trading opportunities. In [102], the authors propose a bilateral negotiation model with decommitment for leasing resources on the cloud. The negotiation strategy of buyers takes in consideration environmental factors like the demand ratio of resources, the cost of resources, and market competition for resources. Robu et al. [104, 105] present a learning mechanism used by sellers to adapt to the preferences of buyers. The preferences are represented by utility graphs, which model interdependencies between binary issues. 25 Narayanan et al.[106] present a negotiation framework where pairs of agents negotiate over a single issue (i.e., price). The authors assume that the environment is non-stationary in the sense that agents' strate- gies may change over time. Non-stationary Markov chains and Bayesian learning are employed to tackle the uncertainty in this domain, and even- tually converge towards the optimal negotiation strategy. Hindriks et al. [107] present a negotiation framework for bilateral multi-issue negotiations where agents' preferences are represented by means of additive utility func- tions. The main goal of this work is learning a model of the opponent's preferences (i.e., issue value rankings, and issue weights), and Bayesian learning is used for this purpose. Williams et al. [108] present a strategy that is capable of adapting its concession strategy based on the predicted behavior of the opponent. The previous works adapt different elements of the negotiation (e.g., pref- erence models, strategies, reservation prices, etc.). However, they usually focus on modeling aspects of the environment where the negotiation is being carried out or the opponent. Both opponent's models and envi- ronment's models can be applied to the team case. However, there is an additional layer of negotiation/interaction, which in this case is carried out within teammates. One agent should also consider the actions and behaviors of its teammates in order to act accordingly in the negotiation. Thus, new learning and adaptation mechanisms based on the information that is generated inside the team by team members are needed. 4. Discussion & Conclusions Agent-based negotiation teams is a fairly novel topic in the area of multi- agent systems and artificial intelligence. More specifically, an agent-based ne- gotiation team is a group of interdependent agents that join together as a single negotiation party because of their shared interests at the negotiation process. The reasons to employ these multi-individual parties are: (i) more computation and parallelization capabilities; (ii) unite agents with different expertise and skills whose joint work makes possible to tackle complex negotiation domains; (iii) the necessity to represent different stakeholders or different preferences in the same party (e.g., organizations, countries, married couple, etc.). In this article, we have analyzed and reviewed the tasks that may help agent-based negotiation teams to perform successfully. Being a special type of automated negotiation where at least one of the par- ties is a group of agents, it inherits some of the challenges from the classic topic of automated negotiation like opponent selection, typical pre-negotiation tasks (e.g., setting negotiation issues, agreeing negotiation protocol, etc.), strategy selection, and so forth. Nevertheless, an additional layer of difficulty is added to those challenges due to the fact that team members may have different expertise and different preferences (i.e., intra-team conflict). Hence, those decisions that once were taken alone or with the opponent parties should now be discussed 26 and agreed within the negotiation team. Moreover, some unique challenges like negotiation team formation and deciding the intra-team strategy (i.e., team dy- namics) that should be employed in the negotiation also arise with the new topic. In this article we have organized, in a workflow, the tasks that a negotiation team should take. The workflow aims to be general and adaptable to a wide variety of domains and applications. For each of these tasks we have highlighted the aforementioned challenges that arise with the field of agent-based negotiation teams and we have pointed out to related fields of study that may hold the right answer for such challenges. Next, we briefly describe the workflow and the challenges that we have identified throughout this article. • Identify Problem: The first step consists of being able to perceive when conflict is present, and who may be involved in the conflict (i.e., opponents, prospective teammates, and competitors). For that matter, it is necessary to analyze the environment and look for potential partners. The literature has largely focused on domain dependant conflict detection and search mechanisms in networks and markets, leaving conflict detection in open systems almost unexplored. This latter aspect is relatively important for making general negotiators in a wide variety of domains. Hence, this area of work remains largely unexplored. • Team Formation: If the agent thinks that it may be beneficial to form a negotiation team, it should attempt to select its teammates. Closely re- lated research areas are coalition formation, buyer coalitions, and cooper- ative team formation. On the one hand, coalitional approaches (including buyer coalitions) have focused on forming optimal groups of agents and how to divide the payoff generated by the group task. However, the result of the negotiation with the opponent may be difficult to anticipate mak- ing it complicated to estimate the value of coalitions. Moreover, while the payoff generated by some negotiation issues like price may be naturally di- visible, the payoff generated by other issues is not divisible (e.g., payment method). On the other hand, cooperative team formation aims to form teams for a certain task based on complementary skills. The usual trend in the literature is to consider these team members as fully cooperative and committed to the team goal. Nevertheless, in agent-based negotia- tion teams, team members may not be fully cooperative since they may additionally have their own and possibly conflicting individual interests. Special challenges identified in this task are considering (i) the relation- ship between team size and social power; (ii) the relationship between team size, team similarity, intra-team conflict and conflict with the oppo- nent; (iii) requiring different knowledge expertise; (iv) the social network provided by each team member. • Opponent Selection: The next step consists of selecting the opponents with whom the team will negotiate. Classic approaches to this task have relied on trust and reputation, or the negotiation outcome in previous 27 interactions with the opponent. Since the aforementioned perspectives are usually individual, it is necessary to form an opinion for the team. In this case, we pointed out that social choice and argumentation/deliberation in groups can play this role. The main challenge in this workflow task is adapting the aforementioned mechanisms to the opponent evaluation task. • Understand the Negotiation Domain: The general idea behind this task is creating a shared model of the negotiation domain at hand. It in- cludes identifying relevant negotiation issues, merging different points of views and expertise, clarifying team goals that may be abstract in essence, and identifying the nature of prospective negotiation issues (e.g., compati- ble and predictable, unpredictable, etc). Discussion in groups can certainly help to discover these issues during argumentation processes. Addition- ally, belief merging is also a potential candidate to solve this task as long as team members are truthful or the belief merging method is strategy-proof. The main challenges in this task are identifying the nature of negotiation issues among team members, and taking into account opportunistic be- haviors (e.g., manipulating belief merging, hiding relevant information for one's own interest, etc.). • Agree Negotiation Issues: The next part consists of agreeing with the opponent which negotiation issues should be considered in the negotia- tion. Depending on the participating parties, it is possible that some of the issues/issue values are not available for negotiation (e.g., the service provider cannot offer such issue). Additionally, it is also possible that some issues/issue values that were not initially considered by the team are included due to opponent parties' requests. Despite its importance, negotiation models usually assume that the negotiation domain is given and they do not provide mechanisms that allow forming or negotiating the domain of each negotiation. This is an interesting research challenge since, as far as we know, there is almost no related literature. • Plan Negotiation Protocol: Given a specific situation, there may be different negotiation protocols that may be used to negotiate with the op- ponent. Team members should argue about which protocols are preferred according to their experiences, known strategies , and so forth. Although the problem has not been explicitly covered by the literature, its solution may not pose exceptional efforts compared with classic argumentation and social choice problems. Nevertheless, it is also acknowledged that there is a lack of works comparing the advantages and disadvantages of available negotiation protocols under different conditions. • Agree Negotiation Protocol: Similarly, once team members have dis- cussed about the available negotiation protocols, they should negotiate a proper negotiation protocol and its parameters with the opponent. Cur- rent negotiation technologies may be able to support this phase. 28 • Decide Intra-team Strategy: Intra-team strategies define team dy- namics for a specific negotiation protocol. They define the coordination and negotiation protocol carried out within the team to decide on the steps to be carried out in the negotiation with the opponent. Team members may employ information regarding the current environment state (e.g., deadline length, number of competitors, team size, beliefs regarding the opponent, etc.) in order to decide on the most appropriate intra-team strategy. For this matter, it may be necessary to carry out simulation studies in order to discover under what circumstances some intra-team strategies perform better than others. The scarce research in negotiation teams has gone in that direction. We have identified that even though some studies exist that identify good practices and good strategies for sin- gle individual parties, the area remains largely unexplored for intra-team strategies. Moreover, if the intra-team strategy requires role differenti- ation, techniques from role/task allocation may be employed. However, it should be considered that agents may not be fully cooperative, which is the usual approach in role/task allocation. Thus, the problem slightly differs from classic role/task allocation. • Select Individual Strategy: Intra-team strategies define team dynam- ics, but they do not define the individual behavior of team members per se. The next step consists of each team member individually deciding the most appropriate individual behavior for the negotiation at hand. This task may not pose additional difficulties compared with the selection of the individual negotiation strategy in classic negotiation literature. • Negotiation & Adaptation: The final task consists of negotiating and adapting in order to face unexpected events properly. We have identified three special challenges. The first of them is team membership adaptation. The second challenge that needs some consideration is adapting negotia- tion issues. Parties can solve impasses in the negotiation and better off other parties by including other issues that were not initially included in the negotiation. As far as we are concerned, this problem has not been widely studied in multi-agent literature. The third and final challenge that we consider is the adaptation of the intra-team strategy and the individ- ual strategy. Usually, team members have planned on using an intra-team strategy and an individual strategy based on some initial prediction of the negotiation environment, opponents, and teammates' behavior. How- ever, based on new evidence, initial predictions may prove wrong and adjustments need to be done in order to properly tackle the negotiation. In automated negotiation, some works exist that allow single individual parties to adapt themselves to changes in the negotiation environment and new predictions. However, these mechanisms need to be adapted for the team case since interactions among team members also influence the negotiation. Therefore, it is observable that some issues remain open and they need to be 29 solved before deploying full-fledged applications that make use of agent-based negotiation teams. In this article, we have observed that despite these open issues, technology exists that can be adapted in the near future to solve the aforementioned challenges. We expect that, due to inherent social component of negotiating as a group, the deployment of applications supporting agent- based negotiation teams can specially benefit from social networks. For instance, travel services are classically offered to individuals in Web sites. Even though it is possible to purchase travel services for multiple individuals, usually the process only involves interactions with one single user, leaving the intra-team negotiation, if any, to human users. Human negotiations may be time consuming and costly in cognitive terms. A social network for travelers that introduces computational models for negotiation teams may help to avoid these problems. In this social network, users may indicate to their personal agents their desire to go on a travel together. Then, the agents help users from the initial stages of forming a group of travelers (i.e., a negotiation team) to the later stages where the group of agents looks for appealing travel agreements with different travel agencies. The general scheme of this social application can be extrapolated to other domains involving purchases in group. Another future application that may be supported by agent-based nego- tiation teams is management of complex democractic organizations. For ex- ample, agricultural cooperatives are supposed to be democratic institutions where groups of farmers join together to save resources for the distribution of their products. One of the main problems of agricultural cooperatives is the principal-agent problem [109]. Basically, despite being democratic institutions, agricultural cooperatives are managed by a board of directors who take decisions on behalf of the democratic institution. It has been reported in the literature [109] that dissatisfaction in cooperatives comes from the fact that the goals of members are not aligned with those of the managers. Agent-based negotiation teams may provide support for part of the processes that are carried out by cooperatives. For instance, the negotiations between agricultural cooperatives and distributors may be supported by an electronic market where the agricul- tural cooperative is modeled as an agent-based negotiation team. Each member may be represented by an electronic and personal agent that participates in the negotiation team according to the preferences of its owner. For this kind of application, it is specially important to provide scalable models for agent-based negotiation teams. We hope that with this article, the reader can be introduced to the novel topic of agent-based negotiation teams and that it facilitates their work towards building successful agent-based negotiation teams. As of today, our work has focused on designing new intra-team strategies for negotiation teams. We plan to extend our present research with new intra-team strategies, and additional phases of the proposed workflow like team formation based on agents' prefer- ences. 30 Acknowledgements This work is supported by TIN2011-27652-C03-01 and TIN2012-36586-C03- 01 of the Spanish government. References [1] D. G. Pruitt, Negotiation Behavior, Academic Press, 1981. [2] S. S. Fatima, M. J. Wooldridge, N. R. Jennings, An agenda-based frame- work for multi-issue negotiation, Artificial Intelligence 152 (1) (2004) 1–45. [3] Y. In, R. Serrano, Agenda restrictions in multi-issue bargaining (ii): un- restricted agendas, Economics Letters 79 (3) (2003) 325–331. [4] N. Gatti, Game theoretic models for strategic bargaining, in: Negotiation and Argumentation in Multi-Agent Systems, Bentham Science, 2011. URL http://home.dei.polimi.it/ngatti/ [5] S. Kraus, Negotiation and cooperation in multi-agent environments, Ar- tificial Intelligence 94 (1-2) (1997) 79–97. [6] N. R. Jennings, P. Faratin, A. R. Lomuscio, S. Parsons, M. J. Wooldridge, C. Sierra, Automated negotiation: Prospects, methods and challenges, Group Decision and Negotiation 10 (Mar 2001) 199–215. [7] L. Thompson, E. Peterson, S. Brodt, Team negotiation: An examina- tion of integrative and distributive bargaining, Journal of Personality and Social Psychology 70 (1) (1996) 66–78. [8] E. Peterson, L. Thompson, Negotiation teamwork: The impact of infor- mation distribution and accountability on performance depends on the relationship among team members, Organizational Behavior and Human Decision Processes 72 (3) (1997) 364–383. [9] S. Brodt, L. Thompson, Negotiating teams: A levels of analysis, Group Dynamics 5 (3) (2001) 208–219. [10] V. Sanchez-Anguix, V. Julian, V. Botti, A. Garcia-Fornes, Towards agent- based negotiation teams, in: Working Conference on Human Factors and Computational Models for Negotiation at Group Decision and Negotiation (HuCom@GDN2010), 2010, pp. 328–331. [11] V. Sanchez-Anguix, V. Julian, V. Botti, A. Garcia-Fornes, Studying the Impact of Negotiation Environments on Negotiation Teams' Performance, Information Sciences 219 (2013) 17–40. [12] V. Sanchez-Anguix, V. Julian, V. Botti, A. Garcia-Fornes, Reaching Unanimous Agreements within Agent-Based Negotiation Teams with Lin- ear and Monotonic Utility Functions, IEEE Transactions on Systems, Man and Cybernetics, Part B 42 (3) (2012) 778–792. 31 [13] V. Sanchez-Anguix, T. Dai, Z. Semnani-Azad, K. Sycara, V. Botti, Mod- eling power distance and individualism/collectivism in negotiation team dynamics, in: 45 Hawaii International Conference on System Sciences (HICSS-45), 2012, pp. 628–637. [14] V. Sanchez-Anguix, R. Aydogan, V. Julian, C. M. Jonker, Analysis of Intra-Team Strategies for Teams Negotiating Against Competitor, Match- ers, and Conceders, in: The 5th International Workshop on Agent-based Complex Automated Negotiations (ACAN 2012), 2012, pp. 1–8. [15] G. Browder, An analysis of the negotiations for the 1995 mekong agree- ment, International Negotiation 5 (2) (2000) 237–261. [16] K. O'Connor, Groups and solos in context: The effects of accountability on team negotiation, Organizational Behavior and Human Decision Processes 72 (3) (1997) 384–407. [17] M. J. Gelfand, J. M. Brett, L. Imai, H. Tsai, D. Huang, Team negotiation across cultures: When and where are two heads better than one?, in: Proceedings of 18th Annual Conference for the International Association for Conflict Management (IACM-2005), 2005. URL http://dx.doi.org/10.2139/ssrn.735003 [18] K. Behfar, R. A. Friedman, J. M. Brett, The team negotiation challenge: Defining and managing the internal challenges of negotiating teams, in: Proceedings of the 21st Annual Conference for the International Associa- tion for Conflict Management (IACM-2008), 2008. URL http://dx.doi.org/10.2139/ssrn.1298512 [19] E. Mannix, Strength in numbers: Negotiating as a team, Negotiation 8 (5) (2005) 3–5. [20] L. Thompson, The Mind and heart of the negotiator, Prentice Hall Press, Upper Saddle River, NJ, USA, 2005. [21] S. E. Brodt, M. Tuchinsky, Working together but in opposition: An exam- ination of the good-cop/bad-cop negotiating team tactic, Organizational Behavior and Human Decision Processes 81 (2) (2000) 155 – 177. [22] N. Halevy, Team negotiation: Social, epistemic, economic, and psycholog- ical consequences of subgroup conflict, Personality and Social Psychology Bulletin 34 (2008) 1687–1702. [23] H. Taylor, Most people are privacy pragmatists who, while concerned about privacy, will sometimes trade it off for other benefits, The Harris Poll 17 (2003) 19. [24] R. G. Smith, The contract net protocol: High-level communication and control in a distributed problem solver, Computers, IEEE Transactions on 100 (12) (1980) 1104–1113. 32 [25] T. Sandholm, An implementation of the contract net protocol based on marginal cost calculations, in: Proceedings of the eleventh national con- ference on Artificial intelligence, AAAI Press, 1993, pp. 256–262. [26] T. Nguyen, N. Jennings, Coordinating multiple concurrent negotiations, in: Proceedings of the Third International Joint Conference on Au- tonomous Agents and Multiagent Systems, IEEE Computer Society, 2004, pp. 1064–1071. [27] B. An, K. Sim, L. Tang, S. Li, et al., Continuous-time negotiation mech- anism for software agents, Systems, Man, and Cybernetics, Part B: Cy- bernetics, IEEE Transactions on 36 (6) (2006) 1261–1272. [28] Y. Shoham, K. Leyton-Brown, Multiagent systems: Algorithmic, game- theoretic, and logical foundations, Cambridge University Press, 2009. [29] C. R. Williams, V. Robu, E. H. Gerding, N. R. Jennings, Negotiating concurrently with unknown opponents in complex, real-time domains, in: 20th European Conference on Artificial Intelligence, Vol. 242, 2012, pp. 834–839. [30] K. Mansour, R. Kowalczyk, A meta-strategy for coordinating of one-to- many negotiation over multiple issues, in: Foundations of Intelligent Sys- tems, Vol. 122, Springer Berlin / Heidelberg, 2012, pp. 343–353. [31] C. Beam, A. Segev, Automated negotiations: A survey of the state of the art, Wirtschaftsinformatik 39 (3) (1997) 263–268. [32] R. H. Guttman, A. G. Moukas, P. Maes, Agent-mediated electronic com- merce: a survey, Knowledge Engineering Review 13 (2) (1998) 147–159. [33] A. R. Lomuscio, M. Wooldridge, N. R. Jennings, A classification scheme for negotiation in electronic commerce, Group Decision and Negotiation 12 (2003) 31–56. [34] M. He, N. R. Jennings, H. Leung, On agent-mediated electronic commerce, IEEE Trans on Knowledge and Data Engineering 15 (4) (2003) 985–1003. [35] F. Lopes, M. Wooldridge, A. Novais, Negotiation among autonomous com- putational agents: principles, analysis and challenges, Artificial Intelli- gence Review 29 (1) (2008) 1–44. [36] X. Luo, C. Miao, N. R. Jennings, M. He, Z. Shen, M. Zhang, Kemnad: A knowledge engineering methodology for negotiating agent development, Computational Intelligence 28 (1) (2012) 51–105. [37] C. Tomlin, G. Pappas, S. Sastry, Conflict resolution for air traffic man- agement: A study in multiagent hybrid systems, IEEE Transactions on Automatic Control 43 (4) (1998) 509–521. 33 [38] J. Chu-Carroll, S. Carberry, Conflict resolution in collaborative planning dialogs, International Journal of Human-Computer Studies 53 (6) (2000) 969 – 1015. [39] K. Barber, T. Liu, S. Ramaswamy, Conflict detection during plan integra- tion for multi-agent systems, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 31 (4) (2001) 616–628. [40] S. Wollkind, J. Valasek, T. Ioerger, Automated conflict resolution for air traffic management using cooperative multiagent negotiation, in: AIAA guidance, navigation, and control conference, 2004, pp. 1–11. [41] F. Lopes, N. Mamede, A. Novais, H. Coelho, A negotiation model for au- tonomous computational agents: Formal description and empirical evalu- ation, Journal of Intelligent & Fuzzy Systems 12 (3) (2002) 195–212. [42] D. Sarne, E. Manisterski, S. Kraus, Multi-goal economic search using dynamic search structures, Autonomous Agents and Multi-Agent Systems 21 (2010) 204–236. [43] E. D. Val, M. Rebollo, V. Botti, Self-organized service management in social systems, in: Proceedings of the 45 Hawaii International Conference on System Sciences (HICSS 2012), 2012, pp. 810–817. [44] R. Lopez de Mantaras, Case-based reasoning, in: Machine Learning and Its Applications, Vol. 2049 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2001, pp. 127–145. [45] T. Sandhlom, V. Lesser, Coalitions among computationally bounded agents, Artificial Intelligence 94 (1) (1997) 99–137. [46] V. Conitzer, T. Sandholm, Computing shapley values, manipulating value division schemes, and checking core membership in multi-issue domains, in: Proceedings of the 19th national conference on Artifical intelligence (AAAI 2004), AAAI Press, 2004, pp. 219–225. [47] N. Ohta, V. Conitzer, Y. Satoh, A. Iwasaki, M. Yokoo, Anonymity-proof shapley value: extending shapley value for coalitional games in open en- vironments, in: Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems, International Foundation for Autonomous Agents and Multiagent Systems, 2008, pp. 927–934. [48] Y. Zick, E. Elkind, Arbitrators in overlapping coalition formation games, in: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'11), International Foundation for Autonomous Agents and Multiagent Systems, 2011, pp. 55–62. [49] T. Rahwan, T. Michalak, E. Elkind, P. Faliszewski, J. Sroka, M. Wooldridge, N. Jennings, Constrained coalition formation, in: Twenty Fifth AAAI Conference on Artificial Intelligence (AAAI), 2011, pp. 719– 725. 34 [50] T. Rahwan, Algorithms for coalition formation in multi-agent systems, Ph.D. thesis, University of Southampton (2007). [51] T. Rahwan, S. D. Ramchurn, N. R. Jennings, A. Giovannucci, An anytime algorithm for optimal coalition structure generation, Journal of Artificial Intelligence Research 34 (1) (2009) 521–567. [52] M. Tsvetovat, K. Sycara, Y. Chen, J. Ying, Customer coalitions in elec- tronic markets, in: Agent-Mediated Electronic Commerce III, Vol. 2003 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2001, pp. 121–138. [53] J. Yamamoto, K. Sycara, A stable and efficient buyer coalition forma- tion scheme for e-marketplaces, in: Proceedings of the fifth international conference on Autonomous agents (AGENTS'01), ACM, New York, NY, USA, 2001, pp. 576–583. [54] T. Ito, H. Ochi, T. Shintani, A group-buy protocol based on coalition formation for agent-mediated e-commerce, International Journal of Com- puter and Information Science 3 (1) (2002) 11–20. [55] C. Li, U. Rajan, S. Chawla, K. Sycara, Mechanisms for coalition formation and cost sharing in an electronic marketplace, in: Proceedings of the 5th international conference on Electronic commerce (ICEC'03), ACM, New York, NY, USA, 2003, pp. 68–77. [56] L. He, T. Ioerger, Combining bundle search with buyer coalition forma- tion in electronic markets: A distributed approach through explicit ne- gotiation, Electronic Commerce Research and Applications 4 (4) (2006) 329–344. [57] P. Cohen, H. Levesque, I. Smith, On team formation, in: Contemporary Action Theory. Synthese, Kluwer Academic Publishers, 1999, pp. 87–114. [58] F. Dignum, B. Dunin-Keplicz, R. Verbrugge, Agent theory for team for- mation by dialogue, in: Proceedings of the 7th International Workshop on Intelligent Agents VII. Agent Theories Architectures and Languages (ATAL'00), Springer-Verlag, London, UK, 2001, pp. 150–166. [59] M. E. Gaston, M. desJardins, Agent-organized networks for dynamic team formation, in: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems (AAMAS'05), ACM, New York, NY, USA, 2005, pp. 230–237. [60] C. Badica, S. Ilie, M. Kamermans, G. Pavlin, A. Penders, M. Scafes, Multi-agent systems, ontologies and negotiation for dynamic service com- position in multi-organizational environmental management, in: Software Agents, Agent Systems and Their Applications, 2012, pp. 286–306. 35 [61] K. Sycara, G. Sukthankar, Literature review of teamwork models, CMU- RI-TR-06-50. [62] B. Rezabakhsh, D. Bornemann, U. Hansen, U. Schrader, Consumer power: A comparison of the old economy and the internet economy, Journal of Consumer Policy 29 (2006) 3–36. [63] J. Sabater, C. Sierra, Review on computational trust and reputation mod- els, Artificial Intelligence Review 24 (1) (2005) 33–60. [64] S. Younger, Reciprocity, sanctions, and the development of mutual obli- gation in egalitarian societies, Journal of Artificial Societies and Social Simulation 8 (2). URL http://jasss.soc.surrey.ac.uk/8/2/9.html [65] A. Perreau de Pinninck, C. Sierra, M. Schorlemmer, Distributed norm en- forcement: Ostracism in open multi-agent systems, in: Computable Mod- els of the Law, Vol. 4884 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2008, pp. 275–290. [66] J. Brzostowski, R. Kowalczyk, Experimental evaluation of possibilistic mechanism for negotiation partners selection, in: Rational, Robust, and Secure Negotiations in Multi-Agent Systems, Vol. 89, Springer Berlin / Heidelberg, 2008, pp. 127–145. [67] J. Schafer, D. Frankowski, J. Herlocker, S. Sen, Collaborative filtering recommender systems, in: The Adaptive Web, Vol. 4321 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2007, pp. 291–324. [68] J. M. Such, A. Espinosa, A. Garcia-Fornes, V. Botti, Partial identities as a foundation for trust and reputation, Engineering Applications of Artificial Intelligence 24 (7) (2011) 1128–1136. [69] S. Koc-Menard, Team performance in negotiation: a relational approach, Team Performance Management 15 (7-8) (2009) 357–365. [70] H. Nurmi, Voting systems for social choice, Handbook of Group Decision and Negotiation (2010) 167–182. [71] P. McBurney, D. Hitchcock, S. Parsons, The eightfold way of deliberation dialogue, International Journal of Intelligent Systems 22 (1) (2007) 95– 132. [72] S. Heras, J. Jord´an, V. Botti, V. Julian, Argue to Agree: A Case-Based Argumentation Approach, International Journal of Approximate Reason- ing 54 (1) (2013) 82–108. [73] R. Booth, Social contraction and belief negotiation, Information Fusion 7 (1) (2006) 19–34. 36 [74] G. Qi, W. Liu, D. Bell, Combining multiple prioritized knowledge bases by negotiation, Fuzzy Sets and Systems 158 (23) (2007) 2535–2551. [75] P. Everaere, S. Konieczny, P. Marquis, et al., The strategy-proofness land- scape of merging, Journal of Artificial Intelligence Research 28 (1) (2007) 49–105. [76] S. Konieczny, R. Pino P´erez, Logic based merging, Journal of Philosoph- ical Logic 40 (2) (2011) 239–270. [77] J. M. Such, A. Espinosa, A. Garcia-Fornes, C. Sierra, Self-disclosure De- cision Making based on Intimacy and Privacy, Information Sciences 211 93–111. [78] P. Faratin, Automated service negotiation between autonomous compu- tational agents, Ph.D. thesis, University of London (2000). [79] A. Rubinstein, Perfect equilibrium in a bargaining model, Econometrica 50 (1982) 155–162. [80] G. Lai, K. Sycara, C. Li, A decentralized model for automated multi- attribute negotiations with incomplete information and general utility functions, Multiagent and Grid Systems 4 (1) (2008) 45–65. [81] X. Luo, N. Jennings, N. Shadbolt, H. Leung, J. Lee, A fuzzy constraint based model for bilateral, multi-issue negotiations in semi-competitive en- vironments, Artificial Intelligence 148 (1) (2003) 53–102. [82] L. Pan, X. Luo, X. Meng, C. Miao, M. He, X. Guo, A two-stage win– win multiattribute negotiation model: Optimization and then concession, Computational Intelligence (2012) In Press. URL http://dx.doi.org/10.1111/j.1467-8640.2012.00434.x [83] M. Klein, P. Faratin, H. Sayama, Y. Bar-Yam, Negotiating complex con- tracts, Group Decision and Negotiation 12 (2003) 111–125. [84] T. Ito, M. Klein, H. Hattori, A multi-issue negotiation protocol among agents with nonlinear utility functions, Multiagent and Grid Systems 4 (1) (2008) 67–83. [85] J. R. Oliver, On artificial agents for negotiation in electronic commerce, in: The 29 Hawaii International Conference on System Sciences (HICSS'96), Vol. 4, IEEE Computer Society, Washington, DC, USA, 1996, pp. 337– 346. [86] N. Matos, C. Sierra, N. R. Jennings, Determining successful negotiation strategies: An evolutionary approach, in: The 3rd International Con- ference on Multi Agent Systems (ICMAS '98), IEEE Computer Society, Washington, DC, USA, 1998, pp. 182–189. 37 [87] T. Tu, E. Wolff, W. Lamersdorf, Genetic algorithms for automated nego- tiations: A fsm-based application approach, in: Proceedings of the 11th International Conference on Database and Expert Systems (DEXA 2000), IEEE, 2000, pp. 1029–1033. [88] E. Gerding, D. Van Bragt, H. La Poutr´e, Multi-issue negotiation processes by evolutionary simulation, validation and social extensions, Computa- tional Economics 22 (1) (2003) 39–63. [89] R. Nair, M. Tambe, S. Marsella, Role allocation and reallocation in multi- agent teams: Towards a practical analysis, in: Proceedings of the second international joint conference on Autonomous agents and multiagent sys- tems, ACM, 2003, pp. 552–559. [90] M. Hoogendoorn, C. Jonker, Formation of virtual organizations through negotiation, in: Multiagent System Technologies, Vol. 4196 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2006, pp. 135– 146. [91] B. J. Grosz, S. Kraus, D. G. Sullivan, S. Das, The influence of social norms and social consciousness on intention reconciliation, Artificial Intelligence 142 (2) (2002) 147 – 177. [92] P. Paruchuri, M. Tambe, S. Kapetanakis, S. Kraus, Between collaboration and competition: An initial formalization using distributed pomdps, in: Proceedings of the GTDT workshop at AAMAS-2003, 2007. URL http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1. 2.5244 [93] B. Spector, Creativity heuristics for impasse resolution: Reframing in- tractable negotiations, The Annals of the American Academy of Political and Social Science 542 (1) (1995) 81–99. [94] L. Babcock, G. Loewenstein, Explaining bargaining impasse: The role of self-serving biases, The Journal of Economic Perspectives 11 (1) (1997) 109–126. [95] R. Tollison, T. Willett, An economic theory of mutually advantageous issue linkages in international negotiations, International Organization 33 (4) (1979) 425–449. [96] J. Sebenius, Negotiation arithmetic: adding and subtracting issues and parties, International Organization 37 (2) (1983) 281–316. [97] T. Morgan, Issue linkages in international crisis bargaining, American Journal of Political Science 34 (2) (1990) 311–333. [98] K. M. Sim, C. Y. Choi, Agents that react to changing market situations, IEEE Transactions on on Systems, Man, and Cybernetics, Part B: Cyber- netics 33 (2) (2003) 188 – 201. 38 [99] C. Li, J. Giampapa, K. Sycara, Bilateral negotiation decisions with uncer- tain dynamic outside options, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 36 (1) (2006) 31–44. [100] B. An, K. M. Sim, C. Y. Miao, Z. Q. Shen, Decision making of negotiation agents using markov chains, Multiagent and Grid Systems 4 (1) (2008) 5– 23. [101] F. Ren, M. Zhang, K. Sim, Adaptive conceding strategies for automated trading agents in dynamic, open markets, Decision Support Systems 46 (3) (2009) 704–716. [102] B. An, V. Lesser, D. Irwin, M. Zink, Automated negotiation with de- commitment for dynamic resource allocation in cloud computing, in: Pro- ceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems, 2010, pp. 981–988. [103] F. Ren, M. Zhang, X. Luo, D. Soetanto, A parallel, multi-issue negoti- ation model in dynamic e-markets, in: AI 2011: Advances in Artificial Intelligence, Springer, 2011, pp. 442–451. [104] V. Robu, D. J. A. Somefun, J. A. La Poutr´e, Modeling complex multi- issue negotiations using utility graphs, in: Proceedings of the fourth inter- national joint conference on Autonomous agents and multiagent systems (AAMAS'05), ACM, New York, NY, USA, 2005, pp. 280–287. [105] V. Robu, J. A. La Poutr´e, Retrieving the structure of utility graphs used in multi-item negotiation through collaborative filtering of aggregate buyer preferences, in: Rational, Robust and Secure Negotiations, Vol. 89 of Computational Intelligence, Springer, 2008. [106] V. Narayanan, N. R. Jennings, Learning to negotiate optimally in non- stationary environments, in: Cooperative Information Agents X, 10th In- ternational Workshop, CIA 2006, Edinburgh, UK, September 11-13, 2006, Proceedings, Vol. 4149 of Lecture Notes in Computer Science, Springer, 2006, pp. 288–300. [107] K. V. Hindriks, D. Tykhonov, Opponent modelling in automated multi- issue negotiation using bayesian learning, in: The 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'08), International Foundation for Autonomous Agents and Multiagent Sys- tems, Richland, SC, 2008, pp. 331–338. [108] C. Williams, V. Robu, E. Gerding, N. Jennings, Using gaussian processes to optimise concession in complex negotiations against unknown oppo- nents, in: Proceedings of the 22nd International Joint Conference on Ar- tificial Intelligence (IJCAI'11), 2011, pp. 432–438. [109] G. Ortmann, R. King, Agricultural cooperatives i: history, theory and problems, Agrekon 46 (1) (2007) 18–46. 39
1710.03354
1
1710
2017-10-10T00:00:03
The Role of Data-driven Priors in Multi-agent Crowd Trajectory Estimation
[ "cs.MA" ]
Trajectory interpolation, the process of filling-in the gaps and removing noise from observed agent trajectories, is an essential task for the motion inference in multi-agent setting. A desired trajectory interpolation method should be robust to noise, changes in environments or agent densities, while also being yielding realistic group movement behaviors. Such realistic behaviors are, however, challenging to model as they require avoidance of agent-agent or agent-environment collisions and, at the same time, seek computational efficiency. In this paper, we propose a novel framework composed of data-driven priors (local, global or combined) and an efficient optimization strategy for multi-agent trajectory interpolation. The data-driven priors implicitly encode the dependencies of movements of multiple agents and the collision-avoiding desiderata, enabling elimination of costly pairwise collision constraints and resulting in reduced computational complexity and often improved estimation. Various combinations of priors and optimization algorithms are evaluated in comprehensive simulated experiments. Our experimental results reveal important insights, including the significance of the global flow prior and the lesser-than-expected influence of data-driven collision priors.
cs.MA
cs
The Role of Data-driven Priors in Multi-agent Crowd Trajectory Estimation Gang Qiao1, Sejong Yoon2, Mubbasir Kapadia1, Vladimir Pavlovic1 1Rutgers University, 2The College of New Jersey {gq19, mk1353, vladimir}@cs.rutgers.edu, [email protected] 7 1 0 2 t c O 0 1 ] A M . s c [ 1 v 4 5 3 3 0 . 0 1 7 1 : v i X r a Abstract Trajectory interpolation, the process of filling-in the gaps and removing noise from observed agent trajectories, is an essen- tial task for the motion inference in multi-agent setting. A desired trajectory interpolation method should be robust to noise, changes in environments or agent densities, while also being yielding realistic group movement behaviors. Such re- alistic behaviors are, however, challenging to model as they require avoidance of agent-agent or agent-environment col- lisions and, at the same time, seek computational efficiency. In this paper, we propose a novel framework composed of data-driven priors (local, global or combined) and an effi- cient optimization strategy for multi-agent trajectory interpo- lation. The data-driven priors implicitly encode the depen- dencies of movements of multiple agents and the collision- avoiding desiderata, enabling elimination of costly pairwise collision constraints and resulting in reduced computational complexity and often improved estimation. Various combina- tions of priors and optimization algorithms are evaluated in comprehensive simulated experiments. Our experimental re- sults reveal important insights, including the significance of the global flow prior and the lesser-than-expected influence of data-driven collision priors. Introduction In a multi-agent scenario, a tracking system deployed on an observing, moving or stationary agent (camera), needs to estimate complete trajectories of other moving agents (people, robots, crowds) c.f., (Bera and Manocha 2014; Bera, Kim, and Manocha 2015). However, direct tracker out- put of the observing agent is often insufficient to reconstruct accurate trajectories because of factors such as noise, the environmental configuration, density of agents in a crowd, or hardware failures. For instance, during the movement of multiple agents in a complex scenario, there are inevitable inter-agent occlusions and agent-obstacle occlusions from the perspective of the observing agent, resulting in observed trajectories that are both noisy and incomplete. To obtain high-quality complete trajectories, tracking sys- tems typically adopt a multi-step strategy. First, the sensor deployed on the observing agent detects and tracks objects in its neighboring area to obtain local tracklets, continuous but short trajectories, of other moving agents. The tracklets of specific agents are then linked together by applying track- let similarity measurements and re-identification algorithms (e.g., min-cost flow). Next, a trajectory interpolation algo- rithm is applied to fill in the gaps between the linked track- lets, in a way that the filled portions present desired realis- tic properties such as containing few potential collisions and saving energy. Finally, trajectory extrapolation could be ap- plied to the reconstructed trajectories so that the observing agent can further plan its own motion. While several trajectory interpolation approaches have been proposed to-date (Rodriguez et al. 2011; Sharma, Huang, and Nevatia 2012; Bera and Manocha 2014), few have proven to work robustly in a general setting, often exhibiting slow performance and inability to tackle com- plex scenarios. In practice, many real-time tracking sys- tems typically trade-off accuracy largely for speed (Bera and Manocha 2014). In addition, few approaches attempt to in- tegrate realistic data-driven priors into the estimation frame- work except for few very recent attempts in simulation and content generation community (Bera, Kim, and Manocha 2016), resulting in interpolated trajectories that fail to match typical realistic crowd behaviors. In this work we aim to develop a multi-agent trajectory interpolation method of low complexity that results in realis- tic agent trajectory estimates. To that end, we propose a new multi-agent trajectory interpolation framework composed of a data-driven prior (either local, global or the combination thereof) and an optimization algorithm. The data prior im- plicitly encodes the movement dependencies of multiple agents and thus can decouple individual agent trajectories, resulting in reduced computational complexity while main- taining or improving the quality of estimation. We evaluate different combinations of prior representations in simulated experiments and demonstrate the essential role of these pri- ors to accomplish the low-complexity, high-accuracy multi- agent trajectory estimation task. Prior Work Modeling, simulation and analysis of crowd motion have at- tracted significant interest in research community over the past years, e.g. (Jacques Junior, Raupp Musse, and Jung 2010; Ali et al. 2013; Kapadia, Pelechano, and Allbeck 2015). We refer readers to survey papers for important works in this area (Zhan et al. 2008; Li et al. 2015). In the follow- manathan, and Fei-Fei 2014) proposed origin-destination priors to enhance trajectory estimation performance in the context of global optimization-based data-driven methods. They introduced a handcrafted feature called social affin- ity map (SAM) to capture relative adjoining positions of a number of people within a limited area, by computing the histograms of a number of agents in that region. In contrast, our global optimization framework allows to describe the motion patterns of crowds in a complex scenario within the visibility area of an agent that incorporates much richer in- formation (e.g., the configuration of the environmental ob- stacles, the shapes and velocities of the agents, rather than a histogram of agent numbers in 2D space) than SAM fea- ture. Obtaining high-quality simulation data of crowd mo- tion is an important aspect in the context of data-driven crowd trajectory estimation, with many solutions proposed in the graphics community (Kapadia, Pelechano, and All- beck 2015). Since crowd simulation, tracking and trajectory estimation are closely related, crowd simulators (Helbing and Moln´ar 1995; van den Berg, Lin, and Manocha 2008) may be utilized as the source of motion priors or training data for motion prior models necessary to improve the track- ing accuracy (Lerner, Chrysanthou, and Lischinski 2007). Neural Network-based Methods. The work in (Long, Liu, and Pan 2017) introduced an approach for data-driven collision-minimizing motion planning. In this approach a neural network (NN) is trained from examples of collision- free behaviors, aimed at cloning the Optimal Reciprocal Collision Avoidance (ORCA) policy (van den Berg et al. 2011), which provides a sufficient condition for avoiding collisions if the agents are not densely packed, otherwise ORCA has to select a reasonable velocity. However, this method can not mimic the movement behavior well without a large amount of training samples. Even with large train- ing sets, emphasizing realistic behaviors such as collision minimization is still difficult, since behavior cloning gen- erates only rough imitations while ignoring some detailed properties without environmental interactions to reinforce those properties. In contrast, our approach can embed var- ious priors, including not only the neural network based lo- cal prior, but also globally informed probabilistic velocity priors (see Sec. ) that are critical for proper behaviors, into a trajectory interpolation framework. This leads to an advan- tage over either ORCA or neural network-based behavior cloning, resulting in a framework that can handle large por- tions of missing trajectories. Notation t; si t; yi We use the following notation to define the framework. Typ- ical tracker output at a specific time point is represented with location and a timestamp. For 2D trackers, the triple t] specifies the x-y location and the corresponding [xi timestamp of agent i at video frame (time step) t. In this work, we assume a uniform temporal grid with a fixed tem- poral gap between each consecutive pair of frames of a tra- jectory. Under this assumption, we can omit the timestamp t from the triple. si Figure 1: Overview of the proposed framework. A tracker generates noisy and missing trajectories due to occlusions or sensor failure. Our approach takes such observations and applies a global optimization-based trajectory interpolation framework, which incorporates data-driven priors from a model trained on trajectories generated by crowd simulator. Outcome of the optimization (updated trajectories) can be used as new observations to obtain new priors for iteratively improving the tracking performance. ing, discuss related work on crowd motion modeling and es- timation in context of the trajectory interpolation problem. Crowd Motion and Tracking. It is common to introduce a motion prior to improve pedestrian tracking accuracy (Hu, Ali, and Shah 2008; Ali and Shah 2008; Rodriguez, Ali, and Kanade 2009). The Social Force model (Helbing and Moln´ar 1995) has been one particularly popular choice (Pellegrini et al. 2009; Pellegrini et al. 2010), that represents individ- ual dynamic behavior as a combination of different types of forces that characterize both attractive and repulsive ef- fects between pairs of agents or between an agent and an obstacle (an obstacle could be viewed as a static agent with its own shape). Extensions include the multi-target tracking model (Pellegrini and Gool 2013) that incorporates several different priors such as appearance, physical constraints and social behavior of pedestrians. Bera and Manocha (Bera and Manocha 2014; Bera, Kim, and Manocha 2015) introduced a real-time algorithm for trajectory estimation, which works in medium density crowds using particle filtering. Their ap- proach relies on a multi-agent motion model called velocity obstacle (van den Berg, Lin, and Manocha 2008) that delim- its a space of relative velocity within which collision free behavior is guaranteed for a certain period of time. Simi- lar to these model-based approaches (Pellegrini et al. 2009; Bera, Kim, and Manocha 2015), our approach also relies on a synthetic simulator to provide motion priors for crowd trajectory estimation, but it utilizes the prior as a term within a modified global optimization framework of (Yoon et al. 2016), which is different from the aforementioned ap- proaches. In this way, complex dependencies of movements are implicitly encoded in the prior to decouple trajectories while the optimization provides flexibility of incorporating desired properties in the objective to capture more realistic behaviors. Crowd Trajectory Estimation. Alahi et al. (Alahi, Ra- t (cid:9)T (cid:9)T i=1, where Xi = (cid:8)xi i=1, Oi =(cid:8)oi Our goal is to estimate a set of trajectories for N agents {Xi}N t=1 is the desired but unob- served trajectory of agent i. We will be estimating {Xi}N i=1 from the corresponding observed fragments of trajectories {Oi}N t=1, with noisy and missing portions. We use the term tracklet to refer an observed continuous fragment of a trajectory, and we assume known identifica- tion (i.e., correspondences between measurements and esti- mates) of all tracklets. Let ∆t denote the sampling period between two consecutive samples t and t − 1, and vi t de- note the true average velocity of agent i over time interval [t − 1, t], thus xi t. Index t = 0 indicates known initial position of each agent, xi 0. t−1 + ∆t · vi t = xi t Data Driven Priors We consider two types of data driven priors: local collision avoidance priors and global flow priors. We next described these priors and how they will be used in the global opti- mization framework. Local Collision Avoidance Prior The goal of utilizing local collision avoidance priors is to effectively replace the collision constraints in (Yoon et al. 2016). We will use the data driven regression approach that aims to estimate the velocity vi of agent i at space-time point xi as vi t+1 = fN N t,N N , vi t (1) (cid:12)(cid:12) θN N (cid:1) , (cid:0) oi where oi t,N N is the local measurement which encodes local visibility of the state space of agent i and θN N is the param- eter of the model. Similar to (Long, Liu, and Pan 2017), the ot,N N generally includes the following three components: (a) 2D desired ve- locity: we assume that each agent receives a global velocity guidance signal vi t. This signal is typically a velocity vector pointing toward the goal position of each agent, while dis- regarding local environment geometry or other agents. (b) Local range/occupancy map: we assume that each agent is equipped with a 360-dimensional distance scanner to col- lect distances to surface points of other agents and obstacles within a certain range. Within the distance map relative po- sitions and shapes of the environmental configurations and other agents are explicitly encoded as distances along a 360 degree circularly sampled grid. (c) 360 × 2 dimensional ve- locity map: in addition to aforementioned distances to other agents or obstacles, we also assume the local velocity mea- surements of neighboring agents or obstacles. Global Flow Prior In a multi-agent setting, individual agent movement typi- cally follows a flow pattern that depends on the environ- ment and obstacles, other agents and their density, as well as the global movement goal. This pattern can be encoded in a global flow-field. While one could obtain it from a path plan- ning algorithms, we instead use a data driven approach to capture the global flow field patterns. Specifically, we model the flow field as a random walk encoded by a Gaussian Pro- cess (GP) prior: t + δi(cid:0)xi t (cid:1) , where (cid:0)xi t δi x xi t+∆t = xi (cid:1) ∼ GP(cid:0)δxi t, st t, Xtrain, θGP (cid:1) . (2) (3) t) is the "global" velocity of agent i at frame t, and δi x(xi t denotes the predicted standard deviation of the GP. The st GP will now model the data-prior velocity field in (x, y, s) space, similar to (Kim, Lee, and Essa 2011). Xtrain denotes the trajectory data used to train the GP model and θGP the model hyper-parameter. Embedding Priors into Multi-agent Optimization Framework The essence of the multi-agent optimization framework is to estimate (interpolate) the trajectories of a set of N agents X from some set of observations O, given a partially observ- able environment Z, P r (XO, Z). In (Yoon et al. 2016), this problem is formulated as a MAP estimation problem by minimizing the following Gibbs energy u(xi, vioi) + Ei Ei,j p (xi, vi, xj, vj), (4) (cid:88) (cid:88) i(cid:54)=j i (cid:88) i u is the energy term related to an individual agent i where Ei p denotes the pairwise energy term de- (i.e., unary) and Ei,j scribing dependencies of a pair of agents (i, j). The unary term includes energies that model kinematic constraint, maximum velocity constraint as well as the compatibility between the estimated trajectories and the measurements oi. The pairwise term is responsible for avoiding collisions be- tween agents. However, joint optimization of X is a chal- lenging task, in part because of the existence of the pairwise terms as well as the lack of strong motion priors. We next describe some of the weak but frequently used priors and then suggest a way to combine our data-driven priors while keeping the computational complexity under control. Existing Unary Priors In the work (Yoon et al. 2016), the following three unary energy terms are defined to model individual behavior of an agent: tracker output, kinetic energy, and maximum veloc- ity constraint. The Tracker Output term seeks to keep the estimated trajectory close to the measured trajectories while taking into account the amount of observation uncertainty t: ui gt(xioi) = Ei t(cid:107)xi ui t − oi t(cid:107)2. (5) For instance, ui t = 0 indicates that the measurement is miss- ing. The Kinetic Energy term ensures that the total traveled distance is minimized: Ei kn(xi) = Ckn (cid:107)xi t − xi t−1(cid:107)2. (6) (cid:88) t (cid:88) t Parameter Ckn can be interpreted as the mass of an agent, which typically could be set as 1. Finally, the Maximum Ve- locity Constraint certifies that each agent's speed not exceed a physically feasible velocity, given as Cmv: Ei mv(xi) = if (cid:107)vi t(cid:107) ≤ Cmv ∞ otherwise ,∀t = 1..T. (7) (cid:26)0 Combining Local and Global Priors The key challenge in the aforementioned multi-agent opti- mization framework arises from the existence of the pair- wise terms, implying coupling trajectories between agents, the highly nonlinear nature of the coupling (collision) con- straints and the expensive computations due to this cou- pling. If such coupling were to be eliminated, the optimiza- tion of trajectories for each agent could be solved indepen- dently from other agents. However, their elimination would result in infeasible motion with possibly many collisions. We therefore propose to replace the computationally costly pairwise terms with stronger global motion and local data- driven collision priors. Specifically, we propose to modify the unary objectives by augmenting them as follows: dg(vioi) = Ei (cid:1)(cid:13)(cid:13)vi 1 t, θGP (cid:0)oi (cid:13)(cid:13)vi σ2 GP 1 σ2 N N + t+∆t − µGP (cid:0)oi t+∆t − fN N N NθN N (cid:1)(cid:13)(cid:13)2 (cid:0)oi t, θGP (cid:1)(cid:13)(cid:13)2 (8) Here, µGP is the predictive mean and σGP is the predictive standard deviation given by the learned GP and σN N is the standard deviation of the NN regression model. Integrating all unary terms above, we obtain the final global objective, which we seek to minimize in the estima- tion process: (cid:88) X = arg min X i u(xi, vioi) = arg min Ei X +Ei kn(xi) + Ei mv(xi) + Ei (cid:88) i gt(xioi) Ei dg(xioi) (9) Optimization of the Global Objective In the following, we introduce three optimization ap- proaches to solve the optimization problem in Eq. 9. In gen- eral, our optimization framework is iterative and outlined in Alg. 1. The iterative nature of our algorithm stems from the coupling between the essential collision-avoiding NN term in Eq. 1 and the solution to the optimization prob- lem. Namely, the NN term's range observations require the knowledge of the agents' locations and velocities, which are the variable we are solving for. To mitigate this effect, we propose the alternating optimization scheme where the agent's trajectories from a previous iteration are used as the proxies for measurements in Eq. 1. The choice of the minimizer in Step-5 of this algorithm is important but less essential. We consider three methods for optimizing optimizing Eq. 9: a message-passing algo- rithm (MPA) of (Bento et al. 2013; Yoon et al. 2016), a gen- eral interior point method (IPM), and an unscented Kalman Algorithm 1: Proposed Optimization Framework Input : O, (θN N , σN N ), (θGP , µGP , σGP ), Ckn, Cmv Output: X 1 Initialize X; 2 repeat 3 4 5 6 until X converges; 7 X = X; Compute NN prior velocities of X using Eq. 1; Compute GP prior velocities of X using Eq. 3; Find X by minimizing Eq. 9; smoother (UKS) that exploits the sequential nature of each (independent) agent's trajectory optimization task while ap- plying a nonlinear Rauch-Tung-Striebel smoother (Rauch, Striebel, and Tung 1965). Further details of some of the se- lected approaches are provided in the Supplement. Experiments To evaluate the proposed framework, we consider 6 exper- imental settings similar to those in (Yoon et al. 2016): 3 different settings of bottlenecks (each contains a challeng- ing egress in evacuation-like scenarios), concentric circle (agents are symmetrically placed along a circle and aim to reach their antipodal positions), two-way and four-way hall- ways (the environment is divided by two or four building blocks and agents move along the regulated ways). The con- figuration of each scenario and the details of training can be found in the supplementary. We considered five different prior velocity predictors: Gaussian Process (GP), Neural Network (NN), a linear com- bination of the NN and GP (LinComb GP+NN), GP-driven NN (GP-fed-NN), and GP-driven ORCA (GP-fed-ORCA). For GP, NN, and LinComb GP+NN, we used the training split of the trajectories to train the data-driven priors we described in Eq. 1, Eq. 3, and Eq. 8, respectively. For GP- fed-NN, we used the outputs of the trained GP (the velocity (mean) and the variance) as two additional input branches to a neural network model, besides the local observation. For GP-fed-ORCA, we used the trained GP's velocity (mean) as the preferred velocity for ORCA (van den Berg et al. 2011), a common local collision avoiding framework. When training the models, GP was trained within each scenario while the NN was trained across the scenarios, due to dis- tinct model complexities. Experimental Setup. The ground truth trajectories are obtained by running SteerSuite (Singh et al. 2009a) library with social force AI (Helbing and Moln´ar 1995), and are split into a training and testing sets. In testing set, each tra- jectory contains a challenging missing segment around 30% points, which are initially inferred with linear interpolation. See the illustration in Fig.2. We consider two evaluation strategies. In the first basic strategy, we evaluate our trained models on the test sets from the same agent density setting. Namely, both the training and the test scenarios contain the matching (identical) number (a) bottleneck evacuation (b) bottleneck evacuation 2 (c) bottleneck squeeze (d) concentric circles (e) hallway-two-way (f) hallway-four-way Figure 3: DTW measurements over 6 scenarios using UKS optimization for extended evaluation. Horizontal axis de- notes the number of agents (density). Bounding box indi- cates the case where training and test densities are the same. which means this metric is strict. Note that for simplic- ity a collision does not change the velocities of involved agents. We also measure the time-to-completion as a proxy for the computational complexity of each approach. Indices are measured after the 5th optimization loop. Experimental Results. Results of experiments in the first, matching-agent-density setting, are summarized in Ta- ble 1, 2, 3. The average rankings of different methods can be used to ascertain relative performance and are presented in Table 4. Table 5 shows the computational time of dif- ferent evaluated approaches. Finally, results of evaluations across different train-test agent densities are shown in Fig- ures 3, 4 and 5. We only show evaluations for one of the optimization approaches, the UKS, for brevity and because other approaches follow similar trends. Discussion For the basic evaluations where the agent density of the test set matches that of the training set, we can see from Ta- ble 1, 2 and 3 that (i) for DTW score, GP-fed-NN, GP and GP-fed-ORCA perform better than other priors. This illus- trates that GP is important for regulating the trajectory to roughly follow the movement (flow) pattern. (ii) In terms of the number of agent-agent collisions, GP-fed-NN, LinComb GP+NN perform best, followed by NN. This demonstrates Figure 2: Visualization: the first two rows show the bot- tleneck evacuation and bottleneck squeeze scenario respec- tively. In these two rows the left figure denotes the initial lin- ear interpolation and the right figure denotes the optimized trajectories, shown in yellow portions and zoomed in corre- spondingly in the third row. Best viewed by zooming in. of agents. In the second extended strategy, we consider test scenarios where the agent density varies compared to train- ing setting to evaluate the generalization ability of our ap- proaches. Details of these evaluations are described below. The following methods are evaluated: explicit colli- sion avoidance local optimization using message-passing ADMM (MPA) (Yoon et al. 2016) that includes pair-wise constraints, our framework with various prior velocity pre- dictor settings (GP, NN, LinComb GP+NN, GP-fed-NN, and GP-fed-ORCA), while the optimizer is either IPM or UKS. We set the parameter as: ut = 1 if the point is actually observed, otherwise ut = 0; Ckn = 1, Cmv = 2.6m/s, ∆t = 1.5s and λ = 1/(σ2 N N ∆t2) ≈ 108.0. We employ three evaluation scores. The similarity be- tween the ground truth trajectory and reconstructed tra- jectory is measured with dynamic time warping distance (DTW). We also measure the number of agent-agent col- lisions and agent-obstacle collisions. An collision occurs when the distance between the centers of two agents is strictly less than the sum of their radii during their con- tinuous movements, and it could be checked by solving a quadratic equation provided with locations of two agents at consecutive time points. The number of collisions is accu- mulated by counting all collisions along every time step, Table 1: Missing 30% of frames, Average Relative DTW Distance in Percentage for basic evaluation. Red color indicates the best method in each scenario, followed by the second best in blue. Best viewed in color. Scenario bottleneck-evacuation bottleneck-evacuation-2 bottleneck-squeeze concentric-circles hallway-two-way hallway-four-way MPA 22.2 20.9 19.2 47.2 16.9 18.0 NN IPM UKS 18.1 11.4 16.3 18.5 4.4 3.7 14.8 42.5 13.2 17.4 25.0 17.3 GP-fed-NN IPM UKS 12.0 9.2 12.7 14.4 2.3 3.1 11.2 46.2 11.2 13.7 15.5 14.9 LinComb GP+NN UKS 10.4 13.1 2.8 36.6 13.5 14.1 IPM 10.2 11.4 2.6 17.2 14.3 15.0 GP IPM UKS 9.0 9.1 9.3 11.1 3.1 3.1 35.8 17.1 14.1 15.3 12.0 12.6 GP-fed-ORCA IPM 9.0 12.3 3.3 37.3 14.8 12.9 UKS 9.3 14.1 3.1 34.0 12.6 12.3 Table 2: Missing 30% of frames, Agent-Agent Collisions for basic evaluation. Red color indicates the best method in each scenario, followed by the second best in blue. Best viewed in color. Scenario bottleneck-evacuation bottleneck-evacuation-2 bottleneck-squeeze concentric-circles hallway-two-way hallway-four-way MPA 10.6 147.0 132.0 63.4 53.6 35.8 NN IPM UKS 15.4 16.2 140.4 159.8 46.6 49.0 18.4 52.4 29.6 30.4 13.6 13.6 GP-fed-NN IPM UKS 17.2 15.0 132.4 157.0 47.0 47.4 19.6 71.0 27.8 29.0 12.2 13.0 LinComb GP+NN UKS 12.6 140.8 47.0 44.0 27.6 12.4 IPM 14.6 139.4 46.6 26.0 29.8 10.6 GP IPM UKS 13.8 14.2 139.6 144.8 47.0 47.0 26.0 44.0 29.6 29.8 13.6 13.4 GP-fed-ORCA IPM 16.0 158.6 47.4 67.0 29.0 15.0 UKS 14.2 143.4 47.4 54.4 30.0 15.4 Table 3: Missing 30% of frames, Average-Obstacle Collisions for basic evaluation. Red color indicates the best method in each scenario, followed by the second best in blue. Best viewed in color. Scenario bottleneck-evacuation bottleneck-evacuation-2 bottleneck-squeeze hallway-two-way hallway-four-way MPA 39.2 46.2 28.0 0.0 0.0 NN IPM UKS 61 52.4 83.2 75.4 32.6 30.8 0.4 0.4 0.0 0.0 GP-fed-NN IPM UKS 60.2 45.4 88.0 76.4 7.8 28.8 0.4 0.4 0.0 0.0 LinComb GP+NN UKS 54.6 87.6 18.8 0.4 0.0 IPM 46.6 88.8 8.2 0.4 0.0 GP IPM UKS 37.2 46.2 70.4 73.8 6.6 18.6 0.4 0.4 1.8 0.0 GP-fed-ORCA IPM 39.4 89.4 13.2 0.4 3.2 UKS 49.4 81.4 16.8 0.4 0.4 Table 4: Average ranks of different combinations over scenarios for basic evaluation. Lower rank is better. Red color indicates the best method for each evaluation approach, followed by the second best in blue. Best viewed in color. Evaluation DTW Agent-Agent Agent-Obstacle MPA 10.67 8.50 3.30 NN IPM UKS 8.50 8.33 8.17 5.50 8.00 6.60 GP-fed-NN IPM UKS 6.67 4.00 5.67 5.17 7.80 4.40 LinComb GP+NN UKS 5.33 3.50 7.00 IPM 4.83 3.58 6.00 GP IPM UKS 3.75 3.67 5.67 4.41 4.10 5.00 GP-fed-ORCA IPM 5.58 8.25 7.10 UKS 4.67 7.58 6.70 Table 5: Computational time, in seconds, for basic evaluation. Note that in this table, the time of IPM and UKS is sequentially accumulated over trajectories, while in practice, trajectories could be optimized in parallel when using IPM and UKS. Scenario bottleneck-evacuation bottleneck-evacuation-2 bottleneck-squeeze concentric-circles hallway-two-way hallway-four-way MPA 1343.6 521.1 738.8 29.5 876.3 1135.9 NN IPM UKS 304.4 887.9 201.4 290.1 283.9 746.8 143.8 173.0 841.5 293.9 319.1 901.9 GP-fed-NN IPM UKS 352.7 887.5 233.8 321.2 329.6 769.3 162.0 191.6 876.4 342.6 369.5 941.4 LinComb GP+NN UKS 337.9 222.4 313.4 148.5 324.9 350.6 IPM 922.2 308.7 637.5 178.0 885.8 944.4 GP IPM UKS 353.4 881.1 234.7 320.0 331.2 615.7 162.2 192.1 880.7 343.7 368.8 944.4 GP-fed-ORCA IPM 681.1 174.7 475.5 85.2 694.7 729.7 UKS 144.4 87.7 136.4 56.3 143.2 147.2 (a) bottleneck evacuation (b) bottleneck evacuation 2 (a) bottleneck evacuation (b) bottleneck evacuation 2 (c) bottleneck squeeze (d) concentric circles (c) bottleneck squeeze (d) hallway-two-way (e) hallway-two-way (f) hallway-four-way Figure 4: Number of agent-agent collisions over 6 scenarios using UKS optimization for extended evaluation. See Fig. 3 for additional caption details. that pure GP alone is not sufficient to guarantee the desired collision avoidance, and has to be augmented by another pol- icy learner like NN to achieve the least number of agent- agent collisions. Surprisingly, for this metric GP-fed-ORCA does not give satisfactory results, which might stem from our complex training/testing datasets, containing densely packed agents (especially for bottleneck-evacuation-2 sce- nario) such that the permitted set of ORCA is prone to be empty under such agent density. (iii) For the number of agent-obstacle collisions, MPA and GP perform better than others, indicating the importance of the global flow patterns in order to avoid stationary environmental obstacles. Tab. 4 suggests that, as the optimization approach, IPM is slightly better than UKS and MPA for DTW; on the other hand, UKS achieves the fewest agent-agent collisions, lower than IPM and MPA. MPA yields the fewer agent-obstacle collisions than IPM and UKS. However, in terms of com- putational complexity, Tab. 5 shows that MPA is the most expensive approach since it includes pair-wise constraint. In addition, UKS is cheaper than IPM, in that UKS exploits fast forward-backward computations specific to the trajec- tory domain. The lack of conformability in the above obser- vations implies that there might not exist a dominant opti- mization algorithm and one might need to trade off when choosing the optimizations. Figure 5: Number of agent-obstacle collisions over 4 sce- narios using UKS optimization for extended evaluation. See Fig. 3 for additional caption details. Evaluation across different agent densities, shown in Fig 3, 4 and 5, provides an insight into the important general- ization ability and robustness of proposed approaches. We can see that (i) for DTW, GP-fed-ORCA performs best ex- cept for concentric-circle scenario, where NN presents least DTW distance with respect to the ground truth test trajecto- ries. The reason might be that in concentric-circle scenario, agents are symmetrically placed along a circle, leading to observation patterns similar across all agents and, hence, lo- cal NN policy patterns that can be learned by reusing (shar- ing) the data across agents. On the other hand, global GP fails to reuse the data, leading to a weaker generalization model. (ii) There is a general increasing monotonic trend in the number of collisions across densities. This is an intu- itive outcome, however without a clear winner in terms of collisions except for concentric-circle scenario. For this sce- nario, again, the ability to reuse data across agents, due to symmetry, may lead to better generalization of the local NN approach. (iii) Models in the matching density settings out- perform those in the mismatched density settings in terms of the agent-agent collisions only for the concentric-circle scenario, while in terms of the agent-obstacle collisions this happens for the bottleneck-squeeze scenario. These results suggest that varying density impact the performance of dif- ferent models in a reasonable and predictable manner. Overall, the above observations emphasize the importance of the global flow priors, embodied in the GP model, in our multi-agent trajectory optimization framework. Local colli- sion avoidance priors, manifested through the NN model, have lesser than expected yet still measurable impact. We plan to further investigate these factors as well as the gener- alization across environments and considerations of exploit- ing advanced trajectory learning algorithms where the dy- namics of the trajectory and the cost of making an inference could be implicitly learned, in our future work. Supplemental Materials In this supplementary material, we describe details on the optimization methods we used in the main manuscript and provide some additional details on the experiments. We use the same notation that was used in the main manuscript. Global Objective gt(xioi) = Ei We define our global objective function as a combination of local and global priors we described in the main manuscript. First, we summarize the local and global prior terms we pre- sented in the main manuscript. t − oi t(cid:107)xi t(cid:107)2 (cid:88) ui t − xi (cid:107)xi t−1(cid:107)2 t(cid:107) ≤ Cmv if (cid:107)vi (cid:13)(cid:13)xi (cid:88) (cid:26)0 (cid:88) Ei mv(xi) = dg(xioi) = λ Ei ∞ otherwise t − xi t−1 kn(xi) = Ckn ,∀t = 1..T (S1) (S2) (S3) Ei t t (cid:0)oi (cid:0)oi (cid:1)(cid:1)(cid:13)(cid:13)2 (S4) −∆t · fN N N N ∆t2). Combining all unary prior terms, N N , µGP t, θGP where λ = 1/(σ2 we obtain the final global objective: t (cid:88) (cid:8)Ei X = arg min X i gt(xioi) + Ei kn(xi) dg(xioi)(cid:9) . +Ei mv(xi) + Ei (S5) Optimization of the Global Objective In the following, we introduce two optimization approaches to solve Eq. S5. In general, our optimization framework is iterative in nature, like the algorithm described in Alg. 1 in the main manuscript with different options for optimiz- ing Eq. S5. First, we explain the message passing algo- rithm (MPA) and then we consider the unscented Kalman smoother (UKS). Message Passing Algorithm (MPA) The first optimization method, message-passing (Bento et al. 2013), can be utilized to find X. In this algorithm, we con- sider each energy term that minimizes each point in a trajec- tory as an independent minimizer node, and the minimizer nodes are connected to one another via another type of nodes called equality nodes, building a bipartite graph. Minimizer nodes will minimize each variable, while equality nodes make sure that all minimizer nodes are up-to-date about de- pendent variables optimized by other minimizer nodes. Mes- sages here will be agent location in different time step. The prior work (Yoon et al. 2016) had to link inter-agent min- imizer nodes to deal with Ei,j p . However, we only need to connect nodes within the same agent this time. More specifically, we first define messages from the equality nodes to the minimizer nodes as ni t for i-th agent at time step t. This message conveys the expected location of the agent predicted by the other agents in the previous iteration of the optimization. Then we denote xi t as the opti- mized trajectory variable stored in the equality nodes, and xi t as the corresponding optimized trajectory variable stored in the minimizer node. A general strategy here, is to encode lo- t to be equal across all minimizers that are cally optimized xi referencing xi t estimates, and penalize the error when performing the optimization in the minimizer nodes. t by iteratively passing errors in xi Then, how can we optimize each minimizer node? For toi t), the term is a simple squared equation and Ei gt(xi since it is not dependent on any other nodes, we can solve it in closed form for the quadratic equation. For t), they are dependent on two variables, so Ekn(xi we need two squared penalty terms to optimize, e.g., in case of Ekn(·), we need to solve t), Emv(xi (cid:34) (cid:88) t−1 − ni t kn(·) = Ei arg min t−1,xi xi t Ckn (cid:107)xi t − xi t−1(cid:107)2 (cid:107)xi + ρ 2 t−1(cid:107)2 + (cid:107)xi t − ni ρ 2 t(cid:107)2(cid:105) , (S6) where ρ is the penalty weight. Original algorithm (Bento et al. 2013) uses dynamically changing weight value, but one can consider this as a fixed parameter, reducing the algo- rithm to the standard alternating direction of method of mul- tipliers (ADMM). To solve this, we need to take first order derivative and solve for the variables xi t. In case of Emv(·), we can utilize KKT conditions to find the closed form solution, as explained in (Bento et al. 2013). It is worth dg(·), from each minimizer's perspective, noting that, in Ei t are constant in terms of all other terms except the xi optimization, so the minimizer solution should be identical to the Ekn(·) with minor difference in coefficients. t−1, xi t−1, xi Specifically, Eq. S4 can be optimized as t−1 − F(cid:13)(cid:13)2 (cid:88) (cid:13)(cid:13)xi t − xi t−1 − ni t ρ 2 + (cid:107)xi t−1(cid:107)2 + (cid:107)xi t − ni t(cid:107)2 (S7) ρ 2 dg(xioi) = λ Ei where λ = 1/(σ2 constant term. Taking derivative for each t-th term, DN N ∆t2) and F to denote the nonlinear ∂Ei ∂Ei toi) dg(xi ∂xi t−1 toi) dg(xi ∂xi t = −2λ(xi t − xi t−1 − F ) + ρ(xi t−1 − ni t−1) (S8) = 2λ(xi t − xi t−1 − F ) + ρ(xi t − ni t), (S9) Then, by setting the above as zero and solving for xi t and t−1, we get xi 0 = −2λ(xi 0 = 2λ(xi t − xi t − xi (2λ + ρ)ρni t−1 − F ) + ρ(xi t−1 − F ) + ρ(xi t−1 + 2λρni t−1 − ni t − ni t), t + 2λF (2λ + ρ − 1) t−1), (S10) (S11) (4λ + ρ)ρ (S12) (2λ + ρ)ρni t + 2λρni t−1 + 2λF (2λ + ρ + 1) (4λ + ρ)ρ (S13) xi t−1 = xi t = Unscented Kalman Smoother (UKS) In this subsection, we approximate the constrained optimiza- tion problem Eq. S5 with a dynamical system, and solve it efficiently using unscented Kalman smoother. First, consider the following minimization problem: J(x) = 1 2 (x − a)(cid:62)A(x − a) + 1 2 s.t. (cid:107)v(cid:107) ≤ Cmv where (x − b)(cid:62)B(x − b) (S14) (S15) x = xt+1 a = xt A = 2CknI b = xt + ∆t · fN N−GP (ot) B = 2λI. (S16) (S17) (S18) (S19) (S20) Note that we suppressed the superscript i since we will op- timize each agent's trajectory independently. Substituting Eq. S16-Eq.S20 back into Eq. S14, it is clear that J(xt+1) = Cknxt+1 − xt2 + λxt+1 − xt − ∆t · fN N−GP (ot)2, (S21) which is the summation of the kinetic energy term and the newly introduce prior energy term. If we ignore the veloc- (cid:107)v(cid:107) ≤ Cmv, setting the first derivative of ity constraint Eq. S14 to zero immediately gives the solution of the mini- mization problem x = (A + B)−1(Aa + Bb). Substituting Eq. S16-Eq.S20 back into the solution, we get: xt+1 = xt + ∆t · λ · fN N−GP (ot) λ + Ckn ≈ xt + ∆t · fN N−GP (ot) +  = T (xt), (S22) prior velocity model for a time period ∆t, with error . The error  measures the uncertainty of the prior velocity model about the unknown, true velocity. Thus the error  could be modeled as a Gaussian noise. In this way, Eq. S22 implies a transition function from xt to xt+1 of a dynamical system, and  denotes the process noise, which is Gaussian. Next, let us consider the constraint of the above minimiza- tion problem. The velocity in this case is 'noisy', expressed as v = fN N−GP (ot) + 1 ∆t . One can show that, if we di- rectly pass the 2-dimensional velocity v to a hard magnitude limiter (cid:26)v f (v) = Cmv if (cid:107)v(cid:107) ≤ Cmv otherwise , (S24) the dynamical system will become explosively complex along transitions. Instead, we apply the magnitude limiter to each of the velocity component as vx < Cmv, vy < Cmv with a soft magnitude limiter: f (v) = 2Cmv · (s(v) − 1/2) where v is either vx or vy and s(·) the sigmoid function. The key point is that we do not directly compute f (v) given v. Instead, first-order Taylor approximation is consid- ered: f (v) ≈ f (a) + f(cid:48)(a)(v − a) (S25) where a is a constant (a is a moving point such that it is close to the current v) given v. Therefore, f (v) is a linear transfor- mation of v, hence Gaussian if v is Gaussian. This recursive property makes the dynamical system always a Gaussian, avoiding being explosively complex along transitions. Thus, if we use [f (vx), f (vy)]T rather than v to conduct the transi- tion in Eq. S22, the maximum-velocity constraint is applied. Furthermore, if the measurement function of the dynami- cal system is defined as: ot = xt + rt = H(xt), (S26) where the Gaussian measurement noise rt adaptively con- trols the tracker output energy term Egt(xt, ot) = utxt − ot2 = utrt2. For instance, we know that which points are visible and which points are missing given the incom- plete trajectories. If ut = 1, denoting that ot is an actually observed point, the covariance of rt could be set as the iden- tity matrix scaled by a small number, indicating high confi- dence and hence low energy. On the other hand, if ut = 0, denoting that ot is only from inference, the covariance of rt would be large when estimated from training data, indicat- ing low confidence and high energy. Overall, applying unscented Kalman filter followed by Rauch-Tung-Striebel smoother (Rauch, Striebel, and Tung 1965) that calculates "smoothed" sequence from the given filter output optimizes the approximated objective accumu- lated over all time steps. where  ∼ N (0, (A + B)−1) = N (0, 1 2(Ckn + λ) I). (S23) The interpretation of Eq. S22 is that the true location of an agent xt+1 at time t + 1, starting from the true location xt at time t, is determined by the average velocity from a Experiments To evaluate the proposed framework for various combina- tions of priors and optimization methods, we prepare sim- ilar experimental settings as in (Yoon et al. 2016). We prepare 6 scenarios (environmental configurations): 3 dif- ferent settings of bottlenecks (each contains a challenging Table S1: List of scenarios we have tested and the envi- ronment width and height in each scenario (in meters), and number of frames subsampled. Scenario bottleneck-evacuation bottleneck-evacuation2 bottleneck-squeeze concentric-circles hallway-two-way hallway-four-way Width × Height 200 × 160 100 × 80 200 × 200 20 × 20 200 × 200 200 × 200 #frames 101 53 94 37 101 101 and use the same 1,000 spatio-temporal points to fit the sec- ond GP regression model for the y component of the ve- locity. We treat the two velocity components as two inde- pendent Gaussian processes and the final velocity is simply their superposition. We conduct data normalization and auto relevance determination, and choose the Matern 5/2 kernel. Note that even though there are distinct destinations of tra- jectories in the two-way hallway scenario and in the four- way hallway, one set of GPs are sufficient to model multiple modalities of movements in a single scenario. NN regressor is trained using around 800,000 samples across all 6 scenarios, and tested in test simulations involv- ing around 130,000 test samples. There are several branches in NN and all of them are fully connected followed by ReLU activations and dropout layers. If we adopt the linear com- bination of NN and GP, there are three input branches for NN: 360 dimensional distance map, 360 × 2 dimensional velocity map and 2 dimensional global desired velocity. For GP-fed NN, there are two additional branches for NN: 2 di- mensional GP local guidance velocity and 2 dimensional GP standard deviation. These branches merge at a higher level (at the 6-th layer), which is still fully connected, with ReLU activation and dropout layers. The output layer is a 2 dimen- sional dense layer for velocity regression. The width of the network is 1,024 while the depth is 10. Mean squared error is the loss function and RMSprop is the learner. With early stop, we set learning rate to be 0.0001, batch size 64 and dropout rate 0.2. In addition, similar to the work in (Long, Liu, and Pan 2017), we also apply a clamping to regulate the output of the NN. References A.; 2014. Ra- [Alahi, Ramanathan, and Fei-Fei 2014] Alahi, Socially-aware manathan, V.; and Fei-Fei, L. In Computer Vision and large-scale crowd forecasting. Pattern Recognition (CVPR), 2014 IEEE Conference on, 2211–2218. [Ali and Shah 2008] Ali, S., and Shah, M. 2008. Floor Fields for Tracking in High Density Crowd Scenes. In ECCV. [Ali et al. 2013] Ali, S.; Nishino, K.; Manocha, D.; and Shah, M. 2013. Modeling, Simulation and Visual Analysis of Crowds: A Multidisciplinary Perspective. Springer Publish- ing Company, Incorporated. [Bento et al. 2013] Bento, J.; Derbinsky, N.; Alonso-Mora, Figure S1: The optimized trajectories in concentric-circles scenario in (top) 2D view and (bottom) normalized time axis. Note the rotating behavior of agents in this scenario. exit to go through for evacuation), concentric circle (agents are symmetrically placed along a circle and aim to reach their antipodal positions), two-way and four-way hallways (the environment is divided by two or four building blocks and agents move along the regulated ways). These sce- narios were previously introduced in (Singh et al. 2009b) and are representative settings for studying crowd behav- iors. For each scenario, we simulate 3,000 frames of 30- 40 agents except for the concentric circle scenario, where there are 20 agents, followed by sub-sampling those frames. Detailed statistics of the scenarios are summarized in Ta- ble S1. An example visualization of the scenarios is shown in Fig. S1. The ground truth trajectories were obtained by randomly setting the agents' initial locations and running SteerSuite (Singh et al. 2009a) library driven by social force AI (Helbing and Moln´ar 1995). Then the trajectories were split into training set and testing set with 6:1 ratio. GP regressor is trained per-scenario. More specifically, for each scenario, we use 1,000 spatio-temporal points which are three dimensional denoted by (x, y, t) to fit one GP regression model for the x component of the velocity, stochastic pedestrian motion model. In International Work- shop on Socially Intelligent Surveillance and Monitoring (SISM). [Rauch, Striebel, and Tung 1965] Rauch, H.; Striebel, C.; and Tung, F. 1965. Maximum likelihood estimates of linear dynamic systems. AIAA Journal 3(8):1445–1450. [Rodriguez, Ali, and Kanade 2009] Rodriguez, M.; Ali, S.; and Kanade, T. 2009. Tracking in Unstructured Crowded Scenes. In ICCV. [Rodriguez et al. 2011] Rodriguez, M.; Sivic, J.; Laptev, I.; and Audibert, J.-Y. 2011. Data-driven Crowd Analysis in Videos. In IEEE International Conference on Computer Vi- sion. [Sharma, Huang, and Nevatia 2012] Sharma, P.; Huang, C.; and Nevatia, R. 2012. Unsupervised incremental learning In 2012 IEEE for improved object detection in a video. Conference on Computer Vision and Pattern Recognition, 3298–3305. [Singh et al. 2009a] Singh, S.; Kapadia, M.; Faloutsos, P.; and Reinman, G. 2009a. An Open Framework for Develop- ing, Evaluating, and Sharing Steering Algorithms. In Pro- ceedings of the 2nd International Workshop on Motion in Games, MIG '09, 158–169. Berlin, Heidelberg: Springer- Verlag. [Singh et al. 2009b] Singh, S.; Kapadia, M.; Faloutsos, P.; and Reinman, G. 2009b. SteerBench: a benchmark suite for evaluating steering behaviors. Computer Animation and Virtual Worlds 9999(9999):n/a+. [van den Berg et al. 2011] van den Berg, J.; Guy, S. J.; Lin, M. C.; and Manocha, D. 2011. Reciprocal n-Body Col- In International Symposium on Robotic lision Avoidance. Research (ISRR). [van den Berg, Lin, and Manocha 2008] van den Berg, J.; Lin, M. C.; and Manocha, D. 2008. Reciprocal Velocity Obstacles for Real-Time Multi-Agent Navigation. In Pro- ceedings of the IEEE International Conference on Robotics and Automation (ICRA). [Yoon et al. 2016] Yoon, S.; Kapadia, M.; Sahu, P.; and Pavlovic, V. 2016. Filling in the blanks: Reconstructing mi- croscopic crowd motion from multiple disparate noisy sen- sors. In 2016 IEEE Winter Applications of Computer Vision Workshops, WACV 2016 Workshops, 1–9. 25% contribution. [Zhan et al. 2008] Zhan, B.; Monekosso, D.; Remagnino, P.; Velastin, S.; and Xu, L.-Q. 2008. Crowd analysis: a survey. Machine Vision Applications 19:345?–357. J.; and Yedidia, J. S. 2013. A message-passing algorithm for multi-agent trajectory planning. In Burges, C. J. C.; Bottou, L.; Welling, M.; Ghahramani, Z.; and Weinberger, K. Q., eds., Advances in Neural Information Processing Systems 26. Curran Associates, Inc. 521–529. [Bera and Manocha 2014] Bera, A., and Manocha, D. 2014. Realtime Multilevel Crowd Tracking using Reciprocal Ve- locity Obstacles. In 22nd International Conference on Pat- tern Recognition. [Bera, Kim, and Manocha 2015] Bera, A.; Kim, S.; and Manocha, D. 2015. Efficient Trajectory Extraction and Parameter Learning for Data-Driven Crowd Simulation. In Graphics Interface. [Bera, Kim, and Manocha 2016] Bera, A.; Kim, S.; and Manocha, D. 2016. Online parameter learning for data- driven crowd simulation and content generation. Computers and Graphics. [Helbing and Moln´ar 1995] Helbing, D., and Moln´ar, P. 1995. Social force model for pedestrian dynamics. Phys. Rev. E 51:4282–4286. [Hu, Ali, and Shah 2008] Hu, M.; Ali, S.; and Shah, M. 2008. Learning Motion Patterns in Crowded Scenes Using Motion Flow Field. In ICPR. [Jacques Junior, Raupp Musse, and Jung 2010] Jacques Ju- nior, J.; Raupp Musse, S.; and Jung, C. 2010. Crowd anal- ysis using computer vision techniques. Signal Processing Magazine, IEEE 27(5):66–77. M.; [Kapadia, Pelechano, and Allbeck 2015] Kapadia, Pelechano, N.; and Allbeck, J. 2015. Virtual Crowds: Steps Toward Behavioral Realism. MORGAN & CLAYPOOL. [Kim, Lee, and Essa 2011] Kim, K.; Lee, D.; and Essa, I. 2011. Gaussian Process Regression Flow for Analysis of Motion Trajectories. In IEEE International Conference on Computer Vision, (ICCV). [Lerner, Chrysanthou, and Lischinski 2007] Lerner, Chrysanthou, Y.; and Lischinski, D. example. Comput. Graph. Forum 26(3):655–664. [Li et al. 2015] Li, T.; Chang, H.; Wang, M.; Ni, B.; Hong, R.; and Yan, S. 2015. Crowded scene analysis: A survey. IEEE Transactions on Circuits and Systems for Video Tech- nology 25(3):367–386. [Long, Liu, and Pan 2017] Long, P.; Liu, W.; and Pan, J. 2017. Deep-learned collision avoidance policy for dis- tributed multiagent navigation. IEEE Robotics and Automa- tion Letters 2(2):656–663. [Pellegrini and Gool 2013] Pellegrini, S., and Gool, L. V. 2013. Tracking with a mixed continuous-discrete condi- tional random field. Computer Vision and Image Under- standing. [Pellegrini et al. 2009] Pellegrini, S.; Ess, A.; Schindler, K.; and van Gool, L. 2009. You'll Never Walk Alone: Mod- In IEEE eling Social Behavior for Multi-target Tracking. International Conference on Computer Vision. [Pellegrini et al. 2010] Pellegrini, S.; Ess, A.; Tanaskovic, M.; and Gool, L. V. 2010. Wrong turn - no dead end: a A.; 2007. Crowds by
1702.07934
1
1702
2017-02-25T18:10:37
A decentralized algorithm for control of autonomous agents coupled by feasibility constraints
[ "cs.MA", "eess.SY" ]
In this paper a decentralized control algorithm for systems composed of $N$ dynamically decoupled agents, coupled by feasibility constraints, is presented. The control problem is divided into $N$ optimal control sub-problems and a communication scheme is proposed to decouple computations. The derivative of the solution of each sub-problem is used to approximate the evolution of the system allowing the algorithm to decentralize and parallelize computations. The effectiveness of the proposed algorithm is shown through simulations in a cooperative driving scenario.
cs.MA
cs
A decentralized algorithm for control of autonomous agents coupled by feasibility constraints Ugo Rosolia, Francesco Braghin, Andrew G. Alleyne, Stijn De Bruyne and Edoardo Sabbioni 7 1 0 2 b e F 5 2 ] A M . s c [ 1 v 4 3 9 7 0 . 2 0 7 1 : v i X r a Abstract- In this paper a decentralized control algorithm for systems composed of N dynamically decoupled agents, coupled by feasibility constraints, is presented. The control problem is divided into N optimal control sub-problems and a communication scheme is proposed to decouple computations. The derivative of the solution of each sub-problem is used to approximate the evolution of the system allowing the algorithm to decentralize and parallelize computations. The effectiveness of the proposed algorithm is shown through simulations in a cooperative driving scenario. I. INTRODUCTION In the last decade researchers have focused on automa- tion in several application fields and in the near future autonomous mechatronic systems will be part of our ev- eryday lives. Under this scenario, the need for cooperative control algorithms able to manage the interactions among autonomous agents is increasing. Despite the advance in computational power allowing for solving complex tasks for a single autonomous agent in real time, it is far more challenging to control the interaction among autonomous agents [1]. Indeed, when two or more agents have to interact, there could be communication limitations or the dimension of the problem could increase exponentially, and consequently the computational burden. In this paper we focus on dynamically decoupled systems subjected to coupling constraints. This could be the case for UAV flight formation, air traffic control, power management and several other applications [1]–[10]. Early works in the field did not explicitly take into account the coupling con- straints [11], [12]. For example in UAV flight control, the collision avoidance constraints are usually enforced using barrier functions, which do not guaranty safety. In [8] a decentralized control strategy able to take into account hard constraints was proposed. However, the problem is solved sequentially and each decentralized optimization has to wait until the previous one is completed. Thus, for large scale systems, this approach could prove infeasible for real-time. In order to overcome this issue, the authors in [9] proposed a strategy to parallelize computations. The problem is divided U. Rosolia is with the Department of Mechanical Engineering, University of California at Berkeley , Berkeley, CA 94701, USA ugo.rosolia@ berkeley.edu. Braghin Francesco are with Mechanical Engineering Department, Politecnico di Milano, {francesco.braghin, edoardo.sabbioni} @polimi.it. the Italy and Edoardo Sabbioni A. G. Alleyne is with the Mechanical Science and Engineering, IL 61801 USA Illinois at UrbanaChampaign, Urbana, University of [email protected]. S. De Bruyne is with McKinsey & Company stijn.debryune @gmail.com. into N sub-problems, which are solved in parallel when the agents are not coupled. In [13] a robust distributed MPC which allows the authors to decouple the computation is presented. A robust tube is constructed for each i-th agent and a local feedback controller is used to keep the agent into the tube. Therefore, communication between agents is only required to update the tube. This work proposes a decentralized and parallelized algo- rithm to compute a nearly optimal solution of a specific class of non-linear non-convex problems under the assumption of no delay or loss of communication. The optimization is divided into N sub-problems, similar to [9]. The main contribution of this paper is to propose a communication scheme which allows for independent computation of the solution of each sub-problem. This scheme is inspired by the GMRES\Continuation method [14]–[16], where the time evolution of a nonlinear algebraic system is traced by its derivative. The proposed scheme uses the derivative of the optimal solution to decouple the sub-problems, namely each autonomous agent approximates the behavior of the system based on its derivative. Continuations methods do not con- verge to the solution when the evolution of the system is discontinuous [14]. Unfortunately, the coupling inequality constraints introduce a discontinuity, as shown in [17]. Thus, we use a relaxed approach to deal with inequality constraints which allow us to use a continuation method. These relaxed conditions could be used also for explicit fixed time step algorithms. This paper is organized as follow: Section II the cen- tralized system is expressed as the summation of N de- centralized optimal control sub-problems. In Section III the control algorithm is described and the proposed conditions to deal with inequality constraints are derived. Section IV provides additional details on the algorithm and its range of applicability. Finally, in Section V the proposed control logic is tested on simulations of a cooperative driving scenario. Section VI provides final remarks. II. PROBLEM FORMULATION In this section the centralized control problem is intro- duced. Afterwards, the relaxation method used to guarantee continuity of the optimal solution to the control problem is described. Finally, we present the decoupling strategy. A. System description The proposed algorithm aims to compute the trajectories of a system composed by N dynamically decoupled agents. The dynamics of each agent have the following non-linear state space representation xi(t) = fi(xi(t), ui(t)), (1) with xi ∈ Rni being the state vector and ui ∈ Rnui the control action related with the i-th agent. Thus, the dynamic of the overall system can be written as X(t) = [f1(x1(t), u1(t)),··· , fN (xN (t), uN (t))]T = (2) = F (X(t), U (t)), where X(t) = [x1(t),··· , xN (t)] ∈ Rn1×···×nN is the state vector and U (t) = [u1(t),··· , uN (t)] ∈ Rnu1×···×nuN the input vector. The optimal control problem consists in the minimization of N decoupled cost functions over a moving time interval with fixed duration T : (cid:90) t0+T N(cid:88) t0 i=1 (cid:124) hi(xi(t), ui(t)) dt, (3a) (cid:123)(cid:122) (cid:125) Running Cost J∗ c (X(t0)) = inf U (t) s.t. X(t) = F (X(t), U (t)) I(X(t)) = [C1(X(t)),··· , Cnc(X(t))]T ≥ 0 (3b) (3c) = C. Relaxation method When the inequality constraint Cj(X(t)) in Equation (5) is tightly satisfied after a period where it was not, the optimal solution has a discontinuity [17]. Unfortunately, continuation methods cannot be used to compute the solution at discontinuity points [19]. Thus, continuation methods are not suitable to compute the optimal solution when optimality is described by the KKT conditions (Eq. (5)). In order to overcome this issue, we introduce a set of slack variables to convert the inequality constraints into equality constraints,  E1(X(t)) ...  = Enc(X(t))  C1(X(t)) − z2 Cnc(X(t)) − z2 ... 1(t) nc(t)  = 0. It is clear, (8) that when the equality constraints (Eq. 8) hold also the inequality feasibility constraints (Eq. (3c)) are satisfied. Moreover, this problem formulation provides for the removal of the KKT conditions (Eq. 5), which introduced a discontinuity. The relaxed optimal control problem is defined as the E(X(t)) = minimization of the cost function J(X(t), U (t)) = (cid:90) t+T t N(cid:88) (cid:124) (cid:124) i=1 hi(xi(t), ui(t) + Λ(t)E(t) + (cid:123)(cid:122) Running cost (cid:125) (cid:123)(cid:122) (cid:125) Enforcing feasibility constraint (cid:124) (cid:123)(cid:122) nc(cid:88) (cid:124) j=1 Wz zj(t) (cid:123)(cid:122) (cid:125) Slack varible effect on optimality dt (cid:125) Running cost of the equivalent relaxed unconstrained centralized problem (9) subject to the dynamic constraint (2). We underline that the effect of the slack variable is to add a safety margin which is determined by the tuning parameter Wz, and that the optimal solution of the relaxed problem does not saturates the feasibility constraints. Therefore, the solution of the relaxed problem is suboptimal for the original problem, described in Section II.B. D. Decoupling strategy The centralized control problem could be written as the summation of N Pi optimal control problems. Each Pi problem is related to the i-th agent and is defined as, (cid:90) t0+T t0 J∗ i (X(t0)) = inf ui(t) s.t Ji(X(t), ui(t))dt (10a) (10b) (10c) xi(t) = f (xi(t), ui(t)) Ji(X(t), ui(t)) = with (cid:90) t+T t (cid:88) j∈Ai + (cid:125) (cid:124) (cid:123)(cid:122) Running cost hi(xi(t), ui(t) [λj(t)Ej(X(t)) + (cid:123)(cid:122) (cid:125) Enforcing feasibility constraint (cid:123)(cid:122) Wz zj(t) (cid:124)(cid:123)(cid:122)(cid:125) Slack varible effect on optimality ]dt (cid:125) (11) Equivalent running cost of the Pi problem where the nc feasibility constraints in (3c) may couple the agents. B. The optimal control problem The feasibility constraints in Equation (3c) can be enforced through the cost function [17], [18]. Given a vector of time varying Lagrange multipliers, defined as Λ(t) = [λ1(t),··· , λj(t),··· λnc(t)] (cid:40)(cid:54)= 0 If Cj(X(t)) = 0 = 0 If Cj(X(t)) > 0 . where λj(t) = The centralized optimal control problem consists of the minimization of the augmented cost function Jo(X(t), U (t)) = hi(xi(t), ui(t) + Λ(t)I(t) dt (cid:90) t+T t N(cid:88) (cid:124) (cid:124) i=1 (cid:124) (cid:123)(cid:122) (cid:125) Enforcing feasibility constraint (cid:123)(cid:122) Running cost (cid:125) (cid:123)(cid:122) Running cost of the equivalent unconstrained problem (4) (5) (cid:125) (6) and is defined as J∗ 0 (X(t0)) = inf U (t) s.t (cid:90) t0+T t0 Jo(X(t), U (t))dt X(t) = F (X(t), U (t)) = (7a) (7b) (7c) (cid:124) (cid:124) where Ai is the set of subscripts of the inequalities Cj(X(t)) involving the i-th agent. It is clear that if at time t the global optimal solutions of N −1 agents are known, the Pi problem could be solved independently and its solution is globally optimal for the centralized relaxed problem. III. ALGORITHM In this section a variation to the GMRES\Continuation methods, which allows to parallelized and decentralize com- putations, is presented. Moreover, we suggest a numerical strategy to handle the feasibility constraints based on their effect on optimality. A. Decentralized algorithm The GMRES\Continuation method uses the derivative of the optimal solution to trace its behavior in time. For details on the numerical implementation and accuracy of continuation methods we refer to [15], [16], [20]–[22]. The proposed algorithm uses the derivative of the optimal solution to approximate the optimal trajectories of N − 1 agents, enabling independent solution of each Pi problem. To initialize the algorithm the derivative is computed with a centralized optimization method. After the initialization, the derivative is computed on-board on each i-th agent and communicated to the others. Table I illustrates the algorithms steps. It is interesting to notice that the proposed algorithm does not introduced further numerical approximation with respect to the centralized algorithm based on continuation methods, as shown in the result section. TABLE I ALGORITHM SCHEME Initialization Step 1) Step 2) Iteration k Step 3) Step 4) Step 5) Step 6) Compute the optimal solution and the optimal derivative with a centralized algorithm Communicate the optimal solution and its derivative to all the agents Each i-th agent integrates numerically the trajectories of the other agents Each i-th agent solves its Pi problem to compute the optimal solution and its derivative Each i-th agents communicates the optimal solution and its derivative to all the other agents k = k + 1 go to step 3) B. Handling coupling constraints In this section the effect of the coupling feasibility con- straints on optimality is analyzed, and the relaxed approach to deal with inequality constraints is introduced. As the solution to the relaxed problem is similar to the original one, when the feasibility inequality constraint is satisfied, the relaxed equality constraint does not influence optimality. In order to verify this statement, it is possible to compute the relationship between the slack variable and the Lagrange multiplier related to the j-th constraint. If zj(t) is optimal, the following relationship for the derivative of the equivalent running cost (Eq. 11) holds ∂((cid:80)N i=1(h(xi(t), ui(t) + Λ(t)E(t) +(cid:80)nc j=1 ∂zj(t) Combining Equation (8) and Equation (12), relation between λj(t) and the state can be written as Wz j (t) ) z2 = 0. (12) the explicit λj(t) = Wz z4 j (t) = Wz C 2 j (X(t)) . (13) Equation (13) shows that when the inequality constraints Cj(X(t)) is safely satisfied, the Lagrange multiplier related with the relaxed constraint is small in magnitude. Therefore, the effect of the related relaxed feasibility constraint on op- timality is negligible. When this condition occurs, we would like not to consider the unnecessary feasibility constraint, reducing the dimensions of the i-th optimization problem, Pi, in Step 4) of Table I. Namely, we set a threshold value, Hlim, for which the j-th Lagrange multiplier of Equation (9) is set to zero λj(t) = If λ2 0 (cid:54)= 0 If λ2 j (t) ≤ H 2 j (t) > H 2 lim lim . (14) Substituting in Equation (14) the relationship between the Lagrange multiplier and the system state (Eq. 13), a threshold value for which the relaxed feasibility constraint has to be enforced to the problem is obtained: (cid:40) (cid:40) λj(t) = If C 2 0 (cid:54)= 0 If C 2 j (X(t)) ≥ Wz Hlim j (X(t)) < Wz Hlim . (15) It is interesting to notice that these conditions (Eq. 15) are similar to the KKT conditions in Equation (5), but these are suitable to apply continuation methods and fixed time step algorithms. IV. ALGORITHM ANALYSIS A. Minimum principle properties The MGRES/Continuation method is based on the opti- mality conditions stated by the minimum principle [16], [23], [24]. The minimum principle provides necessary conditions for global optimality and it is not always sufficient to com- pute the optimal solution [18]. Therefore, it is important to analyze the algorithm to understand which class of problems could be solved with the proposed control logic. Firstly we define the difference between weak and strong minima. Given a general optimal control problem, J∗ g (x(0)) = inf u(t) g(x(t), u(t))dt (16a) s.t (16b) (16c) A trajectory x∗(t) is a weak minima if it minimizes the functional (Eq. (16a)) over all the trajectories ¯x(t) close to x(t) = f (x(t), u(t)). (cid:90) T 0 x∗(t) in the sense of the 1-norm, meaning that x∗(t) − ¯x(t)1 := max 0≤t≤T x∗(t) − ¯x(t)+ x∗(t) − ¯x(t) ≤ . (17) Conversely, a trajectory x∗(t) is a strong minima if it minimizes the functional (Eq. (16a)) over all the trajectories ¯x(t) close to x∗(t) in the sense of 0-norm, + max 0≤t≤T x ∗ (t) − ¯x(t)0 := max 0≤t≤T x ∗ (t) − ¯x(t) ≤ . (18) The optimality conditions stated by minimum principle are satisfied for strong minima and not for weak minima [18]. Therefore, the proposed algorithm is suitable to solve non- convex problems with respect to the 1-norm, if those are convex with respect to the 0-norm. For example, say that our control problem is to find the trajectory closest to zero, outside an unfeasible region as shown in Figure 1. From Figure 1 is clear that the trajectory on the left and the one the right are far in the sense of 1-norm (the two trajectories have non-infinitesimal derivatives different in sign) and for this reason those could represent two weak minima for this problem. However, the two trajectories are close in the sense of the 0-norm, thus the problem has just one strong minima which can be correctly computed with the optimality conditions of the minimum principle. C. Non-convex problem Combining the properties of the minimum principle and the continuation methods we are able to solve a particular type of non-linear non-convex problem. Indeed the algorithm is able to take non-convex decisions if the candidate trajecto- ries are close in the sense of the 0-norm. This property has a key importance in control problems where the optimization is performed on a moving time interval. In Figure 2 the domain of an optimal control problem similar to the one in Section IV.A is shown. Here the objective is to compute, on a moving time interval, the feasible trajectory closest to zero. In Figure 2 the unfeasible region is outside the opti- mization window, thus the problem is convex. When the optimization windows moves in time, as soon as it encounters the unfeasible region, the problem becomes non-convex. Indeed there are two weak minima as shown in Figure 3. Fig. 2. Optimal control problem on a time moving window. The objective is to compute the trajectory closest to zero, outside the unfeasible region. Fig. 1. Domain of the feasible trajectories of the optimal control problem. The objective is to compute the trajectory x(t) closest to zero which does not cross the unfeasible region. B. Continuation method properties The algorithm in Section IV.C is based on a continuation method, meaning that at each time instant the optimal solution is given and the algorithm computes its derivative. This derivative is used at the next time instant to approximate the optimal solution. Therefore if there are more trajectories satisfying the min- imum principle, the algorithm would compute the evolution in time of the given trajectory. However, there could be issues at bifurcation points where the optimal solution has two possible derivatives. This particular situation is discussed in the next section. Fig. 3. Representation of a bifurcation point. As soon as the unfeasible region enters the optimization window the there are two weak local minima. Figure 3 depicts bifurcation point mentioned in Section IV.B. As soon as the unfeasible region enters the optimization windows, the global optimal solution bifurcates into two local optimal solutions with respect to the 1-norm. However, as shown in Figure 3, the two trajectories are close with respect to the 0-norm, and the optimality conditions of the minimum principle allow to compute the optimal derivative for the unique strong minima. Therefore, the algorithm correctly choses the global optimal trajectory. Afterwards, when the unfeasible region is almost, com- pletely inside the optimization window, the continuation algorithm follows the trajectory which was globally optimal at the bifurcation point (Fig. 4). Fig. 4. entered the optimization window. Evolution of the optimal solution after the unfeasible region has V. RESULTS The algorithm is tested on a cooperative driving scenario, where autonomous vehicles are driving on the same roadway at different target speeds. In particular, the algorithm is used to compute the collision free-trajectories of each autonomous vehicles. The vehicles are modeled with a simplified sys- tem; this choice for the trajectory planning phase is well- established in literature [25]–[27]. It is important to note that this problem is suitable to test our algorithm as each vehicle has to take a non-convex decision during overtaking maneuvers. Moreover, we assume that no safety maneuvers are needed to guaranty the existence of the derivative re- quired in Section III.A. Simulation was performed on a Windows computer fea- turing an Intel CORE i5 processor using Matlab 2013b. In order to measure the computational time, a stand-along executable mex-function has been compiled for each agent. This function could be used on Linux PCs and experimental results are envisaged for the future. A. Comparison between decentralized and centralized ap- proach The agents in section III.A represent autonomous vehicles and are modeled using a Single Point Mass Model in a curvilinear abscissa reference frame, for more details [28], [29]. The cost function of each vehicle is designed for lane keeping at a cruise velocity: hi(xi(t), ui(t) = W1i(y1−yitarget)2 + W2i y2 i + W3i( si − Vitarget)2 + W4i θ2 i (19) where si represents the distance traveled along the roadway mid-line, and yi the lateral distance between the vehicles center of gravity and the roadway mid-line. The inputs, Vi and θi, are the velocity and the heading angle, respectively. Wji, ∀j ∈ [1,··· , 4] are the weighting parameters. More details on this curvilinear reference frame are given in [28], [29] and [30]. Finally, the feasibility constraints in Section II.C are expressed as ellipses C(si, yi, sj, yj) = (si − sj)2 2l (yi − yj)2 2w + − 1 (20) where the axes are chosen accordingly with vehicle length, l, and width, w: 4 and 2 meters, respectively. In this example, for each problem Pi the distance between the i-th agent and the j-th agent is given by zj(t). From Equation (13) and form our choice of Wz = 7, when zj(t) = 60m then λj(t) (cid:39) 0.5· 10−7. Therefore we picked the threshold Hlim = 0.5 · 10−7 so that, when the relative distance between two agents is greater that 60m, λj(t) is set to zero and the agents are decoupled. Note that 60m is the threshold distance used in commercial blind spot detection system. B. Simulation Results 1) Comparison with a centralized algorithm: In this sec- tion two simulations with the same boundary conditions are carried out. The first one uses the proposed decentral- ized algorithm and the second one uses a centralized GM- RES\Continuation algorithm. The solutions are compared to test optimality, as the solution computed with the centralized method is optimal for the relaxed problem. As shown in Figure 5 two agents are traveling on the same straight path at different target velocities; therefore the faster agent overtakes the slower one. During the overtaking maneuver the agents move sideways from the centerline, so that the overall derivative of the steering angle and lateral velocity are minimized. Coefficients and boundary conditions used in the simulation for the two agents (i = 1 and i = 2) can be found in Tables II and III. Fig. 5. Trajectories of two agents traveling on the same target path at different target speed: 30m/s the agent in red, 24m/s the agent in green. Figures 6 shows the lateral difference between the tra- jectories of the two agents computed with the proposed decentralized control algorithm and the centralized one. The maximum difference, between the trajectories computed 0100200300400500600−1.5−1−0.500.511.52X axis [m]Y axis [m] Trajectory Agent1Trajectory Agent2Reference path TABLE II SIMULATION COEFFICIENTS W1i W2i W3i W4i Wz 0.55 0.05 9 145 7 T ∆T Hlim 2 5 · 10−7 20 TABLE III AGENTS'S TARGET VELOCITY AND LATERAL OFFSET Agent yitarget Vitarget i = 1 0.1 30 i = 2 0 24 i = 3 0 24 i = 4 i = 5 −0.1 −0.1 18 18 [units] [m] [m/s] with the centralized algorithm and the decentralized one, is 0.095m which is 5.59% of the maximum lateral displace- ment. Thus, this proposed algorithm does not introduce fur- ther approximation with respect to a centralized continuation algorithm and it is able to compute a nearly optimal solution for the relaxed problem. Finally, it is important to analyze the computational cost. The centralized control strategy takes on average 12.9ms to compute the solution, while the decentralized one just 4.2ms, as show in Figure 7. Fig. 7. decentralized algorithms. Comparison between computational cost of the centralized and In Figure 8 the trajectories of the five agents are shown. Agent1 travels at the highest cruise velocity and its starting position is the closest to the Y axis. Therefore, during the simulation it overtakes the slower agents that it encounters on the path. Fig. 6. Lateral difference between the trajectories of the agents computed with the proposed decentralized algorithm and with a centralized one. C. Communication method When the number of agents increases, a decentralized algorithm is necessary to limit the computational burden. In this section a simulation involving five agents is carried out and the computational time is analyzed. In this scenario, the proposed relaxed method to deal with inequality constraints (Eq. 15) plays a crucial role. Coefficients and boundary conditions used in the simulation for the five agents can be found in Tables II, III and IV. TABLE IV AGENTS' INITIAL CONDITIONS Agent sistart i = 1 2 i = 2 20 i = 3 50 i = 4 680 i = 5 480 [units] [m] Fig. 8. Trajectories of the five agents. Agent1 has the highest cruise velocity and it overtakes the others four agents. Agent2 and Agent3 have an intermediate cruise velocity and they overtake Agent4 and Agent5. Concluding, during the simulation there is a total of 8 overtaking maneuver. It is clear that the feasibility constraints, which couple Agent1 with the others, should be enforced to the P1 just during the overtaking maneuvers. In Figure 9, a Boolean variable with values 1 and 0 is used to indicate, respectively, if the i-th constraint is enforced or is not enforced to P1. Figure 10 shows the trajectory of Agent1, and those of the other agents when the related feasibility constraints are enforced to P1. Here it is possible to see that the relaxed constraints are correctly enforced to the problem just during the overtaking maneuvers. 0100200300400500600700−0.06−0.04−0.0200.020.040.060.080.1X axis [m]Lateral difference [m] Agent 1Agent 2010020030040050060000.0020.0040.0060.0080.010.0120.0140.0160.0180.02Computational time [s]X axis Centralized (2 Agents)Decentralized (2 Agents)010002000300040005000−1.5−1−0.500.511.5X axis [m]Y axis [m] Agent1Agent2Agent3Agent4Agent5Reference Path Fig. 9. Coupling between Agent1 and the i-th agent in function of the traveled distance on the X axis. When the Boolean variable is set to one the Lagrange multiplier is different from zero. Fig. 10. Trajectory of Agent1 with its prospective view. The trajectories of the others agents are reported when the related feasibility constraint are enforced to the P1 problem, namely when the Boolean variable of Figure 9 is set to 1. D. Complete Simulation Finally the algorithm is tested in the worst case scenario, where all the feasibility constraints has to be enforced to the P1 problem (A video of the simulation can be found at http://youtu.be/wTfb5M1YH44 ). Figure 11 shows the behavior of the computational cost as a function of the Fig. 11. Trajectory of Agent1 with its prospective view. The trajectory of the others agents are reported when the related feasibility constraint are enforced to the P1 problem, namely when the Boolean variable of Figure 10 is set to 1. relaxed constraints. In particular, Figure 11 is divided in five zones, numbered from 0 to 4, to indicate the number of enforced constraints. The minimum computational cost, 3.85ms, is achieved when no constrains are enforced to the problem. Furthermore, the maximum computational cost, 6.02ms, is reached when all the four constraints are enforced to the P1 problem. Thus, the increment in computational cost, between the unconstrained problem and the one where all four constrains are enforced, is 2.17ms. This increment 01000200030004000500000.51X axis [m]Boolean VariableEnforcement of the constraint between the Agent1 and Agent2 to the P1 problem01000200030004000500000.51X axis [m]Boolean VariableEnforcement of the constraint between the Agent1 and Agent3 to the P1 problem01000200030004000500000.51X axis [m]Boolean VariableEnforcement of the constraint between the Agent1 and Agent4 to the P1 problem01000200030004000500000.51X axis [m]Boolean VariableEnforcement of the constraint between the Agent1 and Agent5 to the P1 problem010002000300040005000−1.5−1−0.500.511.5X axis [m]Y axis [m] Agent1Agent2Agent3Agent4Agent5Reference Path is small when compared with the centralized approach which took 12.5ms to solve a problem involving two agents. VI. CONCLUSIONS In this paper a decentralized control algorithm for dynam- ically decoupled system, coupled by feasibility constraint, is presented. The algorithm, similarly to continuation methods, uses the derivative of the optimal solution to approximate the behavior of the system. This strategy allows to decouple and to parallelize computations. Moreover, a relaxed approach to deal with inequalities constraints is introduced. This approach allows one to elimi- nate the discontinuity introduced by the KKT conditions; but it is able to recognize when an inequality constraint does not influence optimality and thus should not be enforced on the problem. The algorithm has been successfully tested in simulation in a cooperative driving scenario. The control logic is able to compute a solution near the global optimal with a decen- tralized strategy. The size of the problem is reduced when the coupling between agents is not relevant, thus the com- putational burden in reduced. Finally, the computational cost of a simulation involving five coupled agents is compared with a centralized control problem involving two agents. This comparison underlines the advantage of the decentralized control strategy which took, on average, 50% less time to solve the optimal control problem, though the dimension of the problem is four times larger. VII. ACKNOWLEDGMENTS The authors thank Dr. Jacopo Guanetti from UC Berkeley from for his feedback on the manuscript presented. REFERENCES [1] A. Bemporad and D. Barcelli, "Decentralized model predictive con- trol," in Networked control systems. Springer, 2010, pp. 149–178. [2] A. Vahidi and W. Greenwell, "A decentralized model predictive control approach to power management of a fuel cell-ultracapacitor hybrid," in American Control Conference, 2007. ACC'07. IEEE, 2007, pp. 5431–5437. [3] A. Mohammadi and M. B. Menhaj, "Formation control and obstacle avoidance for nonholonomic robots using decentralized mpc," in Net- working, Sensing and Control (ICNSC), 2013 10th IEEE International Conference on. IEEE, 2013, pp. 112–117. [4] Z. Ma, I. Hiskens, and D. Callaway, "A decentralized mpc strategy for charging large populations of plug-in electric vehicles," IFAC Proceedings Volumes, vol. 44, no. 1, pp. 10 493–10 498, 2011. [5] S. Devasia, D. Iamratanakul, G. Chatterji, and G. Meyer, "Decoupled conflict-resolution procedures for decentralized air traffic control," IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 2, pp. 422–437, 2011. [6] V. R. Desaraju and J. P. How, "Decentralized path planning for multi- agent teams in complex environments using rapidly-exploring random trees," in Robotics and Automation (ICRA), 2011 IEEE International Conference on. IEEE, 2011, pp. 4956–4961. [7] D. Raimondo, L. Magni, and R. Scattolini, "Decentralized mpc of nonlinear systems: An input-to-state stability approach," International Journal of Robust and Nonlinear Control, vol. 17, no. 17, pp. 1651– 1667, 2007. [8] A. Richards and J. How, "Decentralized model predictive control of cooperating uavs," in Decision and Control, 2004. CDC. 43rd IEEE Conference on, vol. 4. IEEE, 2004, pp. 4286–4291. [9] T. Keviczky, F. Borrelli, K. Fregene, D. Godbole, and G. J. Balas, "Decentralized receding horizon control and coordination of au- tonomous vehicle formations," IEEE Transactions on Control Systems Technology, vol. 16, no. 1, pp. 19–33, 2008. [10] P. Trodden and A. Richards, "Cooperative distributed mpc of linear systems with coupled constraints," Automatica, vol. 49, no. 2, pp. 479– 487, 2013. [11] P. Ogren, M. Egerstedt, and X. Hu, "A control lyapunov function approach to multi-agent coordination," in Decision and Control, 2001. Proceedings of the 40th IEEE Conference on, vol. 2. IEEE, 2001, pp. 1150–1155. [12] A. Bicchi and L. Pallottino, "On optimal cooperative conflict res- olution for air traffic management systems," IEEE Transactions on Intelligent Transportation Systems, vol. 1, no. 4, pp. 221–231, 2000. [13] P. Trodden and A. Richards, "Distributed model predictive control of linear systems with persistent disturbances," International Journal of Control, vol. 83, no. 8, pp. 1653–1663, 2010. [14] S. L. Richter and R. A. Decarlo, "Continuation methods: Theory and applications," IEEE Transactions on Systems, Man, and Cybernetics, no. 4, pp. 459–464, 1983. [15] T. Ohtsuka, "Continuation/gmres method for fast algorithm of non- linear receding horizon control," in Decision and Control, 2000. Proceedings of the 39th IEEE Conference on, vol. 1. IEEE, 2000, pp. 766–771. [16] --, "A continuation/gmres method for fast computation of nonlinear receding horizon control," Automatica, vol. 40, no. 4, pp. 563–574, 2004. [17] A. E. Bryson, Applied optimal control: optimization, estimation and control. CRC Press, 1975. [18] D. Liberzon, Calculus of variations and optimal control theory: a concise introduction. Princeton University Press, 2012. [19] C. Kelley, "Iterative methods for linear and nonlinear equations, siam, philadelphia, 1995," MR 96d, vol. 65002. [20] Y. Saad and M. H. Schultz, "Gmres: A generalized minimal residual algorithm for solving nonsymmetric linear systems," SIAM Journal on scientific and statistical computing, vol. 7, no. 3, pp. 856–869, 1986. [21] T. Hashimoto, Y. Yoshioka, and T. Ohtsuka, "Receding horizon control with numerical solution for spatiotemporal dynamic systems," in Decision and Control (CDC), 2012 IEEE 51st Annual Conference on. IEEE, 2012, pp. 2920–2925. [22] D. A. Knoll and D. E. Keyes, "Jacobian-free newton–krylov methods: a survey of approaches and applications," Journal of Computational Physics, vol. 193, no. 2, pp. 357–397, 2004. [23] T. Hashimoto, Y. Yoshioka, and T. Ohtsuka, "Receding horizon control for nonlinear parabolic partial differential equations with boundary control inputs," in Decision and Control (CDC), 2010 49th IEEE Conference on. IEEE, 2010, pp. 6920–6925. [24] T. Ohtsuka and H. A. Fujii, "Real-time optimization algorithm for nonlinear receding-horizon control," Automatica, vol. 33, no. 6, pp. 1147–1154, 1997. [25] A. Gray, Y. Gao, T. Lin, J. K. Hedrick, H. E. Tseng, and F. Borrelli, "Predictive control for agile semi-autonomous ground vehicles using motion primitives," in American Control Conference (ACC), 2012. IEEE, 2012, pp. 4239–4244. [26] Y. Gao, T. Lin, F. Borrelli, E. Tseng, and D. Hrovat, "Predictive control of autonomous ground vehicles with obstacle avoidance on slippery roads," in ASME 2010 dynamic systems and control conference. American Society of Mechanical Engineers, 2010, pp. 265–272. [27] P. Falcone, F. Borrelli, J. Asgari, H. Tseng, and D. Hrovat, "Low complexity mpc schemes for integrated vehicle dynamics control prob- lems," in 9th international symposium on advanced vehicle control, 2008. [28] U. Rosolia, F. Braghin, A. Alleyne, and E. Sabbioni, "Nlmpc for real time path following and collision avoidance," SAE International Journal of Passenger Cars-Electronic and Electrical Systems, vol. 8, no. 2015-01-0313, pp. 401–405, 2015. [29] U. Rosolia, S. De Bruyne, and A. G. Alleyne, "Autonomous vehicle control: A nonconvex approach for obstacle avoidance," IEEE Trans- actions on Control Systems Technology, 2016. [30] A. Micaelli and C. Samson, "Trajectory tracking for unicycle-type and two-steering-wheels mobile robots," Ph.D. dissertation, INRIA, 1993.
0905.0747
1
0905
2009-05-06T06:11:29
Self-stabilizing Determinsitic Gathering
[ "cs.MA" ]
In this paper, we investigate the possibility to deterministically solve the gathering problem (GP) with weak robots (anonymous, autonomous, disoriented, deaf and dumb, and oblivious). We introduce strong multiplicity detection as the ability for the robots to detect the exact number of robots located at a given position. We show that with strong multiplicity detection, there exists a deterministic self-stabilizing algorithm solving GP for n robots if, and only if, n is odd.
cs.MA
cs
Self-stabilizing Deterministic Gathering Yoann Dieudonn´e1 Franck Petit2 1 MIS CNRS, Universit´e de Picardie Jules Verne Amiens, France 2 INRIA, LIP UMR 5668, Universit´e de Lyon / ENS Lyon, France Abstract. In this paper, we investigate the possibility to deterministi- cally solve the gathering problem (GP) with weak robots (anonymous, autonomous, disoriented, deaf and dumb, and oblivious). We introduce strong multiplicity detection as the ability for the robots to detect the exact number of robots located at a given position. We show that with strong multiplicity detection, there exists a deterministic self-stabilizing algorithm solving GP for n robots if, and only if, n is odd. Keywords: Distributed Coordination, Gathering, Mobile Robot Net- works, Self-stabilization. 1 Introduction The distributed systems considered in this paper are teams (or swarms) of mobile robots (sensors or agents). Such systems supply the ability to collect (to sense) environmental data such as temperature, sound, vibration, pressure, motion, etc. The robots use these sensory data as an input in order to act in a given (sometimes dangerous) physical environment. Numerous potential applications exist for such multi-robot systems, e.g., environmental monitoring, large-scale construction, risky area surrounding, exploration of an unknown area. All these applications involve basic cooperative tasks such as pattern formation, gathering, scatter, leader election, flocking, etc. Among the above fundamental coordination tasks, we address the gathering (or Rendez-Vous) problem. This problem can be stated as follows: robots, ini- tially located at various positions, gather at the same position in finite time and remain at this position thereafter. The difficulty to solve this problem greatly de- pends on the system settings, e.g., whether the robots can remember past events or not, their means of communication, their ability to share a global property like observable IDs, sense of direction, global coordinate, etc. For instance, assuming that the robots share a common global coordinate system or have (observable) IDs allowing to differentiate any of them, it is easy to come up with a deter- ministic distributed algorithm for that problem. Gathering turns out to be very difficult to solve with weak robots, i.e., devoid of (1) any (observable) IDs al- lowing to differentiate any of them (anonymous), (2) any central coordination mechanism or scheduler (autonomous), (3) any common coordinate mechanism or common sense of direction (disoriented), (4) means of communication allow- ing them to communicate directly, e.g., by radio frequency (deaf and dumb), and (5) any way to remember any previous observation nor computation performed in any previous step (oblivious). Every movement made by a robot is then the result of a computation having observed positions of the other robots as a only possible input. With such settings, assuming that robots are points evolving on the plane, no solution exists for the gathering problem if the system contains two robots only [19]. It is also shown in [15] that gathering can be solved only if the robots have the capability to know whether several robots are located at the same position (multiplicity detection). Note that a strong form of such an ability is that the robot are able to count the exact number of robots located at the same position. A weaker form consists in considering the detector as an abstract device able to say if any robot location contains either exactly one or more than one robot. In this paper, we investigate the possibility to deterministically solve the gathering problem with weak robots (i.e., anonymous, autonomous, disoriented, deaf and dumb, and oblivious). This problem has been extensively studied in the literature assuming various settings. For instance, the robots move either among the nodes of a graph [11,13], or in the plane [1,2,4,12,14,15,19], their visibility can be limited (visibility sensors are supposed to be accurate within a constant range, and sense nothing beyond this range) [12,17], robots are prone to faults [1,7]. In this paper, we address the stabilization aspect of the gathering problem. A deterministic system is (self-)stabilizing if, regardless of the initial states of the computing units, it is guaranteed to converge to the intended behavior in a finite number of steps [9]. To our best knowledge, all the above solutions assume that in the initial configuration, no two robots are located at the same position. So, effectively, as already noticed in [6,8], this implies that none of them is "truly" self-stabilizing -- initial configurations where robots are located at the same positions are avoided. Note that surprisingly, such an assumption prevents to initiate the system where the problem is solved, i.e., initially all the robots occupy the same position. In this paper, we study the gathering problem assuming any arbitrary ini- tial configurations, that is in which some robots can share the same positions. Clearly, assuming weak multiplicity detection (each robot location contains ei- ther exactly one or more than one robot), the problem cannot be solved de- terministically. Informally, if all the robots are at exactly two positions, then there is no way to maintain a particular position as an invariant. So, there are some executions where the system behaves as if it contains exactly two robots, leading to the impossibility result in [19]. We introduce the concept of strong multiplicity detection -- the robot are able to count the exact number of robots located at the same position. Even with such capability, the problem cannot be solved deterministically, if the number of robots is even. The proof is similar as above: If initially the robots occupy exactly two positions, then there is no way to maintain a particular position as an invariant. Again, the impossibility result in [19] holds. By contrast, we show that with an odd number of robots, the problem is solvable. Our proof is constructive, as we present and prove a deterministic algorithm for that problem. The proposed solution has the nice property of being self-stabilizing since no initial configuration is excluded. In the next section (Section 2), we describe the distributed system and the problem we consider in this paper. Our main result with its proof is given in Section 3. We conclude this paper in Section 4. Due to the lack of space, some proofs have been moved in the Annexes section. 2 Preliminaries In this section, we define the distributed system and the problem considered in this paper. 2.1 Distributed Model. We adopt the semi-synchoronous model introduced in [18], below referred to as SSM . The distributed system considered in this paper consists of n robots r1, r2, · · · , rn -- the subscripts 1, . . . , n are used for notational purpose only. Each robot ri, viewed as a point in the Euclidean plane, moves on this two-dimensional space unbounded and devoid of any landmark. It is assumed that two or more robots may simultaneously occupy the same physical location. Any robot can observe, compute and move with infinite decimal precision. The robots are equipped with sensors enabling to detect the instantaneous po- sition of the other robots in the plane. In particular, we distinguish two types of multiplicity detection : weak multiplicity detection and strong multiplicity de- tection. Definition 1 (Weak multiplicity detection). [4,10] The robots have weak multiplicity detection if, for every point p, their sensors can detect if there is no robot, there is one robot, or there are more than one robot. In the latter case, the robot might not be capable of determining the exact number of robots. Definition 2 (Strong multiplicity detection). The robots have strong mul- tiplicity detection if, for every point p, their sensors can detect the number of robots on p. Each robot has its own local coordinate system and unit measure. The robots do not agree on the orientation of the axes of their local coordinate system, nor on the unit measure. They are uniform and anonymous, i.e, they all have the same program using no local parameter (such that an identity) allowing to differentiate any of them. They communicate only by observing the position of the others and they are oblivious, i.e., none of them can remember any previous observation nor computation performed in any previous step. Time is represented as an infinite sequence of time instants 0, 1, . . . , j, . . . Let P(t) be the set of the positions in the plane occupied by the n robots at time t. For every t, P(t) is called the configuration of the distributed system in t. Given any point p, p denotes the number of robots located on p. Note that, if the robots do not have the multiplicity detection then p ≤ 1 for all the robots. P(t) expressed in the local coordinate system of any robot ri is called a view.At each time instant t, each robot ri is either active or inactive. The former means that, during the computation step (t, t + 1), using a given algorithm, ri computes in its local coordinate system a position pi(t + 1) depending only on the system configuration at t, and moves towards pi(t + 1) -- pi(t + 1) can be equal to pi(t), making the location of ri unchanged. In the latter case, ri does not perform any local computation and remains at the same position. In every single activation, the distance traveled by any robot r is bounded by σr. So, if the destination point computed by r is farther than σr, then r moves toward a point of at most σr. This distance may be different between two robots. The concurrent activation of robots is modeled by the interleaving model in which the robot activations are driven by a fair scheduler. At each instant t, the scheduler arbitrarily activates a (non empty) set of robots. Fairness means that every robot is infinitely often activated by the scheduler. 2.2 Specification The Gathering Problem (GP) is to design a distributed protocol P for n mobile robots so that the following properties are true : -- Convergence: Regardless of the initial positions of the robots on the plane, all the robots are located at the same position in finite time. -- Closure: Starting from a configuration where all the robots are located at the same position, all the robots are located at the same position thereafter. 3 Gathering with strong multiplicity detection In this section, we prove the following theorem : Theorem 1. With strong multiplicity detection, there exists a deterministic self-stabilizing algorithm solving GP for n robots if, and only if, n is odd. As mentionned in the introduction, even with strong multiplicity detection there do not exist any deterministic algorithm solving GP for an even number of robots. So, to prove Theorem 1 we first give a deterministic self-stabilizing algorithm solving GP for an odd number of robots having the strong multiplicity detection. Then, we prove the correctness of the algorithm. 3.1 Deterministic Self-stabilizing Algorithm for an odd number of robots. In this subsection, we give a deterministic self-stabilizing algorithm solving GP for an odd number of robots. We first provide particular notations, basic defi- nitions and properties that we use for symplifying the design and proofs of the protocol. Next, the protocol is presented. Notations, Basic Definitions and Properties. Given a configuration P, M axP indicates the set of all the points p such that p is maximal. In other terms, ∀pi ∈ M axP and ∀pj ∈ P, we have pi ≥ pj. M axP will be the cardinality of M axP. Remark 1. Since the robots have the strong multiplicity detection, then they are able to compute p for every point p ∈ P. In particular, all the robots can determine M axP(t) at each time instant t. Given three distinct points r, r′ and c in the plane, we say that the two half-lines [c, r) and [c, r′) divide the plane into two sectors if and only if -- either r, r′ and c are not colinear, -- or r, r′ and c are colinear and c is between r and r′ on the segment [r, r′]. If it exists then this pair of sectors is denoted by {rcr′, rcr′} and we assume that the two half-lines [c, r) and [c, r′) do not belong to any sector in {rcr′, rcr′} . Note that, if the three points r, r′ and c are not colinear then one of two sectors is convex (angle centered at c between r and r′ ≤ 180o) and the other one is concave (angle centered at c between r and r′ > 180o). Otherwise, the three points r, r′ and c are colinear and the two sectors are convex and more precisely they are straight (both conjugate angles centered at c between r and r′ are equal to 180o). Definition 3 (Smallest enclosing circle). [6] Given a set P of n ≥ 2 points p1, p2, · · · , pn on the plane, the smallest enclosing circle of P , called SEC(P), is the smallest circle enclosing all the positions in P. It passes either through two of the positions that are on the same diameter (opposite positions), or through at least three of the positions in P. When no ambiguity arises, SEC(P) will be shortly denoted by SEC and SEC(P) ∩ P will indicate the set of all the points both on SEC(P) and P. Besides, we will say that a robot r is inside SEC if, and only if, there is not located on the circumference of SEC. In any configuration P, SEC is unique and can be computed in linear time [3]. Given a set P of n ≥ 2 points p1, p2, · · · , pn on the plane and SEC(P) its smallest enclosing circle, Rad(SEC(P)) will indicate the length of the radius of SEC(P). The next lemma contains a simple fact. Lemma 1. Let P1 be an arbitrary configuration of n points. Let P2 be a con- figuration obtained by pushing inside SEC(P1) all the points which are in P1 ∩ SEC(P1). We have Rad(SEC(P2)) < Rad(SEC(P1)). Let S and C be respectively a sector in {pcp′, pcp′} and a circle centered at c. We denote by arc(C, S) the arc of the circle C inside S. Given a set P of n ≥ 2 points p1, p2, · · · , pn on the plane and SEC(P) its smallest enclosing circle centered at c, we say that p and p′ are adjacent on SEC(P) if, and only if, p and p′ are in P and there exists one sector S ∈ {pcp′, pcp′} such that there is no point in arc(SEC(P), S) ∩ P. The following property is fundamental about smallest enclosing circles Property 1. [5] Let P and c be respectively a set of n ≥ 2 points p1, p2, · · · , pn on the plane and the center of SEC(P). If p and p′ are adjacent on SEC(P) then, there does not exist a concave sector S in {pcp′, pcp′} such that there is no point in arc(SEC(P), S) ∩ P. Property 2 is more general than Property 1 Property 2. Let P and c be respectively a set of n ≥ 2 points p1, p2, · · · , pn on the plane and the center of SEC(P). If p and p′ are in P then, there does not exist a concave sector S in {pcp′, pcp′} such that there is no point in S ∩ P. Proof. Assume by contradiction that p and p′ are in P and, there exists a concave sector S in {pcp′, pcp′} such that there is no point in S ∩ P. So, there is no point in arc(SEC(P), S) ∩ P. We deduce that there exists a concave sector S ′ in {qcq′, qcq′} such that q and q′ are adjacent on SEC(P) and there is no point in arc(SEC(P), S ′) ∩ P. Contradiction with Property 1. Figure 1 illustrates Property 2. r i c C 1 kr r j C 2 Fig. 1. C2 is an enclosing circle for the three points ri, rj and rk. However, there is no point in the intersection between C2 and the concave sector formed by ri, rj and the center c of C2. So, C2 can be replace by a smaller enclosing circle, here C1, even if all the points are on the circumference of C2. Observation 1 Given three colinear points, c,r,r'. If c is on the segment [r, r′], then c cannot be on the circumference of a circle enclosing r and r′. Definition 4 (Convex Hull). [16] Given a set P of n ≥ 2 points p1, p2, · · · , pn on the plane, the convex hull of P, denoted H(P) , is the smallest polygon such that every point in P is either on an edge of H(P) or inside it. Informally, it is the shape of a rubber-band stretched around p1, p2, · · · , pn. The convex hull is unique and can be computed with time complexity O(n log n) [16]. When no ambiguity arises, H(P) will be shortly denoted by H and H(P) ∩ P will indicate the set of the positions both on H(P) and P. From Definition 4, we deduce the following property : Property 3. Let P be respectively a set of n ≥ 2 points that are not on the same line and let H(P) be a convex hull. The two following properties are equivalent 1. Any point c, not necessarily in P, is located on H (either on a vertice or an edge) 2. there is a concave or a straight sector S in {rcr′, rcr′} such that r and r′ are in P and there exists no point ∈ P ∩ S. The relationship between the smallest enclosing circle and the convex hull is given by the following property Property 4. [3] Given a set P of n ≥ 2 points on the plane. We have SEC(P) ∩ P ⊆ H(P) ∩ P . The Algorithm Based on the definitions and basic properties introduced above, we are now ready to present a deterministic self-stabilizing algorithm that allows n robots (n odd) to gather in a point, regardless of the initial po- sitions of the robots on the plane. The idea of our algorithm is as follows : It consists in transforming an arbitrary configuration P into one where there is exactly one point pmax ∈ M axP. When such a configuration is reached, all the robots which are not located at pmax move towards pmax avoiding to create another point q than pmax such that q ≥ pmax. When M axP 6= 1, we will distinguish two cases : M axP = 2 and M axP ≥ 3. If M axP = {pmax1; pmax2}, then each robot which is not located neither on pmax1 nor pmax2 moves towards its closest position ∈ M axP by avoiding to create an adding maximal point. Since the number of robots is odd, we have eventually either pmax1 > pmax2 or pmax1 > pmax2 and then, M axP = 1. For the case M axP ≥ 3, our strategy consists in trying to create a unique maximal point inside SEC. To reach such a configuration, we distinguish three subcases : 1. If there is no robot inside SEC, then all the robots are allowed to move towards the center of SEC. 2. If all the robots inside SEC are located at the center of SEC, then only the robots located in SEC ∩ M axP are allowed to move towards the center of SEC. 3. If some robots inside SEC are not located at the center of SEC, then only the robots inside SEC are allowed to move towards the center of SEC. The main algorithm is shown in Algorithm 1. In Algorithm 1, we use two subroutines : move to caref ully(p) and choose closest position(p1, p2). The for- mer allows a robot r, located at q, to move towards p only if there is no robot on the segment [q, p] except the robots located on p or the robots located on q. The latter one returns the closest position to r among {p1, p2}. If the distance between r and p1 is equal to the distance between r and p2 then the function returns p1. Algorithm 1 Gathering for an odd number of robots, executed by each robot. P := the set of all the positions; M axP := the set of all the points p ∈ P such that p is maximal; if M axP = 1 then pmax := the unique point in M axP; I am not on pmax; if then move to caref ully(pmax); endif endif if M axP = 2 then pmax1 := the first point in M axP; pmax2 := the second point in M axP; if then q := choose closest position(pmax1, pmax2); I am not neither on pmax1 nor pmax2 move to caref ully(q); endif endif if M axP ≥ 3 then SEC := the smallest circle enclosing all the points in P; c := the center of SEC; Boundary := SEC ∩ P; Inside := P \ Boundary; if Inside 6= ∅ then if All the robots ∈ Inside are located at c then if I am in (Boundary ∩ M axP) then move to(c); endif else if I am in Inside then move to(c); endif endif else move to(c); endif endif Proof of closure Lemma 2 (Closure). According to Algorithm 1, if all the robots are located at the same position p, then all the robots are located at the same position thereafter. Proof of convergence Cases M axP = 1 and M axP = 2. Lemma 3. Let P be an arbitrary configuration for an odd number of n robots. According to Algorithm 1, if M axP = 1 then all the robots are located at the same position in finite time. Lemma 4. Let P be an arbitrary configuration for an odd number of n robots. According to Algorithm 1, if M axP = 2 then all the robots are located at the same position in finite time. Case M axP ≥ 3. In this paragraph, we prove that starting from a configuration where M axP ≥ 3, all the robots are located at the same position in finite time. More precisely, we consider the case where there exists at least one robot inside SEC(P(t)) ( refer to Lemma 7) and the case where there is no robot inside SEC(P(t)) ( refer to Lemma 8). In order to prove Lemma 7, we use Lemmas 5 and 6. In particular, Lem- mas 5 shows that, under specific conditions, the center of SEC(P(t)) is inside SEC(P(t + 1)) even if SEC(P(t)) 6= SEC(P(t + 1)) or the center of SEC(P(t)) is not the center of SEC(P(t + 1)). The proof of Lemma 5 is organized in two parts. In the former one, we consider the case where the center of SEC is also on the convex hull (see Figure 2.c). In the latter one, we consider the case where the center of SEC is not on the convex hull. Lemma 5. Let P(t) be a configuration such that M axP ≥ 3 and there exists at least one robot inside SEC(P(t)). According to Algorithm 1, if both conditions are true : 1. some robots ∈ P(t) ∩ SEC(P(t)) move in straight line toward the center c of SEC(t) and, 2. for every p ∈ P(t) ∩ SEC(P(t)) there exists at least one robot in p which does not reach c at time t + 1 then, the center of SEC(P(t)) is inside SEC(P(t + 1)) at time t + 1. Proof. Let c be the center of SEC(t) at time t. We consider two cases, depending on whether c is on the convex hull H(P(t)) or not, at time t. -- c is on H(P(t)) at time t. From Property 3, there exists a concave or a straight sector S in {xcy, xcy} such that x and y are in P(t) and there is no point ∈ P(t) ∩ S. However, from Property 2, we know that there do not exist two points x and y in P(t) such that there exists a concave sector S (5) (2) (1) (3) (2) C (5) (a) (2) (1) (4) (3) C (3) (1) (4) (b) Fig. 2. The numbers between parenthesis indicate the multiplicity. In Figure a, we have a configuration P(t) where the center c of SEC(P(t)) is inside the convex hull. Figure b, we have configuration P(t + 1) where some robots have moved toward c and c is inside the new convex hull. in {xcy, xcy} and P(t) ∩ S = ∅. So, there exists only a straight sector S in {xcy, xcy} such that x and y are in P(t) and there is no point ∈ P(t) ∩ S. Consequently, c is on the segment [x, y] at time t. Since the robots move in straight line towards c and since there exist some robots located at x and some robot located at y which do not reach c at time t + 1 then, c is on the segment [r, s] at time t + 1 with r and s ∈ P(t + 1). From Observation 1, we deduce that c is inside SEC(P(t + 1)) at time t + 1. -- c is not on H(P(t)) at time t. In this case, all the points in P(t) are not on the same line otherwise c would have been on H(P(t)). So, from Property 3 we know that there does not exist a concave or a straight sector S in {xcy, xcy} such that x and y are in P(t) and there is no point ∈ P(t) ∩ S. Since the robots move in straight line towards c and since for each point p ∈ P(t) there exists at least one robot located on p which does not reach c at time t+1 then, we deduce that there does not exist a concave or a straight sector S in {rcs, rcs} such that r and s are in P(t + 1) and there is no point ∈ P(t + 1) ∩ S (Figures 2.a and 2.b illustrate this fact). So, from Property 3 c is inside H(P(t + 1)) at time t + 1, and from Lemma 4 we deduce that c is inside SEC(P(t + 1)). Lemma 6. Let P(t) be a configuration such that M axP ≥ 3 and there exists at least one robot inside SEC(P(t)). If any robot r is inside SEC(P(t)) and r is located on the boundary of SEC(P(t + 1)) then M axP(t + 1) ≤ 2. Proof. By contradiction assume that r is inside SEC(P(t)) and r is located on the boundary of SEC(P(t + 1)) and M axP(t + 1) > 2. Let c be the cen- ter of SEC(P(t)) at time t. From assumption, some robots on the boundary of SEC(P(t)) have moved toward the center of SEC(P(t)). According to Algo- rithm 1, that implies that all the robots inside SEC(P(t)), notably r, are located at the center of SEC(P(t)) at time t. So, c is on the boundary of SEC(P(t+ 1)). From Lemma 5, we deduce that there exists a point p ∈ P(t) ∩ SEC(P(t)) such that all the robots in p have reached c at time t + 1. However, according to Algorithm 1 only the robots located in ∈ M axP(t) ∩ SEC(P(t)) are allowed to move at time t. Therefore, for every point p 6= c we have c > p at time t + 1. Hence, M axP(t + 1) = {c} i.e., M axP(t + 1) = 1. A contradiction. Lemma 7. Let P(t) a configuration such that M axP ≥ 3 and there exists at least one robot inside SEC(P(t)). According to Algorithm 1, all the robots are located at the same position in finite time. Proof. Assume by contradiction M axP ≥ 3 forever. From Lemma 6, we know that the robots inside SEC(P(t)) are inside SEC(P(t + 1)). So, by induction we deduce that the robots inside SEC(P(t)) are inside SEC(P(ti)) for all ti ≥ t. From Lemma 1, fairness and because of the fact that each robot r can move to at least a constant distance σr > 0 in one step, we know that there exists a time instant tk where the number of robots at the center of SEC(P(tk)) will be greater than the number of robots not located at the center of SEC(P(tk)). So, M axP = 1 : contradiction. So, M axP ≤ 2 in finite time and from Lemmas 3 and 4 all the robots are located at the same position in finite time. Lemma 8. Let P(t) be a configuration such that M axP ≥ 3 and there exists no robot inside SEC(P(t)). According to Algorithm 1, all the robots are located at the same position in finite time. Proof. According to Algorithm 1, all the robots may decide to move toward the center of SEC. Since each robot r can move to at least a constant distance σr > 0 in one step, if all the robots are always on the boundary of SEC(P) then, by fairness, the gathering problem is solved in finite time. Otherwise, -- either there exists tk > t such that M axP(tk) ≥ 3 and there exists at least one robot inside SEC(P(t)) : From Lemma 7, we deduce that all the robots are located at the same position in finite time, -- or there exists tk > t such that M axP(tk) ≤ 2 : from Lemmas 3 and 4 all the robots are located at the same position in finite time. 4 Conclusion Assuming strong multiplicity detection, we provided a complete characterization (necessary and sufficient conditions) to solve the gathering problem. Note that we do not know whether strong multiplicity detection is a necessary condition to solve the gathering problem. In future works, we would like to study the weakest minimal multiplicity detection that solves this problem and under which conditions. Note that the gathering problem seems to be the only positioning problem that can be deterministically and self-stabilizing solved. Indeed, since initially the robots can share the same positions, there exists no deterministic algorithm to scatter them in the plane [8]. References 1. Noa Agmon and David Peleg. Fault-tolerant gathering algorithms for autonomous mobile robots. SIAM J. Comput., 36(1):56 -- 82, 2006. 2. H Ando, Y Oasa, I Suzuki, and M Yamashita. A distributed memoryless point convergence algorithm for mobile robots with limited visibility. IEEE Transaction on Robotics and Automation, 15(5):818 -- 828, 1999. 3. P Chrystal. On the problem to construct the minimum circle enclosing n given points in a plane. In the Edinburgh Mathematical Society, Third Meeting, page 30, 1885. 4. M Cieliebak, P Flocchini, G Prencipe, and N Santoro. Solving the robots gath- ering problem. In Proceedings of the 30th International Colloquium on Automata, Languages and Programming (ICALP 2003), pages 1181 -- 1196, 2003. 5. Mark Cieliebak. Gathering non-oblivious mobile robots. In LATIN, pages 577 -- 588, 2004. 6. X Defago and A Konagaya. Circle formation for oblivious anonymous mobile robots with no common sense of orientation. In 2nd ACM International Annual Workshop on Principles of Mobile Computing (POMC 2002), pages 97 -- 104, 2002. 7. Xavier D´efago, Maria Gradinariu, St´ephane Messika, and Philippe Raipin Parv´edy. Fault-tolerant and self-stabilizing mobile robots gathering. In DISC, pages 46 -- 60, 2006. 8. Yoann Dieudon´e and Franck Petit. Scatter of robots. Parallel Processing Letters, 19(1):175 -- 184, 2009. 9. S. Dolev. Self-Stabilization. The MIT Press, 2000. 10. Paola Flocchini, David Ilcinkas, Andrzej Pelc, and Nicola Santoro. Remembering without memory: Tree exploration by asynchronous oblivious robots. In SIROCCO, pages 33 -- 47, 2008. 11. Paola Flocchini, Evangelos Kranakis, Danny Krizanc, Nicola Santoro, and Cindy Sawchuk. Multiple mobile agent rendezvous in a ring. In LATIN 2004: Theoretical Informatics, 6th Latin American Symposium, volume 2976 of Lecture Notes in Computer Science, pages 599 -- 608. Springer, 2004. 12. Paola Flocchini, Giuseppe Prencipe, Nicola Santoro, and Peter Widmayer. Gath- ering of asynchronous robots with limited visibility. Theor. Comput. Sci., 337(1- 3):147 -- 168, 2005. 13. Ralf Klasing, Euripides Markou, and Andrzej Pelc. Gathering asynchronous obliv- ious mobile robots in a ring. Theor. Comput. Sci., 390(1):27 -- 39, 2008. 14. G Prencipe. Corda: Distributed coordination of a set of autonomous mobile robots. In Proceedings of the Fourth European Research Seminar on Advances in Dis- tributed Systems (ERSADS 2001), pages 185 -- 190, 2001. 15. Giuseppe Prencipe. Impossibility of gathering by a set of autonomous mobile robots. Theor. Comput. Sci., 384(2-3):222 -- 231, 2007. 16. Franco P. Preparata and S. J. Hong. Convex hulls of finite sets of poin ts in two and three dimensions. Commun. ACM, 20(2):87 -- 93, 1977. 17. Samia Souissi, Xavier D´efago, and Masafumi Yamashita. Using eventually consis- tent compasses to gather memory-less mobile robots with limited visibility. ACM Trans. Auton. Adapt. Syst., 4(1):1 -- 27, 2009. 18. I Suzuki and M Yamashita. Agreement on a common x-y coordinate system by a group of mobile robots. Intelligent Robots: Sensing, Modeling and Planning, pages 305 -- 321, 1996. 19. I Suzuki and M Yamashita. Distributed anonymous mobile robots - formation of geometric patterns. SIAM Journal of Computing, 28(4):1347 -- 1363, 1999. Annexes Lemma 2. According to Algorithm 1, if all the robots are located at the same position p, all the robots are located at the same position thereafter. Proof. If all the robots are located at the same position p, then M axP = 1 and all the robots are located at the unique position p ∈ M axP. According to Algorithm 1, in the case M axP = 1 the robots located on p remains idle. So, all the robots are located at the same position forever. Lemma 3. Let P be an arbitrary configuration for an odd number of n robots. According to Algorithm 1, if M axP = 1 then all the robots are located at the same position in finite time. Proof. Let pmax be the unique point in M axP(t). According to Algorithm 1, the robots located on pmax during step (t, t+1) remains idle. Moreover, according to Algorithm 1 and Function move to caref ully(), if two robots ri and rj are not at the same point at time t, i.e., pi(t) 6= pj(t) then pi(t + 1) 6= pj(t + 1) at time t + 1 unless they have reached pmax. Hence, pmax remains the unique point in M axP(tk), for all tk ≥ t. So, according to Algorithm 1 and by fairness, we deduce that pmax = n in finite time. Lemma 4. Let P be an arbitrary configuration for an odd number of n robots. According to Algorithm 1, if M axP = 2 then all the robots are located at the same position in finite time. Proof. The proof is organized as follows : First, we prove that there exists tk ≥ t such that M axP(tk) 6= 2. Then, we prove that there does not exist any time tk ≥ t such that M axP(tk) ≥ 3. Finally, we deduce that Lemma 3 holds. 1. Assume by contradiction that there does not exist any time tk ≥ t such that M axP(tk) 6= 2. Consequently, for every tk ≥ t, M axP(tk) = 2. Let pmax1 and pmax2 be the two points in M axP(t) at time t. According to Algorithm 1, the robots located either on pmax1 or on pmax2 during step (t, t + 1) remains idle. Moreover, according to Algorithm 1 and Function move to caref ully(), if two robots ri and rj are not at the same point at time t, i.e., pi(t) 6= pj(t) then pi(t + 1) 6= pj(t + 1) at time t + 1 unless either ri and rj have reached pmax1 or ri and rj have reached pmax2. So, by induction we deduce that pmax1 and pmax2 remains the only positions in M axP(tk) for every tk ≥ t. By fairness, we deduce that, all the robots are either at pmax1 or at pmax2 in finite time. However, since the number of robots is odd then, we have either pmax1 > pmax2 or pmax1 < pmax2. Hence, M axP(tk) = 1 : Contradiction. 2. Assume by contradiction that there exists tk ≥ t such that M axP(tk) ≥ 3. Without lost of generality, we assume that tk is the first time for which M axP(tk) ≥ 3. Clearly, there does not exist any time tl such that t < tl < tk and M axP(tk) = 1 : Indeed from Lemma 2 and the proof of Lemma 3, once there exist a unique point pmax then, it remains the unique point in M axP forever and that would be a contradiction. Hence, M axP(tk − 1) = 2. Let pmax1 and pmax2 be the two points in M axP(tk − 1) at time tk − 1. According to Algorithm 1, the robots located either on pmax1 or on pmax2 during step (t, t + 1) remains idle. Besides, according to Algorithm 1 and Function move to caref ully(), if two robots ri and rj are not at the same point at time tk − 1, i.e., pi(tk − 1) 6= pj(tk − 1) then pi(k) 6= pj(k) at time tk unless either ri and rj have reached pmax1 or ri and rj have reached pmax2. So, M axP(tk) ≤ 2 at time tk. A contradiction. From above, we deduce that if M axP(t) = 2 at time t then, according to Algorithm 1 there exists tk, tk > t such that M axP(tk) = 1. So, from Lemma 3, we know that all the robots will be located at the same position in finite time.
1107.3225
1
1107
2011-07-16T12:47:54
An Agent-based Strategy for Deploying Analysis Models into Specification and Design for Distributed APS Systems
[ "cs.MA" ]
Despite the extensive use of the agent technology in the Supply Chain Management field, its integration with Advanced Planning and Scheduling (APS) tools still represents a promising field with several open research questions. Specifically, the literature falls short in providing an integrated framework to analyze, specify, design and implement simulation experiments covering the whole simulation cycle. Thus, this paper proposes an agent-based strategy to convert the 'analysis' models into 'specification' and 'design' models combining two existing methodologies proposed in the literature. The first one is a recent and unique approach dedicated to the 'analysis' of agent-based APS systems. The second one is a well-established methodological framework to 'specify' and 'design' agent-based supply chain systems. The proposed conversion strategy is original and is the first one allowing simulation analysts to integrate the whole simulation development process in the domain of distributed APS.
cs.MA
cs
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org An Agen t-b ased S tra tegy for Dep loy ing Ana lys is Mode ls into Spec i f icat ion and Des ign for D is tr ibu ted APS Sys tems 7 Luis Antonio de Santa-Eulalia1, Sophie D’Amours2 and Jean-Marc Frayret3 1 Téluq, Université du Québec à Montréal Quebéc City, Québec, Canada 2 Université Laval Quebéc City, Québec, Canada 3 École Polytechnique de Montréal Montréal, Québec, Canada Abstract Despite the extensive use of the agent technology in the Supply Chain Management field, its integration with Advanced Planning and Scheduling (APS) tools still represents a promising field with several open research questions. Specifically, the literature falls short in providing an integrated framework to analyze, specify, design and implement simulation experiments covering the whole simulation cycle. Thus, this paper proposes an agent-based strategy to convert the ‘analysis’ models into ‘specification’ and ‘design’ models combining two existing methodologies proposed in the literature. The first one is a recent and unique approach dedicated to the ‘analysis’ of agent-based APS systems. The second one is a well-established methodological framework to ‘specify’ and ‘design’ agent-based supply chain systems. The proposed conversion strategy is original and is the first one allowing simulation analysts to integrate the whole simulation development process in the domain of distributed APS. Keywords: Advanced Planning and Scheduling (APS), Agent- Based Simulation, Methodological Framework, Analysis, Specification and Design, FAMASS. 1. Introduction Advanced Planning and Scheduling (APS) systems comprise a set of techniques for the supply chain planning over short, intermediate, and long-term time periods. They employ advanced mathematical algorithms or logic to perform optimization or simulation on finite capacity scheduling, sourcing, capital planning, resource planning, forecasting, demand management, and other. APS simultaneously considers a range of constraints and business rules to provide real-time planning and scheduling, decision support, available-to-promise, and capable-to-promise capabilities. In addition, these systems often generate and evaluate multiple ‘what-if’ scenarios [1]. The use of these sophisticated optimization approaches in complex real-life supply chain situations has recently become possible mainly due to the increased computing power of companies [2]. Despite the contribution of APS systems to the supply chain planning domain, some criticism exists in this area [3]. Traditional APSs are basically monolithic systems that cannot model and take into account the complex everyday interactions and information exchanges between partners. For example, APS systems are deficient in handling that allow interaction mechanisms sophisticated the delegation implementation of and coordination approaches, which are methodologies based on negotiation, and cooperation strategies [4, 5]. As a result, the focus on relationships in a multi-tier environment has only recently been claimed by the APS community [6]. To cope with this problem, recent advances in supply chain planning have arisen in the area of agent technology. This technology is able to capture the distributed nature of supply chain entities (e.g. customers, manufacturers, logistics operators etc.) and mimic their business behaviours (e.g. making advanced production decisions and negotiating with other supply chain members), thus supporting their collaborative planning process. Because of these abilities, among several others described in the IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 8 literature, agent-based supply chain systems have great potential for simulating complex and realistic scenarios [7, 4; 9, 10, 11]. Distributed APS systems employing agent- based technology are referred to in this paper as distributed APS systems [12]. Distributed APS systems are normally developed through the use of modelling and simulation frameworks and, usually, these frameworks provide principles, steps, methods and tools for creating a model. They help people understand the simulation problem to be modelled and translate it into a computing model normally used in simulation experiments in the supply chain planning area. In order to create such models, these frameworks guide simulation modellers through one or several development steps [13]. The first modelling step is analysis, where one defines an abstract description of the modelled supply chain planning system containing functional and non- functional requirements. Next, during specification, the information derived from the analysis is translated into a formal model. As the analysis phase does not necessarily allow obtaining a formal model, the specification examines the analysis requirements and builds a model based on a formal approach. After, in the design phase one creates a data-processing model that describes the specification model in more detail. In the case of an agent- based system, design models are close to how agents operate. Finally, during implementation, the design model is translated into a specific software platform or it is programmed [13]. The problem behind these modelling frameworks is that normally simulation systems are implemented as directed by pre-stated requirements with little explicit focus on system analysis, specification, design and implementation in an integrated manner [14]. According to a recent literature review [15], to the best of our knowledge there are no integrated modelling approaches covering the whole developed process in this area. Moreover, there is one unique ‘analysis’ modelling, the FAMASS (FORAC Architecture for Modelling Agent-based Simulations for Supply chain planning) framework, dedicated to the distributed APS domain, and which was proposed by us recently [21, 22, 23]. Despite its contribution to the literature, FAMASS is limited to the identification and mapping of functional requirements of distributed APS simulations, i.e. the ‘analysis’ phase only. If the simulation analysts desire to go further in the modelling process, they have to employ another ‘specification’ and ‘design’ methodology. This can be laborious, since analysts need to thoroughly master FAMASS and another methodology. In order to facilitate FAMASS analysts in converting their analysis models into specification and design models, this paper proposes an agent-based deployment strategy. This strategy enlarges the FAMASS scope to the other modelling phases, thus covering the entire modelling cycle. By doing so, analysis can go smoother and quicker through this cycle. To do so, we were inspired by the specification and design principles of the Labarthe et al. [9] framework, a recent and field of the in largely cited development methodological agent-oriented framework for supply chain management simulation. Since the focus of this framework is on supply chain management as a general concept (and not specialized in APS systems), we had to perform some minor adaptations to this approach. Despite these adaptations, the main ideas of Labarthe et al. [9] are explicitly considered in the deployment strategy. The Labarthe et al. framework is adopted here because it covers the specification and design phases properly at the business and agent levels, just as FAMASS does, which facilitates the deployment process. This deployment strategy demonstrates that the analysis phase of FAMASS can be integrated with other existing approaches specialized in specification and design modelling. Furthermore, it allows us to avoid the research effort needed to develop a totally new specification and design methodology for the domain, although it would be suitable (and even desirable) for future research initiatives. This paper is organized as follows: a literature review in modelling and simulation for distributed APS systems is presented in Section 2. Section 3 introduces the FAMASS approach, while Section 4 summarizes the Labarthe et al. [9] framework. Next, the deployment process is explained in Section 5. Finally, Section 6 outlines some final remarks and suggests future work. 2. Modelling and Simulation Frameworks for distributed APS The use of agent technology in Supply Chain Management is a fruitful field. From the inaugural work of Fox et al. [16] until today, a large variety of works have appeared to propose different ways of encapsulating supply chain entities and performing simulation experiments. Two types of modelling approaches can be identified in the literature. The first type proposes generic approaches for modelling agent-based supply chain systems in general terms, while the second type proposes a modelling framework into consideration takes that specifically Advanced Planning and Scheduling (APS) tools when IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 9 planning, i.e. the incorporate optimization procedures or finite capacity planning models when performing supply chain planning. APS systems emerged in the last decade to provide a suite of planning and scheduling modules for the firm’s internal supply chain, from the raw materials source to the consumers and covering decisions ranging from the strategic to the operational level [17]. In the first type of approach (general agent-based models), examples of relevant contributions include Labarthe et al. [9], Van der Zee, and Van der Vorst [18], MaMA-S [13]. One of the most cited works in the domain is Labarthe et al. [9], which propose a methodological framework for modelling customer-centric supply chains in the context of mass customization. They define a conceptual model for supply chain modelling and show how the multi-agent system can be implemented using predefined agent platforms. Van der Zee and Van der Vorst [18] propose an agent framework derived from an object-oriented approach to explicitly model control structures of supply chains. MaMA-S [13] provides a multi-agent methodology for a distributed industrial system, which is divided into five main phases and two support phases. The authors propose formal methods the specification, design and for implementation phases, but the analysis phase is not tackled by them. This second type of modelling approach provides more sophisticated models of supply chains by incorporating Advanced Planning and Scheduling routines [12]. These approaches, sometimes called d-APS systems (for distributed APS), are composed of semi-autonomous APS tools, each dedicated to a specialized planning area and that can act together in a collaborative manner employing sophisticated interaction schemas. Examples of this kind of work are Egri et al. [19], Lendermann et al. [20] and Swaminathan et al. [11]. Egri et al. [19] is a Gaia-based approach for modelling advanced distributed supply chain planning for mass customization. They develop a model for representing roles and interactions of agents based on the SCOR (Supply-Chain Operations Reference) model. Lendermann et al. [20] developed an approach to couple discrete-event simulation and APS for collaborative supply chain optimization, based on the HLA (High Level Architecture) technology for distributed simulation synchronization. Swaminathan et al. [11] provide a supply chain modelling framework containing a library of modular and reusable software components, which represents different kinds of supply chain agents, their constituent control elements and their interaction protocols. These simulation and modelling approaches have greatly contributed to the domain, however, in spite of these advances, there exists a relevant gap in this field related to the initial developing step of such simulation systems, the analysis phase [12]. Most of the researched works in the literature suggest approaches for specification and design, and some for implementation, but the analysis phase is not explicitly treated [12, 13, 14, 21]. Most of these works suppose that the analysis phase furnishes the necessary information and concentrate their discussions on further phases, mainly specification and design. The first work dedicated to the analysis of distributed APS systems using the agent-based paradigm is FAMASS [21]. Despite its contribution to the agent-based modelling of distributed APS systems, FAMASS does not cover the specification and design phases of the development process. This is an interesting research gap in the literature. Section 3 details the FAMASS approach for the analysis phase, while Section 4 presents a frequently cited method for specification and design of agent-based supply chain systems from Labarthe et al. [9]. Next, Section 5 combines these two approaches in order to create a deployment strategy to translate analysis models into specification and design. 3. The FAMASS Approach The FAMASS (FORAC Architecture for Modelling Agent-based Simulation for Supply chain planning) is the first and unique modelling approach dedicated to the analysis phase of distributed APS simulations [21, 22, 23]. This approach was recently tested in Santa-Eulalia et al. [24]. It is organized into two abstraction levels: Supply chain: refers to the supply chain planning problem, i.e. the business viewpoint; Agent: the supply chain domain problem is translated into an agent-based view (Figure 1). At these two abstraction levels, four modelling approaches are proposed, namely the General Problem Analysis (GPA), the Distributed Planning Analysis (DPA), the Social Agent Organization Analysis (SAOA) and the Individual Agent Organization Analysis (IAOA), as schematized in Fig. 1. !"#$%&'&()*#&+( !"#"$%&' ($)*&"+',#%&-./.' 0!(,1' 2/.3$/*43"5' (&%##/#6',#%&-./.' 02(,1' 7)8/%&',6"#3' 9$6%#/:%;)#' ,#%&-./.' 07,9,1' <#5/=/54%&' ,6"#3' 9$6%#/:%;)#' ,#%&-./.' 0<,9,1' ' # / % @ ? ' - & > > 4 7 ' 3 # " 6 , Fig. 1: Four main modelling approaches proposed for analysis of supply chain and agent levels [23]. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org These four modelling approaches are explained in the following subsections. are proposed in the framework of Fig. 2, which is called the supply chain planning cube. 10 3.1 General Problem Analysis (GPA) GPA is the first modelling effort where simulation analysts have to think about the simulation problems. The GPA is based on Santa-Eulalia et al. [12], in which a discussion about the simulation objective and the problem structure is provided. Basically, the simulation that the GPA proposes analysis has to take two main aspects into consideration: general aspects and experimental aspects. General aspects represent macro definitions of the simulation problem, including the object and environment to be simulated, the and simulation objectives. hypotheses questions, Experimental aspects are related to the design of experiments, where one defines the factors, uncertainties and key performance indicators of the simulation. These elements refer to the general definition of the simulation problem, according to what is desired to be studied, and it will guide the whole development process. This general definition is then organized through some formalisms from SysML (Systems Modeling Language) [25]. In this case, some Requirements Diagrams help the analysts organize the GPA. An example of how this can be done is provided in [23]. 3.2 Distributed Planning Analysis (DPA) The DPA identifies what the desired supply chain planning entities are, as well as their roles. These entities are identified according to their mission in the supply chain and their planning functions at different decision levels. To identify the main supply chain planning entities, FAMASS employs the concepts of supply chain integration proposed by Shapiro [26]. The author states that supply chain management refers to integrated planning relying on three basic dimensions: i) Intertemporal dimension: refers to different decision levels, i.e. strategic, tactical and operational decision levels; ii) Functional dimension: stands for different planning functions in a supply chain, which can be related to procurement, manufacturing, distribution and sales; iii) Spatial dimension: refers to the fact that supply chains are composed of geographically dispersed units of analysis. This gives rise to the notion of a Supply Chain Block. A Supply Chain Block can be defined as a supply chain planning entity, which is a functional unit capable of: performing part of the supply chain planning decisions or their totality; or performing the execution of the supply chain decisions (part of them or their totality). These entities have a certain degree of autonomy and are able to interact with each other. Possible Supply Chain Blocks for covering the integrated supply chain planning dimensions #&1':" 9):$%);4,/0" 7&048&*$4%)0(" 5%/*4%'6'0$" !" !" @"#4.1A" ?B&)0"C1/*D" #$%&$'()*" +&*,*" -.'%&,/0&1" 23'*4,/0"" <'0=/%:" >&*)1),':" ?1)'0$:" ?/0:46'%:" +B'"#4.1A"?B&)0"?4;'" Fig. 2: Supply Chain Planning Cube [23]. A vertical slice of the supply chain planning cube for one spatial unit of analysis (e.g. facilities) is similar to the planning matrix proposed by Meyr and Stadtler [27], except for the execution level. The supply chain planning cube is an evolution of the planning matrix, due to the fact that it represents the possibility of collaboration among different includes It also traditional APS systems. execution entities. Based on the supply chain cube, one has to perform requirements determination for the simulation aspects. This cube serves as a metamodel to help simulation analysts identify their simulation requirements. For example, the analysts decide which kind of Supply Chain Blocks will be needed in their simulation experiments, providing the basic architectural aspects of the simulation system. Then, their requirements are organized through UML-based use cases and requirements diagrams from SyML. An example of the DPA is provided in Santa-Eulalia et al. [23]. 3.3 Social Agent Organization Analysis (SAOA) So far, the concept of Supply Chain Block has been used to represent entities responsible for part of the supply chain planning. Together they compose a population of entities interacting with each other, having a collective co- existence within the planning system. When these entities incorporate attitudes, orientations and behaviours comprising the interests, needs or intentions of other Supply Chain Blocks, they can be seen as social entities. They can exhibit complex actions that take into account the collectivity. A way to represent social entities is to model them as agents, thus creating multi-agent societies. The general logic indicated that a Supply Chain Block can be directly translated into agents by adding agent abilities to them. This is based on the agentification definition of Shen et al. [28], who explain that the agentification process can be functional-based (i.e. white Supply Chain Block) or physical-based (i.e. gray Supply Chain Block). IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org However, in some situations a Supply Chain Block can be transformed into more than one agent, for example when specialization is required, in which case a planning agent can be specialized according to certain generic responsibility orientations, such as products, processors, processes or projects, to obtain faster or more precise responses for certain given situations. In other situations, apart from agents proceeding from the supply chain planning cube, different intermediary agents can be created to perform activities related to, e.g. the coordination of the agents’ society. In addition, the agentification process can also include the representation of information sources, interfaces and other services. The importance of this discussion relies on the notion that agentification is the basis for two mutually dependent aspects in agent-based systems which define the metamodel for the SAOA: • Social structures: system the agent represent architecture [24] characterizing the blueprint of relationships, giving a high level view of how groups solve problems and the role each agent plays within the structure. There are diverse types of social structures, such as hierarchical, federated and autonomous. Social protocols: are agents’ abilities concerning social aspects, normally related to cooperation principles (i.e. agents have to cooperate in order to plan the entire supply chain). Diverse abilities can be considered, like and multiplication, communication, grouping coordination, collaboration by sharing tasks and resources and conflict resolution through negotiation and arbitration. Different social structures and protocols are provided in Santa-Eulalia [22]. Similar to the DPA, these two aspects of the SAOA serve as a metamodel to help simulation analysis identify their requirements for the simulation model. For example, different social protocols can be tested in the simulation. Then, requirements can be organized through agent-based use cases from AUML (Agent Unified Modelling Language) and requirements diagrams from SysML. An example of the SAOA is provided in Santa-Eulalia et al. [23]. • 3.4 Individual Agent Organization Analysis (IAOA) As mentioned by Ferber [29], the task of assigning roles to every individual agent is normally regarded as the last phase in constructing an organization. The logic is that as soon as one knows what the functions to be assigned are, one defines individual specializations. These local assignments influence social protocols functioning inside their respective social structures. In addition, it also influences the local performance of the supply chain planning entities. This is the main idea of the IAOA. 11 At the individual level, agents can be organized according to different internal architectures but there is little consensus on how to conceive the internal architectures of agents [30] in the literature. In order to cope with this, the metamodel for the IAOA proposes that whatever the state of mind of an agent is (cognitive, reactive or hybrid), and whatever internal architecture an agent employs, an agent can be described simply according to its ‘abilities’. This is the central point when performing simulation. An ‘ability’ can be defined as the quality of being able to perform an action, or facilitate the action’s accomplishment. ‘Abilities’ allow for the implementation of actions and the determination of the system’s behaviour, as well as the determination of its related performance. Based on this notion, the metamodel defines two elements: • The Response Space: stands for a collection of general abilities available for the agents, including very simple reactive abilities or sophisticated cognitive ones. For example, one agent can have a simple ability to monitor the inventory levels of the supply chain, or a complex ability to perform production planning employing an optimization method. • Capacity to Produce an Adapted Response: represents the aptitude to choose which abilities have to be transformed into actions at a given time to respond to a given situation. This capacity can vary from elementary to complex. The simplest possible capacity is related to a reactive ‘if-then’ mechanism, where no cognition is necessary. For example, if the inventory level drops to a given threshold, the agent uses its procurement ability to start a procurement action. As the agent becomes more intelligent, more complex responses can be made for some given situations. For example, the linear “if-then” logic can be substituted by more complex approaches based on action optimization and learning. Based on these two elements of the metamodel, one can carry out requirements determination for the simulation model, selecting the desired requirements in terms of agents’ abilities. Similar to the SAOA, the IAOA’s requirements are organized through agent-based use cases from AUML and requirements diagrams from SysML [23]. FAMASS is detailed in Santa-Eulalia et al. [21, 22, 23]. An application of this approach is presented in Santa- Eulalia et al. [24]. 4. Labarthe et al.’s Methodological Framework The Labarthe et al. [9] framework is schematized in Fig. 3 and is briefly described afterwards. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 12 ' + ' $ 2 & 0 % / + . + * * ) - " & ( " , ' + ' $ 2 & & " % + 5 + * $ ) 4 " * ( . 3 ' & " 5 $ / & * # % 4 * . ; : !"#$%&'(")*+' ,"&-*./0$+'12*&/'(")*+' 3.*4$5"&$+'12*&/'(")*+' (0+5612*&/'789/*#' :;.*4%#*&/$+'<+$&' ' F E D D C B ' A + $ ' / * ' * @ / 4 $ = $ ? ' > " ' & " 5 0 = % 4 / & " , Fig. 3: Summarizing the Labarthes et al. [9] framework. The authors propose the modelling steps indicated in Fig. 3. Their contribution corresponds to two abstraction levels: conceptual modelling and operational modelling. Conceptual modelling is performed in two steps, the Domain Model and the Conceptual Agent Model. 4.1 Domain Model (DM) The Domain Model (DM) creates an abstraction of the supply chain. Inspired from the NetMAN approach [31, 32], Labarthe et al. [9] create two sub-models: a Structural Model and a Dynamic Model. The Structural Model, which is based on responsibility networks [33], defines the structure of the supply chain, i.e. its ‘actors’ and their related responsibilities, and it also depicts the material flows among all ‘actors’. The Dynamic Model complements the Structural Model by defining the behaviour of each ‘actor’ and its related interaction modes. 4.2 Conceptual Agent Model (CAM) The Conceptual Agent Model (CAM) remodels the Domain Model guided by the agentification process. From the Structural and Dynamic models, a unique agent model is created. A Conceptual Agent Model specifies the ‘agents’, the ‘objects’ transacted between them and the nature of the agent’s interactions (‘physical interactions’ and ‘informational interactions’). In this case, each ‘actor’ specified in the Structural Model produces a specific agent. Also, any activity of an actor generates a specific agent in close interaction with the agent associated to the actor concerned, which is regrouped in the same partition. In addition, any exchange of information from the Dynamic Model generates a message-based informational interaction; and any material flow from the dynamic model leads to a physical type interaction. After, at the Operational Level, Labarthe et al. [9] proposes the Operational Agent Model (OAM). 4.3 Operational Agent Model (OAM) The Operational Agent Model (OAM) is based on the Conceptual Agent Model, and it aims to build a computer model of the studied supply chain which will be later implemented on a simulation platform. First, the Operational Agent models the software architecture (at the social level). Next, it models the internal agent architecture (individual level), dealing with knowledge, behaviours and interactions among agents. After creating the Domain Model, the Conceptual Agent Model and the Operational Agent Model, a Multi-Agent System is implemented at the Exploitation level and a set of Experimental Plans supports the realization of simulation experiments (the black modelling approaches shown in Fig. 3). The author illustrated the Exploitation level though the implementation of a case study in a simulation environment. This is only a summarized review of Labarthe et al. [9]’s work. For further details about this framework and its applications, the reader is referred to Labarthe et al. [9, 35, 36] and Labarthe [34]. 5. The Deployment Process As explained in the introduction, the original framework of Labarthe et al. [9] had to be slightly adapted to be suitable to the distributed APS domain. The first adaptation occurs at the Domain Modelling. The main reason for not strictly employing the Labarthe et al. [9] Domain Model is because it is based on the responsibility network [33], which uses the definition of centre, i.e. a business entity – a decisional one – linked at the physical level by material flow. Centres do not correspond exactly to our semi-autonomous units, the Supply Chain Blocks (defined in subsection 3.2), which are based on the supply chain cube. We adapted the Labarthe et al. [9] model and thus proposed a modelling approach where the ‘centres’ are substituted by Supply Chain Blocks. Another relevant difference refers to the fact that we separate the Operating System (i.e. the Execution layer) and the Decision System (i.e. the Strategic, Tactical and Operational layers) in the Domain Model, which is not done in the Labarthe et al. [9] Domain Model. They distinguish these two layers later, in the Operational Agent Model. We decided to separate them earlier because both IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 13 systems have to be identified in regard to the supply chain cube introduced in subsection 3.2. If we did not consider entities of the Operating System at this step, the Domain Model would be incomplete for a distributed APS, according to the definition of the supply chain cube. !"#"$%&' ($)*&"+',#%&-./.' 0!(,1' 2/.3$/*43"5' (&%##/#6',#%&-./.' 02(,1' 7)8/%&',6"#3' 9$6%#/:%;)#' ,#%&-./.' 07,9,1' <#5/=/54%&' ,6"#3' 9$6%#/:%;)#' ,#%&-./.' 0<,9,1' n i a h C y l p p u S t n e g A !"#$%&'(")*+' /"&0*123$+'4-*&2' (")*+' 51*6$7"&$+'4-*&2' (")*+' The following subsection discusses the Domain Model generation. 5.1 Domain Model (DM) The objective of the Domain Model is to identify what is to be modelled in the supply chain. As seen in Fig. 4, the Distributed Problem Analysis (DPA) can be translated directly into the Domain Model. Table 1 and Table 2 provide a translation strategy to create FAMASS Structural and Dynamic Models based on Labarthe et al. [9]. Specification Design Element Table 1: Structural Model. Labarthe et al. FAMASS Counterpart Analysis Analysis ,*-*&).' 67484"12('%9$%"&%()*(+,%(:1;17+,%<'(=)>%2( !"#$%"&%'()*(+,%(-./.00(."123'4'(5,1'%( Fig. 4: Deploying process. Fig. 4 depicts the general idea of the deployment process. From the analysis phase, the Distributed Planning Analysis models are the basis for the creation of the Domain Model. The Domain Model represents the supply chain under study and how advanced planning decisions are articulated. Next, the Conceptual Agent Model is naturally created from the Domain Model, but the Social Agent Organization Analysis is also used as an important reference. The Social Agent Organization Analysis provides the Social Structures for the Conceptual Agent Model and it reflects the agentification process used during the Social Agent Organization Analysis. Finally, the Operational Agent Model is created from the Conceptual Agent Model. However, relevant information about social protocols requirements comes from the Social Agent Organization Analysis, while requirements concerning the agents’ abilities come from the Internal Agent Organization Analysis. It is interesting to note, in Fig. 4, that the Domain Model and Conceptual Agent Model roughly correspond to the specification phase, while the Operational Agent Model can be considered equivalent to the design phase. The Domain Model and Conceptual Agent Model are the first formal models to describe the supply chain and the agent domain. The Operational Agent Model is closely related to how agents operate. To sum up, FAMASS proposes a set of abstract notions for distributed APS systems, while Labarthe et al. [9] provide a formal and detailed description of how the system should work. Central elements Main element: a network of (roles and Centres [33] responsibilities) and their interactions. Roles: Processor, producer, assembler, fulfiller, distributor, retailer, transporters, customer. Roles define the nature of the responsibility set. Responsibilities: examples, packing, grouping, sales, etc. Organizational level: supply chain, enterprise, business unit, cells, resources. Modelling formalism Responsibility networks of Montreuil and Lefrançois [33]. Modelling process Identify decision elements of the supply chain and the physical interactions among them. Main element: a network of Supply Chain Blocks and their interactions (interactions are simple representations of Supply relations). A Chain Block’s Supply Chain Block is used instead of centres. Roles: From the “spatial” axis of the supply chain cube (subsection 3.2), we identify the Supply Chain Blocks and their roles: vendors, facilities, clients and consumers. Responsibilities: can one identify responsibilities from the ‘functional’ axis of the supply (subsection 3.2): chain cube procurement, manufacturing, distribution and sales. Organizational levels: strategic, tactic, operational, execution for facilities, clients and vendors, consumers (i.e., the intertemporal axis). Class diagrams and class tables (from AUML – Agent Unified The Language). Modelling concept is the same as for responsibility network, but it is represented using AUML formalisms. Centres are classes; roles are roles in each class; responsibilities are operations in each class; organizational levels are stereotypes of the classes; business processes are operations in each class. We identify the elements from the execution and decision systems and we add only the interactions. physical Informational interactions are the dynamic model added in (later on in the modelling process). IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 14 Element Table 2: Dynamic Model. FAMASS Counterpart Labarthe et al. Central elements Modelling formalism Modelling process same Describes the elements, but with the to add more possibility information based on different experimental definitions, i.e. different configurations of the Supply Chain Blocks, and different performance indicators and uncertainties. Class diagrams and class tables (AUML). All flows are represented by arrows. The decoupling point is represented the class in name. Centre models are represented by arrows as well. Stock holding (raw material, work-in-process or final products) is represented the in operations of each class. are same The flows identified, as as well inventory positions and decoupling point position. They are described in the class tables. Describes (in time) the system behaviour and that elements the compose it. Uses the responsibility network to recognize the [33] coordination modes by the physical identifying and informational relations used according to the environmental stimulus. 32] [31, NetMan a plus approach the representation of decoupling point position. The decoupling point position is mentioned here because it is an the in issue important Labarthe et al. [9] framework. Apart from the physical flow identified previously, the modelling process describes the informational flow exchanged according to the dynamics of the environment. Four flow informational types for coordination are needs i) identified: offers expression; ii) iii) expression; about information coordination; and iv) information sharing by models exchanges. In addition, the decoupling point is positioned and inventories are mapped (raw material, work-in- process and final product). It identifies two models (for models exchange): the network model and the centre model. The most important difference between Labarthe et al. [9] and FAMASS is the use of centre for the former and the use of Supply Chain Block for the latter. Supply Chain Block is used instead of centres in FAMASS because decision entities are central elements. Labarthe [34, p.119] explains that a centre represents a decision process, but centre definitions are closely associated to physical entities of the execution system, i.e. there is a direct relation between a centre and an entity of the execution system. Later in the Labarthe et al. [9] modelling process, the decision system is introduced more formally in the Operational Agent Model. We separate the decision system from the execution system in the Domain Model, since we know that they are relevant for experimental definitions in distributed APS systems. Another difference is related to the fact that we employ a unique modelling formalism based on an AUML approach, coherent with the analysis phase of FAMASS, which employs only UML- inspired formalisms. The next sub-section transforms the Domain Model into a Conceptual Agent Model. 5.2 Conceptual Agent Model (CAM) The Conceptual Agent Model represents the agentification process of the Labarthe et al. [9] approach. The agentification process defines the agent society based on the Domain Model, i.e. which agents are created from the centres (in our case, Supply Chain Block) and how they are organized. Labarthe et al. [9] propose rules for creating agents (i.e., each centre becomes an actor-agent and each centre activity becomes an activity-agent). As discussed before, FAMASS converts each Supply Chain Block into an agent. It also verifies whether some agents are extinguished (e.g. merged with another agent) or whether new agents are introduced (e.g. a mediator). This information the Social Agent is obtained during Organization Analysis (SAOA). As indicated in Fig. 4, the Conceptual Agent Model is generated from the Domain Model and the SAOA (in this case, the social structures). Using Labarthe et al. [9] rules, the Domain Model provides the basic classes’ definition and, using the SAOA, it can be verified if new agent classes are derived from the Domain Model and if different social structures have to be tested and considered in the Conceptual Agent Model. Social Protocols from SAOA are not used in Conceptual Agent Modelling. The Strategy for creating a Conceptual Agent Model is shown in Table 3. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 15 Element Central elements Table 3: Conceptual Agent Models. Labarthe et al. FAMASS Counterpart Actor-agent: agents representing an organizational unit of the supply chain facilities, clients or (i.e. vendors, customers), related to the ‘spatial’ axis. Actor-agents group several other agents, the activity-agents. Activity-agent: agents the from representing decision system, the processes procurement, of manufacturing distribution and sales. These agents are at three different decision levels and they are related to the ‘functional’ axis. Objects: defined products. This is the first time products are specified. Information interactions: they come from the Domain Model. Physical Interactions: from the Domain Model. Actor-agent: centre. Activity-agent: represents a process of transformation, distribution, or stock keeping. Object: products. Informational interaction: same as in Domain Model. Physical interaction: same as in Domain Model. they come Modelling formalism A modelling graphical formalism [34] that models the two types of agents and their interactions. The CAM model is derived from the DM model. Adapted class diagrams, tables and package diagrams. The adaptation of the class diagrams refers to the insertion of objects (products), represented by simple square boxes in the link between two classes. Modelling process Similar process, with the following differences: - Actor-agents and activity-agents: in the classes, use role definitions to indicate if it is an actor-agent or an activity-agent; - Interactions: links between classes. 1. From centre to actor- agent: each centre creates an actor-agent. interactions 2. Physical between actor-agents: physical flow is specified by an linking agents and arrow indicating their respective exchanged objects. 3. Informational interactions between actor-agents: similar to 2, but for information flow. frontiers 4. Organizational definition: establishes the organization frontiers for the actor-agents and places the physical the flows between organizations. 5. Definition of the activity- agents: each activity of a centre is transformed into an activity-agent. Physical 6. interactions activity-agents: between the physical specify flow the activity-agents between and their related objects exchanged. 7. Informational interactions between activity-agents: same as 6, plus the interaction between actor-agents and activity-agents. It is important to note that an actor-agent coordinates a population of other activity-agents in the Labarthe et al. [9] approach. In the case of FAMASS, we decided to use the notion of actor-agent only as an aggregation of agents inside the same organization using a package diagram. The next sub-section transforms the Conceptual Agent Model into an Operational Agent Model. 5.3 Operational Agent Model (OAM) According represents the OAM [34], to Labarthe implementable models. These models involve a choice between two different agent architectures, i.e. the cognitive and the reactive architectures. We believe that most of the time it is not possible to completely distinguish cognitive agents from deliberative agents, meaning that normally agents can be seen as a hybrid state within the cognitive-reactive continuum. In Labarthe et al. [9]’s work, agents from the decision system assume a cognitive agent architecture, composing a cognitive agent society. Based on this society, the author then creates a reactive society responsible for the transformation process (execution system), linked with the cognitive society. As we believe that the agents from the decision system can also assume reactive behaviours (see subsection 3.2), we prefer not to use this agent architecture notation for the Operational Agent Model. Instead, we create two societies (decision agents and execution agents) from the Conceptual Agent Model and start to define all agents’ behaviours and agents’ protocols in detail, as done by Labarthe et al. [9], which is not contradictory to Labarthe et al.’s [9] work. As explained before, instead of separating into decision and execution societies at the Operational Agent Model, our approach does it at the beginning of the specification phase, i.e. at the Domain Model. In sum, our Operational Agent Model is generated from the Conceptual Agent Model, the Social Agent Organization Analysis and the Internal Agent Organization Analysis, as illustrated in Fig. 5. 5'36%)*+,#(-* !$,%(67%&'(* +(%)8969* 05+!+1* :(/6;6/4%)* +,#(-* !$,%(67%&'(* +(%)8969* 0:+!+1* 2'(3#"-4%)*+,#(-* .'/#)*02+.1* !"#$%&'(%)*+,#(-* .'/#)*0!+.1* Fig. 5: Creating an Operational Agent Model. From the Conceptual Agent Model we represent two societies, the decision agents and the execution agents. This is the starting point of the Operational Agent Model. After, we obtain requirements about agent protocols from the Social Agent Organization Analysis, and we obtain requirements about agent abilities from the Internal Agent Organization Analysis. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 16 Table 4 summarizes the deployment strategy for the Operational Agent Model. going faster and smoother through the whole modelling process. Element Table 4: Operational Agent Models. Labarthe et al. FAMASS Counterpart Central elements Modelling formalism Modelling process Multi-agent system architecture: a cognitive and a reactive agent society are represented. A cognitive agent, together with its corresponding reactive agent, form the ‘agent-actor’. It is a generic architecture to represent entities capable of taking their own decisions and acting accordingly. Specification of the software agent: knowledge, behaviour and interactions of each agent are defined. For the behaviours, the following entities are defined: a) external event: concerning the communication aspect with external entities of the multi-agent system; b) internal event: concerning internal activities of an agent; c) passive state: waiting state; d) active state, being an elementary action or a composite action. system the multi-agent For Labarthe architecture, [34] graphical his proposes own modelling formalism. For the specification of the software agent for cognitive behaviours, the Agent Behaviour Representation (ABR) formalism [37] is used. For reactive agent behaviours, AUML formalisms are used, specifically state charts. For interactions, protocol diagrams from AUML are used. 1. Create a society of cognitive agents. Incorporate the informational flow. 2. Create a society of reactive agents. the physical Incorporate flow and the related exchanged objects (products). 3. Define the responsibility links between cognitive and reactive agents. 5. Specify agent behaviour of the cognitive society using the Agent Behaviour Representation (ABR) formalism. 6. Specify agent’s behaviour of the reactive society using statecharts. 7. Specify agents’ interactions through protocol diagrams. system Multi-agent architecture: cognitive agents are seen as decision agents the decision (from system); reactive agents are represented by execution agents (from the execution system). the Specification of agent: software same elements, knowledge, i.e. behaviour and interactions. used We adapted only diagrams from AUML. For behaviours and knowledge representation, we employ Activity Diagrams. For interactions, we use Protocol Diagrams. Same process, but with different formalisms from AUML. The next sub-section provides some final remarks and conclusions about the proposed deployment strategy. 6. Final Remarks and Future Works This paper presents a conversion strategy from the FAMASS analysis models into specification and design models inspired by the methodological agent-based framework of Labarthe et al. [9]. This strategy facilitates the FAMASS analysts in converting their models and In addition, this deployment strategy demonstrates that the analysis phase of FAMASS can be integrated with other existing approaches specialized in specification and design modelling. With this as an impetus, other methodological frameworks could be inspected in the future so as to verify that FAMASS concepts adhere to other frameworks. Furthermore, the proposed strategy allows us to avoid the research effort needed to develop a totally new specification and design methodology for the domain, although it would be suitable and desirable for future research initiatives. With regard to this, a forthcoming research effort will work on extending the FAMASS analysis approach, so as to cover the whole FAMASS life- cycle from analysis to simulation. In this way the proposed deploying strategy launches the basis for this FAMASS- extended version of a complete architecture to deal with agent-based simulations in the context of distributed APS systems. Future versions of the FAMASS approach are to be published shortly. References [1] APICS, “The Association of Operations Management - Online Dictionary”, Retrieved June, 2008, from www.apics.org. [2] K. Kumar, "Technology for supporting supply chain management", Communications of the ACM, Vol. 44, Bo. 6, 2001, pp. 58-61. [3] M. Van Eck, Advanced planning and scheduling: is logistics everything? Working Paper, Vrije Universiteit Amsterdam, Amsterdam, 2003. [4] J.-M. Frayret, S. D'Amours, A. Rousseau, S. Harvey, S., and J. Gaudreault, "Agent-based supply chain planning in the forest products industry", International Journal of Flexible Manufacturing Systems, Vol. 19, No. 4, 2007, pp. 358-391. [5] A. L. Azevedo, C. Toscano, J. P. Sousa, and A. L. Soares, "An advanced agent-based order planning system for dynamic networked enterprises", Production Planning & Control, Vol. 15, No. 2, 2004, pp. 133–144. [6] L. Cecere, "A changing technology landscape", Supply Chain Management Review, Vol. 10, No. 1, 2006. [7] J.-H. Lee, and C.-O. Kim, "Multi-agent systems applications in manufacturing systems and supply chain management: a review paper" International Journal of Production Research, Vol. 46, No. 1, 2008, pp. 233-265. [8] W. Shen, Q. Hao, H. L. Yoon, and D. H. Norrie, "Applications of agent-based systems in intelligent manufacturing: An review", Advanced updated Engineering Informatics, Vol. 20, No. 4, 2006, pp. 415- 431. [9] O. Labarthe, B. Espinasse, A. Ferrarini, A., and B. Montreuil, "Toward a methodological framework for agent-based modelling and simulation of supply chain in a IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 17 mass customization context", Simulation Modelling Practice and Theory, Vol. 15, No. 2, 2007, pp. 113-136. [10] H. Baumgaertel, and U. John, “Combining agent-based supply net simulation and constraint technology for highly efficient simulation of supply networks using APS systems”, in 2003 Winter Simulation Conference, 2003. [11] J. M. Swaminathan, S. F. Smith, and N. M. Sadeh, "Modeling supply chain dynamics: a multiagent approach", Decision Sciences, Vol. 29, No. 3, 1998, pp. 607-632. [12] L. A. Santa-Eulalia, S. D’Amours, and J.-M. Frayret, "Essay on conceptual modeling, analysis and illustration of agent-based simulations for distributed supply chain planning", INFOR Information Systems and Operations Research Journal, Vol. 46, No. 2, 2008, pp. 97-116. [13] S. Galland, F. Grimaud, P. Beaune, and J. P. Campagne, "MAMA-S: an introduction to a methodological approach for the simulation of distributed industrial systems", International Journal of Production Economics, No. 85, 2003, pp. 11–31. [14] R. Govindu, and R.B. Chinnam, "A software agent- component based framework for multi-agent supply chain modelling and simulation", International Journal of Modelling and Simulation, Vol. 30, No. 2, 2010. [15] L. A. Santa-Eulalia, G. Halladjian, S. D’Amours, and J.-M. Frayret, “Integrated methodological frameworks for modelling agent-based APS systems: a systematic literature review”, Working Paper CIRRELT-2011-50, CIRRELT – Interuniversity Research Centre on Enterprise Networks, Logistics and Transportation, 2011, available at www.cirrelt.ca. [16] M. S. Fox, J. F. Chionglo, and M. Barbuceanu, "The integrated supply chain management system", Internal Report - Department of Industrial Engineering, University of Toronto, Canada, from www.eil.utoronto.ca/iscm- descr.html, 1993. [17] H. Stadtler, and C. Kilger, Supply chain management and advanced planning: concepts, models, software and case studies, Berlin: Springer, 2004. [18] D. J. Van der Zee, and J.G.A.J. Van der Vorst, "A Modeling framework for supply chain simulation: opportunities for improved decision making", Decision Sciences, Vol. 36, No. 1, 2005, pp. 65-95. [19] P. Egri, and J. Vancza, “Cooperative planning in the supply network – a multiagent organization model”, in CEEMAS 2005 - 4th International Central and Eastern European Conference on Multi-Agent Systems, Budapest, Hungary, Springer Verlag, 2005. [20] P. Lendermann, B. P. Gan, and L. F. McGinnis, “Distributed simulation with incorporated APS procedures for high-fidelity supply chain optimization’, in 2001 Winter Simulation Conference, Arlington, 2001. [21] L. A. Santa-Eulalia, S. D'Amours, and J.-M. Frayret, “Modeling Agent-Based Simulations for Supply Chain Planning: the FAMASS Methodological Framework”, in 2010 IEEE International Conference on Systems, Man, and Cybernetics, Collaborative on Session Special Manufacturing and Supply Chains, Istanbul, 10-13 October 2010. [22] L. A. Santa-Eulalia, “Agent-based for simulations advanced supply chain planning: a methodological framework for requirements analysis and deployment”, Ph.D. Thesis, Faculté des Sciences et Génie, Université Laval, Canada, 2009. 387p. [23] L. A. Santa-Eulalia, S. D’Amours, and J.-M. Frayret, “Agent-Based Simulations for Advanced Supply Chain Planning: The FAMASS Methodological Framework for Requirements Analysis and Deployment”. Working Paper CIRRELT-2011-22, CIRRELT – Interuniversity Research Centre on Enterprise Networks, Logistics and Transportation, 2011, available at www.cirrelt.ca. [24] L. A. Santa-Eulalia, D. Aït-Kadi, S. D’Amours, J.-M. Frayret, and S. Lemieux, “Agent-based experimental investigations about the robustness of tactical planning and control policies in a softwood lumber supply chain”, Production Planning & Control, Special Issue on Applied Simulation, Planning and Scheduling Techniques in Industry, 1366-5871, first published on February 10th 2011 (iFirst). [25] OMG, “OMG Systems Modeling Language (OMG SysML™)”, Object Management Group Specification Report, June 2010. [26] J. F. Shapiro, “Modeling the supply chain”, Duxbury: Pacific Grove, 2000. [27] H. Meyr, and H. Stadtler, “Types of supply chain”, in Supply chain management and advanced planning: concepts, models, software and case studies, Berlin: Springer, 2004. [28] W. Shen, F. Maturana, and D. H. Norrie, "MetaMorph II: intelligent an agent-based architecture for distributed design and manufacturing", Journal of Intelligent Manufacturing, No. 11, 2000, pp. 237-251. [29] J. Ferber, Multi-agent systems: an to introduction distributed artificial intelligence, Harlow: Addison-Wesley, 1999. [30] L. Sanya, and W. Hongwei, "Agent architecture for agent- based supply chain integration & coordination", Software Engineering Notes, Vol. 28, No. 4, 2003. [31] J.-M. Frayret, S. D'Amours, B. Montreuil, and L. Cloutier, , "A network approach to operate agile manufacturing systems", International Journal of Production Economics, Vol. 74, No. 1-3, 2001, pp. 239-259. [32] B. Montreuil, J.-M. Frayret, and S. D'Amours, "A strategic framework for networked manufacturing", Computers in Industry, Vol. 42, No. 2-3, 2000, pp. 299-317. [33] B. Montreuil, and P. Lefrançois, "Organizing factories as responsibility networks", Progress in Material Handling Research, 1996, pp. 375-411. [34] O. Labarthe, “Modélisation et simulation orientées agents de chaînes logistiques dans un contexte de personnalisation de masse : modèles et cadre méthodologique”, Ph.D. Thesis, Université Laval (Canada) and Université Paul Cézanne (France), 2006. [35] O. Labarthe, B. Montreuil, A. Ferrarini, and B. Espinasse, “Modelisation multi-agents pour la simulation de chaines logistiques de type personnalisation de masse”, in 5e Conférence Francophone de MOdélisation et SIMulation: Modélisation et simulation pour l’analyse et l’optimisation des systèmes industriels et logistiques, MOSIM’04. Nantes, 2004. [36] O. Labarthe, E. Tranvouez, A. Ferrarini, B. Espinasse, and B. Montreuil, “A heterogeneous multi-agent modelling for IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011 ISSN (Online): 1694-0814 www.IJCSI.org 18 distributed simulation of supply chains” in HoloMAS 2003, pp. 134-145, 2003. [37] E. Tranvouez, “IAD et ordonnancement : une approache coopérative du réordonnancement par systèmes multi- agents”, Ph.D. Thesis, Université de Valenciennes et du Hainaut-Cambrésis, 2001. Luis Antonio de Santa-Eulalia is a professor at Téluq-UQAM (Université du Québec à Montréal), Canada, a member of the innovation board of Axia Value Chain (North America division), and a researcher of the NSERC Strategic Research Network on Value Chain Optimization (VCO). He holds a Ph.D. Industrial in Engineering from Université Laval, Canada, an MSc. and BSc. both in Industrial Engineering respectively from the University of São Paulo, Brazil, and Federal University of São Carlos, Brazil. He has worked as a researcher and consultant in the domains of production planning and control, supply chain management, and simulations. His current research interests are related to novel business models and technology for sustainable value chain management. Sophie DʼAmours holds a Ph.D. in Applied Mathematics and Industrial Engineering from the École Polytechnique de Montréal, as well as a MBA and a BSc in Mechanical Engineering from Université Laval. She is currently a scientific director of the NSERC Strategic Research Network on Value Chain Optimization (VCO) and she holds a Canada Research Chair in Planning Sustainable Forest Value Networks as well as an NSERC Industrial Chair. She is also Director of the FORAC Research Consortium. Sophie is a full professor at the Faculty of Science and Engineering, Department of Mechanical Engineering, at Université Laval. Her research interests are in supply chain management and planning, web-based applications, and forest sector. Jean-Marc Frayret the École is Associate Professor at Polytechnique de Montréal, Québec, Canada. He holds a Ph.D. in Mechanical and Industrial Engineering from Université Laval, Canada. He is a member of the CIRRELT, a research centre dedicated to the study of network organizations and logistics. He is also a researcher of the NSERC Strategic Research Network on Value Chain Optimization (VCO) and of the FORAC Research Consortium. His research interests include agent-based and distributed manufacturing systems, supply chain management and interfirm collaboration. Dr. Frayret has published several articles in these fields in various journals and international conferences.
1802.03427
1
1802
2018-02-09T19:40:01
Structural matrix algebras, generalized flags and gradings
[ "math.RA" ]
We show that a structural matrix algebra $A$ is isomorphic to the endomorphism algebra of an algebraic-combinatorial object called a generalized flag. If the flag is equipped with a group grading, an algebra grading is induced on $A$. We classify the gradings obtained in this way as the orbits of the action of a double semidirect product on a certain set. Under some conditions on the associated graph, all good gradings on $A$ are of this type. As a bi-product, we obtain a new approach to compute the automorphism group of a structural matrix algebra.
math.RA
math
STRUCTURAL MATRIX ALGEBRAS, GENERALIZED FLAGS AND GRADINGS F. BES¸LEAG A AND S. D ASC ALESCU Abstract. We show that a structural matrix algebra A is isomorphic to the endomorphism algebra of an algebraic-combinatorial object called a generalized flag. If the flag is equipped with a group grading, an algebra grading is induced on A. We classify the gradings obtained in this way as the orbits of the action of a double semidirect product on a certain set. Under some conditions on the associated graph, all good gradings on A are of this type. As a bi-product, we obtain a new approach to compute the automorphism group of a structural matrix algebra. 8 1 0 2 b e F 9 ] . A R h t a m [ 1 v 7 2 4 3 0 . 2 0 8 1 : v i X r a 1. Introduction and preliminaries Flags and flag varieties play a key role in Algebraic Geometry, Representation Theory, Alge- braic Groups and Combinatorics, see [6]. In this paper we consider a more general concept of flag and we give some applications. This new kind of flag arises as follows. Let k be a field. A structural matrix algebra is a subalgebra of a full matrix algebra over k, consisting of all matrices with zero entries on certain prescribed positions, and allowing anything on the remaining positions. An important number of examples and counterexamples use such algebras. These algebras were called structural matrix algebras in [10], but they had already been considered in [8]. Particular examples of structural matrix algebras are upper triangular matrix algebras, and more generally, upper block triangular matrix algebras, which are of fundamental importance in Linear Algebra, the study of linear groups, the study of numerical invariants of PI algebras, etc. A structural matrix subalgebra A of Mn(k) is associated with a preorder relation (i.e. reflexive and transitive) ρ on the set {1, . . . , n}; A consists of all matrices (aij)1≤i,j≤n such that aij = 0 whenever (i, j) /∈ ρ. We denote A = M (ρ, k); in other terminology, this is the incidence algebra over k associated with ρ, see [9]. Automorphisms of structural matrix algebras are of interest, and the problem to understand them gets more complicated if we take k to be just a ring. If k is a field, the description of the automorphism group of M (ρ, k) was done in [5]. A general problem in Ring Theory is to describe and classify all group gradings on various matrix algebras. In the case of full matrix algebras over a field k, the problem was solved in [1] and [2] for algebraically closed k, and descent theory was used in [4] to approach the case of an arbitrary k. For subalgebras of a full matrix algebra, in particular for structural matrix algebras, it is much more complicated to describe all gradings. The aim of our paper is to construct and classify a certain class of gradings on structural matrix algebras. We show in Section 2 that in the same way the full matrix algebra Mn(k) is the endomorphism group of a vector space of dimension n, a structural matrix algebra M (ρ, k) is isomorphic to the endomorphism algebra of a certain algebraic-combinatorial structure F, which we call a ρ-flag. In Section 5 we explain that if F is additionally equipped with a G-grading, where G is a group, then its endomorphism algebra End(F) gets an induced G-graded algebra structure; we denote by END(F) the obtained G-graded algebra. This grading transfers to a G-grading on 2010 Mathematics Subject Classification. 16W50, 16W20, 16S50, 06A06. Key words and phrases. structural matrix algebra, preorder relation, flag, group grading, automorphism group. 1 2 F. BES¸LEAG A AND S. D ASC ALESCU M (ρ, k) via the isomorphism mentioned above. The gradings produced in this way on M (ρ, k) are good gradings, i.e. all the matrix units present in M (ρ, k) are homogeneous elements. It is an interesting question whether all good gradings are obtained like this. This is a problem of independent interest, and it can be formulated in simple terms related to the graph Γ associated with ρ: if G is a group, and on each arrow of Γ we write an element of G as a label, such that for any two paths starting from and terminating at the same points the product of the labels of the arrows is the same for both paths, does the set of labels arise from a set of weights on the vertices of Γ, in the sense that an arrow starting from v1 and terminating at v2 has label g1g−1 2 , where g1 and g2 are the weights of v1 and v2? This problem was considered in [8] in the case where G is abelian, and it was showed that the answer is positive if and only if the cohomology group H 1(∆, G) = 0, where ∆ is a certain simplicial complex associated with ρ. Also, for a given ρ, the answer to the above question is positive for any abelian group G if and only if the homology group H1(∆) = 0. We show that the answer is positive for any arbitrary group G if and only if the normal closure of two certain subgroups A(Γ) ⊆ B(Γ) of the free group generated by the arrows of Γ coincide; A(Γ) and B(Γ) are defined in terms of cycles of the un-directed graph obtained from Γ. This parallels the result in the abelian case, where H1(∆) = B/A for similar subgroups A and B in a free abelian group associated with Γ. In fact we use slightly different A and B, by working with a different graph. In order to classify G-gradings on the structural matrix algebra M (ρ, k), we first look at the isomorphisms between the algebras End(F) and End(F ′), where F and F ′ are ρ-flags under the vector spaces V and V ′. An equivalence relation ∼ on {1, . . . , n} arises from ρ, where i ∼ j whenever iρj and jρi. Then ρ induces a partial order on the set C of equivalence classes with respect to ∼. We show in Section 3 that the End(F)-submodules of V are in a bijective correspondence with the antichains of C; let A(C) be the lattice structure on the set of all such antichains, induced via this bijection. Then an algebra isomorphism ϕ : End(F) → End(F ′) induces a linear isomorphism γ : V → V ′ which is a ϕ′-isomorphism for a certain deformation of ϕ. The new algebra isomorphism ϕ′ is obtained from ϕ by using a transitive function on ρ with values in k∗. Since ϕ′ is an algebra isomorphism, γ induces an isomorphism between the lattices of End(F)-submodules of V and of End(F ′)-submodules of V ′, and this lattice isomorphism reduces in fact to an automorphism of the lattice A(C). Such an automorphism is completely determined by an automorphism g of the poset C. Moreover, we explain that ϕ can be recovered from g, the deformation constants producing ϕ′ from ϕ, and a matrix of γ in a fixed pair of bases. Thus we obtain that the set of algebra isomorphisms from End(F) to End(F ′) is in a bijective correspondence with the equivalence classes of a set involving the invertible matrices of M (ρ, k), the automorphisms of C preserving the cardinality of elements, and the transitive functions on ρ, with respect to an equivalence relation. In particular, if F ′ = F, the automorphism group of End(F) is described as a factor group of a double semidirect product. As a bi-product, we obtain a descriptive presentation of the automorphism group of a structural matrix algebra. This automorphism group was computed in [5], and we show how the presentation in [5] can be derived from ours. For classifying G-gradings arising from graded flags, we consider two G-graded ρ-flags F and F ′, and we look at the isomorphisms between the graded algebras END(F) and END(F ′). Using the structure of isomorphisms between End(F) and End(F ′), which we already know by now, and adding the additional information about gradings, we obtain in Section 6 that END(F) ≃ END(F ′) if and only if the connected components of F and F ′ are pairwise isomorphic up to a permutation, some graded shifts and an automorphism of C. Using this result, we show in Section 7 that the isomorphism types of graded algebras of the form END(F) are classified by 3 the orbits of the action of a certain group, which is a double semidirect product of a Young subgroup of Sn, a certain subgroup of automorphisms of C, and Gq, where q is the number of connected components of C, on the set Gn. We use the standard terminology on gradings, see for example [7]. 2. Structural matrix algebras as endomorphism algebras Let k be a field, n a positive integer and ρ a preorder relation on {1, . . . , n}. Let M (ρ, k) be the structural matrix algebra associated with ρ. Let ∼ be the equivalence relation on {1, . . . , n} associated with ρ, i.e. i ∼ j if and only if iρj and jρi, and let C be the set of equivalence classes. Then ρ induces a partial order ≤ on C defined by i ≤ j if and only if iρj, where i denotes the equivalence class of i. For any α ∈ C, let mα be the number of elements of α. Definition 2.1. A ρ-flag is an n-dimensional vector space V with a family (Vα)α∈C of subspaces Bα with the property that Bα = mα such that there is a basis B of V and a partition B = [ and [ α∈C Bβ is a basis of Vα for any α ∈ C. If F = (V, (Vα)α∈C) and F ′ = (V ′, (V ′ α)α∈C) are ρ- β≤α flags, then a morphism of ρ-flags from F to F ′ is a linear map f : V → V ′ such that f (Vα) ⊂ V ′ α for any α ∈ C. If ρ is just the usual ordering relation on {1, . . . , n} (which corresponds to M (ρ, k) being the algebra of upper triangular matrices), then a ρ-flag is just an usual flag on an n-dimensional vector space. More generally, if ρ is such that C = {α1, . . . , αr} is totally ordered, say α1 < . . . < αr, and αi = mi for any 1 ≤ i ≤ r, then a ρ-flag is a flag of signature (m1, . . . , mr), and M (ρ, k) is the algebra   Mm1 (k) Mm1,m2(k) 0 . . . 0 Mm2(k) . . . 0 . . . Mm1,mr (k) . . . Mm2,mr (k) . . . . . . Mmr (k) . . .   of upper block triangular matrices, with diagonal blocks of size m1, . . . , mr. For any i, j ∈ {1, . . . , n} with iρj, let eij be the matrix in Mn(k) having 1 on the (i, j)-position and 0 elsewhere. The set of all such eij's is a basis of M (ρ, k). Now we present M (ρ, k) as an algebra of endomorphisms. Proposition 2.2. Let F = (V, (Vα)α∈C) be a ρ-flag. Then the algebra End(F) of endomorphisms of F (with the map composition as multiplication) is isomorphic to M (ρ, k). Proof. Let B be a basis of V as in Definition 2.1. We can choose some set of indices such that B = (vi)1≤i≤n and for any α ∈ C the basis Bα of Vα is just {vii ∈ α}. If i, j ∈ {1, . . . , n}, then iρj if and only if i ∈ α and j ∈ β for some α, β ∈ C with α ≤ β; in this case let Eij ∈ End(F) be defined by Eij(vt) = δjtvi for any t (δij is Kronecker's delta). Then it is easy to see that EijEpq = δjpEiq for any i, j, p, q and {Eij iρj} is a basis of End(F). Hence the linear map Eij 7→ eij for any i, j with iρj, is an algebra isomorphism between End(F) and M (ρ, k). (cid:3) We associate with ρ another useful combinatorial object. Let Γ = (Γ0, Γ1) be the graph whose set Γ0 of vertices is the set C of equivalence classes. The set Γ1 of arrows is constructed as follows: if α, β ∈ C, there is an arrow a from α to β (we write s(a) = α, t(a) = β) if α < β and there is no γ ∈ C with α < γ < β. Clearly, if α, β ∈ C, then α ≤ β if and only if there is a 4 F. BES¸LEAG A AND S. D ASC ALESCU path in Γ starting from α and ending at β (recall that paths of length zero are just vertices of Γ). We denote by Γu the undirected graph obtained from Γ when we forget the orientation of arrows. 3. The lattice of End(F)-submodules of V Let F = (Vα)α∈C be a ρ-flag on the space V . The aim of this section is to describe the lattice LEnd(F )(V ) of submodules of the End(F)-module V , where the action of End(F) on V is just the restriction of the usual End(V )-action on V . We also determine the automorphisms of this lattice. If D is a subset of C, we denote by VD = X α∈D Vα. By convention V∅ = 0. Proposition 3.1. The End(F)-submodules of V are the subspaces of the form VD, where D is a subset of C. {Vi there exists α ∈ D such that i ≤ α}, and Epqvi = δq,ivp α∈D nX i=1 Vα = for any p, q with p ≤ q, and any i, it is clear that VD is an End(F)-submodule of V . Proof. Since VD = X Conversely, let X be an End(F)-submodule of V . If v = Pn for some i0, then for any j with bj ≤ bi0 we have Eji0v = ai0vj, so vj ∈ X, thus V bi0 i=1 aivi ∈ X − {0} with ai0 6= 0}, we obtain that VD = X D = {bi0 there exists v = Pn i=1 aivi ∈ X − {0}, and ai0 6= 0 ⊂ X. If Obviously X ⊂ VD, so then X = VD. α∈D Vα ⊂ X. (cid:3) Remark 3.2. If D ⊂ C and Dmax is the set of maximal elements of D (with respect to the partial order of C), it is clear that VD = VDmax. As Dmax is an antichain in C (i.e. a subset of C whose any two different elements are not comparable with respect to ≤), and for any antichain D we have Dmax = D, we conclude that the End(F)-submodules of V are VD with D an antichain in C. If we denote by A(C) the set of all antichains of C, we have a bijection between A(C) and LEnd(F )(V ), given by D 7→ VD. Its inverse is X 7→ Dmax, where D is a subset of C such that X = VD. This bijection induces a lattice structure on A(C) from the lattice LEnd(F )(V ). Since for D, E ∈ A(C) we have {Vα there exist β1 ∈ D, β2 ∈ E such that α ≤ β1 and α ≤ β2} VD ∩ VE = X α∈C and we see that the infimum and the supremum in A(C) are given by VD + VE = VD∪E , D ∧ E = {α ∈ C there exist β1 ∈ D, β2 ∈ E such that α ≤ β1 and α ≤ β2}max, D ∨ E = (D ∪ E)max for any D, E ∈ A(C). Note that (D ∪ E)max may be strictly contained in D ∪ E, since D ∪ E is not necessarily an antichain. The partial order relation on A(C) is D ≤ E ⇐⇒ VD ⊂ VE ⇐⇒ for any α ∈ D there exists β ∈ E such that α ≤ β. 5 Note that this is not the inclusion, thus A(C) is not in general a sub-poset of the power set (P(C), ⊆). The next result describes the automorphisms of the lattice A(C). Proposition 3.3. If g is an automorphism of the poset (C, ≤), then the map fg : A(C) −→ A(C), fg(D) = g(D) = {g(α) α ∈ D} is an automorphism of the lattice A(C). Moreover, for any lattice automorphism f of A(C) there exists an automorphism g of the poset (C, ≤) such that f = fg. Proof. It is straightforward to check the first part. Now let f be a lattice automorphism of A(C). Let L0(C) be the set of all minimal elements of C, L1(C) be the set of all minimal elements of C \ L0(C) (or equivalently, elements of height 1 in C) and recurrently we define Lh(C) for any h, as the set of all minimal elements of C \ (L0(C) ∪ · · · ∪ Lh−1(C)) (or equivalently, elements of height h in C). The set L0 of minimal elements of A(C) consists of all singletons {α}, with α ∈ L0(C). As f is a lattice automorphism, we have f (L0) = L0, and this induces a bijection g0 : L0(C) −→ L0(C). We note that g0 (or f L0) uniquely determines the value of f at any non-empty D ⊂ L0. Next A(C) \ P(L0) is a poset with the order inherited from A(C), such that for any two elements their supremum exists. Moreover, f induces by restriction an isomorphism of posets f : A(C) \ P(L0) −→ A(C) \ P(L0) (there is no harm if we also denote it by f ), such that f (x ∨ y) = f (x) ∨ f (y) for any x, y. The set L1 of minimal elements of A(C) \ P(L0) consists of all singletons {α}, where α is minimal in C \ L0(C), i. e. α ∈ L1(C). Since f (L1) = L1, f induces a bijection g1 : L1(C) −→ L1(C), and g0 and g1 uniquely determine the value of f at any antichain D with D ⊂ L0(C) ∪ L1(C). We continue recurrently, by considering for any h the set Lh of minimal elements in A(C) \ P(L0 ∪ · · · ∪ Lh−1). This consists of all singletons {α}, where α ∈ Lh(C). As above, f induces an automorphism of the poset A(C) \ P(L0 ∪ · · · ∪ Lh−1), hence a bijection gh : Lh(C) −→ Lh(C). As Lh(C) = C, the coproduct (i.e. disjoint union) g of all gh's is an automorphism of the poset [ h C, and it is clear that f = fg. (cid:3) 4. Isomorphisms between endomorphism algebras of flags We consider the set Aut0(C, ≤) = {g ∈ Aut(C, ≤) mα = mg(α) for any α ∈ C}, For any g ∈ Aut0(C) we define a bijection which is a subgroup of Aut(C). g : {1, . . . , n} → {1, . . . , n} as follows: if α = {i1, . . . , ir} with i1 < . . . < ir, and g(α) = {j1, . . . , jr} with j1 < . . . < jr, then g(i1) = j1, . . . , g(ir) = jr. If g, h ∈ Aut0(C), we clearly have fhg = hg, thus g 7→ g is an embedding of Aut0(C) into the symmetric group Sn. If A ∈ Mn(k), let Ag ∈ Mn(k) be the matrix whose (i, j)-entry is the (i, g(j))-entry of A, and let gA ∈ Mn(k) be the matrix whose (i, j)-entry is the (g(i), j)-entry of A. If g, h ∈ Aut0(C), then (Ag)h = Agh, h(gA) = ghA, (gA)h = g(Ah) for any A ∈ Mn(k). Also (AB)g = ABg, g(AB) = (gA)B, (Ag)B = A(g−1 B) 6 F. BES¸LEAG A AND S. D ASC ALESCU for any A, B ∈ Mn(k) and any g ∈ Aut0(C). It follows that if A is invertible, then so is Ag, and its inverse is g(A−1). Let T = {(aij)iρj ⊂ k∗ aijajr = air for any i, j, r with iρj, jρr}. Using the terminology of Section 5, T can be identified with the set of transitive k∗-valued functions on ρ. Multiplication on positions (i.e. pointwise multiplication of functions) makes T a group. Let F be a ρ-flag on the space V , and F ′ be a ρ-flag on the space V ′. We keep the notation of Section 2 for F, the basis of V , and the associated Eij's. Thus we fix a basis (vi)i of V such i i ≤ α} is a that {vi i ≤ α} is a basis of Vα, and similarly a basis (v′ basis of V ′ ij)iρj be the basis of End(F ′) associated with (v′ i)i of V ′ such that {v′ α for any α; let (E′ i)i. Define F : U (M (ρ, k)) × Aut0(C) × T −→ Isoalg(End(F), End(F ′)) as follows. If A ∈ U (M (ρ, k)), g ∈ Aut0(C) and (aij)iρj ∈ T , let (wi)1≤i≤n be the basis of V ′ defined by (. . . , wi, . . .) = (. . . , v′ i, . . .) Ag. Then for any i, j with iρj let Fij ∈ End(V ′) be such that Fij(wj) = aijwi for any iρj, and Fij(wr) = 0 for any r 6= j. Clearly FijFjr = Fir for iρj, jρr. Lemma 4.1. With the above notation, let A = (λpq)p,q and A−1 = (λpq)p,q. Then Fij = aij X sρg(i) g(j)ρt λsg(i)λg(j)tE′ st. In particular Fij ∈ End(F ′). Proof. Since (. . . , v′ i, . . .) = (. . . , wi, . . .)(Ag)−1 = (. . . , wi, . . .) g(A−1), we see that v′ t = X p λg(p)twp for any t. Then Fij(v′ t) = X p λg(p)tFij(wp) = aijλg(j)twi = aij X s λg(j)tλsg(i)v′ s. The coefficient of v′ thus it is zero unless s ≤ t. This shows that s in the last sum may be non-zero only if s ≤ dg(i) = g(i) and g(j) = dg(j) ≤ t, λsg(i)λg(j)tE′ st. Fij = aij X sρg(i) g(j)ρt Now define F (A, g, (aij )iρj) = ϕ, where ϕ : End(F) −→ End(F ′) is the linear map such that ϕ(Eij) = Fij for any iρj. Clearly ϕ is an algebra isomorphism. Proposition 4.2. F is surjective. Proof. Let ϕ : End(F) −→ End(F ′) be an algebra isomorphism. Denote Fij = ϕ(Eij) for any i, j with iρj. Then (Fij)iρj is a basis of End(F ′), FijFjr = Fir for any i, j, r with iρj and jρr, and (Fii)i is a complete set of orthogonal idempotents of End(F ′). (cid:3) It is easy to see that V ′ = nM i=1 Qi, where Qi = ImFii 6= 0, so dim Qi = 1 for any i. Choose 7 some non-zero wi ∈ Qi for any i. Then (wi)i is a basis of V ′. Since Fij = ϕ(Eij) 6= 0, Fij(Qr) = FijFrr(V ′) = 0 for any r 6= j, and Fij(Qj) = FiiFij(Qj) ⊂ Qi, we see that Fij(wj) = aijwi for some aij ∈ k∗. Since FijFjr = Fir, we must have aijajr = air for any i, j, r with iρj and jρr. In particular, aii = 1 for any i. Let γ : V −→ V ′ be the linear isomorphism such that γ(vi) = wi for any i. Regard V as a left End(F)-module, and V ′ as a left End(F ′)-module with the usual action of the endomorphism algebra. If iρj we have γ(Eijvt) = γ(δjtvi) = δjtwi, and Fijγ(vt) = Fijwt = δjtaijwi for any t. We get (1) ϕ(Eij )γ(vt) = aijγ(Eijvt) for any iρj and any t. Thus in general γ is not a ϕ-isomorphism, the obstruction being the scalars aij. However, γ is a ϕ′-isomorphism for a deformation ϕ′ of ϕ. Indeed, the linear map θ : End(F) −→ End(F) defined by θ(Eij) = a−1 ij Eij for any iρj, is an algebra automorphism, and (1) shows that (2) γ(Eijvt) = (ϕθ)(Eij )γ(vt) for any iρj, and any t. Thus γ is a ϕ′-isomorphism, where ϕ′ = ϕθ : End(F) −→ End(F ′) is also an algebra isomorphism. Then the lattice of End(F)-submodules of V is isomorphic to the lattice of End(F ′)-submodules of V ′ via the map γ : LEnd(F )(V ) −→ LEnd(F ′)(V ′), γ(X) = γ(X) for any End(F)-submodule X of V. By Remark 3.2, there is an isomorphism of lattices Φ : LEnd(F )(V ) −→ A(C), given by Φ(X) = Dmax, where X = VD; its inverse is Φ−1(D) = VD for any D ∈ A(C). Similarly, there is an isomorphism of lattices Φ′ : LEnd(F ′)(V ′) −→ A(C). Let f : A(C) −→ A(C) be the isomorphism of lattices such that the diagram LEnd(F )(V ) γ ∼ / / LEnd(F ′)(V ′) Φ ∼ A(C) f ∼ Φ′ / A(C) is commutative. By Proposition 3.3, f = fg for some automorphism g of the poset (C, ≤). Then for any α ∈ C γ(Vα) = γ(Vα) = (Φ′−1fgΦ)(Vα) = (Φ′−1fg)({α}) = Φ′−1({g(α)}) = V ′ g(α). This shows that dim Vα = dim V ′ g(α) = dim Vg(α) for any α ∈ C. Since dim Vα = X mβ, we see β≤α by induction on the length of α that mα = mg(α) for any α ∈ C, so g ∈ Aut0(C).     / 8 F. BES¸LEAG A AND S. D ASC ALESCU Let M be the matrix of γ in the bases (vi)i and (v′ g(α), M may have non-zero entries only on positions (i, j) with i ≤ g(j), i.e. on blocks (α, β) with α ≤ g(β). We see that A = M g−1 ∈ M (ρ, k) and M = Ag. Moreover, A is invertible and A−1 = g−1 i)i. Since γ(Vα) = V ′ (M −1). Now we have ϕ = F (A, g, (aij )iρj), and this ends the proof. (cid:3) We consider the relation ≈ on U (M (ρ, k)) × Aut0(C) × T defined by (A, g, (aij )iρj) ≈ ij = did−1 (B, h, (bij )iρj) if and only if g = h and there exist d1, for any iρj, and Bg = Ag diag(d1, . . . , dn) (or equivalently AB−1 = g−1 where D = diag(d1, . . . , dn)); here diag(d1, . . . , dn) denotes the diagonal matrix with diagonal en- tries d1, . . . , dn. This is clearly an equivalence relation. ..., dn ∈ k∗ such that aijb−1 (D−1)g−1 j Theorem 4.3. With the above notation, F (A, g, (aij )iρj) = F (B, h, (bij )iρj) if and only if (A, g, (aij )iρj) ≈ (B, h, (bij)iρj ). Thus F induces a bijection F : U (M (ρ, k)) × Aut0(C) × T ≈ −→ Isoalg(End(F), End(F ′)). Proof. Denote F (A, g, (aij )iρj) = ϕ and F (B, h, (bij )iρj) = ψ. Thus ϕ(Eij) = Fij, where Fij(wj) = aijwi; here (. . . , wi, . . .) = (. . . , u′ j) = bijw′ i and (. . . , w′ for any iρj. Now j = djwj for some dj ∈ k∗, for any j. ImFij =< wj > and ImF ′ Thus (. . . , w′ i, . . .) = (. . . , wi, . . .)diag(d1, . . . , dn), showing that Bh = Ag diag(d1, . . . , dn). Since ϕ = ψ, then Fij = F ′ ij i, . . .)Ag. Also ψ(Eij) = F ′ j >, so we must have w′ i, . . .) = (. . . , u′ ij, where F ′ i, . . .)Bh. ij =< w′ ij(w′ The (α, β)-block of Bh may be non-zero only if α ≤ h(β), and the (h(β), β)-block of Bh is non- zero (since the (β, β)-block of B is non-zero). Similarly, the (α, β)-block of Ag may be non-zero only if α ≤ g(β); the same holds for Ag diag(d1, ..., dn). Since Bh = Ag diag(d1, ..., dn), the (h(β), β)-block of Ag must be non-zero, so then h(β) ≤ g(β). Similarly, since the (g(β), β)-block of Ag is a non-zero, we obtain that g(β) ≤ h(β). Thus g = h. On the other hand, F ′ ij(wj) = F ′ ij(d−1 j w′ j) = d−1 j bijw′ i = did−1 j bijwi, so Fij = F ′ ij requires aij = did−1 j bij for any iρj. We conclude that (A, g, (aij )iρj ) ≈ (B, h, (bij )iρj). Conversely, the above computations show that the F ′ ij's associated to each of the two triples (cid:3) are the same. Let us fix some notation. If G and A are groups, a right action of G on A is a mapping A × G −→ A, (a, g) 7→ a · g, such that (ab) · g = (a · g)(b · g) and (a · g) · h = a · (gh) for any a, b ∈ A, g, h ∈ G. This is equivalent to giving a group morphism ϕ : G −→ Aut(A), where the multiplication of Aut(A) is the opposite map composition. Indeed, one can take ϕ(g)(a) = a · g. In this case, the right crossed product G ⋉ A is the cartesian product G × A of sets, with multiplication (h ⋉ b)(g ⋉ a) = hg ⋉ (b · g)a for any g, h ∈ G, a, b ∈ A; here we denote the pair (g, a) by g ⋉ a. The group Aut0(C) acts to the right on T by (aij)iρj · g = (ag(i)g(j))iρj, thus we can form a right crossed product Aut0(C) ⋉ T . Similarly, a left action of G on A is a mapping G × A −→ A, (g, a) 7→ g · a, such that g · (ab) = (g · a)(g · b) and g · (h · a) = (gh) · a; this is the same with giving a group morphism G −→ Aut(A), where this time the multiplication of Aut(A) is just the map composition. The left crossed product A ⋊ G is the set A × G with the multiplication (a ⋊ g)(b ⋊ h) = a(g · b) ⋊ gh. Now if G ⋉ A is a right crossed product, and B is a group, then a left G ⋉ A-action on B is a pair consisting of a left G-action on B and a left A-action on B, such that (3) a · (g · x) = g · ((a · g) · x) for any a ∈ A, g ∈ G, x ∈ B. 9 The action of G ⋉ A on B is (g ⋉ a) · x = g · (a · x). Indeed, this easily follows from the fact that A, respectively G, embeds into G ⋉ A by a 7→ 1 ⋉ a, respectively g 7→ g ⋉ 1, and (1 ⋉ a)(g ⋉ 1) = g ⋉ (a · g) = (g ⋉ 1)(1 ⋉ (a · g)). For later use (in Section 7), we note that if G ⋉ A is a right crossed product, and B is just a set, then a right action of G ⋉ A on B is a pair consisting of a right action of G on B and a right action of A on B satisfying the compatibility condition (4) (x · a) · g = (x · g) · (a · g) for any x ∈ B, a ∈ A, g ∈ G. Also for later use, we mention that if A ⋊ G is a left semidirect product, and both A and G act to the right on a set B, then x · (a ⋊ g) = (x · a) · g defines a right action of A ⋊ G on B, provided that (5) (x · g) · a = (x · (g · a)) · g for any x ∈ B, a ∈ A, g ∈ G. We use some of these facts in the following particular situation. The group T acts to the left if (aij)iρj ∈ T and A = (αij)1≤i,j≤n ∈ U (M (ρ, k)), then on the group U (M (ρ, k)) as follows: (aij)iρj · A is the matrix whose (i, j)-spot is αijaij if iρj, and 0 elsewhere. We note that (aij)iρj · A ∈ U (M (ρ, k)), its inverse being just (aij)iρj · A−1. The group Aut0(C) . The two actions are compatible in the Ag−1 also acts to the left on U (M (ρ, k)) by g · A = g−1 sense of (3), since (6) (aij)iρj · g−1 Ag−1 = g−1 ((ag(i)g(j))iρj · A)g−1 for any (aij)iρj ∈ T and g ∈ Aut0(C). Indeed, if A = (αij)1≤i,j≤n, it is easy to check that both sides in (6) have aijαg−1(i)g−1(j) on the (i, j)-spot for any iρj. We obtain that Aut0(C) ⋉ T acts to the left on U (M (ρ, k)) by ((aij)iρj · A)g−1 (g ⋉ (aij)iρj) · A = g−1 , and we can form the left crossed product U (M (ρ, k)) ⋊ (Aut0(C) ⋉ T ). Its multiplication is given by (7) (B ⋊ (h ⋉ (bij)iρj)) · (A ⋊ (g ⋉ (aij)iρj )) = (B h−1 ) ⋊ (hg ⋉ (bg(i)g(j)aij)iρj). Now if we apply the construction of the map F to the case where F ′ = F, we obtain a surjective map ((bij)iρj · A)h−1 F : U (M (ρ, k)) ⋊ (Aut0(C) ⋉ T ) −→ Aut(End(F)). Theorem 4.4. F is a morphism of groups, and it induces a group isomorphism where D = {diag(d1, . . . , dn) ⋊ (Id ⋉ (d−1 U (M (ρ, k)) ⋊ (Aut0(C) ⋉ T ) ≃ Aut(End(F)), D i dj)iρj) d1, . . . , dn ∈ k∗}. Proof. Let ϕ = F (A ⋊ (g ⋉ (aij)iρj)), where A = (λij)i,j; denote A−1 = (λij)i,j. Let also ψ = F (B ⋊ (h ⋉ (bij)iρj)), with B = (µij)i,j and B−1 = (µij)i,j. We will show that (8) ψϕ = F ( (B ⋊ (h ⋉ (bij)iρj)) · (A ⋊ (g ⋉ (aij)iρj)) ) and this will prove that F is a group morphism. We know that ϕ(Eij) = aij X sρg(i) g(j)ρt λsg(i)λg(j)tEst, 10 F. BES¸LEAG A AND S. D ASC ALESCU λsg(i)λg(j)tψ(Est) so then ψϕ(Eij ) = aij X = aij X sρg(i) g(j)ρt sρg(i) g(j)ρt X pρh(s) h(t)ρq bstλsg(i)λg(j)tµph(s)µh(t)qEpq = aij X X pρhg(i) hg(j)ρq h−1(p)ρsρg(i) g(j)ρtρh−1(q) = aijbg(i)g(j) X ( X pρhg(i) hg(j)ρq h−1(p)ρsρg(i) bsg(i)bg(i)g(j)bg(j)tλsg(i)λg(j)tµph(s)µh(t)qEpq µph(s)bsg(i)λsg(i))( X g(j)ρtρh−1(q) bg(j)tλg(j)tµh(t)q)Epq. But the first bracket in the last row above is the product of the p-th row in Bh and the i-th column in ((bij )iρj ·A)g, thus it is the (p, i)-position in the matrix Bh((bij)iρj ·A)g, or equivalently, the (p,fhg(i))-position in Denote B h−1 (Bh((bij )iρj · A)g)(hg)−1 = Bh((bij)iρj · A)h−1 = B h−1 ((bij)iρj · A)h−1 . ((bij )iρj · A)h−1 = (νij)i,j, and the inverse of this matrix by (ν ij)i,j. A similar argument shows that the second bracket above is just νhg(j)q. Then ψϕ(Eij ) = aijbg(i)g(j) X νphg(i)ν hg(j)qEpq, pρhg(i) hg(j)ρq showing that ψϕ = F (B h−1 ⋊ (hg ⋉ (bg(i)g(j)aij)iρj)), which using (7) is just (8). Now z = A ⋊ (g ⋉ (aij)iρj) is in the kernel of F if and only if it is equivalent (via ≈) to the (cid:3) identity element. In view of Theorem 4.3, this is the same with z ∈ D. ((bij )iρj · A)h−1 Now we explain how the description of the automorphism group of M (ρ, k) given in [5] can be deduced from Theorem 4.4. We recall a few basic things about semidirect products. We first note that if a group G acts to the right on a group A, with action denoted by a · g for a ∈ A and g ∈ G, then there is also a left action of G on A, defined by g · a = a · g−1, and the associated right and left semidirect products are isomorphic. Indeed, φ : A ⋊ G → G ⋉ A, φ(a ⋊ g) = g ⋉ (g−1 · a), is a group isomorphism, with inverse φ−1(g ⋉ a) = a · g−1 ⋊ g. Secondly, if we have a double semidirect product B ⋊ (A ⋊ G), then the left action of A ⋊ G on B induces (via the usual embeddings of A and G) left actions of A and G on B. Moreover, G acts to the left on the group B ⋊ A by g · (x ⋊ a) = g · x ⋊ g · a for any g ∈ G, x ∈ B, a ∈ A, and the map γ : B ⋊ (A ⋊ G) → (B ⋊ A) ⋊ G, γ(x ⋊ (a ⋊ g)) = (x ⋊ a) ⋊ g, is an isomorphism of groups. Finally, if A ⋊ G is a left semidirect product, and N is a normal subgroup of A which is invariant to the action of G, then N ⋊ 1 is a normal subgroup of A ⋊ G and A⋊G ⋊ G, where the action of G on A N is the one induced by the action of G on A. N ⋊G ≃ A N Using these remarks, we see that U (M (ρ, k)) ⋊ (Aut0(C) ⋉ T ) ≃ U (M (ρ, k)) ⋊ (T ⋊ Aut0(C)) ≃ (U (M (ρ, k)) ⋊ T ) ⋊ Aut0(C) 11 and in the third double semidirect product the action of Aut0(C) on U (M (ρ, k)) ⋊ T is given by g · (A ⋊ (aij)iρj) = g−1 Ag−1 ⋊ (aij)iρj · g−1. The image of D through these isomorphisms in (U (M (ρ, k)) ⋊ T ) ⋊ Aut0(C) is D0 ⋊ 1, where D0 = {diag(d1, . . . , dn) ⋊ (d−1 i dj)iρj d1, . . . , dn ∈ k∗}. Clearly D0 is a normal subgroup in U (M (ρ, k))⋊T , since D is a normal subgroup of U (M (ρ, k))⋊ (Aut0(C) ⋉ T ), and it is easy to check that D0 is invariant under the action of Aut0(C). Thus we obtain that U (M (ρ, k)) ⋊ (Aut0(C) ⋉ T ) D ≃ ≃ (U (M (ρ, k)) ⋊ T ) ⋊ Aut0(C) D0 ⋊ 1 U (M (ρ, k)) ⋊ T D0 ⋊ Aut0(C). Following [5], we consider an undirected graph ∆, whose vertices are all elements i ∈ {1, . . . , n} such that the equivalence class i is not an isolated point in the poset (C, ≤); we say that α ∈ C is an isolated point if any of α ≤ β and β ≤ α implies that β = α. If i and j are vertices of ∆, there is an edge connecting i and j if and only if i and j are not equal, but they are in relation ≤ (in any possible way). If ∆1, . . . , ∆z are the connected components of ∆, choose a tree Tℓ in each ∆ℓ (note that there are several possible such choices). Now let G be the subgroup of T consisting of all (aij)iρj 's for which aij = 1 whenever iρj and i, j are vertices of ∆, joined by an edge of some Tℓ, or when both i and j lie in an isolated equivalence class in C. Also, let I be the group of inner automorphisms of M (ρ, k), i.e. I = {CA A ∈ U (M (ρ, k))}, where CA(X) = AXA−1 for any X ∈ M (ρ, k). Then there is a left action of G on I given by (aij)iρj · CA = C(aij )iρj ·A. We prove that (9) and this will show that U (M (ρ, k)) ⋊ T D0 ≃ I ⋊ G Aut(M (ρ, k)) ≃ U (M (ρ, k)) ⋊ (Aut0(C) ⋉ T ) D ≃ (I ⋊ G) ⋊ Aut0(C), thus recovering the description of the automorphism group of the structural matrix algebra given in [5]. For proving (9), define Ψ : I ⋊ G → U (M (ρ, k)) ⋊ T D0 , Ψ(CA ⋊ (aij)iρj) = A ⋊ (aij)iρj, where y denotes the class of y modulo D0. We note that Ψ is well defined since CA = CB if and only if A−1B lies in the center of M (ρ, k), and this is the set of diagonal matrices constant on all ith diagonal positions with i in the same connected component of C. Then B = Adiag(d1, . . . , dn) for such a central diagonal matrix diag(d1, . . . , dn). Since d−1 i dj = 1 for any iρj, we have that diag(d1, . . . , dn) ⋊ (1)iρj ∈ D0. But B ⋊ (aij)iρj = (diag(d1, . . . , dn) ⋊ (1)iρj )(A ⋊ (aij)iρj), so B ⋊ (aij)iρj = A ⋊ (aij)iρj. We show that Ψ is injective. Indeed, if Ψ(CA ⋊ (aij)iρj) is trivial, then A = diag(d1, . . . , dn) and aij = d−1 i dj for any iρj, where d1, . . . , dn are some non-zero scalars. Since aij = 1 for any i, j joined by an edge of some Tℓ, and Tℓ is a tree, we see that di must be the same when i runs through the vertices of a fixed ∆ℓ. Also, aij = 1 for i, j in the same isolated equivalence class α ∈ C, so di is constant for i in such a class. We conclude that A is a central element, so CA is the identity, and all aij's with iρj are equal to 1. 12 F. BES¸LEAG A AND S. D ASC ALESCU j To prove that Ψ is surjective, it is enough to show that for any A ⋊ (aij)iρj ∈ U (M (ρ, k)) ⋊ T there exists B ⋊ (bij)iρj ∈ I ⋊ G with A ⋊ (aij)iρj = B ⋊ (bij)iρj. We first show that there are d1, . . . , dn ∈ k∗ such that aij = did−1 for any i, j joined by an edge of some Tℓ, and also for any i, j in the same isolated equivalence class. Indeed, for the tree Tℓ we can fix some vertex i0, set di0 = 1, and then define di for any other vertex in Tℓ by induction on the distance from i0 to i in the tree Tℓ, using at each step the desired condition aij = did−1 . For an isolated equivalence class, say {i1, . . . , ip}, set dip = 1, and ai1,ip = di1 , . . . , aip−1,ip = dip−1. Then air,is = air,ipaip,is = air,ipa−1 is,ip (diag(d1, . . . , dn) ⋊ (d−1 and (d−1 i dj)iρj)(A ⋊ (aij)iρj) = diag(d1, . . . , dn)((d−1 i dj)iρj · A) ⋊ (d−1 i djaij)iρj ∈ G, so we are done. = dir d−1 is i djaij)iρj . Now j 5. Graded flags and associated gradings of matrices Let G be a group. A G-graded vector space is a vector space V with a decomposition Vg are called the homogeneous Vg, where each Vg is a subspace. The elements of [ V = M elements of V . Each v ∈ V is uniquely written as v = X vg, vg ∈ Vg. g∈G g∈G g∈G Definition 5.1. A G-graded ρ-flag is a ρ-flag (V, (Vα)α∈C) such that V is a G-graded vector space, and the basis B from Definition 2.1 consists of homogeneous elements. If F = (V, (Vα)α∈C) and F ′ = (V ′, (V ′ α)α∈C) are G-graded ρ-flags, then a morphism of graded flags from F to F ′ is a morphism f : V → V ′ of ρ-flags, which is also a morphism of graded vector spaces. Note that in a graded flag any Vα is a graded vector subspace, as it has a basis of homogeneous elements. If F = (V, (Vα)α∈C) is a G-graded ρ-flag and σ ∈ G, define End(F)σ = {f ∈ End(F) f (Vg) ⊆ Vσg for any g ∈ G}. Proposition 5.2. End(F) = M σ∈G algebra. End(F)σ, and this decomposition makes End(F) a G-graded Proof. It is clear that End(F)σ can be non-zero only for σ ∈ (supp V ) · (supp V )−1, where supp V = {g ∈ G Vg 6= 0}. Thus only finitely many End(F)σ are nonzero. End(F)σ is a direct sum, choose some f σ ∈ End(F)σ for each σ ∈ G. In order to see that X If X f σ = 0, then 0 = (X σ∈G σ∈G f σ)(Vg) = X σ∈G σ∈G f σ(Vg) for any g ∈ G. Since f σ(Vg) ⊂ Vσg, this shows that f σ(Vg) = 0 for any σ and any g, and we get that f σ = 0 for any σ. Now let f ∈ End(F). For any σ ∈ G define the linear maps fσ : V −→ V such that (fσ)(vg) = f (v)σg for any g ∈ G, vg ∈ Vg. Then fσ(Vα) = X fσ((Vα)g) ⊂ X g∈G g∈G f (Vα)σg ⊂ Vα for any α ∈ C, so fσ ∈ End(F)σ. Moreover, M σ∈G End(F)σ. it is clear that f = X σ∈G fσ, so End(F) = Obviously, End(F)σEnd(F)τ ⊂ End(F)στ for any σ, τ ∈ G, so End(F) is a G-graded algebra. (cid:3) 13 We will denote by END(F) the algebra End(F), regarded with the G-grading defined in Proposition 5.2. This grading transfers via the isomorphism defined in the proof of Proposition 2.2 to a G-grading on the structural matrix algebra M (ρ, k). If g1, . . . , gn are the degrees of the basis elements v1, . . . , vn, then each matrix unit eij with iρj is a homogeneous element of degree gig−1 in this grading. j Definition 5.3. A G-grading on the algebra M (ρ, k) is called a good grading if eij is a homo- geneous element for any i, j with iρj. Gradings on M (ρ, k) arising from graded flags are good gradings. We note that giving a good G-grading on M (ρ, k) is equivalent to giving a family (uij)iρj of elements of G such that uijujr = uir for any i, j, r with iρj and jρr. If we regard this family as a function u : ρ → G, defined by u(i, j) = uij for any i, j with iρj, then u is just a transitive function on ρ with values in G, in the terminology of [8]. j Examples of a transitive functions on ρ can be obtained as follows. Let g1, . . . , gn ∈ G, and let uij = gig−1 for any i, j with iρj. Then (uij)iρj is a transitive function on ρ. A transitive function on ρ is called trivial if it is obtained in this way. Clearly, the good G-gradings corresponding to trivial transitive functions on ρ are precisely the gradings obtained from graded flags as above. It is an interesting question whether all good gradings arise from graded flags, or equivalently Question. Let ρ be a preorder relation. Is it true that for any group G all transitive functions u : ρ → G are trivial? Several variations of the above questions can be formulated, for example to determine for a fixed ρ all groups G such that any transitive function on ρ with values in G is trivial. The following shows that the problem posed in the question above reduces to answering it for the associated poset (C, ≤). We also give an equivalent formulation involving the associated graph Γ. The equivalence between (1) and (2) in the next Proposition was proved in [8]. Proposition 5.4. Let G be a group. The following are equivalent: (1) Any transitive function u : ρ → G is trivial. (2) Any transitive function w : ≤ → G is trivial, where ≤ is the partial order on C. (3) For any function v : Γ1 → G such that v(a1) . . . v(ar) = v(b1) . . . v(bs) for any paths a1 . . . ar and b1 . . . bs in Γ with s(a1) = s(b1) and t(ar) = t(bs), there exists a function f : Γ0 → G such that v(a) = f (s(a))f (t(a))−1 for any a ∈ Γ1. Proof. Denote C = {α1, ..., αh} and pick i1 ∈ α1, ..., ih ∈ αh. (1)⇒(2) Let w : ≤ → G be a transitive function. Then u : ρ → G defined by u(i, j) = w(i, j) for any i, j with iρj, is a transitive function, so there exists a function f : {1, . . . , n} → G such that u(i, j) = f (i)f (j)−1 for any i, j with iρj. Now define f : C → G, f (αq) = f (iq) for any 1 ≤ q ≤ h. Then if αq ≤ αp, we have w(αq, αp) = u(iq, ip) = f (iq)f (ip)−1 = f (αq)f (αp)−1, so w is trivial. (2)⇒(3) Let v : Γ1 → G be as in (3). Define w : ≤ → G as follows. If α < β, let a1 . . . ar be a path in Γ starting at α and ending at β; we define w(α, β) = v(a1) . . . v(ar), and we note that the definition does not depend on the path, taking into account the property satisfied by v. We also define w(α, α) = e, the neutral element of G, for any α ∈ C. Then w is a transitive 14 F. BES¸LEAG A AND S. D ASC ALESCU function, so there exists f : C → G such that w(α, β) = f (α)f (β)−1 for any α ≤ β. In particular v(a) = f (s(a))f (t(a))−1 for any a ∈ Γ1. (3)⇒(1) Let u : ρ → G be a transitive function. Define v : Γ1 −→ G as follows: if a ∈ Γ1 with s(a) = αp, t(a) = αq, then v(a) = u(ip, iq). If a1 . . . ar and b1 . . . bs are paths in Γ with s(a1) = s(b1) = αp and t(ar) = t(bs) = αq, it is clear that v(a1) . . . v(ar) = v(b1) . . . v(bs) = u(ip, iq). Then there exist z1, ..., zn ∈ G such that v(a) = zpz−1 for any arrow a with s(a) = αp, t(a) = αq, 1 ≤ p, q ≤ h. q Now define the family (gi)1≤i≤n of elements of G by gi = u(i, ip)zp for any i, where p is such that i ∈ αp (note that u(i, ip) makes sense since i, ip ∈ αp). Then if i and j are such that iρj, let i ∈ αp, j ∈ αq. We know that gi = u(i, ip)zp, gj = u(j, iq)zq and u(ip, iq) = zpz−1 . Then q u(i, j) = u(i, ip)u(ip, iq)u(iq, j) q u(j, iq)−1 p zpz−1 q zqg−1 j = giz−1 = giz−1 = gig−1 j . (cid:3) The next result gives an easy way to check whether a function v as in Proposition 5.4 (3) arises from a function f : Γ0 → G, by looking at the cycles of the undirected graph associated with Γ. We consider the graph Γ, constructed from Γ by 'doubling the arrows'. It has the same vertices as Γ thus Γ0 = Γ0. For any arrow a ∈ Γ1 from α to β, we consider an arrow a from β to α, and define Γ1 = Γ1 ∪ {a a ∈ Γ1}. If G is a group and v : Γ1 → G is a function, we denote by v : Γ1 → G the function whose restriction to Γ1 is v, and such that v(a) = v(a)−1 for any a ∈ Γ1. Proposition 5.5. Let G be a group, and let v : Γ1 −→ G such that v(a1) . . . v(ar) = v(b1) . . . v(bs) for any paths a1 . . . ar and b1 . . . bs in Γ with s(a1) = s(b1) and t(ar) = t(bs). Then the following are equivalent. (1) There exists a function f : Γ0 → G such that v(a) = f (s(a))f (t(a))−1 for any a ∈ Γ1. (2) For any cycle z1...zm in Γ, with z1, ..., zm ∈ Γ1 (this corresponds to a cycle in the undirected graph Γu associated with Γ) one has v(z1) . . . v(zm) = 1. Proof. (1)⇒(2) For any a ∈ Γ1 starting from α and ending at β, we have v(a) = v(a) = f (α)f (β)−1 and v(a) = f (β)f (α)−1. Thus v(z) = f (s(z))f (t(z))−1 for any z ∈ Γ1. Now it is clear that v(z1) ... v(zm) = 1 for any cycle z1 ... zm in Γ. (2)⇒(1) We construct a function f : Γ0 −→ G satisfying the desired property. It is clear that we can reduce to the case where Γ is connected (and putting together the functions constructed for the connected components). Choose some ω ∈ Γ0 and take f (ω) be an arbitrary element of G. If α ∈ Γ0, let z1 . . . zd be a path from α to ω in Γ. Define f (α) = v(z1) . . . v(zd)f (ω); this does not depend on the path z1 . . . zd, since for another path y1 . . . yh from α to ω, z1 . . . zdy−1 is a cycle in Γ, where y−1 denotes the arrow opposite to y (thus a−1 = a, and a−1 = a for any a ∈ Γ1). It is clear that v(y−1) = v(y)−1 for any y ∈ Γ1. Then v(z1) . . . v(zd)v(y−1 1 ) = 1, so v(z1) . . . v(zd) = v(y1) . . . v(yh). Now if a ∈ Γ1 is an arrow from α to β, let z1 ... zd be a path from β to ω in Γ. Then f (β) = v(z1) ... v(zd)f (ω), and f (α) = v(a)v(z1) ... v(zd)f (ω) = v(a)f (β) = v(a)f (β), so v(a) = f (α)f (β)−1. (cid:3) h ) . . . v(y−1 h . . . y−1 1 Let F (Γ) be the free group generated by the set Γ1 of arrows of Γ. Let A(Γ) be the subgroup 1 , where a1 . . . ar and b1 . . . bp are of F (Γ) generated by all elements of the form a1 . . . arb−1 p . . . b−1 15 two paths (in Γ) starting from the same vertex and terminating at the same vertex. We also consider the subgroup B(Γ) of F (Γ) generated by all elements of the form a1aε2 m , where a1, . . . , am are arrows forming in this order a cycle in the undirected graph obtained from Γ when omitting the direction of arrows, and εi = 1 if ai is in the direction of the directed cycle given by a1, and εi = −1 otherwise. Clearly A(Γ) ⊆ B(Γ), since any generator of A(Γ) lies in B(Γ). Now we can give an answer to the question posed above in terms of these groups. We recall that for a group X and a subgroup Y of X, the normal closure Y N of Y is the smallest normal subgroup of X containing Y . The elements of Y N are all products of conjugates of elements of Y . 2 . . . aεm Proposition 5.6. With notation as above, the following are equivalent. (1) For any group G, any transitive function u : ρ → G is trivial. (2) A(Γ)N = B(Γ)N . (3) Any generator b of B(Γ) can be written in the form b = g1x1g−1 m for some 1 positive integer m, some g1, . . . , gm ∈ F (Γ) and some x1, . . . , xm among the generators in the construction of A(Γ). . . . gmxmg−1 Proof. By Propositions 5.4 and 5.5, (1) is equivalent to the fact that for any group G and any group morphism f : F (Γ) → G such that f (A(Γ)) = 1, we also have f (B(Γ)) = 1. Indeed, giving a function v : Γ1 → G is the same with giving a group morphism f : F (Γ) → G; moreover, v satisfies v(a1) . . . v(ar) = v(b1) . . . v(bs) for any paths a1 . . . ar and b1 . . . bs in Γ with s(a1) = s(b1) and t(ar) = t(bs), if and only if f (A(Γ)) = 1. On the other hand, such a v is trivial if and only if f (B(Γ)) = 1. Now if (1) holds, then the projection F (Γ) → F (Γ)/A(Γ)N is trivial on A(Γ), so it must be trivial on B(Γ). This shows that B(Γ) ⊆ A(Γ)N , or A(Γ)N = B(Γ)N . Conversely, if (2) holds, then any group morphism f : F (Γ) → G which is trivial on A(Γ) is also trivial on A(Γ)N , and then also on B(Γ), so (1) holds. The equivalence between (2) and (3) follows from the description of the normal closure of a (cid:3) subgroup, and the fact that the given set of generators of A(Γ) is closed under inverse. Example 5.7. Assume that ρ is a preorder relation such that the associated graph Γ is of the form am−1 <①①①①①①①① m−1• m• bp+1 b❋❋❋❋❋❋❋❋ •m+1 2• b❊❊❊❊❊❊❊❊❊ a1 1• •m+p <②②②②②②②②② b1 for some integers m ≥ 3 and p ≥ 1. Thus there are two paths from 1 to m, these are a1 . . . am−1 and b1 . . . bp+1. Then for any group G, any transitive function u : ρ → G is trivial. Indeed, if v is a function as in Proposition 5.5, then v(a1) . . . v(am−1) = v(b1) . . . v(bp+1), and then the condition in (2) of the mentioned Proposition is obviously satisfied, as it is clear that the associated undirected graph has just one cycle. < b b < 16 F. BES¸LEAG A AND S. D ASC ALESCU Alternatively, A(Γ) is the cyclic group generated by x = a1 . . . am−1b−1 p+1 . . . b−1 generators of B(Γ) are all conjugates of x or x−1. For example, a2 . . . am−1b−1 a−1 1 xa1. Thus A(Γ)N = B(Γ)N . 1 , while the 1 a1 = p+1 . . . b−1 Example 5.8. Assume that ρ is a preorder relation such that the associated graph Γ is of the form • ⑦⑦⑦⑦⑦⑦⑦ _❅❅❅❅❅❅❅ • • • • ❅❅❅❅❅❅❅ ?⑦⑦⑦⑦⑦⑦⑦ • Thus the un-directed graph Γu associated to Γ is cyclic, and in Γ there are at least two vertices where both adjacent arrows terminate (equivalently, Γu is cyclic and Γ is not of the type in Example 5.7). Then for any non-trivial group G, there exist transitive functions u : ρ → G that are not trivial. Indeed, it is enough to show that the condition (3) in Proposition 5.4 does not hold. Since Γ does not have two different paths starting from the same vertex and ending at the same vertex, we only have to see that not any function v : Γ1 → G is given by v(a) = f (s(a))f (t(a))−1, a ∈ Γ1, for some function f : Γ0 → G. This is clear, for instance we can take v to be the identity of G on all but one arrows. We note that A(Γ) is trivial, since there are no two different paths starting from the same vertex and terminating at the same vertex. On the other hand, B(Γ) is not trivial, since Γu has a cycle. The simplest example of such a graph is • ⑦⑦⑦⑦⑦⑦⑦ _❅❅❅❅❅❅❅ • • ❅❅❅❅❅❅❅ ?⑦⑦⑦⑦⑦⑦⑦ • and the corresponding structural matrix algebra, whose not all good gradings arise from graded flags, is   k 0 k k 0 k k k 0 0 k 0 0 0 0 k   . Example 5.9. If we construct a graph ∆ by taking a graph Γ as in Example 5.8, adding a vertex v, and adding an arrow from each vertex in Γ where both adjacent arrows terminate to v, as in the picture below   _ ?   _ ? 17 v• • • ~⑥⑥⑥⑥⑥⑥⑥⑥ `❇❇❇❇❇❇❇❇ • • • ❅❅❅❅❅❅❅ ?⑦⑦⑦⑦⑦⑦⑦ • then all transitive functions (on the corresponding preordered set) are trivial. For simplicity, we explain this in the case where ∆ is x • • a ⑦⑦⑦⑦⑦⑦⑦ _❅❅❅❅❅❅❅ c • • y b ❅❅❅❅❅❅❅ ?⑦⑦⑦⑦⑦⑦⑦ d • but the argument is the same in general. In this case, A(∆) is generated by g = axy−1b−1 and h = cxy−1d−1, while B(∆) is generated by certain conjugates of g and h (as explained in Example 5.8), ac−1db−1, and certain conjugates of the latter. But ac−1db−1 = g(db−1)−1h−1(db−1), showing that A(∆)N = B(∆)N . 6. Isomorphisms between graded endomorphism algebras If V = ⊕g∈GVg is a G-graded vector space, then for any σ ∈ G the right σ-suspension of V is the G-graded vector space V (σ) which is just V as a vector space, with the grading shifted by σ as follows: V (σ)g = Vgσ for any g ∈ G. Also, the left σ-suspension of V , denoted by (σ)V , is the vector space V with the grading given by ((σ)V )g = Vσg. For any σ, τ ∈ G one has (V (σ))(τ ) = V (τ σ), (σ)((τ )V ) = (τ σ)V and ((σ)V )(τ ) = (σ)(V (τ )). The fact that there are two types of suspensions for a graded vector space V can be explained by the fact that V is an object in the category of left graded modules, and also an object in the category of right graded modules over the algebra k, regarded with the trivial G-grading. Then V (σ) and (σ)V are just the suspensions when V is regarded in these categories. If V and W are G-graded vector spaces and σ ∈ G, we say that a linear map f : V → W is a morphism of left degree σ if f (Vg) ⊆ Wσg for any g ∈ G; this means that f is a morphism of graded vector spaces when regarded as f : V → (σ)W . Similarly, f is a morphism of right degree σ if f (Vg) ⊆ Wgσ for any g ∈ G. If F = (V, (Vα)α∈C) is a G-graded ρ-flag and σ ∈ G, then the right suspension of F is F(σ) = (V (σ), (Vα)α∈C), and the left suspension of F is (σ)F = ((σ)V, (Vα)α∈C). It is clear that END(F)σ is just the space of morphisms of graded flags from F to (σ)F. Let F = (V, (Vα)α∈C) be a G-graded ρ-flag, with a homogeneous basis B = [ Bα of V α∈C providing the flag structure. ~  A A h h ` ?   K K n n _ ? 18 F. BES¸LEAG A AND S. D ASC ALESCU Let C = C1 ∪ . . . ∪ Cq be the decomposition of C in disjoint connected components; these correspond to the connected components of the undirected graph Γu. For each 1 ≤ t ≤ q, let ρt α, by restricting ρ. be the preorder relation on the set [ If V t = X V = M α∈Ct 1≤t≤q Vα, then F t = (V t, (Vα)α∈Ct ) is a G-graded ρt-flag with basis [ Bα. Obviously, α∈Ct V t. In a formal way we can write F = F 1 ⊕ . . . ⊕ F q, where F is a G-graded ρ-flag, α∈Ct and F t is a G-graded ρt-flag for each 1 ≤ t ≤ q. Definition 6.1. Let ρ and µ be isomorphic preorder relations (i.e. the preordered sets on which ρ and µ are defined are isomorphic). Let C and D be the posets associated with ρ and µ, and let g : C → D be an isomorphism of posets. We say that a ρ-flag F = (V, (Vα)α∈C)) is g- isomorphic to a µ-flag G = (W, (Wβ)β∈D)) if there is a linear isomorphism u : V → W such that u(Vα) = Wg(α) for any α ∈ C. If F and G are G-graded flags, we say that they are g-isomorphic as graded flags if there is such an u which is a morphism of graded vector spaces. Lemma 6.2. With notation as in Definition 6.1, if the G-graded flags F and G are g-isomorphic, then END(F) and END(G) are isomorphic as G-graded algebras. Proof. If u : V → W is a g-isomorphism between the graded flags F and G, then Φ : END(F) → END(G), Φ(φ) = uφu−1 is an isomorphism of G-graded algebras. (cid:3) Now we will consider another G-graded ρ-flag F ′ = (V ′, (V ′ α)α∈C). As we did for F, we also V ′t and F ′ = F ′1 ⊕ . . . ⊕ F ′q, where F ′t is a G-graded ρt-flag for each 1 ≤ t ≤ q. have V ′ = M 1≤t≤q α)α∈C) be G-graded ρ-flags. Then the Theorem 6.3. Let F = (V, (Vα)α∈C) and F ′ = (V ′, (V ′ following assertions are equivalent: (1) END(F) and END(F ′) are isomorphic as G-graded algebras. (2) There exist g ∈ Aut0(C), σ1, . . . , σq ∈ G and a g-isomorphism γ : V → V ′ between the (ungraded) ρ-flags F and F ′, such that γV ′g(t) : V t → V ′g(t) is a linear isomorphism of left degree σt for any 1 ≤ t ≤ q, where g ∈ Sq is the permutation induced by g, i.e. g(Ct) = Cg(t). (3) There exists a permutation τ ∈ Sq, an isomorphism gt : Ct → Cτ (t) for each 1 ≤ t ≤ q, and σ1, . . . , σq ∈ G, such that F t(σt) is gt-isomorphic to F ′τ (t) for any 1 ≤ t ≤ q. V t Proof. (1)⇒(2) Let φ : END(F) → END(F ′) be an isomorphism of G-graded algebras. We follow the line of proof of Proposition 4.2 and its notation, adding the additional information related to the graded structure. Let gi = deg vi for any i. Then Eij is a homogeneous element of degree gig−1 Now Qi = Im Fii is a graded subspace of V ′, V ′ = M of END(F), and Fij = φ(Eij) also has degree gig−1 Qi and each Qi is 1-dimensional. For in END(F ′). j j 1≤i≤n each i pick wi ∈ Qi \ {0}, which is a homogeneous element. Then for any i, j with iρj we have Fij(wj) = aijwi for some aij ∈ k∗, and aijajr = air for any i, j, r with iρj and jρr. Since (Fij)Qi Qj : Qj → Qi is a linear isomorphism of degree gig−1 : Qi → Qj), we obtain that Qi ≃ (gjg−1 )(gj )Qj for any i, j with iρj, so then (gi)Qi ≃ (gj)Qj as graded vector spaces. This implies that (gi)Qi has the same isomorphism type for all i ∈ α with α lying in a connected component of C. (with inverse (Fji)Qj Qi )Qj ≃ (g−1 j i i 19 On the other hand, if Ri = kvi for any i, then (gi)Ri and (gj)Rj are isomorphic graded vector spaces for any i, j. Then there are σ1, . . . , σq ∈ G such that for any 1 ≤ t ≤ q we have Qi ≃ Ri(σt) for any i ∈ α with α ∈ Ct. Indeed, fix some t and pick α0 ∈ Ct and i0 ∈ α0. Since Qi0 and Ri0 are 1-dimensional graded vector spaces, there exists σt ∈ G such that Qi0(σt) ≃ Ri0. Then for any α ∈ Ct and any i ∈ α one has Qi(σt) ≃ ((gi0 g−1 i )Qi0)(σt) = (gi0g−1 i )(Qi0(σt)) ≃ (gi0 g−1 i )Ri0 ≃ Ri Thus we obtain that (10) deg vi = (deg wi)σt for any i ∈ α with α ∈ Ct As in the proof of Proposition 4.2, the linear map γ : V → V ′ with γ(vi) = wi for any i, is a φ′-isomorphism for a certain algebra isomorphism φ′ : END(F) → END(F ′), and then there exists g ∈ Aut0(C) with γ(Vα) = V ′ g(α) for any α ∈ C. By (10), γV t is a linear morphism of left degree σt, and we are done. (2)⇒(3) Take τ = g, and let gt : Ct → Cτ (t) be the restriction and corestriction of g for each t. Then the restriction and corestriction of γ to V t and V ′τ (t) gives a gt-isomorphism of graded flags F t(σt) ≃ F ′τ (t). (3)⇒(1) It is clear that END(F) ≃ END(F 1) × . . . × END(F q) and END(F ′) ≃ END(F ′1) × . . . × END(F ′q) as G-graded algebras. By Lemma 6.2, we see that END(F t(σt)) ≃ END(F ′τ (t)) for any 1 ≤ t ≤ q. As it is obvious that END(F t(σt)) = END(F t), we get END(F t) ≃ END(F ′τ (t)) for any 1 ≤ t ≤ q. We conclude that END(F) ≃ END(F ′). (cid:3) 7. Classification of gradings arising from graded flags The aim of this section is to classify G-gradings on M (ρ, k) arising from graded flags by the orbits of a certain group action. We keep all the notations of Section 6. We first consider three group actions on the set Gn. • Aut0(C) acts to the right on Gn by (hi)1≤i≤n ← g = (hg(i))1≤i≤n for any (hi)1≤i≤n ∈ Gn and g ∈ Aut0(C). • Gq acts to the right on Gn by where for each i we define h′ (hi)1≤i≤n ← (σt)1≤t≤q = (h′ i)1≤i≤n i = hiσp, where p is such that i ∈ Cp. • For each α ∈ C let S(α) be the symmetric group of α (regarded as a subset of {1, . . . , n}. We consider the group Qα∈C S(α), which is a Young subgroup of Sn (isomorphic to Qα∈C Smα). Then Qα∈C S(α) acts to the right on Gn by (hi)1≤i≤n ← (ψα)α∈C = (h′ i)1≤i≤n with h′ i defined by h′ i = hψα(i), where α = i, for each i. 20 F. BES¸LEAG A AND S. D ASC ALESCU Now there is a right action of the group Aut0(C) on the group Gq defined by (σt)1≤t≤q ← g = (στ (t))1≤t≤q where τ ∈ Sq is the permutation induced by g. Then we have a right semidirect product Aut0(C) ⋉ Gq. Moreover, the compatibility condition (4) holds for these actions, i.e. (11) ((hi)1≤i≤n ← (σt)1≤t≤q) ← g = ((hi)1≤i≤n ← g) ← ((σt)1≤t≤q ← g) Indeed, it is easy to see that both sides of equation (11) have on the ith position hg(i)στ (p), where p is such that i ∈ Cp. We conclude that Aut0(C) ⋉ Gq acts to the right on the set Gn by (hi)1≤i≤n ← (g ⋉ (σt)1≤t≤q) = ((hi)1≤i≤n ← g) ← (σt)1≤t≤q On the other hand, it is straightforward to check that Aut0(C) acts to the left on the group Qα∈C S(α) by g → (ψα)α∈C = (ψ′ α)α∈C, where for any α ∈ C, ψ′ α is defined by ψ′ α(i) = g(ψg−1(α)(g−1(i))) for any i ∈ α. Moreover, one can check that (12) ((hi)1≤i≤n ← g) ← (ψα)α∈C = ((hi)1≤i≤n ← (g → (ψα)α∈C)) ← g The left action of Aut0(C) on Qα∈C S(α) induces a left action of Aut0(C) ⋉ Gq on Qα∈C S(α), with 1 ⋉ Gq acting trivially on Qα∈C S(α), and then we can consider the left semidirect product Qα∈C S(α) ⋊ (Aut0(C) ⋉ Gq). The right actions of Qα∈C S(α) and Gq on Gn commute, i.e. (13) ((hi)1≤i≤n ← (ψα)α∈C) ← (σt)1≤t≤q = ((hi)1≤i≤n ← (σt)1≤t≤q) ← (ψα)α∈C Indeed, it is easily checked that on the ith position of each side one finds the element hψα(i)σp, where α = i ∈ Cp. Now (12) and (13) show that the compatibility relation (5) is satisfied for the right actions of Aut0(C) ⋉ Gq and Qα∈C S(α) on Gn. In conclusion, the group Qα∈C S(α) ⋊ (Aut0(C) ⋉ Gq) acts to the right on the set Gn by (hi)1≤i≤n ← ((ψα)α∈C ⋊ (g ⋉ (σt)1≤t≤q)) = (((hi)1≤i≤n ← (ψα)α∈C) ← g) ← (σt)1≤t≤q. Now we can prove the following. Theorem 7.1. The isomorphism types of G-gradings of the type END(F), where F is a G-graded ρ-flag, are classified by the orbits of the right action of the group Qα∈C S(α) ⋊ (Aut0(C) ⋉ Gq) on the set Gn. Proof. We first need some simple remarks. If V and V ′ are G-graded vector spaces with homo- n}, then V and V ′ are isomorphic as G-graded geneous bases {v1, . . . , vn}, respectively {v′ vector spaces if and only if dim Vg = dim V ′ g for any g ∈ G, and this is also equivalent to the 1, . . . , deg v′ fact that the n-tuple (deg v1, . . . , deg vn) of elements of G is obtained from (deg v′ n) by a permutation. 1, . . . , v′ Also, if σ ∈ G, then V (σ) ≃ V ′ if and only if ((deg v1)σ−1, . . . , (deg vn)σ−1) is obtained from n) by a permutation; this follows from the fact that a homogeneous element of 1, . . . , deg v′ (deg v′ degree g of V has degree gσ−1 in V (σ). Let F be a ρ-flag with basis B = {v1, . . . , vn} as in Definition 2.1. A G-graded structure on F is given by assigning arbitrary degrees h1, . . . , hn ∈ G to v1, . . . , vn. Thus G-graded structures on F are given by elements (h1, . . . , hn) of Gn. 21 Let F and F ′ be G-graded ρ-flags given by n-tuples (h1, . . . , hn) and (h′ The homogeneous basis of V and V ′ are denoted by B = [ Bα and B′ = [ 1, . . . , h′ B′ α. n) as above. α∈C α∈C We show that END(F) ≃ END(F ′) as G-graded algebras if and only if (h1, . . . , hn) and 1, . . . , h′ n) are in the same orbit of Gn with respect to the right action ofQα∈C S(α)⋊(Aut0(C)⋉ (h′ Gq), and this will finish the proof. By Theorem 6.3, END(F) ≃ END(F ′) if and only if there exists g ∈ Aut0(C) such that F t(σt) is gt-isomorphic as a graded flag to F ′g(t) for any 1 ≤ t ≤ q, where g ∈ Sq is the permutation such that for any t, g(Ct) = Cg(t), and gt : Ct → Cg(t) is the isomorphism of posets induced by g via restriction and corestriction. Using the considerations above, we obtain that END(F) ≃ END(F ′) if and only if there exists g ∈ Aut0(C) such that for each 1 ≤ t ≤ q and any α ∈ Ct, the degrees of the elements of Bα multiplied to the right by σ−1 are obtained by a permutation from the elements of B′ g(α). But this is equivalent to t ((hi)1≤i≤n ← (σ−1 )1≤t≤q) ← (ψα)α∈C = (h′ t i)1≤i≤n ← g for some (ψα)α∈C ∈ Qα∈C S(α). Since the right actions of Gq and Qα∈C S(α) on Gn commute, this is the same with which is the same to (hi)1≤i≤n and (h′ (hi)1≤i≤n = (((h′ Qα∈C S(α) ⋊ (Aut0(C) ⋉ Gq) on Gn. i)1≤i≤n ← g) ← (σt)1≤t≤q) ← (ψ−1 α )α∈C i)1≤i≤n lying in the same orbit of the right action of (cid:3) Example 7.2. As particular cases of our results we obtain the following. (1) Let A = Mn(k), the full matrix algebra. If G is a group, then the good G-gradings on A are all isomorphic to gradings of the form END(V ), where V is a G-graded vector space of dimension n. These gradings are classified by the orbits of the biaction of the groups Sn (by usual permutations of the elements) and G (by right translations) on Gn. Indeed, in this case C is a singleton, so obviously Aut0(C) is trivial. This result appears in [4]. (2) Let A be the algebra of upper block triangular matrices of type m1, . . . , mr, where n = m1 + . . . + mr. Then C is isomorphic to the poset {1, . . . , r} with the usual order, so any good grading on A is of the type END(F), where F is a graded (usual) flag of signature (m1, . . . , mr). Again, Aut0(C) is trivial and C is connected, so the isomorphism types of good G-gradings on A are classified by the orbits of the biaction of a Young subgroup Sm1 × . . . × Smr (by permutations) and G (by translations) on Gn. This result appears in [3]. References [1] Yu. A. Bahturin, S. K. Sehgal, M. V. Zaicev, Group gradings on associative algebras, J. Algebra 241 (2001), 677 -- 698. [2] Yu. A. Bahturin, M. V. Zaicev, Group gradings on matrix algebras, Canad. Math. Bull. 45 (2002), 499 -- 508. [3] M. Barascu, S. Dascalescu, Good gradings on upper block triangular matrix algebras, Comm. Algebra 41 (2013), 4290-4298. [4] S. Caenepeel, S. Dascalescu, C. Nastasescu, On Gradings of Matrix Algebras and Descent Theory, Comm. Algebra 30 (2002), 5901 -- 5920. [5] S. P. Coelho, The automorphism group of a structural matrix algebra, Linear Alg. Appl. 195 (1993), 35-58. [6] V. Lakshmibai and J. Brown, Flag varieties. An interplay of geometry, combinatorics and representation theory, Hindustan Book Agency, 2009. [7] C. Nastasescu and F. van Oystaeyen, Methods of graded rings, Lecture Notes in Math., vol. 1836 (2004), Springer Verlag. [8] A. Nowicki, Derivations of special subrings of matrix rings and regular graphs, Tsukuba J. Math. 7 (1983), 281-297. 22 F. BES¸LEAG A AND S. D ASC ALESCU [9] E. Spiegel and C. J. O'Donnell, Incidence algebras, Pure and Appl. Math. 206 (1997), Marcel Dekker, New York. [10] L. Van Wyk, Maximal left ideals in structural matrix rings, Comm. Algebra 16 (1988), 399-419. University of Bucharest, Facultatea de Matematica, Str. Academiei 14, Bucharest 1, RO- 010014, Romania e-mail: filoteia [email protected], [email protected]
1510.05621
1
1510
2015-10-19T19:00:32
A classification of torsors over Laurent polynomial rings
[ "math.RA" ]
Let R\_n be the ring of Laurent polynomials in n variables over a field k of characteristic zero and let K\_n be its fraction field.Given a linear algebraic k-group $G$, we show that a K\_n-torsor under G which is unramified with respect to X=Spec(R\_n)extends to a unique toral R\_n-torsor under G. This result, in turn, allows us to classify all G-torsors over R\_n.
math.RA
math
A CLASSIFICATION OF TORSORS OVER LAURENT POLYNOMIAL RINGS V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA Abstract. Let Rn be the ring of Laurent polynomials in n variables over a field k of characteristic zero and let Kn be its fraction field. Given a linear algebraic k -- group G, we show that a Kn-torsor under G which is unramified with respect to X = Spec(Rn) extends to a unique toral Rn -- torsor under G. This result, in turn, allows us to classify all G-torsors over Rn. Keywords: Reductive group scheme, torsor, multiloop algebra. MSC 2000: 14F20, 20G15, 17B67, 11E72. Contents Introduction 1. 2. Unramified functors 3. Non-abelian cohomology 3.1. Some terminology 3.2. Torsion bijection 3.3. Acyclicity Theorem 3.5. Grothendieck -- Serre's conjecture 3.10. Rational torsors everywhere locally defined 4. Proof of Theorem 1.2 5. Applications 5.1. A disjoint union decomposition for Rn -- torsors 5.6. The case of orthogonal groups 5.9. The projective linear case 5.14. Applications to Rn -- Lie algebras References 2 4 6 6 6 7 7 8 9 11 11 13 14 16 16 Date: July 28, 2021. V. Chernousov was partially supported by the Canada Research Chairs Program and an NSERC research grant. P. Gille was supported by the Romanian IDEI project PCE−2012-4-364 of the Ministry of National Education CNCS-UEFISCIDI. A. Pianzola wishes to thank NSERC and CONICET for their continuous support. 1 2 V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA 1. Introduction Torsors are the algebraic analogues of the principal homogeneous spaces that one encounters in the theory of Lie groups. While the latter are (under natural assumptions) locally trivial (in the usual topology), this is not the case for the former: a torsor E → X under a group scheme G over X is not necessarily trivial (i.e., isomorphic to G with G acting on itself by right multiplication) when restricted to any non-empty Zariski open subset U of X. The reason for this is that the Zariski topology is too coarse. The path out of this serious obstacle was initiated by J.-P. Serre (with what is now called the finite ´etale topology) and then implemented in full generality (together with an accompanying descent theory) by A. Grothendieck. The idea is to have certain morphisms U → X (e.g. ´etale or flat and of finite presentation) replace open immersions as trivializing local data. Torsors have played an important role in number theory (Brauer groups, Tate-Shafarevich group, Manin obstructions) and in the Langlands program (Ngo's proof of the Fundamental Lemma). Somehow surprisingly torsors have been used over the last decade to solve difficult problems in infinite dimensional Lie theory (see [GP3] for an extensive list of references. See also [CGP2] and [KLP]). The way that torsors arise in this context is the following. The infinite dimensional object L under consideration (for example, the centreless core of an extended affine Lie algebra [EALA] or a Lie superconformal algebra) has an invariant called the centroid (essentially the linear endomorphisms of the object that commute with their multiplication). These centroids are Laurent polynomial rings k[t±1 n ] in finitely many variables over a base field k of characteristic 0. We will denote this ring by Rn, or simply by R if no confusion is possible. 1 , · · · , t±1 The object L is naturally an R-module and it inherits the algebraic struc- ture of L (for example L is a Lie algebra over R). It is when L is viewed as an object over R that torsors enter into the picture. One can for ex- ample classify up to R-isomorphism the objects under consideration using non-abelian ´etale cohomology. Of course at the end of the day one wants to understand the problem under consideration (say a classification) over k and not R. Thankfully there is a beautiful theory, known as the "centroid trick", that allows this passage. The above discussion motivates why one is interested in the classification of torsors over R under a smooth reductive R-group scheme. We believe that the understanding of such torsors is of its own interest. This is the purpose of the present work. There is an important class of torsors under G called loop torsors that appear naturally in infinite dimensional Lie theory. (Loop torsors are defined over an arbitrary base in [GP3]. They have already caught the attention of researchers in other areas. See for example [PZ].) It is shown in [GP3] that if E is a torsor over R under G, then E being a loop torsor is equivalent to E being toral, i.e. that the twisted R-group scheme TORSORS OVER LAURENT POLYNOMIAL RINGS 3 EG admits a maximal torus. This is a remarkable property of the ring R: loop and toral torsors coincide. Toral torsors under reductive group schemes were completely classified in our paper [CGP2] with the use of Bruhat-Tits theory of buildings (see the Acyclicity Theorem 3.4). We will use toral torsors in what follows (but the reader is asked to keep in mind that these are precisely the torsors that arise in infinite dimensional Lie theory). Given a smooth reductive group scheme G over Rn we want to classify/describe all the isomorphism classes of Rn-torsors under G. Since G is smooth reductive they are in natural one-to-one correspondence with elements of the pointed set H 1 ´et(Rn, G). We have of course by definition a natural inclusion H 1 ´et,toral(Rn, G) ⊆ H 1 ´et(Rn, G) where H 1 toral G-torsors. From now on by default our topology will be ´etale; particular we will denote H 1 main results is the following. ´et,toral(Rn, G) is the subset consisting of (isomorphism) classes of in toral. One of our ´et by H 1 and H 1 ´et,toral by H 1 1.1. Theorem. Under the above notation there is a natural bijection H 1(Rn, G) ←→ H 1 Zar(Rn, E G). G [E]∈H 1 toral(Rn,G) The content of the above equality could be put in words as follows. Given a torsor E′ over Rn under G there exists a unique toral torsor E such that E′ is locally isomorphic (in the Zariski topology) to E. The proof of this result is achieved by a careful analysis (of independent interest) of the ramification of the torsors under consideration. We denote by Kn = k(t1, . . . , tn) the fraction field of Rn and set Fn = k((t1)) . . . ((tn)). The precise statement of our other main result is the following. 1.2. Theorem. Let G be a smooth affine Rn -- group scheme. Assume that either (i) G is reductive and admits a maximal Rn-torus (equivalently G is "loop reductive" [GP3, cor. 6.3]); or (ii) there exists a linear (smooth, not necessary connected) algebraic group G over k and a loop torsor E under G ×k Rn such that G = E(G ×k Rn). Then we have natural bijections H 1 toral(Rn, G) ∼−→ H 1(Kn, G)Rn−unr ∼−→ H 1(Fn, G) where H 1(Kn, G)Rn−unr stands for the subset of the Galois cohomology set H 1(Kn, G) consisting of (isomorphism) classes of G-torsors over Kn ex- tending everywhere in codimension one (see §3.10). We need to explain briefly the assumptions. In both cases (i) and (ii) we consider loop (=toral) group schemes because they play a central role in the 4 V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA classification of Rn-torsors (see Theorem 1.1). Also, even though reductive group schemes are the main interest in this paper, in case (ii) we include group schemes over Rn which are not necessary "connected". Far from being a trivial generalization, this case is absolutely essential for applications to infinite dimensional Lie theory. Indeed one is forced to understand twisted forms of Rn-Lie algebras g ⊗k Rn, where g is a split finite dimensional simple Lie algebra over k. This leads to torsors under the group G ×k Rn where G is the linear algebraic k-group Aut(g). Many interesting infinite dimensional Lie objects over k, including extended affine Lie algebras (a particular case of them are the celebrated affine Kac -- Moody Lie algebras) and Lie super- conformal algebras, follow under the above considerations. Note that the special case G = PGLd (i.e. Rn -- Azumaya algebras) was already quite understood by Brauer group techniques when the base field is algebraically closed [GP2, §4.4]. Note also that Theorem 1.2 refines our ∼−→ H 1(Fn, G) ([CGP2, acyclicity theorem, i.e. the bijection H 1 th. 14.1] in case (i) (resp. [GP3, th. 8.1] in case (ii)). toral(Rn, G) The structure of the paper is as follows. In section 2, we establish useful generalities about unramified functors. Section 3 discusses unramified non- abelian cohomology. In section 4, we prove Theorem 1.2. Section 5 is devoted to applications including a disjoint union decomposition for the set H 1(Rn, G) (Theorem 1.1). Two important particular cases are considered in detail: the cases of orthogonal groups and projective linear groups. This illustrates that our main result, which may look rather abstract and remote in appearance, can lead to new very concrete classifications/descriptions of familiar objects. 2. Unramified functors We follow essentially the setting of [CT]. Let S be a scheme. If X is an integral S-scheme we denote by κ(X) the fraction field of X. Let F be an S-functor, that is a contravariant functor X 7→ F(X) from the category of S -- schemes into the category of sets. If X is integral normal one defines the following two subsets of F(κ(X)): F(κ(X))X−loc := \ x∈X Im(cid:16)F(OX,x) → F(κ(X))(cid:17) and F(κ(X))X−unr := \ x∈X (1) Im(cid:16)F(OX,x) → F(κ(X))(cid:17). The first subset F(κ(X))X−loc is called the subset of local classes with re- spect to X and the second one F(κ(X))X−unr is called the subset of unram- ified classes with respect to X. Obviously, we have the inclusions F(κ(X))X−loc ⊆ F(κ(X))X−unr ⊆ F(κ(X)). TORSORS OVER LAURENT POLYNOMIAL RINGS 5 2.1. Lemma. Let Y is an integral normal scheme over S. Let f : Y → X be a dominant morphism of S-schemes. Consider the map F(f ∗) : F(κ(X)) → F(κ(Y )) induced by the comorphism f ∗ = f ∗ (1) F(f ∗)(F(κ(X))X−loc) ⊆ F(κ(Y ))Y −loc. (2) If f is flat then F(f ∗)(F(κ(X))X−unr ) ⊆ F(κ(Y ))Y −unr. κ(X) : κ(X) → κ(Y ). Then. Proof. (1) The comorphism f ∗ allows us to view κ(X) as a subfield κ(X) ֒→ κ(Y ) of the field κ(Y ). Let γ ∈ F(κ(X))X−loc. We want to show that its image γκ(Y ) := F(f ∗)(γ) ∈ F(κ(Y )) under the base change is local with respect to Y . Let y ∈ Y and put x = f (y). The commutative square κ(X) ⊂ κ(Y ) ∪ ∪ OX,x ⊂ OY,y induces a commutative diagram F(κ(X)) / F(κ(Y )) F(OX,x) F(OY,y). Since γ ∈ Im(cid:0)F(OX,x) → F(κ(X))(cid:1), it follows that γκ(Y ) is contained in Im(cid:0)F(OY,y) → F(κ(Y ))(cid:1). Thus γκ(Y ) ∈ F(κ(Y ))Y −loc. (2) Assume now that γ ∈ F(κ(X))X−unr and let y ∈ Y (1). As above, we set x = f (y). Without loss of generality we may assume that and that X = Spec(A) = Spec(OX,x) Y = Spec(B) = Spec(OY,y) where B is a DVR. Let v be the discrete valuation on κ(Y ) corresponding to the valuation ring B. For brevity we denote by K (resp. L) the fraction field of A (resp. B). If v(K ×) = 0, then K ⊂ B and therefore γκ(Y ) ∈ Im(cid:0)F(OY,y) → F(κ(Y ))(cid:1). Assume now that v(K ×) 6= 0. Then mAB 6= B so that A → B is a local morphism. By [EGAI, 0.6.6.2], since B is flat over A the ring B is a faithfully flat A -- module. It follows that A = B ∩ K (apply [Bbk, § I.3, §5, prop. 10] with F = K and F ′ = A. An alternative proof can be given by appealing to [EGAIV, 2.1.13]). Let Av = {x ∈ K × v(x) ≥ 0} be the valuation ring of vK. Then Av = K ∩ B = A, so that A is a DVR. This implies that γ ∈ Im(cid:0)F(OX,x) → F(κ(X))(cid:1), and the commutative diagram above yields that γκ(Y ) ∈ Im(cid:0)F(OY,y) → F(κ(Y ))(cid:1). Thus γκ(Y ) ∈ F(κ(Y ))Y −unr. (cid:3) / / / O O O O 6 V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA We shall discuss next the case of non-abelian cohomology functors, but we remark that this technique and considerations can be applied to various interesting functors such as Brauer groups, Witt groups, unramified Galois cohomology... 3. Non-abelian cohomology ´et(X, G), H 1 3.1. Some terminology. Let X be a scheme and let G be an X -- group scheme. The pointed set of non-abelian Cech cohomology on the flat (resp. ´etale, Zariski) site of X with coefficients in G, is denoted by H 1 f ppf (X, G) (resp. H 1 Zar(X, G)). These pointed sets measure the isomor- phism classes of sheaf torsors over X under G with respect to the chosen topology (see [M, Ch. IV §1] and [DG] for basic definitions and references). If X = Spec(R), following customary usage and depending on the context, we also use the notation H 1 f ppf (X, G). Similarly for the ´etale and Zariski sites. f ppf (R, G) instead of H 1 If G is in addition affine, by faithfully flat descent all of our sheaf torsors are representable. They are thus torsors in the usual sense. For a G-torsor E we denote by EG the twisted form of G by inner automorphisms; it is an affine group scheme over X. Furthermore, if G is smooth all torsors are lo- cally trivial for the ´etale topology. In particular, H 1 f ppf (X, G). These assumptions on G hold in most of the situations that arise in our work. Also, as we mentioned in the introduction, by default our topology will be ´etale so that instead of H 1 ´et(X, G) we will write H 1(X, G). ´et(X, G) = H 1 Given an X -- group G and a morphisms Y → X of schemes, we let GY denote the Y -- group G ×X Y obtained by base change. For convenience, we will denote H 1(Y, GY ) by H 1(Y, G). Assuming G affine of finite type, a maximal torus T of G is a subgroup X-scheme T of G such that T ×X κ(x) is a maximal κ(x) -- torus of G ×X κ(x) for each point x ∈ X [SGA3, XII.1]. Here κ(x) denotes an algebraic closure of κ(x). A G -- torsor E is toral if the twisted group scheme E G admits a maximal X-torus. We denote by H 1 f ppf (X, G) consisting of (isomorphism) classes of toral X -- torsors under G. f ppf,toral(X, G) the subset of H 1 3.2. Torsion bijection. If E is an X -- torsor under G (not necessarily toral), according to [Gi, III.2.6.3.1] there exists a natural bijection τE : H 1 f ppf (X, E G) → H 1 f ppf (X, G), called the torsion bijection, which takes the class of the trivial torsor under EG to the class of E. It is easy to see that its restriction to classes of toral torsors induces a bijection H 1 f ppf,toral(X, E G) → H 1 f ppf,toral(X, G). TORSORS OVER LAURENT POLYNOMIAL RINGS 7 3.3. Acyclicity Theorem. The following theorem is the main tool for proving our main results. 3.4. Theorem. Let G be a smooth affine Rn -- group scheme. Assume that either (i) G is reductive and admits a maximal Rn-torus (equivalently G is "loop reductive" [GP3, cor. 6.3]); or (ii) there exists a linear (smooth, not necessary connected) algebraic group G over k and a loop torsor E under G ×k Rn such that G = E(G ×k Rn). Then a natural map H 1 toral(Rn, G) −→ H 1(Fn, G) is bijective. Proof. See [CGP2, th. 14.1] in case (i) and [GP3, th. 8.1] in case (ii). (cid:3) 3.5. Grothendieck -- Serre's conjecture. The following conjecture is due to Grothendieck -- Serre ([Se, Remarque 3], [Gr, Remarque 1.1.a]). 3.6. Conjecture. Let R be a regular local ring with fraction field K. If G a reductive group scheme over R then the natural map H 1(R, G) → H 1(K, G) has trivial kernel. If R contains an infinite field k (of any characteristic), the conjecture has been proven by Fedorov -- Panin [FP, PSV]. When G = G ×k R for some reductive k-group G, the so called "constant" case, was established before by Colliot-Th´el`ene and Ojanguren [CTO]. For our considerations we need a similar result for group schemes which are not necessary "connected". 3.7. Lemma. Let R be a regular local ring with fraction field K. Let G be an affine smooth group scheme over R which is an extension of a finite twisted constant group scheme F over R by a reductive group scheme G0 over R. Assume that Grothendieck -- Serre's conjecture holds for G0. Then the map H 1(R, G) → H 1(K, G) has trivial kernel. Proof. We consider the commutative exact diagram of pointed sets F(R) −−−−→ H 1(R, G0) −−−−→ H 1(R, G) −−−−→ H 1(R, F) ≀y ηy νy λy F(K) −−−−→ H 1(K, G0) −−−−→ H 1(K, G) −−−−→ H 1(K, F). Since λ is injective, an easy diagram chase shows that Ker η surjects onto Ker ν. But by hypothesis Ker η vanishes, so the assertion follows. (cid:3) As a corollary of Fedorov -- Panin's theorem we get the following facts. 8 V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA 3.8. Corollary. Let R be a regular local ring containing an infinite field with fraction field K. Let G be an affine smooth group scheme over R which is an extension of a finite twisted constant group scheme over R by a reductive group scheme over R. Then the natural map H 1(R, G) → H 1(K, G) has trivial kernel. 3.9. Corollary. Let X be an integral smooth affine variety over an infinite field with function field K. Let G be an affine smooth group scheme over X which is an extension of a finite twisted constant group scheme over X by a reductive group scheme over X. Then the sequence of pointed sets 1 −→ H 1 Zar(X, G) −→ H 1(X, G) −→ H 1(K, G) is exact. 3.10. Rational torsors everywhere locally defined. For a smooth affine group scheme G over an integral normal scheme X Colliot-Th´el`ene and Sansuc [CTS, §6] introduced the following sets: DG(X) := Im(cid:16)H 1(X, G) → H 1(κ(X), G)(cid:17), and H 1(κ(X), G)X−loc := \ H 1(κ(X), G)X−unr := \ x∈X x∈X (1) DG(OX,x) ⊆ H 1(κ(X), G), DG(OX,x) ⊆ H 1(κ(X), G). Clearly, we have the inclusions DG(X) ⊆ H 1(κ(X), G)X−loc ⊆ H 1(κ(X), G)X−unr . In our terminology introduced in § 2 the two last sets are nothing but the local and unramified subsets with respect to X attached to the functor F given by F(Y ) = H 1(Y, G) for each X-scheme Y . Unramified classes have the following geometrical characterization. 3.11. Lemma. Let γ ∈ H 1(κ(X), G). Then γ ∈ H 1(κ(X), G)X−unr if and ´et(U, G) such only if there exists an open subset U of X and a class eγ ∈ H 1 (i) γ = (eγ)κ(X); (ii) X (1) ⊂ U . that Proof. In one direction the statement is obvious.The other one was treated in [GP2, cor. A.8]. (cid:3) A special case of Lemma 2.1 is then the following. 3.12. Lemma. Let f : Y → X be a dominant morphism of integral and normal S-schemes. Let F(f ∗) : H 1(κ(X), G) → H 1(κ(Y ), GY ) be the map induced by the comorphism f ∗ : κ(X) → κ(Y ). Then. TORSORS OVER LAURENT POLYNOMIAL RINGS 9 (1) F(f ∗)(H 1(κ(X), G)X−loc) ⊆ H 1(κ(Y ), G)Y −loc. (2) If f is flat then F(f ∗)(H 1(κ(X), G)X−unr ) ⊆ H 1(κ(Y ), G)Y −unr. 3.13. Remark. If X is regular and the "purity conjecture" holds for G and local rings of X, i.e. DG(OX,x) = H 1(κ(X), G)OX,x−unr for all points x ∈ X, then assertion (1) implies that (2) holds without flatness assumption for f . We now combine earlier work by Colliot-Th´el`ene/Sansuc and Nisnevich theorem [N] on Grothendieck-Serre conjecture for reductive groups over DVR. 3.14. Proposition. Assume that X is a regular integral scheme and that G is an extension of a finite twisted constant group scheme by a reductive group scheme G0. Then (1) DG defines a contravariant functor for the category of regular integral X-schemes. (2) If X = Spec(k), then H 1( , G)loc defines a contravariant functor for the category of smooth integral k -- varieties. Proof. Nisnevich's theorem states that if A is a DVR and G is a reductive group over A then the natural map H 1(R, G) → H 1(K, G), where K is a fraction field of A, is injective. By Lemma 3.7, it holds more generally for a group G which is an extension of a finite twisted constant group by a reductive group. In particular, if γ1, γ2 ∈ H 1(A, G) have the same image in H 1(K, G), they have the same specialization modulo the maximal ideal of A. By [CTS, 6.6.1], this specialization property holds more generally over an arbitrary valuation ring. Then the assertions follow from [CTS, 6.6.3] and [CT, proposition 2.1.10]. (cid:3) 4. Proof of Theorem 1.2 Let G be a smooth affine group scheme over Rn satisfying condition (i) or (ii) in Theorem 1.2. Clearly, Im [H 1(Rn, G) → H 1(Kn, G)] ⊂ H 1(Kn, G)Rn−unr, so that we have the factorization (∗) H 1 toral(Rn, G) φ −→ H 1(Kn, G)Rn−unr ψ −→ H 1(Fn, G). The Acyclicity Theorem 3.4 states that the composite map ψ ◦ φ is bijective; in particular, φ is injective and ψ is surjective. 4.1. Lemma. The following are equivalent. (i) φ is bijective. (ii) The map Eψ : H 1(Kn, E G)Rn−unr −→ H 1(Fn, E G) has trivial kernel for all toral Rn -- torsors E under G. 10 V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA Proof. (i) =⇒ (ii): Assume that φ is bijective. The above factorization (∗) and the bijectivity of ψ ◦ φ yield that we have bijections H 1 toral(Rn, G) ∼−→ H 1(Kn, G)Rn−unr ∼−→ H 1(Fn, H). Let now E be a toral Rn -- torsor under G. Recall that the torsion bijection map induces a bijection τE : H 1(Rn, E G) ∼−→ H 1(Rn, G) H 1 toral(Rn, E G) ∼−→ H 1 toral(Rn, G) (see § 3.2). The commutative diagram of torsion bijections H 1 toral(Rn, G) ∼ / H 1(Kn, G)Rn−unr ∼ / H 1(Fn, G) ≀ ≀ ≀ H 1 toral(Rn, E G) H 1(Kn, E G)Rn−unr Eψ H 1(Fn, E G) shows that Eψ is bijective, so a fortiori has trivial kernel. (ii) =⇒ (i): We have noticed above that φ is injective, hence it remains to prove its surjectivity only. Let [E′] ∈ H 1(Kn, G)Rn−unr. Since ψ ◦ φ is bijective there exists a class [E] ∈ H 1(Rn, G) such that ψ([E′]) = ψ(φ([E])). It follows from the above commutative diagram that under the torsion bi- jection H 1(Kn, EG)Rn−unr → H 1(K, G)Rn−unr the class [E′] corresponds to an element in H 1(Kn, EG)Rn−unr lying in the kernel of Eψ. Since by our hypothesis Ker(Eψ) = 1, this implies that the class [E′] corresponds to the trivial one in H 1(Kn, E G)Rn−unr or equivalently φ([E]) = [E′]. (cid:3) Note that hypothesis (i) and (ii) in Theorem 1.2 are stable with respect to twisting by a toral Rn-torsor under G. Therefore the above lemma reduces the proof of Theorem 1.2 to showing that for all group schemes H over Rn satisfying conditions (i) or (ii) in Theorem 1.2 a natural map ψ : H 1(Kn, H)Rn−unr −→ H 1(Fn, H) has trivial kernel. To prove this fact we proceed by induction on n ≥ 1 by allowing the base field k to vary. n = 1: Since we are in dimension one, by Lemma 3.11 the map H 1(R1, H) −→ H 1(K1, H)R1−unr is onto. Therefore, Lemma 4.1 applied to the group scheme G = H and the trivial torsor E = 1 shows that ψ has trivial kernel. n ≥ 2: Consider the following field tower: Kn ⊂ Fn−1(tn) ⊂ Fn. / / / / O O / / O O O O TORSORS OVER LAURENT POLYNOMIAL RINGS 11 Let γ ∈ Ker(ψ) and let γ′ be its image in H 1(Fn−1(tn), H). Since the mor- phism of affine schemes Spec(Fn−1[t±1 n ]) → Spec(Rn) is flat and dominant, by Lemma 3.12 (2) we have γ′ ∈ H 1(cid:0)Fn−1(tn), H(cid:1)Fn−1[t±1 n ]−unr. Since Fn = Fn−1((tn)) and γFn = 1, we then conclude that γ′ ∈ Ker(cid:16)H 1(cid:0)Fn−1(tn), H(cid:1)Fn−1[t±1 n ]−unr → H 1(cid:0)Fn−1((tn)), H(cid:1)(cid:17). But according to the case n = 1 (applied to the base field Fn−1) the last kernel is trivial. Thus γ′ = 1, i.e. (∗∗) γ ∈ Ker(cid:16)H 1(cid:0)Kn, H)Rn−unr → H 1(Fn−1(tn), H(cid:1)(cid:17). Now, we observe that the field Fn−1(tn) = k((t1)) . . . ((tn−1))(tn) embeds into k(tn)((t1)) . . . ((tn−1)) = k′((t1)) . . . ((tn−1)) with k′ = k(tn), so that we have a commutative diagram H 1(cid:0)Kn, H(cid:1)Rn−unr ∩ −−−−→ H 1(cid:0)Fn−1(tn), H(cid:1) y H 1(cid:0)k′(t1, ..., tn−1), H(cid:1)Rn−1⊗kk′−unr −−−−→ H 1(cid:0)k′((t1)) . . . ((tn−1)), H(cid:1), where the left vertical inclusion again is due to Lemma 3.12 (2). By the induction hypothesis applied to the base field k′, the bottom horizontal map has trivial kernel. Therefore the top horizontal map has trivial kernel as well. By (∗∗), this implies γ = 1. 5. Applications 5.1. A disjoint union decomposition for Rn -- torsors. We shall use now our Theorem 1.2 and Fedorov-Panin's theorem to prove Theorem 1.1. In fact we will prove a little bit more general result by allowing G to be any group scheme satisfying conditions of Theorem 1.2. 5.2. Theorem. Let G be as in Theorem 1.2. Then there is a natural bijection G [E]∈H 1 toral(Rn,G) H 1 Zar(Rn, E G) Θ ∼−→ H 1(Rn, G). Proof. Recall first that the torsion bijection τE (see § 3.2) allows us to embed H 1 Zar(Rn, E G) ֒→ H 1(Rn, EG) τE ∼−→ H 1(Rn, G). and this, in turn, induces a natural map Θ : G [E]∈H 1 toral(Rn,G) H 1 Zar(Rn, E G) → H 1 ´et(Rn, G). Surjectivity of Θ. Assume [γ] ∈ H 1(Rn, G). Since the generic class γKn ∈ H 1(Kn, G) is Rn -- unramified by Theorem 1.2 there is a unique toral class 12 V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA [E] ∈ H 1(Rn, G)toral such that [E]Kn = γKn. Consider the following com- mutative diagram H 1(Rn, G) −−−−→ H 1(Kn, G) τEx≀ τEx≀ H 1 Zar(Rn, E G) ι ֒→ H 1(Rn, E G) −−−−→ H 1(Kn, E G) with an exact bottom horizontal line (see Corollary 3.9). the diagram that that τ −1 η ∈ H 1 Injectivity of Θ. Let E, E′ be two toral torsors under G and let It follows from E (γ) ∈ Im ι. Hence there exists a unique class Zar(Rn, E G) such that η = τ −1 E (γ). By construction, Θ(η) = γ. η ∈ H 1 Zar(Rn, E G), η′ ∈ H 1 Zar(Rn, E ′ G) be such that Θ(η) = Θ(η′), i.e. τE(η) = τE ′(η′) ∈ H 1(Rn, G). Since η is locally trivial in the Zariski topology we conclude that and similarly for E′. It follows that τE(η)Kn = τE(1)Kn = [E]Kn [E]Kn = [E′]Kn ∈ H 1(Kn, G)Rn−unr and therefore, by Theorem 1.2, we have [E] = [E′]. But τE = τE ′ is bijective. Therefore, η = η′. (cid:3) 5.3. Example. Let G be a reductive k -- group with the property that all of its semisimple quotients are isotropic (for example, k-split). By a result of Raghunathan [R, th. B] one has H 1 Zar(An k , G) = 1 for all n ≥ 0. According to [GP2, prop. 2.2], any Zariski locally triv- ial G-torsor over Rn can be extended to a G-torsor over An k . Therefore H 1 Zar(Rn, G) = 1. This implies that the map H 1(Rn, G) → H 1(Kn, G) has trivial kernel. In other words, rationally trivial Rn -- torsors under G are trivial. We expect that the similar result holds in a more general case. 5.4. Conjecture. Let G be a loop reductive group scheme over Rn. If all semisimple quotients of G are isotropic, then H 1 Zar(Rn, G) = 1. 5.5. Remark. Note that Artamonov's freeness result [A] as well as Pari- mala's result [P] for quadratic forms over R2 are particular special cases of this conjecture Theorem 5.2 gives a classification of all G-torsors that involves first the description of all its toral torsors and then to studying locally trivial in Zariski topology torsors under its twisted toral forms. In the following two subsections we show how our theorem works in particular cases of orthogonal groups and projective linear groups. TORSORS OVER LAURENT POLYNOMIAL RINGS 13 5.6. The case of orthogonal groups. Let qsplit be a split quadratic form over k of dimension d ≥ 1 and let O(qsplit) be the corresponding split orthog- onal group. It is well-known that H 1(Rn, O(qsplit)) classifies non-singular quadratic Rn -- forms of dimension d [DG, III.5.2]. This allows us to iden- tify classes of torsors under G = O(qsplit,Rn) with classes of d-dimensional quadratic forms over the ring Rn. 5.7. Proposition. For each subset I ⊆ {1, ..., d}, we put tI = Qi∈I ti ∈ R× toral(Rn, O(qsplit)) contains a unique Rn -- quadratic form with the convention t∅ = 1. (1) Each class in H 1 of the shape n M I⊆{1,...,d} htI i ⊗ qI,Rn where all qI's with I 6= ∅ are non-singular anisotropic quadratic forms over k such that d = M I⊆{1,...,d} dim(qI ). (2) Let q be a non -- singular quadratic Rn -- form of dimension d. Then there exists a unique quadratic Rn-form qloop as in (1) such that q is a Zariski Rn -- form of qloop. Furthermore, q is isometric to qloop if and only if q is diagonalizable. Proof. (1) By Acyclicity Theorem 3.4 it suffices to compute H 1(Fn, O(qsplit)) or equivalently isometry classes of d-dimensional quadratic forms over Fn. Let q be such quadratic form. We want to show that it is as in (1). By the Witt theorem we may assume without loss of generality that q is anisotropic. We proceed by induction on n ≥ 0. The case n = 0 is obvious. Assume that n ≥ 1. Note that Fn = Fn−1((tn)). Springer's decomposition [EKM, §19], then shows that q ∼= q′ ⊕ htni q′′ where q′ and q′′ are (unique) anisotropic quadratic forms over Fn−1. By induction on n, q′ and q′′ are of the required form, hence we the assertion for q follows. The unicity is clear. (2) The first assertion follows from Theorem 5.2. If q is isometric to qloop, then q is diagonalizable since so is qloop. Conversely, assume that q is diag- onalizable: q = hb1, . . . , bd i. Since R× n /(R× n )2 ∼−→ k×/(k×)2 × htǫ1 1 . . . tǫn n ǫ1, . . . , ǫn = 0, 1 i. all coefficients of q are of the shape bi = ai tIi with Ii ⊆ {1, . . . , d} and ai ∈ k×. Then we can renumber b1, . . . , bd in such a way that q is as in (1) and we are done. (cid:3) 5.8. Corollary. Toral classes in H 1(Rn, O(qsplit)) correspond to diagonal- izable Rn-quadratic forms. 14 V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA 5.9. The projective linear case. Let G = PGLd. The set H 1(Rn, PGLd) classifies Azumaya Rn-algebras of degree d [CF, prop. 2.5.3.13]. Recall also that if A is an Azumaya algebra over Rn of degree d, then there is a one- to-one correspondence between commutative ´etale Rn -- subalgebras of A of dimension d and maximal Rn -- tori of the group scheme PGL1(A). (This is a general well-known fact [SGA3, XIV.3.21.(b)]. Indeed, if S is a commutative ´etale Rn -- subalgebra of A of degree d then T = RS/Rn(Gm)/Gm is a maximal Rn -- torus of PGL1(A). Conversely, to a maximal Rn-subtorus T of PGL1(A) one associates the Rn -- subalgebra AT of fixed points under the natural action of T. This subalgebra AT has the required properties locally and hence globally). From the above discussion it follows that H 1 toral(Rn, PGLd) consists of isomorphism classes of Azumaya Rn -- algebras A of degree d having ´etale commutative Rn -- subalgebras of dimension d. We pass to description of locally trivial torsors under PGL1(A). 5.10. Lemma. Let A be an Azumaya algebra over Rn. Then the natural map H 1 Zar(Rn, PGL1(A)) is bijective. Zar(Rn, GL1(A)) → H 1 Proof. The exact sequence 1 → Gm → GL1(A) → PGL1(A) → 1 gives rise to a commutative diagram with exact rows (of pointed sets) 1 −−−−→ H 1(Rn, GL1(A)) −−−−→ H 1(Rn, PGL1(A)) −−−−→ Br(Rn) φ H 1(Kn, GL1(A)) = 1 −−−−→ H 1(Kn, PGL1(A)) −−−−→ Br(Kn). Every class in H 1(Rn, GL1(A) is rationally trivial, hence by Fedorov -- Panin's result [FP, PSV] it is locally trivial in the Zariski topology. In other words H 1(Rn, GL1(A)) = H 1 Zar(Rn, GL1(A)). Clearly φ(H 1 Zar(Rn, GL1(A))) ⊆ H 1 Zar(Rn, PGL1(A)). Conversely, let γ ∈ H 1 injective, we obtain γ ∈ Im(φ). Zar(Rn, PGL1(A)). Since ψ1(γ) = 1 and since ψ2 is Finally, it remains to note that the above diagram shows that φ has trivial kernel and this is true for all Azumaya algebras over Rn. Then the standard twisting argument enables us to conclude that φ is injective. (cid:3) Thus, the disjoint union decomposition of the set of isomorphism classes of torsors under PGLd becomes G [A]∈H 1 toral(Rn,PGLd) H 1 Zar(Rn, GL1(A)) Θ ∼−→ H 1(Rn, PGLd). y ψ1y ψ2y TORSORS OVER LAURENT POLYNOMIAL RINGS 15 In general we can't say much about the subset H 1 Zar(Rn, GL1(A)). Recall only that it classifies right invertible A-modules (so that the above decom- position is coherent with [GP2, prop. 4.8]). More precisely, if A is a toral Azumaya Rn -- algebra and L is a right invertible A-module, then the class [L] corresponds to the class of the Azumaya algebra EndA(L) under the map Θ. However, when the base field k is algebraically closed, toral Azumaya algebras over Rn are easy to classify explicitly, and also much more infor- mation about Zariski trivial torsors is available due to Artamonov's freeness statements [A]. More precisely, let k be an algebraically closed field. Choose a coherent system of primitive roots of unity (ζn)n≥1 in k. Given integers r, s satisfying 1 ≤ r ≤ s, we let A(x, y)s r denote the Azumaya algebra of degree s over the Laurent polynomial ring k[x±1, y±1] defined by a presentation X s = x, Y s = y, Y X = ζ r s XY. 5.11. Lemma. Let s1, . . . , sm, r1, . . . rm be positive integers such that (si, ri) = 1 for all i = 1, . . . , m. Then the Azumaya algebra A = A(t1, t2)s1 r1 ⊗ A(t3, t4)s2 r2 ⊗ · · · A(t2m−1, t2m)sm rm is a division algebra. Proof. Indeed, using the residue method it is easy to see that it is a division algebra even over the field F2m = k((t1)) . . . ((t2m)). (cid:3) We next recall that the group GLd(Z) acts in a natural way on the ring Rn, hence it acts on H 1(Rn, PGLd) (for details see [GP3, 8.4]). 5.12. Theorem. Assume that k is algebraically closed. (1) H 1 the following shape: toral(Rn, PGLd) consists of GLd(Z) -- orbits of classes of Rn -- algebras of A = Ms0(Rn) ⊗Rn A(t1, t2)s1 r1 ⊗ A(t3, t4)s2 r2 ⊗ · · · A(t2m−1, t2m)sm rm where the integers m, s0, s1, r1, . . . , sm, rm satisfy the following conditions: (i) 0 ≤ 2m ≤ n; 1 ≤ ri ≤ si and (ri, si) = 1 for all i = 1, ..., m; (ii) s0 ≥ 1 and s0s1 . . . sm = d. (2) A ⊗Rn Fn is division if and only if s0 = 1. (3) Let A be an Azumaya algebra as in (1). If s0 ≥ 2 we have H 1 Zar(Rn, GL1(A)) = 1. Proof. (1) If A ⊗Rn Fn is division, this is [GP3, th. 4.7]. Assume now that A ⊗Rn Fn is not division. By Wedderburn's theorem there exists an integer s ≥ 1 and a central division Fn -- algebra A′ such that A ⊗Rn Fn ∼= Ms(A′). The acyclicity theorem provides a toral Rn -- Azumaya algebra A′ such that A′ ⊗Rn Fn ∼= A′. Since Ms(A′) and A are isomorphic over Fn, the acyclicity theorem again shows that A ∼= Ms(A′). It remains to note that A′ being a division algebra over Rn is of the required form by the first case. 16 V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA (2) The assertion follows from Lemma 5.11. (3) Write A = Ms(A′) with A′ is division and s ≥ 2. Morita equivalence pro- vides a one-to-one correspondence between invertible A -- modules and finitely generated projective A′ -- modules of relative rank s. Artamonov's result [A] states that those A′ -- modules are free [A, cor. 3] since s ≥ 2, so that invert- ible A -- modules are free as well. This implies H 1 (cid:3) Zar(Rn, GL1(A)) = 1. 5.13. Remarks. (a) The third statement shows that for each invertible A -- module P the module P ⊕ A is free. (b) The third statement refines Steinmetz's results in the 2-dimension case (n = 2) [St, th. 4.8] where the case s ≥ 3 was considered only. Note that [St] provides some other cases for classical groups when all Zariski locally trivial torsors are trivial. 5.14. Applications to Rn -- Lie algebras. We next consider the special case G = Aut(g) where g is a split simple Lie algebra over k of finite dimension. For such group the set H 1 ´et(Rn, G) classifies Rn-forms of the Lie algebra g ⊗k Rn and H 1 toral(Rn, G) classifies loop objects, i.e. those which arise from loop cocycles. More precisely, by [GP3, §6] we have Im(cid:16)H 1(cid:0)π1(Rn, 1), G(ks)) → H 1(Rn, G)(cid:17) = H 1 toral(Rn, G). Theorems 1.2 and 5.2 have the following consequences. 5.15. Corollary. (1) Let eL be a Kn -- form of the Lie algebra g ⊗k Kn. If eL is unramified, i.e. extends everywhere in codimension one, then eL is isomorphic to the generic fiber of a unique multiloop Lie algebra L. (Of course L, being a multiloop algebra, is a twisted from of the Rn -- Lie algebra g ⊗k Rn). (2) Let L be any Rn -- form of g⊗R Rn. Then there exists a (unique up to Rn -- isomorphism) multiloop Lie algebra Lloop over Rn such that L is a Zariski Rn -- form of Lloop. References [A] V. A. Artamonov, Projective modules over crossed products, J. Algebra 173 (1995), 696 -- 714. [Bbk] N. Bourbaki, Alg`ebre commutative, Ch. 1 `a 4, Springer. [CF] B. Calm`es, J. Fasel, Groupes classiques, to appear in Autour des sch´emas en groupes, vol II, Panoramas et Synth`eses (2015). [CGP1] V. Chernousov, P. Gille and A. Pianzola, Torsors over the punctured affine line, American Journal of Mathematics 134 (2012), 1541 -- 1583. [CGP2] V. Chernousov, P. Gille and A. Pianzola, Conjugacy theorems for loop reductive group schemes and Lie algebras, Bulletin of Mathematical Sciences 4 (2014), 281 -- 324. [CT] J. -- L. Colliot -- Th´el`ene, Birational invariants, purity and the Gersten conjecture, K- theory and algebraic geometry: connections with quadratic forms and division al- gebras (Santa Barbara, CA, 1992), 1 -- 64, Proc. Sympos. Pure Math. 58.1 (1995), AMS. TORSORS OVER LAURENT POLYNOMIAL RINGS 17 [CTO] J. -- L. Colliot -- Th´el`ene, M. Ojanguren, Espaces principaux homog`enes localement triviaux, I.H.´E.S. Publ. Math. 75 (1992), 97 -- 122. [CTS] J. -- L. Colliot -- Th´el`ene, J. -- J. Sansuc, Fibr´es quadratiques et composantes connexes r´eelles, Math. Annalen 244 (1979), 105 -- 134. [DG] M. Demazure et P. Gabriel, Groupes alg´ebriques, Masson (1970). [EKM] R. Elman, N. Karpenko, A. Merkurjev, The algebraic and geometric theory of qua- dratic forms, American Mathematical Society Colloquium Publications, 56. American Mathematical Society, Providence, RI, 2008. [EGAI] A. Grothendieck (avec la collaboration de J. Dieudonn´e), El´ements de G´eom´etrie Alg´ebrique I: Le langage des sch´emas, Publications math´ematiques de l'I.H.´E.S. no 4 (1960). [EGAIV] A. Grothendieck (avec la collaboration de J. Dieudonn´e), El´ements de G´eom´etrie Alg´ebrique IV: ´Etude locale des sch´emas et des morphismes de sch´emas, Publications math´ematiques de l'I.H.´E.S. no 20, 24, 28 and 32 (1964-1967). [FP] R. Fedorov, I. Panin, A proof of Grothendieck-Serre conjecture on principal bun- dles over regular local rings containing infinite fields, to appear in Publications Math´ematiques de l'I.H.´E.S. [GP1] P. Gille and A. Pianzola, Galois cohomology and forms of algebras over Laurent polynomial rings, Mathematische Annalen 338 (2007), 497 -- 543. [GP2] P. Gille and A. Pianzola, Isotriviality and ´etale cohomology of Laurent polynomial rings, J. Pure Appl. Algebra 212 (2008), 780 -- 800. [GP3] P. Gille and A. Pianzola, Torsors, reductive group schemes and extended affine Lie algebras, Memoirs of AMS 1063 (2013). [Gi] J. Giraud, Cohomologie non ab´elienne, Die Grundlehren der mathematischen Wis- senschaften 179 (1971), Springer-Verlag. [Gr] A. Grothendieck, Le groupe de Brauer. II, Th´eorie cohomologique (1968), Dix Ex- pos´es sur la Cohomologie des Sch´emas, 67 -- 87, North-Holland. [KLP] V. Kac, M. Lau and A. Pianzola. Differential conformal superalgebras and their forms, Advances in Mathematics 222 (2009), 809 -- 861. [M] J. S. Milne, Etale cohomology, Princeton University Press (1980). [N] Y. A. Nisnevich, Espaces homog`enes principaux rationnellement triviaux et arithm´etique des sch´emas en groupes r´eductifs sur les anneaux de Dedekind, C. R. Acad. Sci. Paris S´er. I Math. 299 (1984), 5 -- 8. [PSV] I. Panin, A. Stavrova and N. Vavilov, On Grothendieck-Serres conjecture concerning principal G-bundles over reductive group schemes: I, Compositio Math. 151 (2015), 535 -- 567. [PZ] G. Pappas, X. Zhu, Local models of Shimura varieties and a conjecture of Kottwitz, Inventiones Mathematicae 194 (2013), 147 -- 254. [P] R. Parimala, Quadratic spaces over Laurent extensions of Dedekind domains, Trans. Amer. Math. Soc. 277 (1983), 569 -- 578. [R] M. S. Raghunathan, Principal bundles on affine space and bundles on the projective line, Math. Ann. 285 (1989), 309-332. [Se] J.-P. Serre, Espaces fibr´es alg´ebriques, S´eminaire Claude Chevalley 3 (1958), Expos´e no. 1, 37 p. [SGA1] S´eminaire de G´eom´etrie alg´ebrique de l'I.H. ´E.S., Revetements ´etales et groupe fondamental, dirig´e par A. Grothendieck, Lecture Notes in Math. 224 (1971), Springer. [SGA3] S´eminaire de G´eom´etrie alg´ebrique de l'I.H. ´E.S., 1963-1964, sch´emas en groupes, dirig´e par M. Demazure et A. Grothendieck, Lecture Notes in Math. 151-153 (1970), Springer. [St] A. Steinmetz-Zikesch, Alg`ebres de Lie de dimension infinie et th´eorie de la descente, M´emoire de la SMF 129 (2012). 18 V. CHERNOUSOV, P. GILLE, AND A. PIANZOLA Department of Mathematics, University of Alberta, Edmonton, Alberta T6G 2G1, Canada E-mail address: [email protected] UMR 5208 Institut Camille Jordan - Universit´e Claude Bernard Lyon 1 43 boulevard du 11 novembre 1918 69622 Villeurbanne cedex - France Institute of Mathematics Simion Stoilow of the Romanian Academy, Calea Grivitei 21, RO-010702 Bucharest, Romania. E-mail address: [email protected] Department of Mathematics, University of Alberta, Edmonton, Alberta T6G 2G1, Canada. Centro de Altos Estudios en Ciencia Exactas, Avenida de Mayo 866, (1084) Buenos Aires, Argentina. E-mail address: [email protected]
1902.04430
2
1902
2019-02-15T12:31:53
Ore extensions for function algebras
[ "math.RA" ]
In this article we consider the Ore extension Algebra for the algebra $\mathcal{A}$ of functions with finite support on a countable set. We derive explicit formulas for twisted derivations on $\mathcal{A}.$ We give a description for the centralizer of $\mathcal{A},$ and the center of the Ore extension algebra when the derivation is zero.
math.RA
math
Ore extensions of functional algebras Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov 9 1 0 2 b e F 5 1 ] . A R h t a m [ 2 v 0 3 4 4 0 . 2 0 9 1 : v i X r a Abstract In this article we consider the Ore extension algebra for the algebra A of functions with finite support on a countable set. We derive explicit formulas for twisted derivations on A , give a description for the centralizer of A , and the center of the Ore extension algebra under specific conditions. 1 Introduction A topic of interest in the field of operator algebras is the connection between prop- erties of dynamical systems and algebraic properties of crossed products associated to them. More specifically the question when a certain canonical subalgebra is max- imal commutative and has the ideal intersection property, that is, each non-zero ideal of the algebra intersects the subalgebra non-trivially. For a topological dy- namical systems (X,σ), one may define a crossed product C*-algebra C(X) ⋊ σ Z where σ is an automorphism of C(X) induced by σ. It turns out that the property known as topological freeness of the dynamical system is equivalent to C(X) being a maximal commutative subalgebra of C(X) ⋊ σ Z and also equivalent to the con- dition that every non-trivial closed ideal has a non-zero intersection with C(X). An excellent reference for this correspondence is [19]. For analogues, extensions and applications of this theory in the study of dynamical systems, harmonic analysis, Alex Behakanira Tumwesigye Department of Mathematics, College of Natural Sciences, Makerere University, Box 7062, Kam- pala, e-mail: [email protected] Johan Richter Division of Applied Mathematics, UKK, Malardalens University, Box 883, Vasteras e-mail: [email protected] Sergei Silvestrov Division of Applied Mathematics, UKK, Malardalens University, Box 883, Vasteras e-mail: [email protected] 1 2 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov quantum field theory, string theory, integrable systems, fractals and wavelets, see [1, 2, 4, 5, 6, 10, 11, 19]. For any class of graded rings, including gradings given by semigroups or even filtered rings (e.g. Ore extensions), it makes sense to ask whether the ideal intersec- tion property is related to maximal commutativity of the degree zero component. For crossed product-like structures, where one has a natural action, it further makes sense to ask how the above mentioned properties of the degree zero component are related to properties of the action. These questions have been considered recently for algebraic crossed products and Banach algebra crossed products, both in the tra- ditional context of crossed products by groups as well as generalizations to crossed products by groupoids and general categories [3, 9, 12, 13, 17, 18, 21, 22]. Ore extensions constitute an important class of rings, appearing in extensions of differential calculus, in non-commutative geometry, in quantum groups and algebras and as a uniting framework for many algebras appearing in physics and engineering models. An Ore extension of a ring R is an overring with a generator x satisfying xr = σ(r)x + ∆(r), r ∈ R, for some endomorphism σ and a σ-derivation ∆. This article aims at giving a description of the centralizer and the center of the coefficient subalgebra A in the Ore extension algebra A [x, σ,∆], where A is the algebra of functions with finite support on a countable set X and σ : A → A is an automorphism of A that is induced by a bijection σ : X → X . A number of studies on centralizers in Ore extensions have been carried out before in [14, 15, 20], but this is in completely different settings the one here. In section 2, we recall some notation and basic facts about Ore extensions used through out the rest of the article. In section 3, we give a description of twisted derivations on the algebra of functions on a finite set from which it is observed that there are no non trivial derivations on Rn. In section 4, we give the description of the centralizer of the coefficient algebra A and the center of the Ore extension A [x, σ, 0]. In section 5, we turn to the case when A is the algebra of functions on a countable set with finite support, give a description for the centralizer and the center of the Ore extension A [x, σ, 0]. Sections 6 and 7 are devoted to the special case of the skew power series and the skew Laurent rings respectively. 2 Ore extensions. Basic preliminaries For general references on Ore extensions, see for example, [7, 16]. For the conve- nience of the reader, we recall the definition. Let R be a ring , σ : R → R a ring endomorphism (not necessarily injective) and ∆ : R → R a σ-derivation, that is, ∆(a + b) = ∆(a) + ∆(b) and ∆(ab) = σ(a)∆(b) + ∆(a)b for all a, b ∈ R. Ore extensions of functional algebras 3 Definition 1. The Ore extension R[x,σ,∆] is defined as the ring generated by R and an element x /∈ R such that 1, x, x2, . . . form a basis for R[x,σ,∆] as a left R-module and all r ∈ R satisfy xr = σ(r)x + ∆(r). (1) Such a ring always exists and is unique up to isomorphism [7]. From ∆(1 · 1) = σ(1) · 1 + ∆(1) · 1 we get that ∆(1) = 0, and since σ(1) = 1 we see that 1R will be the multiplicative identity for R[x,σ,∆] as well. If σ = idR, then we say that R[x, idR,∆] is a differential polynomial ring. If instead ∆ ≡ 0, then we say that R[x,σ, 0] is a skew polynomial ring. The reader should be aware that some authors use the term skew polynomial ring to mean Ore extensions. An arbitrary non-zero element P ∈ R[x,σ,∆] can be written uniquely as P = aixi for some n ∈ Z≥0, with ai ∈ R for i ∈ {0, 1, . . . , n} and an 6= 0. The degree of n ∑ i=0 P will be defined as; deg(P) := n. We set deg(0) := −∞. Definition 2. A σ-derivation ∆ is said to be inner if there exists some a ∈ R such that ∆(r) = ar − σ(r)a for all r ∈ R. A σ-derivation that is not inner is called outer. Given a ring S we denote its center by Z(S). The centralizer C(T ), of a subset T ⊆ S is defined as the set of elements of S that commute with every element of T . If T is a commutative subring of S and the centralizer of T in S coincides with T , then T is said to be a maximal commutative subring of S. 3 Derivations on algebras of functions on a finite set Let X = [n](= {1, 2, · · · , n}) be a finite set and let A = { f : X → R} denote the algebra of real-valued functions on X with respect to the usual pointwise operations, that is, pointwise addition, scalar multiplication and pointwise multiplication. By writing fn := f (n), then we can identify A with Rn. Here, Rn is equipped with the usual operations of pointwise addition, scalar multiplication and multiplication defined by xy = (x1y1, x2y2, · · · , xnyn) for every x = (x1, x2, · · · , xn) and y = (y1, y2, · · · , yn). Now, let σ : X → X be a bijection such that A is invariant under σ, (that is σ is a permutation on X ) and let σ : A → A be the automorphism induced by σ, that is σ( f ) = f ◦ σ−1 (2) for every f ∈ A . We would like to consider the Ore extension A [x; σ,∆] where ∆ is a σ− derivation on A and x is an indeterminate. Recall that ∆ is a σ derivation on A if it is R−linear and for every f , g ∈ A , ∆( f g) = σ( f )∆(g) + ∆( f )g. 4 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov Since A can be identified with Rn, then ∆ is an operator on Rn which can be repre- sented by a matrix, that is; [∆] = [∆(e1)∆(e2) · · · ∆(en)], (3) where {e1, e2, · · · , en} is the standard basis of Rn. In the following Theorem we give the description of the matrix [∆] in (3) above. Theorem 1. Let σ : X → X be a bijection and let ∆ be a σ−derivation whose stan- dard matrix [∆] = [ki j] is as given by (3). Then 1. kli = 0 if l 6∈ {i,σ(i)}, 2. k ji = −k j j for all i 6= j. Proof. 1. If σ(i) = j, then σ(ei) = e j, where σ is as defined by (2) and {ei, i = 1, 2, · · · , n} is the standard basis for Rn. Therefore from the definition of ∆, ∆(e2 i ) = σ(ei)∆(ei) + ∆(ei)ei = e j∆(ei) + ∆(ei)ei = ∆(ei)(e j + ei). Now e2 i = ei and hence ∆(ei) = ∆(ei)(ei + e j). The term on the right side is zero except in the ith and jth component. Therefore, ∆(ei) =  k1i k2i ... kni   where kli = 0 whenever l 6= i, j. 2. For i 6= j, ∆(eie j) = ∆(0) = 0 and hence 0 = ∆(eie j) = σ(ei)∆(e j) + ∆(ei)e j = e j∆(e j) + ∆(ei)e j = e j(∆(e j) + ∆(ei)), where the right hand side term is zero except in the jth component. Looking at the jth component we get ⊓⊔ k j j + k ji = 0 or k ji = −k j j. Corollary 3.1 There are no non zero derivations on A . Ore extensions of functional algebras 5 Proof. If σ = id, that is, σ(ei) = ei, i = 1, 2, · · · , n, then from Theorem 1, it follows that if [∆] = [ki j], then ki j = 0 for all i 6= j, and from kii = −ki j we have kii = 0 for all i = 1, 2, · · · , n. Therefore, ∆ = 0. ⊓⊔ Example 3.1 Let n = 3 and let σ : [3] → [3] be a permutation such that σ(1) = 2, σ(2) = 3 and σ(3) = 1. Then σ( f )(1) = f(cid:0)σ−1(1)(cid:1) = f (3) σ( f )(2) = f(cid:0)σ−1(2)(cid:1) = f (1) σ( f )(3) = f(cid:0)σ−1(3)(cid:1) = f (2) Therefore σ(x1, x2, x3) = (x3, x1, x2). Let k11 k12 k13 k21 k22 k23 k31 k32 k33 [∆] =    be the standard matrix for ∆ and let x = (x1, x2, x3) and y = (y1, y2, y3) be arbitrary vectors in R3. Then x3 x1 x2     σ(x)∆(y) =  =      k11y1 k12y2 k13y3 k21y1 k22y2 k23y3 k31y1 k32y2 k33y3 k11x3y1 k12x3y2 k13x3y3 k21x1y1 k22x1y2 k23x1y3 k31x2y1 k32x2y2 k33x2y3 y1 y2 y3     k11x1 k12x2 k13x3 k21x1 k22x2 k23x3 k31x1 k32x2 k33x3 ∆(x)y =  =  σ(x)∆(y) + ∆(x)y = k31(x2y1 + x1y3) k32(x2y2 + x2y3) k33(x2y3 + x3y3)   k11(x1y1 + x3y1) k12(x2y1 + x3y2) k13(x3y1 + x3y3) k21(x1y2 + x1y1) k22(x1y2 + x2y2) k23(x1y3 + x3y2) k11x1y1 k12x2y1 k13x3y1 k21x1y2 k22x2y2 k23x3y2 k31x1y3 k32xxy3 k33x3y3     Also, . 6 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov ∆(xy) =  =  k11 k12 k13 k21 k22 k23 k31 k32 k33 x1y1 x2y2 x3y3       k11x1y1 k12x2y2 k13x2y3 k21x1y1 k22x2y2 k23x3y3 k31x1y1 k32x2y2 k33x3y3  . ∆(xy) = σ(x)∆(y) + ∆(x)y Therefore, from we get k11x3y1 + k12(x2y1 + x3y3 − x2y2) + k13x3y1 = 0, from which we obtain, k13 = −k11 and k12 = 0. Similarly, we obtain k21 = −k22, k23 = 0, and k31 = 0, k32 = −k33 which is agreement with the assertions of Theorem 1. Setting k11 = s, k22 = t and k33 = u we obtain the matrix of ∆ as; [∆] =  s −t 0 −s 0 t 0 −u u  . In the next Theorem, we prove that if σ : Rn → Rn is an automorphism of Rn and ∆ : Rn → Rn is an operator on Rn that satisfies the conditions of Theorem 1, then ∆ is a σ− derivation. Theorem 2. Let σ : X → X be a bijection on X and let σ : Rn → Rn be the auto- morphism induced by σ. Let ∆ : Rn → Rn be an operator whose standard matrix [∆] = [ki j] has the following properties 1. kli = 0 if l 6∈ {i,σ(i)}, 2. k ji = −k j j. Then ∆ is a σ − derivation. Proof. We first do the proof for the standard basis {e1, e2, · · · , en} of Rn. Recall that if σ(i) = j then σ(ei) = e j. From the definition of ∆, ∆(ei) =  where kli = 0 for all l 6= i, j and k ji = −k j j. Now, for i 6= j, ∆(eie j) = ∆(0) = 0. And k1i k2i ... kni   σ(ei)∆(e j) + ∆(ei)e j = e j∆(e j) + ∆(ei)e j = e j(∆(e j) + ∆(ei)). Ore extensions of functional algebras 7 All the components in the above vector are zero except the jth component which is given by k j j + k ji = k j j − k j j = 0. Also, ∆(e2 i ) = ∆(ei), (since e2 i = ei), and σ(ei)∆(ei) + ∆(ei)ei = e j∆(ei) + ∆(ei)ei = ∆(ei)(ei + e j), where all the components in the above vector are zero except the ith and jth compo- nent. That is (assuming i < j) σ(ei)∆(ei) + ∆(ei)ei = = ∆(ei). 0 ... kii 0 ... k ji 0 ... 0     Therefore, ∆ is a σ−derivation on the standard basis vectors. Now let x = (x1, x2, · · · , xn) and y = (y1, y2, · · · , yn) be arbitrary vectors in Rn. Then and x = n ∑ i=1 xiei and y = n ∑ j=1 y je j xy = n ∑ i, j=1 xiy jeie j. Using the fact that both σ and ∆ are R−linear we have; 8 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov ∆(xy) = ∆ n ∑ i, j=1 xiy jeie j! = = = = n ∑ i, j=1 n ∑ i, j=1 n ∑ i, j=1 n ∑ i, j=1 ∆(xiy jeie j) xiy j∆(eie j) xiy j( σ(ei)∆(e j) + ∆(ei)e j) xiy j σ(ei)∆(e j) + n ∑ i, j=1 xiy j∆(ei)e j xi σ(ei)! n ∑ j=1 y j∆(e j)! + n ∑ i=1 ∑ i=1 = n = σ n ∑ i=1 xiei!! ∆ n ∑ j=1 y je j!! + ∆ n ∑ i=1 y je j! xi∆(ei)! n ∑ j=1 y je j! xiei!! n ∑ j=1 = σ(x)∆(y) + ∆(x)y. Therefore ∆ is a σ−derivation on Rn. ⊓⊔ 4 Centralizers in Ore extensions for functional algebras Consider the Ore extension A [x, σ,∆], that is, the algebra A [x, σ,∆] :=( m ∑ k=0 fkxk, : fk ∈ A) with the operations of pointwise addition, scalar multiplication, and multiplication given by the relation x f = σ( f )x + ∆( f ) for every f ∈ A . Our interest is to give a description of the centralizer C(A ), of A in the Ore extension A [x, σ,∆] where σ and ∆ are as described before. Using the notation introduced in [20], we define functions πl 0 = id. If m, n are nonzero integers such that m > n or atleast one of the integers is negative, then πn k : A → A , for k, l ∈ Z as follows; π0 m = 0. For the other remaining cases, m = σ ◦ πn−1 πn m−1 + ∆ ◦ πn−1 m . Ore extensions of functional algebras 9 It has been proven in [20] that an element tralizer of A if and only if m ∑ k=0 fkxk ∈ A [x, σ,∆] belongs to the cen- g fk = m ∑ j=k f jπ j k (g) (4) holds for all k ∈ {0, 1, · · · , m} and all g ∈ A . Observe that since A is commutative, then the centralizer C(A ) of A is also commutative and hence a maximal commutative subalgebra of A [x, σ,∆]. 4.1 Centralizer for the case ∆ = 0 In this section we treat the simplest case when ∆ = 0. Recall that σ acts like a permutation of the elements of A and since [n] is a finite set, then σ is of finite order. Before we give the description, we need the following definition. Definition 3. For any nonzero n ∈ Z, set Sepn(X) = {x ∈ X x 6= σn(x)}, Pern(X) = {x ∈ X x = σn(x)}. Observe that σn(h)(x) 6= h(x) if and only if σn(x) 6= x for every x ∈ X and every h ∈ A . We give the description of the centralizer in the following theorem. Theorem 3. The centralizer C(A ), of A in the Ore extension A [x, σ,∆] is given by C(A ) =( m ∑ k=0 fkxk such that fk = 0 on Sepk(X)). Proof. From equation (4) and the fact that ∆ = 0, we see that an element A [x, σ,∆] belongs to the centralizer of A if and only if m ∑ k=0 fkxk ∈ for every k = 0, 1, · · · , m and every g ∈ A . That is, g fk = fk σk(g) g(x) fk(x) = fk(x) σk(g)(x) (5) for every x ∈ X. Since A is commutative, then equation (5) will hold if and only if x ∈ Perk(X) or fk = 0. Therefore, the centralizer C(A ), of A will be given by C(A ) =( m ∑ k=0 fkxk : fk ∈ A where fk = 0 on Sepk(X)). ⊓⊔ 10 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov 4.2 Centralizer for the case ∆ 6= 0 Now, suppose σ 6= id is of order j ∈ Z>0, that is σ j = id but σk 6= id for all k < j. In the next Theorem, we state a necessary condition for an element in the Ore extension to belong to the centralizer. Theorem 4. If an element of degree m, izer of A , then fm = 0 on Sepm(X). m ∑ k=0 fkxk ∈ A [x, σ,∆] belongs to the central- Proof. As already stated an element of A if and only if for every g ∈ A m ∑ k=0 fkxk ∈ A [x, σ,∆] belongs to the centralizer g fk = m ∑ j=k f jπ j k (g) for k = 0, 1, · · · , m. Looking at the leading coefficient we have g fm = fmπm m (g) = fm σm(g) (6) Since A is commutative, then equation (6) holds on Perm(X) and on Sepm(X), equation (6) holds if and only if fm = 0. ⊓⊔ The above condition is not sufficient to describe all the elements that belong to the centralizer of A . In the next example we show that conditions satisfied by all elements in the centralizer of A are actually quite complicated even for the case when n = 2. Example 4.1 Let n = 2 and let σ : [n] → [n] be a bijection on [n]. We already know that if σ = id, then ∆ = 0 so we will consider the case σ 6= id, that is σ(e1) = e2 and σ(e2) = e1. In this case, ∆ has a standard matrix given by [∆] =(cid:20) s −s t (cid:21) −t for some s,t ∈ R with s,t 6= 0. A direct calculation shows that an element f x ∈ A [x, σ,∆] belongs to the cen- tralizer of A if and only if f = 0. So we consider a monomial of degree 2. f2(cid:19)x2 ∈ A [x, σ,∆] be an element in the centralizer of A . Then, if Let f =(cid:18) f1 g2(cid:19) ∈ A , we have, g =(cid:18)g1 g f =(cid:18)g1 g2(cid:19)(cid:18) f1 f2(cid:19)x2 =(cid:18)g1 f1 g2 f2(cid:19)x2. Ore extensions of functional algebras 11 On the other hand, using the fact that for every g ∈ A , x2g = σ2(g)x2 + [∆( σ(g)) + σ(∆(g))]x + ∆2(g) and since σ2 = id we have, −t f g =(cid:18) f1 g1(cid:19) + σ(cid:18)(cid:18) s −s f2(cid:19)(cid:20)(cid:18) s −s t (cid:19)(cid:18)g2 g2(cid:19)x2 +(cid:18) f1 f2(cid:19)(cid:18)g1 f2(cid:19)(cid:18) s2 + st −(s2 + st) g2(cid:19). st + t 2 (cid:19)(cid:18)g1 +(cid:18) f1 f2g2(cid:19)x2 +(cid:20)(cid:18)− f1(s + t)(g1 − g2) =(cid:18) f1g1 f2(s + t)(g1 − g2) (cid:19)(cid:21)x +(cid:20) f1(s2 + st)(g1 − g2) − f2(st + t 2)(g1 − g2)(cid:21) g2(cid:19)(cid:19)(cid:21)x −(st + t 2) −t t (cid:19)(cid:18)g1 Solving f g = g f and looking at the coefficient of x2, we get that f1, f2 are free variables and hence the centralizer C(A ) is non trivial. In the more general case, we have the following. As already seen, an element A if and only if for every g ∈ A m ∑ k=0 fkxk ∈ A [x, σ,∆] belongs to the centralizer of g fk = m ∑ j=k f jπ j k (g) for k = 0, 1, · · · , m. Looking at the constant term and using the fact that π j 0(g) = ∆ j(g) we have; g f0 = m ∑ j=0 f jπ j 0(g) = f0g + m ∑ j=1 f j∆ j(g) m ∑ j=1 f j∆ j(g) = 0. from which we obtain that Now, for any g ∈ A , g =(cid:18)g1 Therefore, from equation (7), we have g2(cid:19), we have g2(cid:19) =  ∆ j(g) = ∆ j(cid:18)g1 (g1 − g2) ∑ j −(g1 − g2) ∑ j k=0(cid:18) j − 1 k=0(cid:18) j − 1 k (cid:19)s j−kt k k (cid:19)skt j−k (7) .   12 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov   (g1 − g2) ∑m j=1 f j1 ∑ −(g1 − g2) ∑m j=0 f j2 ∑ j k=0(cid:18) j − 1 k=0(cid:18) j − 1 k (cid:19)s j−kt k k (cid:19)skt j−k j   =(cid:20)0 0(cid:21). Since equation (7) should hold for every g ∈ A , then we have (8) Since s,t 6= 0, then from equation (8), we have j=1 f j1 ∑ j=0 f j2 ∑ j k=0(cid:18) j − 1 k=0(cid:18) j − 1 j ∑m ∑m     k=0(cid:18) j − 1 ∑m ∑m ∑ j j=1 f j1 ∑ j=0 f j2 ∑ j−1 k=0(cid:18) j − 1 k=0(cid:18) j − 1 j−1 k (cid:19)s j−k−1t k = =(cid:20)0 0(cid:21). k (cid:19)s j−kt k k (cid:19)skt j−k    k (cid:19)s j−k−1t k  k (cid:19)skt j−k−1 k (cid:19)skt j−k−1. k=0(cid:18) j − 1 =(cid:20)0 0(cid:21). ∑ j Observe that Therefore we get a matrix equation of the form (cid:20) f11 f21 f31 · · · f12 f22 f32 · · ·  fm2(cid:21) fm1  1 s + t s2 + 2st + t 2 ... k=0 (cid:18)m − 1 k (cid:19)sm−k−1tt ∑m−1 =(cid:20)0 0(cid:21) (9)   which always has nontrivial solutions if m > 2. 4.3 Center of the Ore extension algebra In the following section, we give a description of the center of our Ore extension algebra. We will give the description for the case ∆ = 0. Theorem 5. The center of the Ore extension algebra A [x, σ, 0] is given by Z(A [x, σ, 0]) =( m ∑ k=0 fkxk : where fk = 0 on Sepk(X) and σ( fk) = fk). Ore extensions of functional algebras 13 Proof. Let f = m ∑ k=0 fkxk be an element in Z(A [x, σ, 0]), then f ∈ C(A ), that is fk(x) = 0 for every x ∈ Sepk(x). Since the Ore extension A [x, σ, 0] is associative, it is enough to derive conditions under which x f = f x. Now f x = m ∑ k=0 fkxk!x = m ∑ k=0 fkxk+1. On the other hand, m x f = x fkxk ∑ k=0 m x fkxk = = ∑ k=0 m ∑ k=0 σ( fk)xk+1. From which we obtain that x f = f x if and only if σ( fk) = fk. Therefore, Z(A [x, σ, 0]) =( m ∑ k=0 fkxk : where fk = 0 on Sepk(x) and σ( fk) = fk). ⊓⊔ 5 Infinite dimensional case Let J be a countable subset of R and let A be the set of functions f : J → J such that f (i) = 0 for all except finitely many i ∈ J. Then A is a commutative non-unital algebra with respect to the usual pointwise operations of addition, scalar multipli- cation and multiplication. For i ∈ J, let ei ∈ A denote the characteristic function of i, that is ei( j) = χ{i}( j) =(1 if i = j 0 if i 6= j. Then every f ∈ A can be written in the form f = ∑ i∈J fiei (10) where fi = 0 for all except finitely many i ∈ J. Let σ : J → J be a bijection and let σ : A → A be the automorphism of A induced by σ, that is, σ( f ) = f ◦ σ−1 14 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov for every f ∈ A . We can still construct the non-unital Ore extension A [x, σ,∆] as follows A [x, σ,∆] :=( m ∑ k=0 fkxk where fk ∈ A) with addition and scalar multiplication given by the usual pointwise operations and multiplication determined by the relation ( f x)g = σ(g) f x + ∆(g) where ∆ is a σ−derivation on A . In the following Theorem, we state the necessary and sufficient conditions for ∆ : A → A to be a σ−derivation on A . Theorem 6. Let σ : J → J be a bijection and let σ : A → A be the automorphism induced by σ. A linear map ∆ : A → A is a σ−derivation on A , if and only if, for every i ∈ J 1. ∆(ei) = −∆(cid:0)eσ(i)(cid:1) and 2. ∆(ei)(k) = 0 if k 6∈ {i,σ(i)} Proof. Suppose ∆ is a σ−derivation on A and letσ(i) = j, then σ(ei) = e j. If i 6= j, then, ∆(eie j) = ∆(0) = 0. On the other hand, That is, for every k ∈ J, ∆(eie j) = σ(ei)∆(e j) + ∆(ei)e j = e j(∆(e j) + ∆(ei)). ∆(eie j)(k) = [e j(∆(ei) + ∆(e j))] (k) =(∆(ei) + ∆(e j) 0 if k = j if k 6= j. Therefore, since ∆(eie j) = 0, then ∆(ei) = −∆(e j). Also, for any k ∈ J ∆(e2 i )(k) = ( σ(ei)∆(ei) + ∆(ei)ei)(k) = ∆(ei)(e j + ei)(k) = 0 k 6∈ {i, j}. if Conversely, suppose ∆ : A → A is a R−linear map which satisfies conditions (1) and (2) for some bijection σ : J → J of J. We prove that ∆ is σ−derivation on A . Suppose σ(i) = j and consider the characteristic functions ei, e j for i 6= j. Since ∆ is a linear map, Ore extensions of functional algebras 15 On the other hand, ∆(eie j) = ∆(0) = 0. σ(ei)∆(e j) + ∆(ei)e j = e j∆(e j) + ∆(ei)e j = e j(∆(e j) + ∆(ei)) = 0. Therefore ∆(eie j) = σ(ei)∆(e j) + ∆(ei)e j (11) for i 6= j and the same holds for i = j. The fact that equation (11) holds for every f , g ∈ A follows from linearity of both σ and ∆ and equation (10). Therefore ∆ is a σ−derivation. ⊓⊔ Remark 5.1 It can be seen from Theorem 6 above that, if σ(i) = i for all i ∈ J, then ∆ = 0. That is, there are no non trivial derivations on A . 5.1 Centralizer for A In this section, we give a description of the centralizer C(A ) of A , in the Ore exten- sion A [x, σ,∆] and the center of the Ore extension. Since A is commutative, then by [20, Proposition 3.3], if σ is of infinite order, then A is maximal commutative, that is, C(A ) = A . Therefore we will focus on the case when σ is of finite order. We do this for two cases. 5.1.1 The case ∆ = 0 The following Theorem gives the description of the centralizer of A in the skew- polynomial ring A [x, σ, 0]. Theorem 7. The centralizer C(A ), of A in the Ore extension A [x, σ,∆] is given by C(A ) =( m ∑ k=0 fkxk such that fk = 0 on Sepk(X)) where Sepk(X) is as defined in definition 3. Proof. Let f = m ∑ k=0 fkxk ∈ A [x, σ, 0] be an element of degree m which belongs to C(A ). Then f g = g f should hold for every g ∈ A . Now, g f = g m ∑ k=0 fkxk = m ∑ k=0 g fkxk. 16 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov On the other hand, f g = m ∑ k=0 fkxk!g = m ∑ k=0 fk(cid:16)xkg(cid:17) = m ∑ k=0 fk σk(g)xk. Therefore, g f = f g if and only if g fk = fk σk(g) for all k = 0, 1, · · · , m. Since A is commutative, then the above equation holds on Perk(X). Therefore, C(A ) =( m ∑ k=0 ⊓⊔ fkxk such that fk = 0 on Sepk(X)). 5.1.2 The case ∆ 6= 0 Now, suppose σ 6= id is of order j ∈ Z>0, that is σ j = id but σk 6= id for all k < j. In the next Theorem, whose proof is similar to Theorem 4, we state a necessary condition for an element in the Ore extension to belong to the centralizer. Theorem 8. Let σ : A → A be an automorphism on A . If an element of order m, m ∑ k=0 fkxk ∈ A [x, σ,∆] belongs to the centralizer of A , then fm = 0 on Sepm(X). 5.2 Center of A [x, σ,∆] when ∆ = 0 In the following section, we give a description of the center of our Ore extension algebra. We will give the description for the case ∆ = 0. Theorem 9. Then the center of the Ore extension algebra A [x, σ, 0] is given by Z(A [x, σ, 0]) =( m ∑ k=0 fkxk : where fk = 0 on Sepk(X) and σ( fk) = fk). Proof. Observe that since A is not unital, the proof of Theorem 5 does not work for Theorem 9, since the element x 6∈ A [x, σ, 0]. Therefore, we adopt the following proof. Denote A [x, σ,∆] by R and let f = fk = 0 on Sepk(X). Now let g = n ∑ l=0 m ∑ k=0 fkxk ∈ Z(R). Then f ∈ C(A ), that is glxl be an arbitrary element in R. Then Ore extensions of functional algebras 17 f g = m = ∑ = ∑ k,l k,l ∑ k=0 glxl! ∑ l=0 fkxk! n fk(xkgl)xl! fk σk(gl)xk+l! In the same way, it can be shown that g f = n ∑ l=0 glxl! m ∑ k=0 fkxk! = ∑ k,l gl σl( fk)xk+l. It follows that f g = g f if and only if fk σk(gl) = gl σl( fk). (12) for all k = 0, 1, · · · , m and all l = 0, 1, · · · , n. Now, fk = 0 on Sepk(X) and on Perk(X), we have σk = id. Therefore, equation (12) holds if and only if fkgl = gl σl( fk) for all l = 0, 1, · · · , n. Since A is commutative, we conclude that (12) holds iff σ( fk) = fk. Therefore Z(A [x, σ, 0]) =( m ∑ k=0 fkxk : where fk = 0 on Sepk(X) and σ( fk) = fk). ⊓⊔ 6 The skew power series ring As before, we let X = [n](= {1, 2, · · · , n}) be a finite set and let A = { f : X → R} denote the unital algebra of real-valued functions on X with respect to the usual pointwise operations. Let σ : X → X be a bijection such that A is invariant under σ, (that is σ is a permutation on X ) and let σ : A → A be the automorphism induced by σ, that is σ( f ) = f ◦ σ−1 (13) for every f ∈ A . Consider the skew ring of formal power series over A , A [x; σ]; that is the set ( ∞ ∑ n=0 fnxn such that fn ∈ A) 18 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov with pointwise addition and multiplication determined by the relations x f = σ( f )x. That is, if f = ∑∞ n=0 fnxn and g = ∑∞ n=0 gnxn are elements of A [x; σ], then f + g = ∞ ∑ n=0 ( fn + gn)xn and f g = ∞ ∑ n=0 fnxn! ∞ ∑ n=0 gnxn! = ∞ ∑ n=0 n ∑ k=0 fk σk(gn−k)!xn. 6.1 Centralizer of A in the skew power series ring A [x; σ] In the next Theorem, we give the description of the centralizer of A in the skew power series ring A [x; σ]. Theorem 10. The centralizer C(A ), of A in the skew power series ring A [x; σ] is given by C(A ) =( ∑ n∈Z fnxn such that fn = 0 on Sepn(X)) where Sepk(X) is as given in definition 3. Proof. Let f = fnxn ∈ A [x; σ] be an element which belongs to C(A ). Then ∞ ∑ n=0 f g = g f should hold for every g ∈ A . Now, g f = g ∞ ∑ n=0 fnxn = ∞ ∑ n=0 g fnxn. On the other hand, f g = ∞ ∑ n=0 fnxn!g = ∞ ∑ n=0 fn(xng) = ∞ ∑ n=0 fn σn(g)xn. Therefore, g f = f g if and only if g fn = fn σn(g) for all n ∈ N. Since A is commutative, then the above equation holds on Pern(X). Therefore, Ore extensions of functional algebras 19 C(A ) =( ∑ n∈Z ⊓⊔ fnxn such that fn = 0 on Sepn(X)). 6.2 The center of the skew power series ring The next Theorem gives the description of the center for the skew power series ring A [x; σ]. Theorem 11. The center of the skew power series ring A [x; σ] is given by Z(A [x; σ]) =( ∞ ∑ k=0 fnxn : where fn = 0 on Sepn(X) and σ( fn) = fn). ∞ ∑ n=0 Proof. Let f = fnxn be an element in Z(A [x; σ]). Then f ∈ C(A ), that is fn(x) = 0 for every x ∈ Sepn(x). Since A [x; σ] is associative, it is enough to de- rive conditions under which x f = f x. Now f x = ∞ ∑ n=0 fnxn!x = ∞ ∑ n=0 fnxn+1. On the other hand, x f = x fnxn ∞ ∑ n=0 ∞ ∑ n=0 x fnxn = = ∞ ∑ n=0 σ( fn)xn+1. From which we obtain that x f = f x if and only if σ( fn) = fn. Therefore, Z(A [x; σ]) =( ∞ ∑ n=0 fnxn : where fn = 0 on Sepn(x) and σ( fn) = fn). ⊓⊔ 20 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov 7 The skew-Laurent ring A [x, x−1; σ] The fact that σ is an automorphism of A naturally leads us to the consideration of the skew-Laurent ring A [x, x−1; σ]. Definition 4. Let R be a ring and σ an automorphism of R. By a skew-Laurent ring R[x, x−1;σ] we mean that 1. R[x, x−1;σ] is a ring, containing R as a subring, 2. x is an invertible element of R[x, x−1;σ], 3. R[x, x−1;σ] is a free left R−module with basis(cid:8)1, x, x−1, x2, x−2, · · ·(cid:9), 4. xr = σ(r)x,(cid:0)and x−1r = σ−1(r)x−1(cid:1) for all r ∈ R. As before, we let X = [n](= {1, 2, · · · , n}) and let A = { f : X → R} denote the unital algebra of real-valued functions on X with respect to the usual pointwise operations. Let σ : X → X be a bijection such that A is invariant under σ, (that is σ is a permutation on X ) and let σ : A → A be the automorphism induced by σ, as defined by equation (13). Consider the skew-Laurent ring A [x, x−1; σ], that is the set ( ∑ n∈Z fnxn : fn ∈ A and fn = 0 for all except finitely many n) with pointwise addition and multiplication determined by the relations x f = σ( f )x and x−1 f = σ−1x−1. In the next Theorem, we give the description of the centralizer of A in the skew- Laurent ring A [x, x−1; σ]. Theorem 12. The centralizer of A in the skew-Laurent extension A [x, x−1; σ] is given by C(A ) =( ∑ n∈Z fnxn : fn = 0 on Sepn(X)) where Sepk(X) is as given in Definition 3. Proof. Let f = ∑ n∈Z f g = g f should hold for every g ∈ A . Now, fnxn ∈ A [x, x−1; σ] be an element which belongs to C(A ). Then g f = g ∑ n∈Z fnxn = ∑ n∈Z g fnxn. On the other hand, f g = ∑ n∈Z fnxn!g = ∑ n∈Z fn(xng) = ∑ n∈Z fn σn(g)xn. Ore extensions of functional algebras 21 Therefore, g f = f g if and only if g fn = fn σn(g) for all n ∈ Z. Since A is commutative, then the above equation holds on Pern(X). Therefore, C(A ) =( ∑ n∈Z fnxn : fn = 0 on Sepn(X)). ⊓⊔ Acknowledgement This research was supported by the Swedish International Development Coopera- tion Agency (Sida), International Science Programme (ISP) in Mathematical Sci- ences (IPMS), Eastern Africa Universities Mathematics Programme (EAUMP). Alex Tumwesigye is also grateful to the research environment Mathematics and Applied Mathematics (MAM), Division of Applied Mathematics, Malardalen Uni- versity for providing an excellent and inspiring environment for research education and research. References 1. Archbold, R. J., Spielberg, J. S., (1994). Topologically free actions and ideals in descrete C*-dynamical systems, Proc. Edinburgh Math. Soc. (2) 37, no. 1, 119-124. 2. Carlsen, T. M., and Silvestrov, S. D., (2009). On the Excel crossed product of topological covering maps, Acta Appl. Math. 108, no. 3, 573-583. 3. de Jeu, M., Svensson, C., Tomiyama, J., (2012). On the Banach *-algebra crossed product associated with a topological dynamical system, J. Funct. Anal. 262, no. 11, 4746-4765 4. Dutkay, D. E., Jorgensen, P.E.T., Silvestrov, S., (2012). Decomposition of wavelet represen- tations and Martin boundaries, J. Funct. Anal. 262, no. 3, 1043-1061 5. Dutkay, D. E., Jorgensen, P.E.T., (2007). Martingales, endomorphisms and covariant sys- tems of operators in Hilbert space, J. Operator Theory. Anal. 58, no. 2, 269-310 6. Exel, R., Vershik, A., (2006). C*-algebras of irreversible dynamical systems, Canad. J. Math. 58, no. 1, 39-63 7. Goodearl, K., R., Warfield, R., B., (2004). An introduction to non commutative Noetherian rings. Second edition. London Mathematical Society Student Texts, 61. Cambridge Univer- sity Press, Cambridge. 8. Li, B-R., Introduction to operator algebras, World Sci., Singapore, 1992. 9. Lundstrom, P., Oinert, J., (2012). Skew category algebras associated with partially defined dynamical systems, Internat. J. Math. 23, no. 4, pp. 16 10. Mackey, G. W., (1989). Unitary Group Representations in Physics, Probability and Number Theory, xxviii+402pp. Second edition. Advanced book classics. Addison-Wesley Publish- ing Company, Advanced Book Program, Redwood city. 11. Ostrovskyi, V., Samoilenko, Yu., (1999). Introducion to the Theory of Representations of Finitely Presented *-Algebras, I, iv+261 pp. Representations by bounded operators. Re- views in Mathematics and Mathematical Physics, 11, pt.1. Harwood Academic Publishers, Amsterdam. 22 Alex Behakanira Tumwesigye, Johan Richter, Sergei Silvestrov 12. Richter J., Silvestrov, S. D., Tumwesigye, B. A., (2016). Commutants in crossed product algebras for piece-wise constant functions In: Silvestrov S., Ranci´c M., (eds.), Engineering Mathematics II, Springer Proceedings in Mathematics and Statistics, vol 179. Springer, Cham. 13. Richter, J., Silvestrov S. D. and Ssembatya, V. A. Tumwesigye, A. B, (2016). Crossed prod- uct algebras for piece-wise constant functions, Silvestrov S., Ranci´c M., (eds.), Engineering Mathematics II, Springer Proceedings in Mathematics and Statistics, Springer, pp. 18. 14. Richter J. (2016). Centralizers and Pseudo-Degree Functions. In: Silvestrov S., Ranci´c M. (eds) Engineering Mathematics II. Springer Proceedings in Mathematics and Statistics, vol 179. Springer, Cham 15. Richter, J., Silvestrov, S. (2014). Centralizers in Ore extensions over polynomial rings, In- ternational Electronic Journal of Algebra, 15, 196207. 16. Rowen, L., H., (1988). Ring theory, Vol. I. Pure and Applied Mathematics, 127. Academic Press, Inc., Boston, MA. 17. Svensson, C., Silvestrov, S. D., de Jeu, M., (2009). Dynamical systems associated with crossed products, Acta Appl. Math. 108 no. 3, 547-559. 18. Svensson, C., Silvestrov ,S. D. and De Jeu, M., (2007). Dynamical Systems and Commutants in Crossed Products, Internat. J. Math. 18 455 -- 471 2007. 19. Tomiyama, J., (1987). Invitation to C∗−algebras and topological dynamics, World Sci., 20. 21. 22. Singapore, New Jersey, Hong Kong. Oinert, J., Richter, J., and Silvestrov, S. D. (2013). Maximal commutative subrings and simplicity in ore extensions, Journal of Algebra and Its Applications, 12, 1250192. Oinert, J., Silvestrov, S., (2009). Commutativity and ideals in Pre-crystalline graded rings. Acta Appl. Math. 108, no. 3, 603-615. Oinert J., and Silvestrov S. D., (2008). Commutativity and ideals in algebraic crossed prod- ucts, J. Gen. Lie Theory Appl. 2, no.4, 287-302.
1708.08873
2
1708
2019-05-03T00:48:37
Testing isomorphism of graded algebras
[ "math.RA" ]
We present a new algorithm to decide isomorphism between finite graded algebras. For a broad class of nilpotent Lie algebras, we demonstrate that it runs in time polynomial in the order of the input algebras. We introduce heuristics that often dramatically improve the performance of the algorithm and report on an implementation in Magma.
math.RA
math
TESTING ISOMORPHISM OF GRADED ALGEBRAS PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON Abstract. We present a new algorithm to decide isomorphism between finite graded algebras. For a broad class of nilpotent Lie algebras, we demonstrate that it runs in time polynomial in the order of the input algebras. We introduce heuristics that often dramatically improve the performance of the algorithm and report on an implementation in Magma. ] . A R h t a m [ 2 v 3 7 8 8 0 . 8 0 7 1 : v i X r a 1. Introduction It is possible to decide if algebraic objects A and B of order n are isomorphic by fixing a generating sequence a1, . . . , ad for A and searching through all sequences b1, . . . , bd in B until we find an identification ai 7→ bi that extends to an isomorphism A → B. This process takes nd steps: for groups and algebras, where d can be as large as log n, the resulting complexity is not polynomial in the orders of the input objects. Despite significant progress over the years on various isomorphism problems, asymptotic improvements over "brute force" for substantial classes of objects are rare. We introduce a general strategy for testing isomorphism of finite graded algebras. It is particularly effective for nilpotent matrix Lie algebras, and we describe a class of such algebras for which our isomorphism test runs in time polynomial in the order of the input algebra. We have also implemented a version in Magma [3]. While graded algebras are natural structures in their own right, they also arise from the study of other algebraic structures. For example, given a ring R, one can compute its Jacobson radical, J, and consider the graded algebra gr R = R/J ⊕ L∞ i=1 J i/J i+1. Similarly, the intersection Op(G) of the Sylow p-subgroups of a finite group G for a prime p dividing G is normal and nilpotent, so gr G = Z[G/Op(G)]⊕ L∞ i=1 ηi/ηi+1 is a graded Lie Fp-algebra, where η1 := Op(G) and ηi+1 = [ηi, η1]ηp i . Isomorphism tests for associated graded structures work with individual graded components, often exploiting the power of linear algebra. Existing uses of graded algebras within isomorphism testing proceed sequentially through the grading; see [12], for example. Starting with the first graded compo- nent, one considers all possible isomorphisms between corresponding components, and uses the graded product to decide which of them induces an isomorphism between subsequent components. While this iterative approach usually offers im- provements over brute force, a single large homogeneous component may create a bottleneck. Our approach is not constrained by the need to process the components sequentially. Instead, it identifies sections of the two graded algebras between which This work was supported in part by the Marsden Fund of New Zealand via grant UOA 1626, by NSF grants DMS-1620454 and DMS-1620362, and by the Simons Foundation #281435. We thank the referee for helpful comments. 1 2 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON the list of possible maps is small and can be computed quickly. It then determines which of these maps between sections lift to isomorphisms of the algebras. To state our main result, we require a few preliminaries. Let K be a finite field. A K-algebra is a K-module, A, equipped with a (possibly nonassociative) K-bilinear product ◦ : A × A ֌ A. If, as a K-module, ∞ A = Ms=0 As, where As ◦ At 6 As+t, then A is N-graded. We assume that A is generated in degree 1 in the sense that, for all s > 0, As =Ps−1 j=1 Aj ◦ As−j. An isomorphism between graded algebras that maps each graded component of one algebra to the corresponding component of the other is a graded isomorphism. For each s > 1, one can restrict the product on A to produce a bilinear map A1 × As ֌ As+1. The ring of adjoints of this bilinear map, denoted Ms, is the largest ring R faithfully represented on A1 ⊕ As such that the bilinear map A1 × As ֌ As+1 factors through the tensor product space A1 ⊗R As. Defined explicitly as operators in (2.7), Ms has group of units M× s . Our main result, proved in Section 4, is the following. Theorem 1.1. There is a deterministic algorithm that, given two finite graded K- algebras A and B generated in degree 1, decides whether or not there is a graded isomorphism A → B. The algorithm has complexity O(min s {M× s · Aut(As+1)} · (dim A)2ω · log2 K), where s runs over the grading and 2 6 ω < 3 is the exponent of matrix multiplication over K. By comparison, the sequential approach has complexity O(K(dim A)2 ). While the estimate in Theorem 1.1 is not asymptotically better in all cases, the flexibility to choose which component to process first may lead to dramatic improvements. As one illustrative example, define Fq(d1, . . . , dℓ) to be the smallest class of graded Lie algebras containing the Lie subalgebras L∗ 6 gld1+...+dℓ(q) satisfying [L∗, L∗] = 6 L∗ 6 where 0m,n denotes the zero (m × n)-matrix, and 0n = 0n,n. (A class of algebras is a collection closed under isomorphism; in particular, no specific representation is assumed as part of the input.) An analysis of the algorithm in Theorem 1.1 applied to F (d1, . . . , dℓ) establishes the following. Theorem 1.2. Isomorphism testing in Fq(d1, . . . , dℓ) is in time O(Lm2/ε), where didi+s) . The number of isomorphism classes in F (d1, . . . , dℓ) is qO((d1+···+dℓ)2). ε = X16i<j6ℓ 2(ℓ−s Xi=1 m = min s61+ d didj, 0d1     0d1,d2 . . . ∗ . . . . . . ··· . . . . . . 0dℓ−1 ∗ ... ∗ 0dℓ 0dℓ−1,dℓ     ∗ . . . ··· . . . . . . ∗ ... ∗0dℓ 0d1     ,     TESTING ISOMORPHISM OF GRADED ALGEBRAS 3 The complexity in Theorem 1.2 is polynomial in the size of the algebras when both m2, ε ∈ O((d1 + . . . + dℓ)2), a condition that holds, for instance, when di is bounded, and in many other cases. One of the motivations of this work is to develop practical tools to decide iso- morphism within families of finite groups and algebras. From this viewpoint, we are concerned with developing algorithms that perform well as a function of the length of standard encodings of the input algebras, such as by generating sets, or as bases with structures constants. Despite the significant improvements offered by the strategy underlying our main results, we have encountered situations where the necessary exhaustive search is still intractably large. To address this concern, in Section 7 we introduce heuristics that use local in- variants to deduce global restrictions on the possible automorphisms arising from A1 × As ֌ As+1, thereby reducing substantially the ensuing exhaustive search. More precisely, we design a labeling of the points and lines of the projective space on As+1 that is invariant under isomorphism. The labeling offers sufficient variabil- ity that the resulting constraints often reduce intractable searches to the practical realm. We also revisit another "local-to-global" process called fingerprinting that was introduced in [13]. In Section 8 we report on our implementation of the al- gorithms in Magma, and show for some families of examples that our techniques have significant practical impact. We prove a more general version of Theorem 1.1 in which algebras are not nec- essarily generated in degree 1, and may be graded using an arbitrary monoid. This general treatment allows our algorithms to take as input more refined gradings on the given algebras that often decompose them into smaller pieces. The develop- ment of such refined gradings is an emerging area of study that may lead to faster isomorphism tests; see [16], for example. 2. Preliminaries Throughout the paper K denotes a finite field, and all K-vector spaces are finite- dimensional. The K-dual of a K-vector space V is denoted by V †. If f : U → V is a linear map, then f † : V † → U † denotes the dual map. 2.1. Graded algebras. For convenience in our exposition we assume that an al- gebra A is specified by a basis {a1, . . . , ad} together with structure constants [αk ij] defined by ai · aj =Xk αk ijak. Although the structure constant model of an algebra is both less compact and less efficient than alternatives -- such as matrix algebras specified by generating sets, multivariate polynomials, and more general quotients of free algebras -- it provides a convenient, uniform starting point. Let M be a commutative monoid with pre-order ≺, where a ≺ b if there exists c ∈ M such that a + c = b. We assume that, relative to ≺, every nonempty subset has a minimal element. We also assume that 0 is a minimal element of M so that M is conical. This ensures that we can perform (Noetherian) induction on the indices in M : if S ⊂ M has the property that for every s ∈ S there exists t ∈ S \ {s} with t ≺ s, then S = ∅. The monoids M = Nc satisfy the necessary conditions. 4 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON An algebra A∗ is M -graded if A∗ =Ls∈M As and for all s, t ∈ M , As◦At ⊂ As+t. We assume, for each s, that As is the K-linear span of As ∩ {a1, . . . , ad}. We say that A is generated in degrees T if (2.1) (∀s) s ∈ M \ T =⇒ Xs = s1 + s2, s1, s2 /∈ {0, s} As1 ◦ As2 = As. As M is conical, if A∗ is generated in degrees T , then 0 ∈ T . The following observation is a direct consequence of the induction principle. Lemma 2.2. If A∗ is an M -graded algebra generated in degrees T then, for each s ∈ M , As consists of linear combinations of products of elements in St∈T At. If M = N, then the generating degrees are 0 and 1. Here, A0 contributes no shift in the grading; it is customary to ignore 0 and regard A∗ as generated in degree 1. The main results in the introduction were formulated for this special case. As an infinite monoid can grade a finite algebra, repetitions As = At for s 6= t are common. To avoid redundancy, one can truncate all rays in the conical monoid M in the first place where all are stable. This is always possible but may produce a less familiar monoid: for each c ∈ N, associate to M the ℓ-truncated cyclic monoid Nℓ = {0, . . . , ℓ}, where x ⊞ y := x + y if x + y < ℓ, and x ⊞ y := ℓ otherwise. Proposition 2.3. Let M = hm1, . . . , mdi, let A∗ be an M -graded algebra, and let ℓ be the smallest positive integer satisfying ∀i ∈ {1, . . . , d}, ∀u ∈ M \ {0} Aℓmi = Aℓmi+u. Then A∗ is naturally (Nℓ)d -- graded where A(r1,...,rd) = Ar1m1+···+rdmd . In particu- lar, we may assume for fixed d that M ∈ O((dim A∗)d). 2.2. Bimaps. A bi-additive map (or just bimap) is a tuple U∗ = hU2, U1, U0,◦i where the Ui are abelian groups and ◦ : U2 × U1 ֌ U0 is a function satisfying the following two-sided distributive law: (u2 + u′ 2) ◦ u1 = u2 ◦ u1 + u′ 2 ◦ u1 u2 ◦ (u1 + u′ 1) = u2 ◦ u1 + u2 ◦ u′ 1. We always work with K-bimaps: the Ui are K-modules and ◦ is K-bilinear. The dimension of U∗ is the sum of the dimensions of its component spaces, namely dim U∗ := dim U2 + dim U1 + dim U0. A homotopism f∗ : U∗ → V∗ is a tuple (fi : Ui → Vi i ∈ {0, 1, 2}) satisfying (2.4) (u2 ◦ u1)f0 = u2f2 ◦ u1f1. (∀u2)(∀u1) Denote by Hom(U∗, V∗) the set of all homotopisms f∗ : U∗ → V∗. The class of bimaps with homotopisms forms the homotopism category. There are various natural morphisms on classes of bimaps, such as adjoint-morphisms [22], so we name the categories after the morphisms rather than the objects. We are interested primarily in isotopisms, namely homotopisms whose constituent maps are all isomorphisms. The autotopism group of a bimap U∗ is (2.5) Aut(U∗) = Hom(U∗, U∗) ∩ Aut(Ui). 2 Yi=0 TESTING ISOMORPHISM OF GRADED ALGEBRAS 5 2.3. Shuffling bimaps. Since a bimap U∗ = hU2, U1, U0,◦i consists of multiple components, it is tedious, both in proofs and in algorithms, to specify individual components. Accordingly, we often "shuffle" indices in our bimaps. To do this, however, we must ensure that autotopisms are unaffected by the process, so we now define precisely what we mean by shuffling. Related categorical subtleties are considered in [22]; observe that our treatment differs from that of [14]. Given a bimap U∗ = hU2, U1, U0,◦i and a permutation σ ∈ Sym({2, 1, 0}), we define a new bimap U σ ∗ . It suffices to consider just transpositions, as these generate all possible permutations, but the definition depends on the particular transposi- tion. First consider σ = (2, 1), the transposition swapping 2 and 1. Set U σ 2 := U1, 1 := U2, U σ U σ 2 and u1 ∈ U σ 1 , set 0 as follows: given u2 ∈ U σ 0 := U0, and define ◦σ : U σ 2 × U σ 1 ֌ U σ 2 , U σ We define U σ 2 := f1, f σ f σ ∗ : U σ ∗ → V σ also called the transpose of a bimap. ∗ to be hU σ ∗ where f σ 1 , U σ u2 ◦σ u1 := u1 ◦ u2. 0 ,◦σi. A homotopism f∗ : U∗ → V∗ is sent to In the literature this is 1 := f2, f σ 0 := f0. For σ = (1, 0) and σ = (2, 0) we need a slightly more elaborate construction. We 1 := U † 0 , 1 . We switch to Greek letters when working with elements in a dual vector 1 (so consider just (1, 0) since (2, 0) works in the same way. Set U σ 0 := U † U σ space. Define ◦σ : U σ ν1 : U1σ → K), define (u2 ◦σ ν1) = ν0 ∈ U σ 0 as follows: given u2 ∈ U σ 0 = Hom(U1, K) as follows: 2 and ν1 ∈ U σ 2 := U2, U σ 2 × U σ 1 ֌ U σ ν0 : u0σ 7→ (u2 ◦ u0σ)ν1. A complication arises with homotopisms, since interchanging f1 and f0 is no longer meaningful. Instead, we put f σ 0 and f σ ∗ is not a homotopism but satisfies the following condition: 1 . In particular, f σ 2 := f2, f σ 1 := f † 0 := f † (∀u2)(∀ν1) (u2 ∈ U σ 2 ) ∧ (ν1 ∈ V σ 1 ) ⇒ u2f σ 2 ◦σ ν1 = (u2 ◦σ ν1f σ 1 )f σ 0 . This illustrates the inherent delicacy of the otherwise trivial idea of re-indexing ∗ = variables. (f2, (f † In the special case where f∗ is an isotopism we observe that f σ 1 )−1) is an isotopism U σ 0 )−1, (f † ∗ → V σ ∗ . 2.4. Weakly Hermitian bimaps. A bimap is weakly Hermitian if it is isotopic to its transpose, namely to its σ = (2, 1) shuffle. The familiar symmetric and alternat- ing bimaps are examples of weakly Hermitian bimaps, but the notion is substantially more general. Associated to weakly Hermitian bimaps are group invariants that respect their symmetry. If we fix an isotopism g∗ : U∗ → U † ∗ , then ΨIsom(U∗) = {f∗ ∈ Aut(U∗) : f∗g∗ = g∗f † ∗} is the group of pseudo-isometries of U∗ and does not depend on the choice of g∗. 2.5. Algebras that operate on bimaps. Consider the following algebras deter- mined by a bimap U∗. (2.6) (2.7) (2.8) (2.9) L(U∗) = {(f †, h†) ∈ End(U2) × End(U0) : (f †u2) ◦ u1 = h†(u2 ◦ u1)}, M(U∗) = {(f, g†) ∈ End(U2) × End(U1) : (u2f ) ◦ u1 = u2 ◦ (g†u1)}, R(U∗) = {(g, h) ∈ End(U1) × End(U0) : u2 ◦ (u1g) = (u2 ◦ u1)h}, and T (U∗) = L(U∗) ⊕ M(U∗) ⊕ R(U∗). 6 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON Each Ui is a natural module under each of these rings, and is thus a T (U∗)-module. Although the action is non-unital -- for example, the representation of L(U∗) on U1 is trivial -- it is more convenient to think of each of U2, U1, U0 as a module over a common ring than continually to clarify that the action on U1 is by T (U∗)/L(U∗), and so on. We also use the following algebra: End(Ui) : (u2f2) ◦ u1 = u2 ◦ (u1f1) = (u2 ◦ u1)f0) . C(U∗) =(f∗ ∈ (2.10) We need one final notion. Fix bimaps U∗ and V∗. As defined in [22], an adjoint- morphism (f, g) : U∗ → V∗ is a pair of maps f : U2 → V2 and g : V1 → U1 satisfying 2 Yi=0 (∀u2)(∀v1) (u2 ∈ U2) ∧ (v1 ∈ V1) ⇒ (u2f ) ◦ v1 = u2 ◦ (v1g). The set of all such pairs (f, g) is denoted Adj(U∗, V∗). This defines another category on bilinear maps distinct from those already discussed: it is an abelian category and plays a role similar to modules of rings [22, Theorem 2.27]. In particular, observe that Adj(U∗, U∗) is simply the ring M(U∗). As adjoint-bimap categories are not equivalent to module categories [22, Theorem 2.10], however, we must adapt some established results in module theory to suit our purpose. 3. Testing isotopism of bimaps In this section we consider the problem of deciding if two bimaps are equivalent under isotopisms. This is an essential step in our isomorphism test for graded algebras, but it is also a problem of independent interest. We require an efficient solution to the following problem. IsotopismCoset Given: K-bilinear maps U∗ and V∗. Return: the coset Iso(U∗, V∗) of isotopisms U∗ → V∗. Here, we present a basic algorithm to solve this problem; in Section 7 we introduce heuristics to speed up the construction. Note, if f∗ : U∗ → V∗ is an arbitrary isotopism, then Iso(U∗, V∗) = Aut(U∗)f∗, so the output can be encoded compactly using generators for Aut(U∗). If U∗ = V∗, then the output is simply Aut(U∗). 3.1. Principal autotopisms. The difficulty of IsotopismCoset stems from hav- ing to find solutions to quadratic polynomials in multiple variables: namely, we solve for (f2, f1, f0) where the parameters f2 and f1 occur in a product u2f2 ◦ u1f1. Quadratic varieties are as complex as arbitrary varieties, but fixing any one of the fi renders the problem substantially more tractable. Thus, we consider first the following restricted version of the autotopism group problem; in Section 3.2 we handle the coset version. PrincipalAutotopismGroup Given: a K-bilinear map U∗ and i ∈ {2, 1, 0}. Return: generators for Aut(U∗)(i) := {f∗ ∈ Aut(U∗) : fi = 1Ui}. The following observation leads to an efficient solution to this problem. TESTING ISOMORPHISM OF GRADED ALGEBRAS 7 Proposition 3.1. For a bimap U∗, the following hold: (i) Aut(U∗)(2) ∼= R(U∗)×; (ii) Aut(U∗)(1) ∼= L(U∗)×; and (iii) Aut(U∗)(0) ∼= M(U∗)×. Proof. Following our discussion in Section 2.3, we can assume i = 0 after a possible shuffling of the variables. (We stress once more that reindexing requires some re- adjustment of the resulting isotopisms.) If f∗ ∈ Aut(U∗) and f0 = 1, then 1 ))f0 = u2 ◦ (u1f −1 1 ), 1 , 1U0) ∈ Aut(U∗). (u2f2) ◦ u1 = (u2f2) ◦ (u1f −1 1 f1) = (u2 ◦ (u1f −1 1 ) ∈ M(U∗). If (f2, f1) ∈ M(U∗) then (f2, f −1 so (f2, f −1 (cid:3) Algorithm 1 Principal Autotopism Group Input: a K-bilinear map U∗ and i ∈ {2, 1, 0}. Output: generators for Aut(U∗)(i). 1: Choose a permutation σ on {2, 1, 0} with iσ = 0. 2: Solve a system of linear equations to find a basis for M(U σ ∗ ). 3: Use [6, Theorem 2.3] to compute generators X for the group of units of M(U σ ∗ ). 4: Set G = h(f, g−1, 1)σ : (f, g) ∈ Xi 6Q2 5: return G. i=0 Aut(Ui). Proposition 3.2. Algorithm 1 solves PrincipalAutotopismGroup. As a de- terministic algorithm it runs in time O((dim U∗)2ω log2 K + char K); a Las Vegas variant runs in time O((dim U∗)2ω log2 K). Proof. Since the correctness of the algorithm is clear from Proposition 3.1 and the mechanics of shuffling variables, we focus on the complexity. Line 2 involves solv- ing a system of (dim U2)(dim U1)(dim U0) linear equations in (dim U2)2 + (dim U1)2 variables, which can be done in time O((dim U∗)2ω log2 K). Line 3 invokes the algorithm of [6, Theorem 2.3], which depends on the ability to factor polynomials over K. The algorithm runs in Las Vegas polynomial-time O((dim A)2ω log2 K) if we use Las Vegas polynomial factorization routines such as that of [9]. A determin- istic algorithm is known when the ground field of K can be listed: in this case Line 3 runs in time O((dim A)2ω log2 K + char K). The remaining steps of Algorithm 1 have negligible influence on the timing, so the result follows. (cid:3) 3.2. Extending to isotopisms. Our next objective is to solve a single instance of isotopism. We focus first on principal isotopisms, and assume that i = 0 by shuffling coordinates. PrincipalIsotopism Given: K-bilinear maps U∗ and V∗ and a map fi : Ui → Vi for fixed Return: an isotopism f∗ : U∗ → V∗ extending fi. i ∈ {2, 1, 0}. Just as the construction of the principal autotopism group is a problem in rings, the construction of a principal isotopism resembles a problem in modules. As we indicated in Section 2, however, it is not precisely a module problem that we solve. 8 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON Definition 3.3. An orthogonal decomposition of a bimap U∗ is a pair of direct Each Uij is an orthogonal factor. decompositions U2 = Lj U2j and U1 = Lk U1k such that U2j ◦ U1k = 0 if j 6= k. For example, if U∗ = hK 2, K 3, K,◦i where u2 ◦ u1 = u2(cid:20)1 1 0(cid:21) u† 0 0 then U2 = K(1, 0) ⊕ K(0, 1) and U1 = K(1, 0, 0) ⊕ K(0, 1, 0) ⊕ K(0, 0, 1) is an orthogonal decomposition. More generally, in terms of structure constants this implies that A(k) = [ak ij ] is block diagonal, the blocks coinciding with the (U2j, U1j) pairs; see [22, Section 2.4] for details. 0 1 Our plan is to imitate the algorithm of [4], which builds a module isomorphism one direct summand at a time. Both that algorithm and our adaptation rely on the following construction. If X ⊆ EndK(V ), then let X be the semigroup generated by X and let KhXi be the K-linear span of X. (Contrary to the usual notion of enveloping algebra, KhXi need not be unital: this occurs if, and only if, the identity can be written as a linear combination of elements of X.) Theorem 3.4 ([4, Corollary 2.5]). There is a polynomial-time algorithm that, given X ⊆ EndK(V ), decides if KhXi is nilpotent and, if not, returns a product of elements in X that is not nilpotent. The algorithm in [4] uses non-nilpotent elements to decompose the modules into direct summands. Instead of module isomorphisms we construct principal isotopisms; instead of direct summands we use orthogonal factors. We capture the key recursive step with the following technical definition. Definition 3.5. Fix f0 : U0 → V0. A partial f0-isotopism of bimaps U∗ and V∗ is an isotopism g∗ = (g2, g1, g0) defined on the restriction to some orthogonal factors of U∗ and V∗, and such that g0 = f0. A partial f0-isotopism is maximal if it is not a restriction to proper subspaces of another partial f0-isotopism. The idea is to build a (possibly nilpotent) ring from two sets of adjoint-morphisms. If this ring contains an invertible element, then we find the desired principal iso- topism. Following [4], we propose Algorithm 2 to construct a maximal partial isotopism. ∗ )); Y ← Basis(Adj(V f0 Algorithm 2 Partial Principal Isotopism Input: bimaps U∗ and V∗, and an isomorphism f0 : U0 → V0. Output: a maximal partial f0-isotopism. 1: X ← Basis(Adj(U∗, V f0 ∗ , U∗)). 2: A ← Khxy : x ∈ X , y ∈ Yi ⊂ End(U2) × End(U1)op. 3: For i = 1, 2, U − 4: while A has z = xyw not nilpotent with x ∈ X and y ∈ Y do i = ker zn ⊕ im zn. fi ← fi ⊕ resim zn (x). 1 , f0 : U0 → V0). fi ← 0. Find n > 0 such that, for i = 1, 2, U − i ← ker zn; U + U − Restrict A to ker zn. 7: 8: return f∗ = (f2 : U + i ⊕ im zn; 2 , f1 : U + i ← U + 2 → V + i ← Ui; U + 1 → V + i ← 0; 5: 6: TESTING ISOMORPHISM OF GRADED ALGEBRAS 9 Proposition 3.6. Algorithm 2 is deterministic and constructs a maximal f0-isotopism in polynomial time O((dim U∗)2ω log2 K). Proof. The objective of the algorithm is to find an invertible element of Adj(U∗, V f0 ∗ ). To do this, we first create a (possibly non-unital) algebra A in Line 2 by composing the sets of homomorphisms created in Line 1. Observe that composition in the second variable is in the op-ring End(U1)op. First, note that A ⊂ M(U∗). Secondly, if f0 extends to an isotopism f∗ : U∗ → V∗ then (f2, f −1 ∗ , U∗); in particular, A contains units. However, finding a unit of A does not guarantee that we can extract an invertible element of Adj(U∗, V f0 1 ) ∈ Adj(U∗, V f0 2 ) ∈ Adj(V f0 ∗ ) and (f1, f −1 ∗ ). We claim that the loop starting in Line 4 maintains the following invariants: for is an orthogonal decomposition of Ui; and (f2, f1, f0) is i ∈ {2, 1}, Ui = U + a partial f0-isotopism. Clearly, this is true at the start. i ⊕ U − i By its construction in Line 4, clearly z ∈ M(U∗), and so zn ∈ M(U∗). Note, for every b ∈ M(U∗), the decomposition Ui = ker b ⊕ im b is orthogonal. Therefore we maintain throughout an orthogonal decomposition Ui = U + i . Furthermore, by Fitting's lemma, zn is invertible on im zn. The guard of the loop in Line 4 is a call to Theorem 3.4, which provides x ∈ Adj(U∗, V f0 ∗ ) such that z = xyw. As zn is invertible on im zn, and zn = x··· , it follows that x is injective on im zn. Since all spaces are finite, this injection is a bijection. Therefore the extension of fi by the restriction of x to the image of zn remains a partial f0-isotopism, as required. i ⊕ U − Finally, the loop continues while A contains a non-nilpotent element. Thus, the partial f0-isotopism is maximal and the output is correct. The major work is solving the system of linear equations in Line 1; this results (cid:3) in the complexity stated in the theorem. Remark. In many settings, invertible elements of Adj(U∗, V f0 ∗ ) may be found by random search with high probability, but there are examples that require an ex- ponential number of samples to return an invertible element. Nevertheless, once Adj(U∗, V f0 ∗ ) is constructed, it is sensible to test a small number of random ele- ments. The following is now immediate. Theorem 3.7. There is a deterministic, polynomial-time algorithm to solve Prin- cipalIsotopism. We are finally ready to present Algorithm 3, the main result of this section. Viewing the group G in Line 4 of this algorithm as a parameter, the following is an immediate consequence of the results and algorithms of this section. Theorem 3.8. Algorithm 3 solves IsotopismCoset and runs deterministically in time O(G maxi{(dim Ui)2ω} log2 K), where G is the group in Line 4. 4. Testing isomorphism of graded algebras Our algorithm to decide isomorphism between graded algebras proceeds under the assumption that an isomorphism exists. If this does not occur then the test is aborted. A standard mechanism to do this is to raise an exception. This means that all further steps are aborted and the algorithm backtracks to the nearest place that can handle the exception. Recall from Proposition 2.3 that we assume an algebra A∗ is graded by a monoid M that has size polynomial in dim A∗. 10 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON Algorithm 3 Isotopism coset Input: bimaps U∗ and V∗. Output: the coset Iso(U∗, V∗) of isotopisms U∗ → V∗. 1: Choose a permutation σ on {2, 1, 0} with dim U0σ minimized. 2: if dim U0σ 6= dim V0σ then return ∅. 3: Choose any isomorphism f0σ : U0σ → V0σ. 4: Choose G such that Aut(U∗)U0σ 6 G 6 Aut(U0σ). 5: I ← ∅. 6: for all g ∈ G do /* Algorithms 1 & 2 */ Find the coset C of isotopisms h∗ : U∗ → V∗ with h0σ = gf0σ. I ← I ∪ C. 7: 8: 9: 10: return I /* see Section 7 */ 4.1. Extending isotopisms to graded isomorphisms. The isomorphism algo- rithm proceeds by attempting to extend isotopisms between the bimaps obtained by restricting the given products to certain fixed homogeneous components. We there- fore begin by considering the necessary extension problem; our solution is summa- rized in Algorithm 4. As A∗ and B∗ are generated in degrees T , we assume that we have a homotopism whose restriction to T , namely fT = {(ft : At → Bt) : t ∈ T}, is defined. Our task is to extend fT to a graded algebra homomorphism f∗ : A∗ → B∗. For s ∈ M \ T , define A⊗s := Ms = s1 + s2, si /∈ {0, s} As1 ⊗ As2 ⊂ A∗ ⊗ A∗. Given s ∈ M , we can construct {(s1, s2) ∈ M × M : s = s1 + s2} in at most M2 6 (dim A∗)2 steps. Define f⊗s := Ms = s1 + s2, si /∈ {0, s} fs1 ⊗ fs2 ∈ Hom(A⊗s, B⊗s), where fs1 ⊗ fs2 is defined component-wise on As1 ⊗ As2 . For s ∈ M , let ≺s = {u ∈ M : u ≺ s}. For R ⊂ M , write R ≺ s if r ≺ s for every r ∈ R. If A∗ is generated in degrees T , then setting s =Pt∈T t implies that T ≺ s. O(M(dimA∗)2ω log2 K). Proposition 4.1. Algorithm 4 is correct and runs deterministically in time Proof. Consider first the correctness of the algorithm. Observe that f∗ : A∗ → B∗ is a graded homomorphism if, and only if, for all s and t, (fs, ft, fs+t) is a homotopism from the bimap As × At ֌ As+t to Bs × Bt ֌ Bs+t. We claim that the loop starting on Line 2 has the following invariants: (i) R is an interval closed set of indices; (ii) for all r ∈ R, the map fr : Ar → Br is defined; and (iii) for all r, r′ ∈ R, if r + r′ ∈ R, then (fr, fr′, fr+r′) is an isotopism from The loop terminates when R = M , so f∗ : A∗ → B∗ is defined and is consequently a graded algebra isomorphism. Ar × Ar′ ֌ Ar+r′ to Br × Br′ ֌ Br+r′. TESTING ISOMORPHISM OF GRADED ALGEBRAS 11 Algorithm 4 Extending Homotopisms Input: finite M -graded K-algebras A∗ and B∗ generated in degrees T ⊂ M , and fT = {(ft : At → Bt) : t ∈ T} such that for every t, r ∈ T with t + r ∈ T , the triple (ft, fr, ft+r) is a homotopism from Ar × At ֌ Ar+t to Br × Bt ֌ Br+t. Output: an algebra homomorphism f∗ : A∗ → B∗ extending fT , or raise an excep- tion if fT does not extend to an algebra homomorphism. 1: R ← T . 2: while R 6= M do 3: 4: 5: 6: 7: 8: 9: Choose s ∈ M \ R such that {r ∈ M : r ≺ s, r 6= s} ⊂ R. Induce πs,A∗ : A⊗s → As and likewise πs,B∗ : B⊗s → Bs. Compute ker πs,A∗ and ker πs,B∗ . if (ker πs,A∗ )f⊗s 6 ker πs,B∗ then s,A∗ · f⊗s · πs,B∗ ∈ Hom(As, Bs). fs ← π−1 R ← R ∪ {s}. raise exception no extension exists at s. else 10: 11: return f∗. Consider any s selected in Line 3. Since A∗ is generated in degrees T , and T ⊂ R, it follows that πs,A∗ is surjective and As ∼= A⊗s/ ker πs,A∗ . The same holds for B∗. By our choice of s, for every s1, s2 /∈ {0, s} with s = s1 + s2, fs1 and fs2 are defined, so f⊗s is defined. If (ker πs,A∗ )f⊗s 6 ker πs,B∗ , then we may induce fs : As → Bs on the generators of As as follows: for as1 ∈ As1 and as2 ∈ As2 , (as1 ◦ as2 )fs := (as1 ⊗ as2 )f⊗s ≡ as1fs1 ◦ as2 fs2 mod ker πs,B∗ . Conversely, if f≺s extends to a graded isomorphism f∗ : A∗ → B∗, then fs is defined as above. Thus, if (ker πs,A∗ )f⊗s 66 ker πs,B∗ we conclude that {ft : t ∈ T} does not extend, and raise an exception to abort all subsequent steps. Next, we analyze the timing. The loop executes at most M ∈ (dim A∗)O(1) iterations, and the timing in each one is dominated by the computation of ker πs,A∗ and ker πs,B∗ and the subsequent membership test in the latter. Each requires solving systems of linear equations in (dim As)2 variables. In total this takes (cid:3) O(Ps(dim As)2ω log2 K) steps, as stated. 4.2. The isomorphism test. For an M -graded algebra A∗ and S ⊂ M , define AS =Ls∈S As; for a graded homomorphism f∗, define fS =Ls∈S fs. Algorithm 5 is our isomorphism test for graded algebras. The mechanism for selecting S in Line 1 is discussed in Section 4.3. Proposition 4.2. Algorithm 5 is correct. Proof. If f∗ : A∗ → B∗ is a graded isomorphism, then the restriction  Mt∈T ft, Ms∈S fs, Ms∈S,t∈T fs+t  12 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON Algorithm 5 Graded Isomorphism Coset Input: finite M -graded algebras A∗ and B∗ generated in degrees T ⊂ M . Output: the coset of graded isomorphisms A∗ → B∗, or ∅ if A 6∼= B. 1: Choose ∅ 6= S ⊂ M . 2: Restrict multiplication in A∗ to obtain the bimap AT × AS ֌ AS+T . 3: Similarly, obtain the bimap BT × BS ֌ BS+T . 4: I ← Iso(AT × AS ֌ AS+T , BT × BS ֌ BS+T ), using Algorithm 3. 5: Γ ← {f∗ : A∗ → B∗ : f∗ extends some (fT , fS, fS+T ) ∈ I}, using Algorithm 4. 6: return Γ. /* see Section 4.3 */ is an isotopism from AT ×AS ֌ AS+T to BT ×BS ֌ BS+T . Since A∗ is generated in degrees T , for each s ∈ M \ T , fs is determined by fT =Lt∈T ft. In particular, f∗ = 1 if, and only if, fT = 1. Hence, the mapping fs+t  f∗ 7→ Mt∈T ft,Ms∈S fs, Ms∈S,t∈T is injective. The algorithm constructs the inverse image of this injection, and so returns the coset of graded isomorphisms A∗ → B∗. (cid:3) Proof of Theorem 1.1. We analyze the complexity of Algorithm 5. If the algorithm discovers that A∗ 6∼= B∗, then it terminates. Hence, the case that dominates com- plexity is A∗ ∼= B∗. Using Algorithm 3, I = Iso(U∗, V∗) is constructed in time O(min{ Aut(AT ), Aut(AS), Aut(AS+T )}(dim A∗)2ω log2 K), and hence in time O( Aut(AS+T )(dim A∗)2ω log2 K). The remaining time to construct Iso(A∗, B∗) is O(I). Observe that I = Aut(U∗) 6 M(U∗)× · Aut(AS+T ). The complexity stated in Theorem 1.1 now follows by substituting T = {1} and S = {s}, where s is the largest positive integer such that As+1 6= 0. 4.3. Selecting optimal indices. We now discuss the issue left open in Line 1 of Algorithm 5: how to choose the subset, S, of optimal indices. Our aim is to predict the order of (cid:3) Aut (AT × AS ֌ AS+T ) without computing it. This allows us in Line 1 of Algorithm 5 to sample several subsets S to find a selection whose estimated work is either minimal, or below an acceptable threshold. If U∗ is the bimap AT × AS ֌ AS+T , then by definition there is an exact sequence (4.3) (4.4) from which we immediately obtain the bound 1 → M(U∗)× → Aut(U∗) → Aut(U0), Aut(U∗) 6 M(U∗)× · q(dim U0)2 . This bound suffices to prove our main theorems, but more precise bounds on Aut(U∗) can be obtained with additional work. We include a brief discussion here both because our implementation uses the better bounds, and also because future analyses of the complexity of our algorithm for specific families of inputs may require them. TESTING ISOMORPHISM OF GRADED ALGEBRAS 13 In [7, Theorem 3.2] a property of autotopisms is given which leads to a general bound on Aut(U∗). However, a better bound using the rings defined in Section 2.5 may be derived from the exact sequences in [23, Theorem 1.2]. Let Out(R) be the group of outer automorphisms of a ring R. If R is equipped with an involution a 7→ ¯a, then R# = {a ∈ R : a¯a = 1} denotes its group of unitary elements, and Out#(R) is the subgroup of Out(R) commuting with the involution. Proposition 4.5. For a bimap U∗ = (U2, U1, U0,◦) the following holds: 6 Aut(U∗) 6 T (U∗)× · Out(T (U∗)) · min{AutT (U∗)(Ui) : 0 6 i 6 2}. If U∗ is weakly Hermitian then T (U∗) and C(U∗) are rings with involutions, and T (U∗)× C(U∗)× T (U∗)# C(U∗)# 6 ΨIsom(U∗) 6 T (U∗)# · Out#(T (U∗)) · min{AutT (U∗)(Ui) : 0 6 i 6 2}. Each bound can be computed in time polynomial in P2 5. Proof of Theorem 1.2 i=0 dim Ui. The efficiency of our test for isomorphism between graded algebras A∗ and B∗ depends critically on two conditions: first, we can find a homogeneous component AS+T of moderate size; secondly, the order of Aut(AT × AS ֌ AS+T ) is manage- able. In this section, we consider a natural family of nilpotent Lie algebras whose basic parameters illustrate the performance of our isomorphism test. In doing so we prove Theorem 1.2. Every nilpotent matrix Lie algebra L∗ 6 gl(V ) has a nontrivial 0-eigenspace V1. Recursively, for i > 1, let Vi+1 6 V so that Vi+1/Vi is the 0-eigenspace of the representation of L∗ on V /Vi. The flag 0 < V1 < . . . < Vℓ = V is denoted F (L∗). Conversely, associated to each flag F of V is a unique maximal nilpotent Lie subalgebra P(F )∗ 6 gl(V ) such that F (P(F )∗) = F . We say L∗ is dense if [L∗, L∗] = [P(F (L∗))∗, P(F (L∗))∗]. 5.1. Comparing results. Before presenting the proof of Theorem 1.2, we pause to compare its complexity to that of other algorithms for algebra isomorphism, and to other well known computational problems. It is helpful to use L-notation which we define in terms of logarithms to base q = K: Ln[α, c] = q(c+o(1))(log n)α(log log n)δ(0,α) , where δ(0, α) =(cid:26) 0 α = 0 1 α > 0 . This function interpolates between polylogarithms Ln[0, c] ∈ O((log n)c), polyno- mials Ln[1, c] ∈ O(nc), quasi-polynomials Ln[2, c] ∈ O(nc ln n), and so forth. For context, the heuristic estimates (in base e) for the cost to factor an integer n are Ln[ 1 2 , 1] for the quadratic sieve, and Ln[ 1 Assuming the size of the field is constant, the complexity of graded algebra 3 , 3p64/9] for the number field sieve. isomorphism in Theorem 1.1 is Ln[2, 1 2 ]. 14 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON We compare this to the general isomorphism test for Lie algebras presented in [11]. That algorithm must select the first homogeneous component L1. In the worst case -- where L∗ = L1 ⊕ L2 and dim L1 = r dim L∗ for some constant r 6 1 -- it exhaustively searches Aut(L1), resulting in a complexity of Ln[2, 1]. For cases in which dim L1 = r√dim L∗, however, the complexity improves to Ln[1, c]. This shows how the Hilbert series Pi(dim Li)xi of the input influences the complexity of [11]; as we explain below, the Hilbert series exerts an influence over the com- plexity of our algorithm that is both more subtle and more emphatic. Another recent approach to isomorphism [7, 23] can be applied to graded Lie algebras of class 2. This exploits invariant algebras of bimaps and is particularly effective when there are large automorphism groups. This method also has com- plexity ranging from a worst case of Ln[2, 1] down to nearly optimal run times of Ln[0, 2ω] for inputs such as generalized Heisenberg Lie algebras. Now, let us consider the complexity of our current algorithm as it appears in Theorem 1.2. First, ε measures the "area" occupied by the dense algebra L∗. The presence of a few large blocks around the middle of F (L∗) makes ε comparatively small, and hence slows down the performance of our algorithm. Secondly, m is the dimension of the smallest Ls+1 we encounter, subject to the product L1×Ls ֌ Ls+1 being nondegenerate (the condition s 6 1 + d/2 in the formula for m ensures this). As illustrated in Figure 1, small values of m2/ε correspond to super block diagonal layers near the middle that are as thin as possible. The dimensions of the possible layers are determined by the Hilbert series of the input. Figure 1. Contrasting the work to construct automorphisms Observe that the work to construct automorphisms by lifting from a fixed shaded layer is roughly qa2 , where q is the size of the field and a is the area of the shaded region (the dimension of the corresponding homogeneous component). The shaded area on the left of Figure 1 is roughly 3 times that on the right. Thus, if w is the work needed to search for automorphisms using the shaded region on the left, then using that on the right decreases the work to w1/9. 5.2. Multiplication tables. We work with L∗ as matrices relative to a basis ex- hibiting F (L∗), so elements of L∗ are block upper-triangular matrices with 0's on the diagonal. Although the specific entries in each block determine the structure of the algebra, much can be deduced simply by studying the block structure. For x ∈ L∗, denote by xst the block of x in (block) row s and (block) column t. For TESTING ISOMORPHISM OF GRADED ALGEBRAS 15 x, y ∈ L∗, the following is the general formula for the product on L∗:   X16s<t6d xst, X16u<v6d yuv  = X16s<u<t6d xsuyut − ysuxut. (5.1) Each product xsuyut − ysuxut may be specified by structure constants depending solely on (s, t); we demonstrate this below for d = 6. (As L∗ is generated in degree 1, we display only the structure constants for each product L1 × Ln ֌ Ln+1 for n = 1, . . . , 5.) x12 . x12 x23 −a† 1 x34 x45 x56 . . . x23 a1 . −a† 2 . . x34 x45 x56 x13 . a2 . −a† 3 . . . a3 . −a† 4 . . . a4 . . . −b† 1 . . x24 b1 . . −b† 2 . x35 x46 x14 . b2 . . −b† 3 . . b3 . . . . . −c† 1 . x25 c1 . . . c† 2 x36 x15 . c2 . . . . . . . −d† 1 x26 d1 . . . . x16 . . . . . This example illustrates two competing tensions that determine our success. On one hand, we want to select s such that Aut(L1 × Ls ֌ L1+s) is small. This occurs when the corresponding product has the most constraining equations, which happens generically when s is small. On the other hand, our method to compute Aut(L1 × Ls ֌ L1+s) requires that we list Aut(L1+s), and the order of this group tends to decrease as s increases. This explains why the best choice of s is typically near the middle. 5.3. Estimating Aut(L1 × Ls ֌ L1+s). To prove Theorem 1.2 it suffices to consider the bound on Aut(L1 × Ls ֌ L1+s) arising from the exact sequence (4.3). In particular we show that if s 6 1 + d/2, then the choice U∗ = (L1, Ls, L1+s, [, ]) of homogeneous component in Theorem 1.1 leads to the complexity stated in The- orem 1.2. Put U2 := L1, U1 := Ls, and U0 := L1+s. It suffices to establish the bounds (5.2) M(U∗)× 6 qd2 6 L1/ε, Aut(U0) 6 qm2d2 6 Lm2/ε. We first make an observation. If X i As suggested in Section 4.3 we can derive more subtle bounds by applying Propo- sition 4.5, but the analysis offers little insight into the complexity of our algorithm. 0,◦i) (i = 1, 2) are two bimaps on a common domain X2×X1, but with possibly different codomains and products, then we can define a new bimap Y∗ = X 1 ∗ as follows. Put Y2 := X2, Y1 := X1, Y0 := X 1 ∗ ∩ X 2 0 , and define ◦ : Y2 × Y1 ֌ Y0 by ∗ = (X2, X1, X i 0 ⊕ X 2 y2 ◦ y1 := (y2 ◦1 y1) ⊕ (y2 ◦2 y1). ∗ ∩ X 2 Note that M(X 1 U∗ as Ti U i To compute M(U∗) we solve equations of the form F A = AG†, where A is a ∗, thereby making it simpler to compute the ring of adjoints. ∗ ), so selecting a basis for U0 decomposes ∗ ) = M(X 1 ∗ )∩M(X 2 matrix of structure constants of U∗ of the form . (5.3) A =   a1 . . . . −a† 1 . . . . . . . . . . −a† ℓ .   aℓ . 16 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON We caution that our illustration shows the structure constants for a typical con- figuration but changing the numbers of blocks both changes the number of boxes and alters their positions. To solve this system of equations, we decompose U∗ into terms U i ∗ using the block structure, as follows: a1 . . . . −a† 1 . . . .   . . . . . . . −a† ℓ aℓ .   = −a† 1 .   a1 . . . . . . . . . . . . . . .   . . ∩ ··· ∩ . . . . . . . . . . . . . . . . . −a† ℓ aℓ .   .   This is not precisely a decomposition into the blocks U i ∗ because each term on the right hand side is padded with zeros, thereby defining a degenerate extension U i i ) is straightforward: ∗ of the desired U i . . . ∗. However, the relationship between M( U i 1)⊥(cid:1) × Hom(cid:0)U i  ,   M( U i ∗) = M(U i ∗) + Hom(cid:0)U i =     M       Crucially, the positions of the zeros in the matrices of the M(U i Recalling that M(U∗) =Ti M(U i ∗ . ∗ . −γ† ∗ ∗) we discover that   2, (U i . α . . γ . . β . . δ . ∗ . ∗ ∗ . ∗ ∗ . ∗ ∗ . ∗ ∗ . ∗ ∗ . ∗ ∗ . ∗ ∗ . ∗ . δ† . −a† i ai . . . . . . . . . 1, (U i ∗) and M(U ∗ 2)⊥(cid:1) , and       ∗ . −β† ∗ . ∗ . α† . ∗ . ∗ . ∗ . ∗) shift as i changes. α0 β1 α1 M −a† 1     a1 . . . . . . . . . . . . . . −a† ℓ ∼=     aℓ .     Here, αi is an (ei × ei)-matrix where ei = dim U i is a (eℓ−1 × eℓ)-matrix. Hence, 1, β1 is a (e1 × e2)-matrix, and β2 . . . αℓ−1 β2 αℓ .     e2 i . ℓ Xi=1 (5.4) dimM(U∗) 6 e1 · e2 + eℓ−1 · eℓ + We remark that the specific entries αi are further constrained, since they are ad- joints of the individual bimaps U i ∗. Finally, we observe that ei = dim Vi − dim Vi−1, where 0 = V0 < V1 < ··· < Vℓ = V is the fixed point flag for L∗, from which the desired bound M(U∗)× 6 L∗1/ε in (5.2) follows. The bound on Aut(U0) is straight-forward, since dim U0 = dim L1+s = didi+s+1. s Xi=1 Thus, Aut(U∗) 6 L∗1/ε·L∗m2/ε, so Theorem 1.2 now follows from Theorem 1.1. 5.4. Number of isomorphism types. An immediate bound to the number of isomorphism types in Fq(d1, . . . , dℓ) is provided by the number of partitions, which grows exponentially in the dimension. Having fixed the partition, the number of isomorphism types among dense subalgebras is also large. To see this, observe that blocks yield numerous characteristic subalgebras. We can, for example, remove TESTING ISOMORPHISM OF GRADED ALGEBRAS 17 rows and columns resulting in characteristic quotients. If P(F ) is symmetric along the anti-diagonal, then we must remove both rows and columns; otherwise we can remove these independently. By removing sufficiently many rows/columns, we may assume that the partition has three parts. The number of isomorphism types for algebras based on such partitions may be estimated using arguments similar to those of Higman and Sims [2, Chapter 2] and suffice for the bound stated in Theorem 1.2. 6. Pseudo-isometries The occasional presence of symmetry provides an opportunity to improve the complexity of our isomorphism test for graded algebras. For example, if A∗ is a commutative algebra generated in degrees T , then the map AT × AT ֌ AT +T is symmetric; if A is a Lie algebra, then AT×AT ֌ AT +T is alternating. In such cases, the group of graded automorphisms of A∗ embeds in ΨIsom(AT × AT ֌ AT +T ), the group of pseudo-isometries defined in Section 2.4; typically this is a proper subgroup of Aut(AT × AT ֌ AT +T ). To take advantage of this observation, we must lift elements of Aut(AT +T ) directly to ΨIsom(AT × AT ֌ AT +T ) rather than to Aut(AT × AT ֌ AT +T ). Ivanyos and Qiao [14] devised an algorithm to do this. Our objective is to solve the following problem. PseudoIsometryCoset Given: weakly Hermitian bimaps U∗ and V∗. Return: the coset of all pseudo-isometries of f∗ : U∗ → V∗. Once again, we first consider the restricted version of the problem that arises by insisting that maps induce the identity on the codomain. The analogue of a principal isotopism in this weakly Hermitian context is an isometry. Definition 6.1. Let U∗ and V∗ be weakly Hermitian bimaps. If h : U0 → V0 is a linear isomorphism, then U∗ and V∗ are h-isometric if there is a pseudo-isometry f∗ : U∗ → V∗ with f0 = h. If U∗ = V∗ and h = 1, then Isom(U∗) is the isometry group of U∗. Consider the following problem and its coset analogue. IsometryGroup Given: a weakly Hermitian bimap U∗. Return: generators for Isom(U∗). IsometryCoset Given: weakly Hermitian bimaps U∗, V∗ and a linear isomorphism h : U0 → V0. Return: the coset of all isometries from U∗ → V∗ extending h. Polynomial-time solutions to IsometryGroup and IsometryCoset when K has odd characteristic appear in [8, Theorem 1.2] and [14], respectively. We combine these and an adaption of Algorithm 3 to solve PseudoIsometryCoset. 18 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON 7. Heuristics The family of graded Lie algebras described in Section 5 illustrates decisively the importance of the overarching "layer selection" philosophy of our approach. In this section, we assume that we have chosen a bimap U∗ = (U2, U1, U0,◦), and consider the problem of constructing its group of autotopisms. In Line 4 of Algorithm 3, we have a bimap U∗ = (U2, U1, U0,◦) and we must choose a group G with Aut(U∗)U0 6 G 6 Aut(U0). Without further information, we are forced to choose G = Aut(U0), a group which is often too large to search exhaustively. In this section we introduce heuristics to cut down the order of G. One idea is to compose U2 × U1 ֌ U0 with projections π : U0 → K c and record ∗ : U2 × U1 ֌ K c. Thus, we label isotopism invariants of the resulting bimap U π subspaces of the dual space U † 0 = HomK(U0, K). There are O(Kc(dim U0)) sub- spaces of dimension c, by contrast to the O(K(dim U0)2 ) elements of Aut(U0) we would otherwise be forced to list. It is therefore reasonable to list and label the former for small values of c. One then chooses G as the subgroup of Aut(U0) that preserves labels. In practice, we treat the projective geometry of U † 0 as a complete, colored graph, where vertices and edges are colored according to isotopism invariants. We then construct G as the automorphism group of the colored graph. Since no polynomial- time algorithm is known to construct the automorphism group of a graph, we cannot satisfactorily bound the complexity of this task. In practice, the construction of the graph is the more expensive task since the NAUTY algorithm [15] is extremely fast on generic graphs. Of course, there is no guarantee that G is a proper subgroup of Aut(U0). We discuss this matter further in Section 8. We now describe our labels for the points (vertices) and lines (edges) of U † 0 . We also examine another heuristic technique called fingerprinting that was first introduced in [13]. 7.1. Vertex labels. For each epimorphism π : U0 → K, we define a K-bilinear In particular, if we fix bases for U2 ∼= K a×1 and U1 ∼= K 1×b, then form U π ∗ . ∗ : K a × K b ֌ K is represented by its Gram matrix D ∈ K a×b defined by U π (ei ∗ ej)π = eiDej. Base changes to U2 and U1 leave the rank of the Gram matrix unchanged. We use the rank of D to label hπi ∈ P(U † 7.1.1. Examples. To illustrate subtleties arising from vertex labels, we consider two alternating bimaps K 4 × K 4 ֌ K 3 specified by systems of alternating forms. Let 0 ); this can be computed using [21]. 0 0 0  D =  0 1 0 −1 0 0    0 0 1 0 −1 0 0  E =     0 1 0 −1 0 0 0 0 1 0 −1 0 0 0 0 0 , 0 0 0 0  0 −1 0 0 , 0 0 0 1  0 −1 0 0 0 0 0 0 0 0 1 0 0 0 0 0     0 0 0 ,   0 0 0 0 0 1    0 0 0 0 −1 0 0 ,   0 0    0 −1 0 0 0 0 0 0 0 0 1 0 0 0 , . 0 0 0 0 TESTING ISOMORPHISM OF GRADED ALGEBRAS 19 In each case the dual space Hom(K 3, K) determines a projective plane. For each point P = (x1 : x2 : x3) in the plane we obtain matrices (mod K ×), (mod K ×). MD(P ) ≡ x1D[1] + x2D[2] + x3D[3] ≡  ME(P ) ≡ x1E[1] + x2E[2] + x3E[3] ≡  0 −x1 0 0 0 −x1 0 −x3 x1 0 0 x2 −x2 0 −x3 −x1 0 x1 0 x2 −x2 0 −x1 0 0 x3 x1 0 x3 0 x1 0     As indicated, these matrices are unique up to nonzero scalars, and scalars do not affect their ranks. Since MD(P ) and ME(P ) are nonzero and alternating, the only possible ranks are 2 and 4, distinguished by whether the determinants 1x2x3 + x2 det(MD(P )) = x4 1, 2x2 3 det(ME(P )) = x4 1 + 2x2 are zero or nonzero. Hence, the points of rank 2 for D lie on the hyperplane at infinity, namely (0 : 0 : 1) + (0 : 1 : 0), while all other points have rank 4. For E, the only rank 2 points with x1 = 0 satisfy x2x3 = 0, so there are just two, namely (0 : 1 : 0) and (0 : 0 : 1). The remaining rank 2 points have the form (1 : a : −1/a) for a ∈ K ×. Hence, there are also K + 1 total points of rank 2, but they clearly do not lie on a line. We illustrate the situation for the field of order 3 in Figure 2. It follows that the alternating bimaps defined by the systems D and E are not pseudo-isometric, a fact that will be transparent when we consider line labels. 7.2. Line labels. For each epimorphism λ : U0 → K 2, we consider the composition U λ ∗ : U2 × U1 ֌ U0 → K 2. Choices of bases for U2, U1, U0 determine pairs of matrices associated to U λ ∗ , and the label of hλi is a polynomial invariant derived from this pair. Characterizations of indecomposable pairs of matrices defined over the complex numbers were given by Kronecker and later for arbitrary fields by Dieudonn´e [10]. Using [10], Scharlau [17] characterized indecomposable skew-symmetric pairs. The reduction to indecomposable pairs is accomplished by computing a fully-refined orthogonal decomposition of U λ ∗ using an algorithm of Wilson [20]. Based on Scharlau's characterization, the aforementioned polynomial invariant for alternat- ing pairs was first introduced by Vishnivitskiı [19] for prime fields. It was later shown in [5, Theorem 3.22] to determine alternating pairs up to pseudo-isometry over all finite fields. The invariant may be adapted to determine all U λ ∗ up to autotopism. There are two consequences. First, the best possible labels for the lines of our projective geometry can be computed efficiently using the algorithm of [5]. Sec- ondly, there is a far greater variety of possible line labels than there are point labels, and so the study of lines may reveal significant global constraints. 7.2.1. Examples, revisited. Although the bimaps D and E in Section 7.1.1 are too small to illustrate great variability, we already begin to see differences in behaviour. We illustrate this for the field of order 3 in Figure 2. For bimap D there are only two line labels. The first (colored green) labels the single line at infinity 20 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON 001 012 011 102 112 122 101 111 121 010 100 110 120 2 4 2 2 4 4 4 4 4 4 2 4 4 4 2 2 4 4 4 4 4 4 2 4 2 4 Figure 2. On top is the geometry P G(2, 3) labeled by homoge- neous coordinates. The labeled and colored versions corresponding to bimaps D and E are shown on the left and right, respectively. (0 : 0 : 1) + (0 : 1 : 0), and the other lines are all labeled the same (colored red). For the bimap E there are three labels (colored blue, green, and red). 7.3. Fingerprinting. This process was introduced in [13] in the context of con- structing automorphism groups of p-groups. Here, we examine it in more detail and generalize it to our setting. First, consider a linear map f : V → W . Every subspace of V is mapped to a subspace of W , and the preimage of a subspace of W is a subspace of V . This cor- respondence is order-preserving and allows us to compare the projective geometries of V and W . Next, consider a bilinear map U∗ : U2 × U1 ֌ U0. We compare subspaces of U2 ⊗ U1 and U0. Since most of the elements of U2 ⊗ U1 are not pure tensors, the preimages that are pure tensors provide a largely ad hoc distribution of subspaces. This presents an opportunity to discover properties of U∗ that can be used to distinguish between bimaps. Definition 7.1. The left idealizer of S 6 U0 is λ(S) = {u2 ∈ U2 : u2 ◦ U1 6 S} and the right idealizer is ρ(S) = {u1 ∈ U1 : U2 ◦ u1 6 S}. These are subspaces of U2 and U1, respectively. We collect some basic properties of idealizers (stated just for left idealizers). Lemma 7.2. For subspaces S and T of U0, the following hold: (i) S 6 T =⇒ λ(S) 6 λ(T ); (ii) λ(S ∩ T ) = λ(S) ∩ λ(T ); and TESTING ISOMORPHISM OF GRADED ALGEBRAS 21 (iii) λ(S) + λ(T ) 6 λ(S + T ). Since the subspaces λ(S) + λ(T ) and λ(S + T ) are typically distinct, there is an opportunity to discover hidden invariants of a bimap. Using λ and ρ, uniform incidences in the projective geometry PG(U0) may be lifted to create generically irregular structures known as subspace arrangements. These are more general con- figurations than the better known hyperplane arrangements studied by Bjorner [1] and others. This can help to break symmetries, allowing us to see differences in bimaps that have no other obvious distinctions. Let us define more carefully the objects we use. An (affine) subspace arrangement is a set of subspaces of a vector space. We define the idealizer arrangements of U∗ = (U2, U1, U0,◦) as follows: A2 = {λ(P ) : P ∈ PG(U0)} A1 = {ρ(P ) : P ∈ PG(U0)}. We can build other arrangements for U∗ by shuffling coordinates. One way to discover Aut(U∗)-invariant substructures is to compute the intersection numbers of the arrangement up to some rank. This is essentially what is described as a fingerprint in [13] and the algorithm described there is polynomial in U0. One could, however, use more refined tools such as the Mobius function µ : PG(U0) × PG(U0) → Z, where µ(P, Q) =  1 λ(P ) = λ(Q), −Pλ(P )6X<λ(Q) µ(λ(P ), X) λ(P ) < λ(Q), otherwise. 0 8. Implementation and performance We have implemented our algorithms in Magma. The implementation utilizes various packages -- all publicly available on GitHub -- that have been developed by the authors and their collaborators [24]. The examples in Sections 7.1.1 and 7.2.1 show how our local heuristics expose global structures. Here we briefly report on experiments with our implementation that demonstrate their impact. 8.1. Twisted Heisenberg groups. Fix a prime p and odd integer k > 1. Put q := pk, A := Fq, and choose σ ∈ Gal(Fq). Define a product · on A, where x · y = xy + ixσyσ2 for x, y ∈ A. This turns A into a twisted Albert algebra, a nonassociative finite division algebra. Finally, define a bimap • : A2 × A2 ֌ A by u • v = u(cid:20) 0 1 −1 0 (cid:21) v†. p × F2k Over the ground field Fp, this gives a bimap F2k p, which can be encoded for computation as a system of k alternating forms of degree 2k. These bimaps arise from the twisted Heisenberg groups p ֌ Fk H(A) =    1 α γ 1 β 0 0 0  : α, β, γ ∈ A 1   . For various choices 1 < e 6 k, we now compose • with random ϕ ∈ Hom(F pk , Fpe) to obtain bimaps ◦ : F2k p, where u◦ v := u•ϕ v = (u• v)ϕ. The objective is to construct the group ΨIsom(◦). The default is to use the algorithm outlined in p × F2k p ֌ Fe 22 PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON Section 6 which requires us to list GL(e, p). An alternative is to build the projective geometry PG(e, p) and label its points and lines, as described in Section 7. Table 1 records information from experiments with our implementation. For dif- ferent choices of p, k and e, it records: the numbers of points and lines in PG(e, p); the approximate order of GL(e, p); the order of the subgroup Ω of GL(e, p) pre- serving the point and line labels; and finally the order of the subgroup Ψ of Ω that lifts to pseudo-isometries of ◦. For each choice of parameters, we performed 10 random trials and recorded the Ω and Ψ that occurred most often. (In fact, these numbers were the same for all runs.) p 3 3 3 5 5 k 5 5 6 5 5 e # points 3 4 4 3 4 13 40 40 31 156 # lines 13 130 130 31 806 GL(e, p) ≈ 104 ≈ 108 ≈ 108 ≈ 107 ≈ 1011 Ω 16 10 1 1 20 Ψ 2 10 1 1 20 Table 1. Experiments for the twisted Heisenberg groups We remark that other weaker (but more efficiently computed) invariants can be used to label the lines in our projective geometries. Often these suffice to discover structures that must be preserved by pseudo-isometries (or by autotopisms in more general applications). However, the weaker invariants do not distinguish quotients of twisted Heisenberg groups: all resulting line labels are identical. But, by using the invariants described in Section 7.2, the problem breaks completely. 8.2. Random nilpotent Lie algebras of class 2. If U∗ = (U2, U1, U0,◦) is a generic bimap -- which we loosely define to be one specified by an arbitrary selection of structure constants -- then the group induced by Aut(U∗) on U0 is usually very small, and is often trivial. In such cases, local invariants (even the weaker ones) almost always cut down to an overgroup containing the correct group as a subgroup of very small index. In Table 2, we mimic the experiments and reporting of Section 8.1, but this time we generate alternating bimaps ◦ : Fd p by selecting e random skew- symmetric d × d matrices over Fp. Once again, we select the most commonly occurring Ω and Ψ from 10 runs with each choice of parameters (d, p, e). p × Fd p ֌ Fe d 10 20 20 10 20 10 10 p 3 3 3 3 5 5 5 e # points # lines 13 3 13 3 130 4 5 1210 31 3 4 806 20306 5 13 13 40 121 31 156 781 GL(e, p) ≈ 104 ≈ 104 ≈ 108 ≈ 1011 ≈ 106 ≈ 1011 ≈ 1017 Ω 1 1 1 1 1 1 1 Ψ 1 1 1 1 1 1 1 Table 2. Experiments for Lie algebras of class 2 TESTING ISOMORPHISM OF GRADED ALGEBRAS 23 These tests suggest that, for generic bimaps, ΨIsom(◦) acts trivially on its codomain. The variation of the dimension, d, of the domain space has little impact on the outcome, but increasing e introduces more constraints and therefore makes it increasingly likely that ΨIsom(◦) acts trivially. As we see, the local invariants usually detect when this is the case. 8.3. Do the heuristics always work? The striking practical success of the local invariants raises the obvious question of whether we can strengthen the theoretical complexity of Theorem 1.1. If we label just points and lines, the answer is no: there exist alternating bimaps U∗ for which all points and lines are labeled identically, yet the group induced by ΨIsom(U∗) on its codomain U0 is a proper subgroup of Aut(U0); one such example appears in [18]. References [1] Anders Bjorner, Subspace arrangements, First European Congress of Mathematics, Vol. I (Paris, 1992), Progr. Math., vol. 119, Birkhauser, Basel, 1994, pp. 321 -- 370. MR1341828 [2] Simon R. Blackburn, Peter M. Neumann, and Geetha Venkataraman, Enumeration of finite groups, Cambridge Tracts in Mathematics, vol. 173, Cambridge University Press, Cambridge, 2007. MR2382539 [3] W. Bosma, J. Cannon, and C. Playoust, The Magma algebra system. I. The user language, J. Symbolic Comput. 24 (1997), no. 3-4, 235 -- 265. MR1484478 [4] Peter A. Brooksbank and Eugene M. Luks, Testing isomorphism of modules, J. Algebra 320 (2008), no. 11, 4020 -- 4029. MR2464805 (2009h:16001) [5] Peter A. Brooksbank, James B. Wilson, and Joshua Maglione, A fast isomorphism test for groups whose Lie algebra has genus 2, J. Algebra 473 (2017), 545 -- 590. MR3591162 [6] Peter A. Brooksbank and E. A. O'Brien, Constructing the group preserving a system of forms, Internat. J. Algebra Comput. 18 (2008), no. 2, 227 -- 241. MR2403820 (2009g:20020) [7] Peter A. Brooksbank and James B. Wilson, Groups acting on tensor products, J. Pure Appl. Algebra 218 (2014), no. 3, 405 -- 416. MR3124207 [8] , Computing isometry groups of Hermitian maps, Trans. Amer. Math. Soc. 364 (2012), no. 4, 1975 -- 1996. MR2869196 [9] David G. Cantor and Hans Zassenhaus, A new algorithm for factoring polynomials over finite fields, Math. Comp. 36 (1981), no. 154, 587 -- 592. [10] Jean Dieudonn´e, Sur la r´eduction canonique des couples de matrices, Bull. Soc. Math. France 74 (1946), 130 -- 146. MR0022826 (9,264f) [11] Bettina Eick, Computing the automorphism group of a solvable Lie algebra, Linear Algebra Appl. 382 (2004), 195 -- 209. MR2050106 [12] , Computing automorphism groups and testing isomorphisms for modular group al- gebras, J. Algebra 320 (2008), no. 11, 3895 -- 3910. [13] Bettina Eick, C. R. Leedham-Green, and E. A. O'Brien, Constructing automorphism groups of p-groups, Comm. Algebra 30 (2002), no. 5, 2271 -- 2295. MR1904637 (2003d:20027) [14] G´abor Ivanyos and Youming Qiao, Algorithms based on ∗-algebras, and their applications to isomorphism of polynomials with one secret, group isomorphism, and polynomial identity testing, SIAM Journal on Computing. [15] Brendan D. McKay, Practical Graph Isomorphism, Congr. Numer. 30 (1981), 45 -- 87. [16] Joshua Maglione, Efficient characteristic refinements for finite groups, J. Symbolic Comput. 80 (2017), 511 -- 520. MR3574524 [17] Rudolf Scharlau, Paare alternierender Formen, Math. Z. 147 (1976), no. 1, 13 -- 19. MR0419484 (54 #7505) [18] Libero Verardi, Semi-extraspecial groups of exponent p, Ann. Mat. Pura Appl. 148 (1987), no. 4, 131 -- 171. MR0932762 (89h:20033) [19] A. L. Vishnevetskiı, A system of invariants of certain groups of class 2 with commutator subgroup of rank two, Ukrain. Mat. Zh. 37 (1985), no. 3, 294 -- 300, 403. MR795568 (86k:20033) [20] James B. Wilson, Finding central decompositions of p-groups, J. Group Theory 12 (2009), no. 6, 813 -- 830. MR2582050 24 [21] [22] [23] PETER A. BROOKSBANK, E. A. O'BRIEN, AND JAMES B. WILSON , Optimal algorithms of Gram-Schmidt type, Linear Algebra Appl. 438 (2013), no. 12, 4573 -- 4583. MR3039211 , Division, adjoints, and dualities of bilinear maps, Comm. Algebra 41 (2013), no. 11, 3989 -- 4008. MR3169502 , On automorphisms of groups, rings, and algebras, Comm. Algebra 45 (2017), no. 4, 1452 -- 1478. MR3576669 [24] Peter A. Brooksbank, Joshua Maglione, E.A. O'Brien, and James B. Wilson, isomorphism tests, for multilinear TheTensor.Space: Repositories https://github.com/thetensor-space , 2019. algebra and Brooksbank, Department of Mathematics, Bucknell University, Lewisburg, PA 17837, USA O'Brien, Department of Mathematics, University of Auckland, Private Bag 92019, Auckland, New Zealand Wilson, Department of Mathematics, Colorado State University, Fort Collins, CO 80523, USA
1601.00207
1
1601
2016-01-02T18:51:26
Subrings of $\mathbb{C}$ Generated by Angles
[ "math.RA" ]
Consider the following inductively defined set. Given a collection $U$ of unit magnitude complex numbers, and a set initially containing just 0 and 1, through each point in the set, draw lines whose angles with the real axis are in $U$. Add every intersection of such lines to the set. Upon taking the closure, we obtain $R(U)$. We investigated for which $U$, $R(U)$ is a ring. Our main result holds for when $1 \in U$ and $|U| \ge 4$. If $P$ is the set of real numbers in $R(U)$ generated in the second step of the construction, then $R(U)$ equals the module over $\mathbb{Z}[P]$ generated by the set of points made in the first step of the construction. This lets us show that whenever the pairwise products of points made in the first step remain inside $R(U)$, it is closed under multiplication, and is thus a ring.
math.RA
math
Subrings of C Generated by Angles Juniper Bahr, Arielle Roth July 27, 2021 Abstract Consider the following inductively defined set. Given a collection U of unit magnitude complex numbers, and a set initially containing just 0 and 1, through each point in the set, draw lines whose angles with the real axis are in U . Add every intersection of such lines to the set. Upon taking the closure, we obtain R(U ). We investigated for which U , R(U ) is a ring. Our main result holds for when 1 ∈ U and U ≥ 4. If P is the set of real numbers in R(U ) generated in the second step of the construction, then R(U ) equals the module over Z[P ] generated by the set of points made in the first step of the construction. This lets us show that whenever the pairwise products of points made in the first step remain inside R(U ), it is closed under multiplication, and is thus a ring. 1 Introduction Suppose we are given a collection U of unit length elements of C. If we have some collection of points in C, we can draw lines through each of them with every angle in U (with respect to the real axis). In this way we can construct intersections of lines and repeat the process. Specifically, if we start with 0 and 1 in the complex plane and continue this construction forever until it is completed, when is the resulting collection of points a subring of the complex numbers? Note that even though we are drawing lines, only the intersection points are considered to be constructed. In [1], Buhler et al. motivated this construction with a discussion of origami where two folds can intersect to create a reference point. Definition 1.1. Let p, q, α, β ∈ C with α = β = 1. Define Lα(p) to be In other words, Lα(p) := p + Rα. Define the line through p with angle α. Iα,β(p, q) := Lα(p) ∩ Lβ(q) when α 6= ±β so that an intersection exists. Definition 1.2. Let U be a set of unit magnitude complex numbers. Set S0 = {0, 1}. For each n ∈ N, set Sn+1 = {Iα,β(p, q) α, β ∈ U , p, q ∈ Sn, and α 6= ±β}. We then define R(U ) = Sn∈N Sn. 1 Definition 1.3. T = {z ∈ C z = 1} which is viewed as a group under complex multiplication. T /{±1} will be used for the collection of angles, since α and β are considered equivalent iff α = ±β. Unless otherwise specified, U ⊆ T /{±1}. Definition 1.4. Given U ⊆ T /{±1}, we define all elements z ∈ R(U ) of the form Iα,β(0, 1) to be elementary monomials, i.e., length 1 monomials. Next, if m is a length k monomial, then Iα,β(0, m) ∈ R(U ) is a length k + 1 monomial. In this way we inductively define monomials. Proposition 1.5 ([1]). We can calculate Iα,β (p, q) as follows for p, q ∈ C and α 6= β ∈ T /{±1}. Iα,β(p, q) = [β, q] [β, α] α [α, p] [α, β] β + where [x, y] = x¯y − y ¯x and ¯z is the complex conjugate of z. Proposition 1.6 ([1]). We list some properties of Iα,β (p, q) below for w ∈ T /{±1} and r ∈ R. (Symmetry) Iu,v(p, q) = Iv,u(q, p) (Reduction) Iu,v(p, q) = Iu,v(p, 0) + Iv,u(q, 0) (Linearity) Iu,v(rp + q, 0) = rIu,v(p, 0) + Iu,v(q, 0) (Rotation) For w ∈ T /{±1}, wIu,v(p, q) = Iwu,wv(wp, wq). Lemma 1.7 ([1]). Let U ≥ 3 with 1 ∈ U . Then, R(U ) is closed under addition and additive inverses. Theorem 1.8 ([1]). Let U ≥ 3. R(U ) is the collection of integer linear com- binations of monomials. Remark. Since whenever U ≥ 3, R(U ) is a group under addition, we need only check closure under multiplication to ensure that R(U ) is a ring. The authors of [1] then studied the case when U is a group. Specifically, they took the set of unit magnitude complex numbers T (i.e., the unit circle) and considered it to be a group under complex multiplication. Then they took the quotient of T by {−1, +1}. The result can be viewed as the top half of the unit circle. By convention, whenever we use U , we will refer to U ⊆ T /{±1} where the elements are viewed as complex numbers. Theorem 1.9 ([1]). Let U be a subgroup of T /{−1, +1} with U ≥ 3. Then, R(U ) is a ring. In their paper, Buhler et al. observed that R(U ) maybe be a ring even when U is not a group. They left the question of what properties U must satisfy exactly for R(U ) to be a group open. 2 2 Three Angles In order to understand R(U ), first we looked at U = 3 with 0 ∈ arg(U ). We found that R(U ) has the structure of a lattice and can be understood in terms of one of the elementary monomials. Lemma 2.1. Let U = {1, u, v}. We claim that R(U ) is a lattice in C with the form R(U ) = Z + Iu,v(0, 1)Z. Proof. Set x = Iu,v(0, 1). From Lemma 1.7, we know that R(U ) is a subgroup of C with addition. Since 1 ∈ R(U ) and x ∈ R(U ), we clearly see that R(U ) ⊇ Z + xZ. We will prove the other containment with induction. We know that S1 = {x, 1 − x, 0, 1} ⊆ Z + xZ. Let p, q ∈ Sn, which is assumed to be in Z + xZ. Let α, β ∈ U . We claim that z = Iα,β(p, q) ∈ Z + xZ. Since Iα,β(p, q) = Iα,β(p, 0) + Iβ,α(q, 0), it suffices to prove that Iα,β (a + bx, 0) ∈ Z + xZ. Further note that Iα,β(a + bx, 0) = Iα,β (a, 0) + Iα,β(bx, 0) = aIα,β(1, 0) + Iα,β (bx, 0). by linearity. Iα,β(1, 0) ∈ S1, so Iα,β(1, 0) = 1, 0, x, or 1− x. There are only four choices since if one of the angles is 0 radians, the resulting point is 0 or 1. If α, β 6= 1, then there are two choices left, α = u, β = v or α = v, β = u. One of these yields the point x and the other yields (by the parallelogram law) 1 − x. Thus Iα,β(a, 0) ∈ Z + xZ. Next, note that Iα,β(bx, 0) = bIα,β(x, 0). Thus it suffices to prove that Iα,β(x, 0) ∈ Z + xZ. We have 6 cases. (u, v) Since x = ru for some r ∈ R, Iu,v(x, 0) = rIu,v(u, 0) = 0 ∈ Z + xZ. (v, u) Iv,u(x, 0) is the projection of x on to the line ru in the direction of v, but x ∈ Ru, so Iv,u(x, 0) = x. (u, 1) Iu,1(x, 0) is the projection of x on to the real axis in the direction of u. It is easy to see that this must be 0, since the line from 0 (which is on the real axis) extending in the u direction intersects x. (v, 1) Iv,1(x, 0) = 1, for a similar reason. The line extending from 1 (which is on the real axis) in the v direction intersects x. (1, u) I1,u(x, 0) is the line crossing through x + s and ru for s, r ∈ R, but since x ∈ Ru, this intersection is clearly at x. (1, v) I1,v(x, 0) is at x − 1 which is demonstrated by the fact that I1,v(x, 0) + Iv,1(x, 0) = x and Iv,1(x, 0) = 1. All of these points line in Z + xZ, so we have shown that R(U ) for U = 3 is of the form Z + xZ where x = Iu,v(0, 1). 3 Remark. Given U = {1, u, v}, if we find u′, v′ such that Iu′,v′ (0, 1) = m + Iu,v(0, 1) for m ∈ Z and set U ′ = {1, u′, v′}, by the above structural result R(U ) = R(U ′). Theorem 2.2 expands on this remark and show exactly when U and U ′ of size three generate the same lattice. Theorem 2.2. Let Iu,v(0, 1) = x and let Iu′,v′ (0, 1) = y. Let x = a + bi and y = c + di. Set U = {1, u, v} and U ′ = {1, u′, v′}. We claim that R(U ) = R(U ′) if and only if b = ±d and a ∓ c ∈ Z. Proof. Z + xZ = Z + yZ means that {m + nx m, n ∈ Z} = {p + qy p, q ∈ Z}. For arbitrarily m, n ∈ Z, m + nx ∈ {p + qy p, q ∈ Z} holds iff nx ∈ Z + yZ, which is equivalent to na + nbi = p + qc + qdi for some p, q ∈ Z. In order for this to hold, the imaginary parts must equal: nbi = qdi (for any n, there is some q). Thus d b (using n = 1). We can make the same argument swapping x and y, which tells us that b d, so b = ±d and thus n = ±q. Also, the real parts must be equal: na − qc = p (for any n there are such p, q). Above we determined that n = ±q, so n(a ∓ c) = p. Such a p exists for any n, so a ∓ c ∈ Z. We showed that if Z + xZ = Z + yZ, then b = ±d and a ∓ c ∈ Z. Now, if we assume that b = ±d and a ∓ c ∈ Z, then for any Z + xZ = m + na + nbi, we have m + na + nbi = m + n(k ± c) + n(±d)i = (m + nk) ± nc ± ndi ∈ Z + yZ. This shows that Z + xZ ⊆ Z + yZ. Likewise, Z + yZ ⊆ Z + xZ. and only if b = ±d and a ∓ c ∈ Z, so Z + xZ = Z + yZ. Since R(U ) = Z + xZ and R(U ′) = Z + yZ, we have that R(U ) = R(U ′) if Now that we understand what form R(U ) has for U = 3 with 0 ∈ arg(U ), we can easily show exactly when R(U ) is a ring. The only point that gives any difficulty is x, one of the two elementary monomials off of the real line. If we can square this point and the result lies in R(U ), then R(U ) = Z + xZ must be closed under multiplication. Now we characterize all U with 0 ∈ arg(U ) and U = 3 such that R(U ) is a ring. Theorem 2.3. Let U = {1, u, v} and let Iu,v(0, 1) = x. R(U ) is a ring if and only if x is a (non-real) quadratic integer, i.e., x is the root of some monic integer quadratic polynomial. Proof. First we will prove that if x is a quadratic integer, then R(U ) is a ring. Note that R(U ) = Z + xZ where x = Iu,v(0, 1). Since R(U ) is already a group, we need to show closure under multiplication. We write (a + bx)(c + dx) = ac + (bc + ad)x + bdx2. Since x is a quadratic integer, x2 = λx + µ for some 4 λ, µ ∈ Z. Then, (a + bx)(c + dx) = ac + (bc + ad)x + bd(λx + µ) = (ac + bdµ) + (bc + ad + bdλ)x so in fact R(U ) is closed under multiplication. Now assume that R(U ) is closed under multiplication. Then (a+bx)(c+dx) ∈ Z + xZ, but we can expand this: (a + bx)(c + dx) = ac + (bc + ad)x + bdx2 ∈ Z + xZ Since ac + (bc + ad)x ∈ Z + xZ, we know that bdx2 ∈ Z + xZ for every b, d ∈ Z. In particular, this holds for b = d = 1, so x2 ∈ Z + xZ. In other words, x must be a quadratic integer. Also, if x ∈ R, then our R(U ) is degenerate, so we need x /∈ R. We can compute the intersection point x in terms of arg(u) and arg(v) and rephrase Theorem 2.3. Corollary 2.4. Let arg(U ) = {0, θ, φ} with φ < θ. Then R(U ) is a ring if and only if tan θ + tan φ tan θ tan θ − tan φ is a quadratic integer. tan θ − tan φ Proof. We can see from the following figure that (1 + w) tan φ = h = w tan θ so w = tan φ tan θ−tan φ . i x h φ 1 θ w Immediately, we see also that h = tan φ tan θ tan θ−tan φ . Thus, x = tan θ tan θ − tan φ + tan φ tan θ tan θ − tan φ Remark. In [2], Nedrenco independently characterized R(U ) where U = 3, describing R(U ) = Z + xZ and generalized to when 0 /∈ arg(U ). In the same paper, Nedrenco also noted that R(U ) is dense when U = 4. We present what we found independently. 5 3 Four or More Angles Since we understood R(U ) for U = 3 in terms of an elementary monomial, we wish to understand R(U ) for U ≥ 4 in terms of elementary monomials. Because R(U ) is now dense in the complex plane, we cannot hope for an integral basis. By linearity if we have some p ∈ R ∩ R(U ), then Iα,β(0, p) = pIα,β(0, 1). This means we can scale points. This motivates our interest in "projections" on to the real axis. Proposition 3.1. Let U = {1, u, v, w} with arg(u) < arg(v) < arg(w) < π. There are at most eight length-two monomials on the real axis. There are at most five length-two monomials constructed from elementary monomials of the form Iα,β(0, 1) with arg(α) < arg(β). They are 0, 1, x, 1/x, x/(x − 1) where x = Iv,1(Iu,w(0, 1), 0). Proof. With the exception of 0 and 1, the only way to construct a length-two monomial on the real axis is to intersect a line through an elementary monomial and the line passing through 0 and 1. For any given elementary monomial, there are already two lines passing through the point: one passes through 0 and one passes through 1. Thus there can be at most 6 extra length-two monomials on the real axis, at most three of which created from z1, z2, z3 in the form described in the claim, and at most three of which created from 1− z1, 1− z2, 1− z3 which are of the opposite form. z3 z1 z2 1 p2 p6 p5 p3 0 1 − z2 p4 p1 1 − z1 1 − z3 Note that p1 = 1 − p4, p2 = 1 − p5, and p3 = 1 − p6. As proof, we calculate I1,α(0, Iβ,γ(0, 1)) = I1,α(0, 1 − Iγ,β(0, 1)) = I1,α(0, 1) − I1,α(0, Iγ,β(0, 1)) = 1 − I1,α(0, Iγ,β(0, 1)) Now we will show that the projections have the described form. Set x = p1. 1 = z1 . z2 = z1 . z2 Note that the triangle 0− p1− z1 is similar to the triangle 0− 1− z2, so p1 Also, the triangle 0 − 1 − z1 is similar to the triangle 0 − p2 − z2, so 1 Thus, p2 = 1/x. p2 6 z2 z3 z1 p3 0 p1 1 p2 z1 Next, the triangle 0 − p1 − z1 is similar to the triangle p3 − 0 − z3, so p3 . Also, the triangle 0− 1− z1 is similar to the triangle p3 − 1− z3, z3−p3 = p1 so z3−p3 = 1 z1 1−p3 . We conclude = x p3 1 1 − p3 p3 − 1x = p3 x p3 = (cid:12)(cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12)(cid:12) x − 1 To remove the absolute value signs, we note that since arg(z3) > arg(z1), the line through z3 with angle arg(z1) must intersect the negative real axis, so x−1 < 0, so we deduce that p3 = x/(x − 1). p3 < 0. Furthermore, since x < 1, x Now that we understand a small amount of R ∩ R(U ), we can quickly con- struct an entire ring inside R ∩ R(U ) with the scaling mentioned earlier. Later we will show that what we construct next is exactly R ∩ R(U ) Proposition 3.2. Let 0 ∈ arg(U ) with U ≥ 4. Let P be the set of length-two monomials on the real axis. For any x ∈ R(U ) and any p ∈ P , px ∈ R(U ). As a result, the ring Z[P ] is constructible, i.e., Z[P ] ⊆ R(U ). Proof. Let p be a projection. Since R(U ) is the collection of finite linear com- binations of monomials, it suffices to construct pm for a given monomial m, i=1 cimi for ci ∈ Z The proof that pm ∈ R(U ) follows from linearity. Formally, we rely on since if we have x ∈ R(U ), we can simply represent x = Pn and then write px = Pn i=1 ci(pmi). induction. Base Case: The length of m is one, so m = Iα,β(0, 1) for some α, β ∈ U . Then, pm = Iα,β(0, p) by linearity, which is in R(U ) since p ∈ R(U ). Inductive Step: Suppose every length n− 1 monomial satisfies the claim. Let m be of length n. Then, m = Iα,β(0, q) for some length n − 1 monomial q. By linearity, pm = Iα,β(0, pq) which is constructible since pq ∈ R(U ) by the inductive hypothesis. 7 Thus every monomial can be arbitrarily multiplied by projections, so in fact everything in R(U ) can be arbitrarily multiplied by projections. In particular, so can the projections themselves. This means that arbitrary powers of projections are in R(U ). Furthermore, since R(U ) is a group under addition, Z[P ] ⊆ R(U ). Remark. Since the above result does not rely on the previous two results, this holds even when U > 4. Our current goal is to characterize all monomials in terms of Z[P ] and el- ementary monomials. By Theorem 1.8, if the monomials have a nice enough form, we will be able to understand all of R(U ). Characterizing all monomials starts with the length two monomials. First, however, we need a quick lemma. Lemma 3.3. Let 0, α, β ∈ arg(U ). Let p, q ∈ R(U ), and let x = Iα,β(p, q) and y = Iβ,α(p, q). Then, x = p + q − y. Proof. Since the lines from x to q and from p to y are parallel, and also the lines from x to p and from q to y are parallel, this forms a parallelogram. It is clear that 0, x− q, p− q, and y− q form a parallelogram and that x− q + y− q = p− q, so x + y − q = p. p y α x β q Lemma 3.4. Let U ≥ 4 and let 0 ∈ arg(U ). Let P be the set of projections from the elementary monomials to the real axis along angles in U . Every length two monomial is a Z[P ]-linear combination of elementary monomials. Proof. Let z = Iα,β(0, 1) for some α, β ∈ U and let our length two monomial m = Iγ,δ(0, z). We will prove that m is a Z[P ]-linear combination of elementary monomials by cases. (δ = 1): Note that Iγ,0(0, z) + I0,γ(0, z) = z, so Iγ,δ(0, z) = z − I0,γ(0, z). Since I0,γ(0, z) ∈ P , m is a Z[P ]-linear combination of elementary monomials. 8 (δ = α): Since the line through z = Iα,β(0, 1) with angle arg(α) passes through the origin, m = Iγ,α(0, z) = 0. This is trivially a Z[P ]-linear combination of elementary monomials. (δ = β): Since the line through z = Iα,β(0, 1) with angle arg(β) passes through 1, m = Iγ,β(0, z) = Iγ,β(0, 1), which is an elementary monomial. (δ ∈ U \ {1, α, β}): Let p = I0,γ(0, z) be the projection from z to the real axis in the direction of γ. Note that Iγ,δ(0, p) = pIγ,δ(0, 1) by linearity. Set x = Iγ,δ(0, p). We that x + z − p = m, and since x = pIγ,δ(0, 1), this is enough to prove that m is a Z[P ]-linear combination of elementary monomials. Restated, the claim is that Iγ,δ(0, I0,γ(0, z)) + z − I0,γ(0, z) = Iγ,δ(0, z) To prove this, we will show that Iγ,δ(x, z) = m. This follows by the fact that x ∈ Rγ, so the line through x with angle arg δ also passes through 0 and thus Iγ,δ(x, z) = Iγ,δ(0, z) = m. Furthermore, Iδ,γ(x, z) = p. To see this, first note that Iγ,0(z, 0) = p. Also, Iδ,0(x, 0) = p, because Iδ,0(x, 0) = Iδ,0(Iγ,δ(0, p), 0) and both x and p lie along the same line through p with angle arg(δ) (by construction of x). This means that x and z lie on opposite corners of a parallelogram which has a corner at p through the real axis and another corner through m. Thus, 0, (x − p), (z − p), and (m − p) form the corners of a parallelogram and (x − p) + (z − p) = m − p so x + z − p = m, concluding the proof. Since in all cases m is a Z[P ]-linear combination of elementary monomials, we know that every length two monomial is of this form. Now that we understand length two monomials, we can apply induction to characterize all monomials, and thus all of R(U ). Theorem 3.5. Let 0 ∈ arg(U ). Let P be the set of projections of elementary monomials along lines with angles from arg(U ) on to the real axis. Then, ev- ery monomial in R(U ) is a Z[P ]-linear combination of elementary monomials. Indeed, R(U ) is the set of Z[P ]-linear combinations of elementary monomials. Proof. We will prove this by induction on the length of the monomial. Length one monomials are already elementary and length two monomials follow from the above theorem. Let m be length n and suppose that all length n−1 monomials 9 are of this form. Then, m = Iα,β(0, m′) k = Iα,β(0, cizi) X i=1 = = k X i=1 k X i=1 ciIα,β(0, zi)  ci ℓ X j=1 dixi   length two monomials are of this form. using linearity and the fact that all The ci and di are in Z[P ] and the xi and zi are elementary monomials. After simplification, it is easy to see that m is in fact a Z[P ]-linear combination of elementary monomials. Since everything in R(U ) is an integer linear combination of monomials, everything in R(U ) is a Z[P ]-linear combination of elementary monomials. Furthermore, since Z[P ] is constructible by Proposition 3.2, and pR(U ) ⊆ R(U ) for all p ∈ P , we can construct every Z[P ]-linear combination of ele- mentary monomials. Thus, R(U ) equals the set of Z[P ]-linear combinations of elementary monomials. Remark. We can alternatively say that R(U ) is a Z[P ]-module in C generated by the elementary monomials. As in the three-angle case, understanding the structure of R(U ) led us to understand when R(U ) is a ring in terms of products of elementary monomials. In fact Theorem 2.3 could probably be seen as a special case of the following theorem. Theorem 3.6. Let U with U ≥ 4 and 0 ∈ arg(U ) and let P represent the collection of projections. R(U ) is a ring if and only if every pairwise product of elementary monomials is a Z[P ]-linear combination of elementary monomials. Proof. First note that R(U ) equals the collection of Z[P ]-linear combinations of elementary monomials. We that the Z[P ]-linear combinations of elementary monomials are closed under multiplication if and only if every pairwise product of elementary monomials is a Z[P ]-linear combination of elementary monomi- als. Assume that every pairwise product of elementary monomials is as above. j=1 djyj for i=1 cixi and y = Pm Then, for any x, y ∈ R(U ), we write x = Pn ci, dj ∈ Z[P ] and xi, yj elementary monomials. mentary monomials, so is xy. Thus R(U ) is a ring. Then, xy = Pi,j cidjxiyj. Since xiyj is a Z[P ]-linear combination of ele- Now, suppose that R(U ) is a ring. It must be closed under multiplication, so the pairwise product of elementary monomials must be in R(U ), but R(U ) is the Z[P ]-linear combinations of elementary monomials, so the claim holds. 10 Since we have at least one projection p ∈ (0, 1), we can construct points close to zero. Because elements of R(U ) scaled by p are still in R(U ) and R(U ) is a group, it is actually dense in C as we will prove below. Theorem 3.7. If 1 ∈ U and U ≥ 4, then R(U ) is dense in C. Proof. Since R(U ) is the set of Z[P ]-linear combinations of elementary mono- mials, if z is a non-real elementary monomial and p ∈ Z[P ] ∩ (0, 1), we can construct pn and pnz which go to zero from, two different directions. Let ε > 0 and let x ∈ C. Since R(U ) is a group under addition, we can construct apN1 + bpN2z for all N1, N2 ∈ N. Since p ∈ (0, 1), we can find N2 such that (cid:12)(cid:12)Im(z)pN2(cid:12)(cid:12) < ε/2. To simplify the following expression, write θ = Im(z)pN2. Then there exists a unique b ∈ Z such that So we can show that b − 1 ≤ Im(x) θ ≤ b (cid:12)(cid:12)b Im(z)pN2i − Im(x)i(cid:12)(cid:12) = bθ − Im(x) ≤ ε/2 Likewise we can find a, N1 such that (cid:12)(cid:12)apN1 − (cid:0)Re(x) − bpN2 Re(p)(cid:1)(cid:12)(cid:12) < ε/2. Once we have such a ∈ Z and N1 ∈ N, we have (cid:12)(cid:12)apN1 + bpN2z − x(cid:12)(cid:12) = (cid:12)(cid:12)apN1 + bpN2 Re(z) − Re(x) + bpN2 Im(z)i − Im(x)i(cid:12)(cid:12) ≤ (cid:12)(cid:12)apN1 + bpN2 Re(z) − Re(x)(cid:12)(cid:12) + (cid:12)(cid:12)bpN2 Im(z) − Im(x)(cid:12)(cid:12) Since apN1 + bpN2z ∈ R(U ), and this holds for any x ∈ C and for every ε > 0, we can always find a point in R(U ) arbitrarily close to any point of C. Thus, R(U ) is dense in C. < ε 4 Some U for Which R(U ) Is a Ring Now we can use Theorem 3.6 to prove that R(U ) is a ring for a particular example of U . Example 1. Let U = {1, eiπ/6, eiπ/3, eiπ/2}. R(U ) is a ring. Proof. It suffices to show that all products of elementary monomials are Z[P ]- linear combinations of elementary monomials. Our elementary monomials are 0, 1, z1, z2, z3, 1 − z1, 1 − z2, 1 − z3, where 2√3 3 eiπ/6 z1 = z2 = √3eiπ/6 z3 = 2eiπ/3 11 Z[2/3, 3/2] = Z[1/3, 1/2] = Z[1/6]. First we calculate the projections and get 2/3, 3/2,−2. Note that Z[2/3, 3/2,−2] = We calculate all pairwise products of z1, z2, z3, since calculating more would be redundant, as the others are either 0, 1, or an integer linear combination of {1, z1, z2, z3}. 4 3 z2 1 = eiπ/3 = 2 3 z1z2 = 2eiπ/3 = z3 z3 z1z3 = = 4(z1 − 1) z3 = z3 eiπ/2 = 4i √3 2 3 4 √3 z2 3 2 z2 2 = z2 1 z2 2 1 z2 z1z3 = 6(z1 − 1) z1 9 4 · = z2z3 = z2 3 = z1z2z3 = 6(z2 1 − z1) = 4z3 − 6z1 These are all in R(U ), so R(U ) is closed under multiplication and is a ring. Remark. We suspected that perhaps any subset U of a finite group containing a generator for that finite group would result in a ring. The following example shows that this cannot be necessary. Example 2. Let U = {1, eiπ/6, eiπ/4, eiπ/3}. R(U ) is a ring. Proof. As above, it suffices to show that the products of all elementary mono- mials are Z[P ]-linear combinations of elementary monomials. We go by the con- vention that z1 = Ieiπ/6,eiπ/2 (0, 1), z2 = Ieiπ/6,eiπ/3(0, 1), and z3 = Ieiπ/3,eiπ/2(0, 1) and that p1, p2, p3 are projections from z1, z2, z3 to the real axis. We calculated z1z2 = p3(1 − z3) z1z3 = −p1z2 − (p2p3)z3 + 2p3 z2z3 = −p3z2 − (p2p3)z3 + 2p2p3 z2 1 = p1p3(1 − z3) z2 2 = p2p3(1 − z3) z2 3 = −6z2 − 3p2p3z3 + 3p3 Remark. We then suspected that any subset of a finite group might result in a ring. Our next result shows this too cannot be necessary. Example 3. Let U = {1, ei, e2i, e3i}. R(U ) is a ring. This example is a special case of Theorem 4.1. 12 Remark. We strongly suspect that R({1, eiπ/5, eiπ/4, eiπ/3}) is not a ring, so we suspect that it is not sufficient for U to just be a subset of a finite group. Theorem 4.1. Let U = {1, α, α2, α3}. R(U ) is a ring. Proof. Set z1 = Iα,α3 (0, 1), z2 = Iα,α2 (0, 1), and z3 = Iα2,α3(0, 1). Since the only elementary monomials are 0, 1, z1, z2, z3, 1 − z1, 1 − z2, 1 − z3, it suffices to check pairwise products of {z1, z2, z3}. Set p1 = I1,α2 (0, z1), p2 = I1,α3 (0, z2), and p3 = I1,α(0, z3). Then Z[P ] = Z[p1, p2, p3], since the other projections are 0, 1, 1 − p1, 1 − p2, and 1 − p2. First we claim that z1z2 = z3. We will prove this by calculation. z1z2 = = = [1, α3] [1, α2] [α, α3] [α, α2] e−3iθ − e3iθ e−2iθ − e2iθ [1, α3] α2 = [α, α2] α2 e−2iθ − e2iθ e−iθ − eiθ [1, α3] α2 [α2, α3] = z3 Next we claim that z1/z2 = p1 and z2/z1 = p2. These can also be calculated but a geometrical figure makes it clear. The first claim follows from the fact that the triangles 0−p1−z1 and 0−1−z2 are similar. The second claim follows from the similarity of the triangles 0−1−z1 and 0 − p2 − z2. z3 z2 z1 p3 0 p1 1 p2 So far we can construct the following pairwise products of elementary mono- mials. z2 1 = z1z2 z1 z2 = p1z3 z1z2 = z3 z2 2 = p2 2p1z3 = p2z3 13 We need only construct z2 3 = p2 First we show z2 formula given in Proposition 1.5 and obtained 3 and z2z3 since z1z3 = p1z2z3. 3(z3 − z2) algebraically. We calculated z2 3 using the z2 3 = 1 + 2α2 + 3α4 + 2α6 + α8 which is exactly what we found by calculating p2 equal. 3(z3 − z2), so the two must be Likewise, we calculated z2z3 to be z2z3 = 1 + 2α2 + 2α4 + α6 which precisely equals p3(1 − z3). elementary monomials, so R(U ) is a ring. Thus all 6 pairwise products of {z1, z2, z3} are Z[P ]-linear combinations of This characterization of R(U ) makes finding examples of rings R(U ) a mat- ter of verifying that finitely many products are contained in R(U ). However, finding counterexamples is more difficult. Some U that are difficult to work with, like {1, ei, e2i, e3i}, yield rings. Other U that are nicer to work with, such as {1, eiπ/5, eiπ/4, eiπ/3} are suspected to not yield rings. 5 Open Questions Some open questions we considered in research are posed below. 1. How does 1 /∈ U affect our current results? Can we still express R(U ) as a module over some ring generated by elementary monomials? 2. When exactly are the products of elementary monomials Z[P ]-linear com- binations of elementary monomials? 3. Is R({1, eiπ/5, eiπ/4, eiπ/3}) a ring? 4. What subrings of C are of the form R(U ) for some U ? 5. Given p ∈ C, for which U is p ∈ R(U )? [u,v] v + [v,q] 6. We can write Iu,v(p, q) = [u,p] [v,u] u where [x, y] = x¯y − y ¯x. Note that [x, y] is an alternating bilinear map. If V is some vector space equipped with [·,·], an alternating bilinear map into R and we have some S ⊆ V of allowable "angles", we can define I : S2 × V 2 → V via Iu,v(p, q) = [u, p] [u, v] v + [v, q] [v, u] u Do similar results hold for this generalization? Perhaps we could require V to be a normed vector space and say that S is the sphere of radius one. 14 References [1] Joe Buhler, Steve Butler, Warwick de Launey and Ron Graham, 'Origami rings', Journal of the Australian Mathematical Society 92 (June 2012), 299- 311. [2] D. Nedrenco, 'On origami rings', arXiv:1502.07995 (Feburary 2015). 15
1603.09709
1
1603
2016-03-31T18:44:04
Finite-dimensional algebras are (m>2)-Calabi-Yau-tilted
[ "math.RA", "math.RT" ]
We observe that over an algebraically closed field, any finite-dimensional algebra is the endomorphism algebra of an m-cluster-tilting object in a triangulated m-Calabi-Yau category, where m is any integer greater than 2.
math.RA
math
FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED SEFI LADKANI Abstract. We observe that over an algebraically closed field, any finite-dimensional algebra is the endomorphism algebra of an m-cluster-tilting object in a triangulated m-Calabi-Yau category, where m is any integer greater than 2. 6 1 0 2 r a M 1 3 ] . A R h t a m [ 1 v 9 0 7 9 0 . 3 0 6 1 : v i X r a 1. Introduction Cluster categories were introduced by Buan, Marsh, Reineke, Reiten and Todorov [8] as a means to model the combinatorics of cluster algebras with acyclic skew-symmetric exchange matrices within the framework of quiver representations (see also the work of Caldero, Chapoton and Schiffler [12] for the case of An quivers). The cluster category of an acyclic quiver is the orbit category of the bounded derived category of its path algebra with respect to the autoequivalence F = νΣ−2 where ν denotes the Serre functor and Σ is the suspension functor. By a result of Keller [20], the cluster category is a triangulated 2-Calabi-Yau category. Particular role is played by the 2-cluster-tilting objects within this category (the precise definitions will be given in Section 2.1 below) which model the clusters in the corresponding cluster algebra. As already shown in [20], by replacing Σ−2 by Σ−m for m > 2 and considering the orbit category with respect to the autoequivalence νΣ−m, one gets an m-Calabi-Yau triangulated category with m-cluster-tilting objects. The categories obtained in this way, called m-cluster categories, were the subject of many investigations, see [5, 26, 28, 29]. The endomorphism algebras of 2-cluster-tilting objects in cluster categories are known as cluster-tilted algebras and they possess many remarkable representation-theoretic and homological properties [4, 9, 10, 23]. More generally, consider an m-Calabi-Yau-tilted algebra, i.e. an algebra A = EndC(T ) where C is a K-linear, triangulated, Hom-finite, m-Calabi-Yau category over a field K and T is an m-cluster-tilting object in C for some positive integer m. Keller and Reiten have shown the following results in the case m = 2 (for the first two points, see Sections 2 and 3 of [23] and for the third one, see [24, §2]): • A is Gorenstein of dimension at most m − 1 (i.e. idA A ≤ m − 1 and pdA DA ≤ m − 1, where D(−) = HomK (−, K)); • The stable category of Cohen-Macaulay A-modules is (m + 1)-Calabi-Yau; • If K is algebraically closed, C is algebraic and A ∼= KQ for an acyclic quiver Q, then C is triangle equivalent to the m-cluster category of Q. In addition, they have shown that these results hold also in the case m > 2 provided that one imposes an additional condition on the m-cluster-tilting object T stated in This work was partially supported by the Center for Absorption in Science, Ministry of Aliyah and Immigrant Absorption, State of Israel. 1 2 SEFI LADKANI terms of the vanishing of some of its negative extensions, namely HomC(T, Σ−iT ) = 0 for any 0 < i < m − 1, (⋆) see [24, §4]. Note that by the m-Calabi-Yau property of C this condition is equivalent to the vanishing of the positive extensions HomC(T, ΣiT ) for all m < i < 2m − 1, whereas these extensions for 0 < i < m always vanish since T is m-cluster-tilting. In the terminology of [6], the condition (⋆) means that T is (m − 2)-corigid, and in [6, Theorem B] Beligiannis presents a more refined result connecting the corigidity property of an m-cluster-tilting object with the Gorenstein property of its endomorphism algebra and the Calabi-Yau property of its stable category of Cohen-Macaulay modules. We note also that a condition analogous to (⋆), stated for m-cluster-tilting subcategories inside bounded derived categories of modules and abbreviated "vosnex", appears in the works of Amiot-Oppermann [3, Definition 4.9] and Iyama-Oppermann [18, Notation 3.5]. Whereas for m = 2 the condition (⋆) is empty and hence automatically holds, this is no longer the case for m ≥ 3. In particular, there are examples of triangulated m-Calabi- Yau categories C and m-cluster-tilting objects T ∈ C for which the vosnex condition (⋆) does not hold and moreover the endomorphism algebra EndC(T ) is a path algebra of a connected acyclic quiver, see Iyama and Yoshino [19, Theorem 9.3] for m = 3 and [19, Theorem 10.2] for m odd, and also [24, Example 4.3]. Another example, where the algebra EndC(T ) is not Gorenstein, is given in [23, Example 5.3]. The purpose of this note is to extend this class of examples by showing that given m ≥ 3, any finite-dimensional algebra over an algebraically closed field is the endomorphism algebra of an m-cluster-tilting object in an m-Calabi-Yau triangulated category. Hence, without any further assumptions on C and T , one cannot say too much about the algebras EndC(T ). To this end we invoke the construction of generalized cluster categories due to Amiot [1] in the case m = 2 and generalized by Guo [17] to the case m > 2. This construction produces an m-Calabi-Yau triangulated category with an m-cluster-tilting object from any dg-algebra which is homologically smooth, bimodule (m + 1)-Calabi-Yau and sat- isfies additional finiteness conditions. A rich source of such dg-algebras is provided by the deformed Calabi-Yau completions defined and investigated by Keller [22]. Given a basic finite-dimensional algebra A, we choose a dg-algebra B with two prop- erties; firstly, the underlying graded algebra of B is the path algebra of a graded quiver whose arrows are concentrated in degrees 0 and −1, and secondly, H0(B) ∼= A. Such dg-algebra can be constructed from any presentation of A as a quotient of a path algebra of a quiver by an ideal generated by a finite sequence of elements. Conversely, any such dg-algebra arises in this way. It turns out that for any m ≥ 2, the (m+1)-Calabi-Yau completion of B is a Ginzburg dg-algebra Γ of a graded quiver with homogeneous superpotential of degree 2 − m which can be written explicitly in terms of the quiver and the sequence of elements. In the case m = 2, the zeroth homology H0(Γ) is a split extension of A, whereas when m > 2 it is isomorphic to A, hence Γ satisfies the finiteness conditions required in the construction of [1, 17] and thus gives rise to a Hom-finite m-Calabi-Yau triangulated category with an m-cluster-tilting object whose endomorphism algebra is isomorphic to A. The m-cluster-tilting object we get almost never satisfies the vosnex condition (⋆). More precisely, that condition holds if and only if A is the path algebra of an acyclic FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED 3 quiver and B is chosen such that B = A. Moreover, the flexibility in the choice of the dg-algebra B allows to construct, for certain algebras A and any m > 2, inequivalent triangulated m-Calabi-Yau categories C 6≃ C′ with m-cluster-tilting objects T ∈ C and T ′ ∈ C′ such that EndC(T ) ∼= EndC(T ′) ∼= A. 2. Recollections 2.1. Notations. We recall the definitions of Calabi-Yau triangulated categories and cluster-tilting objects. Throughout, we fix a field K. Definition 2.1. Let C be a K-linear triangulated category with suspension functor Σ. (a) We say that C is Hom-finite if the spaces HomC(X, Y ) are finite-dimensional over K for any X, Y ∈ C. (b) Let m ∈ Z. We say that C is m-Calabi-Yau if C is Hom-finite and there exist functorial isomorphisms HomC(X, Y ) ∼= D HomC(Y, ΣmX) for any X, Y ∈ C, where D denotes the duality D(−) = HomK(−, K). For an object X in an additive category C, denote by add X the full subcategory of C whose objects are finite direct sums of direct summands of X. For a subcategory Y of C, let ⊥Y = {X ∈ C : HomC(X, Y ) = 0 for any Y ∈ Y}. Definition 2.2. Let C be a triangulated m-Calabi-Yau category for some integer m ≥ 1. An object T of C is m-cluster-tilting if: (i) HomC(T, ΣiT ) = 0 for any 0 < i < m; and (ii) if X ∈ C is such that HomC(X, ΣiT ) = 0 for any 0 < i < m, then X ∈ add T . Equivalently, add T =T0<i<m ⊥Σi(add T ). Definition 2.3. Let m ≥ 1. A K-algebra Λ is m-Calabi-Yau-tilted (m-CY-tilted for short) if there exist a triangulated m-Calabi-Yau category C and an m-cluster-tilting object T of C such that Λ ∼= EndC(T ). 2.2. Generalized cluster categories. In this section we briefly review the con- struction of triangulated m-Calabi-Yau categories with m-cluster-tilting object due to Amiot [1] (for the case m = 2) and its generalization by Guo [17] (for the case m > 2). Let Γ be a differential graded (dg) algebra over a field K. Denote by D(Γ) its derived category and by per Γ its smallest full triangulated subcategory containing Γ and closed under taking direct summands. Let Dfd(Γ) denote the full subcategory of D(Γ) whose objects are those of D(Γ) with finite-dimensional total homology. Definition 2.4. Γ is said to be homologically smooth if Γ ∈ per Γe, where Γe = Γop ⊗K Γ. Let Γ be homologically smooth and let Ω = RHomΓe(Γ, Γe). By definition, Ω ∈ D((Γe)op). We can view Ω as an object of D(Γe) via restriction of scalars along the morphism τ : Γe ∼−→ (Γe)op given by τ (x ⊗ y) = y ⊗ x. By [22, Lemma 3.4] (see also [21, Lemma 4.1] and [17, Lemma 2.1]) one has Dfd(Γ) ⊆ per Γ and (2.1) HomD(Γ)(L ⊗Γ Ω, M ) ∼= D HomD(Γ)(M, L) for any L ∈ D(Γ), M ∈ Dfd(Γ). 4 SEFI LADKANI Definition 2.5. Let m ∈ Z. bimodule m-Calabi-Yau. If RHomΓe(Γ, Γe) ∼= Σ−mΓ in D(Γe) we say that Γ is If Γ is homologically smooth and bimodule m-Calabi-Yau then the triangulated cat- egory Dfd(Γ) is m-Calabi-Yau. More precisely, (2.1) yields functorial isomorphisms HomD(Γ)(Σ−mL, M ) ∼= D HomD(Γ)(M, L) for any L ∈ D(Γ), M ∈ Dfd(Γ). Theorem 2.6 ([1, §2], [17, §2]). Let m ≥ 1 and let Γ be a dg-algebra satisfying the following conditions: (i) Γ is homologically smooth; (ii) Hi(Γ) = 0 for any i > 0; (iii) dimK H0(Γ) < ∞; (iv) Γ is bimodule (m + 1)-Calabi-Yau. Consider the triangulated category CΓ = per Γ/Dfd(Γ). Then: (a) CΓ is Hom-finite and m-Calabi-Yau. (b) For any i ∈ Z, set D≤i = {X ∈ D(Γ) : Hp(X) = 0 for all p > i} and let F = D≤0 ∩ ⊥D≤−m ∩ per Γ. The restriction of the canonical projection π : per Γ → CΓ to F induces an equivalence of K-linear categories F (c) The image πΓ of Γ in CΓ is an m-cluster-tilting object and EndCΓ (πΓ) ∼= H0(Γ). ∼ −→ CΓ. The object πΓ occurring in part (c) of the theorem is called the canonical m-cluster- tilting object in CΓ. The statement of the next lemma concerning negative extension groups of the canonical m-cluster-tilting object is implicit in the proof of [17, Corol- lary 3.4]. Lemma 2.7. Let Γ be a dg-algebra satisfying the conditions of Theorem 2.6 and let T = πΓ be the canonical m-cluster-tilting object in CΓ. Then HomC(T, Σ−iT ) ∼= H−i(Γ) for any 0 ≤ i ≤ m − 1. Proof. As observed in [17], the objects Γ, ΣΓ, . . . , Σm−1Γ are in the fundamental domain F. Therefore, for any 0 ≤ i ≤ m − 1, HomCΓ(πΓ, Σ−iπΓ) ∼= HomCΓ(ΣiπΓ, πΓ) = HomCΓ(πΣiΓ, πΓ) ∼= HomD(Γ)(ΣiΓ, Γ) ∼= HomD(Γ)(Γ, Σ−iΓ) ∼= H−i(Γ). (cid:3) 2.3. Ginzburg dg-algebras. Ginzburg dg-algebras were introduced by Ginzburg in [16]. We recall their definition in the case of a graded quiver with homogeneous superpotential and quote the result of Keller [22] that they are homologically smooth and bimodule Calabi-Yau (see also the paper [27] by Van den Bergh). We note that a graded version of quivers with potentials (and their mutations) has also been introduced in [2] and [13], however in these papers one still implicitly considers Ginzburg dg-algebras which are bimodule 3-Calabi-Yau. In contrast, in the setting described below the degree of the superpotential affects the Calabi-Yau dimension of its Ginzburg dg-algebra. A quiver is a finite directed graph. More precisely, it is a quadruple Q = (Q0, Q1, s, t), where Q0 and Q1 are finite sets (of vertices and arrows, respectively) and s, t : Q1 → Q0 FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED 5 are functions specifying for each arrow its starting and terminating vertex, respectively. A quiver Q is graded if we are given a grading · : Q1 → Z. A path p in Q is a sequence of arrows α1α2 . . . αn such that s(αi+1) = t(αi) for all 1 ≤ i < n. For a path p we denote by s(p) its starting vertex s(α1) and by t(p) its terminating vertex t(αn). A path p is a cycle if it starts and ends at the same vertex, i.e. s(p) = t(p). Any vertex i ∈ Q0 gives rise to a cycle ei of length zero with s(ei) = t(ei) = i. The path algebra KQ has a basis consisting of the paths of Q, and the product of two paths p and q is their concatenation pq if s(q) = t(p) and zero otherwise. The path algebra is graded if Q is graded, with the degree of a path being the sum of the degrees of its arrows. The degree of a homogeneous element x of KQ will be denoted by x. Consider the K-bilinear map [−, −] : KQ × KQ → KQ whose value on a pair of homogeneous elements x, y is given by their supercommutator [x, y] = xy − (−1)xyyx. Denote by [KQ, KQ] the linear subspace of KQ spanned by all the supercommutators. The quotient KQ/[KQ, KQ] has a basis consisting of cycles considered up to cyclic permutation "with signs". Definition 2.8. A superpotential on Q is a homogeneous element in KQ/[KQ, KQ]. Any arrow α ∈ Q1 gives rise to a linear map ∂α : KQ/[KQ, KQ] → KQ (called cyclic derivative with respect to α) whose value on any cycle p is given by (2.2) ∂αp = (−1)α Xp=uαv (−1)u(α+v)vu where the sum runs over all possible decompositions p = uαv with u, v paths of length ≥ 0. More explicitly, if p = α1α2 . . . αn has degree w, then (−1)(w−1)(α1+···+αℓ−1)αℓ+1 . . . αnα1 . . . αℓ−1 ∂α(α1α2 . . . αn) = (−1)α Xℓ : αℓ=α is homogeneous of degree w − α. Definition 2.9. Let Q be a graded quiver and let m ∈ Z. Let Q be the graded quiver whose vertices are those of Q and its set of arrows consists of • the arrows of Q (with their degree unchanged); • an arrow α∗ : j → i of degree 1 − m − α for each arrow α : i → j of Q; • a loop ti : i → i of degree −m for each vertex i ∈ Q0. Let W be a superpotential on Q of degree 2 − m. The Ginzburg dg-algebra of (Q, W ), denoted Γm+1(Q, W ), is the dg-algebra whose underlying graded algebra is the path algebra KQ and the differential d is defined by its action on the generators as • d(α) = 0 and d(α∗) = ∂αW for each α ∈ Q1; • d(ti) = ei(Pα∈Q1[α, α∗])ei for each i ∈ Q0. Remark 2.10. Note that for each α ∈ Q1 the element ∂αW is homogeneous of degree 2 − m − α and the supercommutator [α, α∗] is homogeneous of degree 1 − m, hence the definition of the differential d makes sense. Moreover, as [α, α∗] = αα∗ − (−1)αα∗α∗α for any α ∈ Q1, by using the sign conventions in (2.2) one verifies that d2(ti) = 0 for any i ∈ Q0, so that d is indeed a differential. Note also that in [22] the differential of ti is (−1)m−1 times the one given here, but of course by replacing each ti by (−1)m−1ti one sees that the dg-algebras are isomorphic. 6 SEFI LADKANI Theorem 2.11 ([22, Theorem 6.3]). Let m ∈ Z and let W be a superpotential of degree 2 − m on a graded quiver Q. Then Γm+1(Q, W ) is homologically smooth and bimodule (m + 1)-Calabi-Yau. We record two useful observations. Let Q be a graded quiver, m ∈ Z an integer and W a homogeneous superpotential on Q of degree 2 − m. Lemma 2.12. Suppose that α : i → j is an arrow in Q such that no term of W contains α. Define a graded quiver Q′ by Q′ 1 = Q1 \ {α} ∪ {α∗} where α∗ : j → i has degree 1 − m − α. Then W can be naturally viewed as a superpotential W ′ on Q′ and Γm+1(Q, W ) ∼= Γm+1(Q′, W ′). 0 = Q0 and Q′ Proof. Since no term of W contains α, we can view W as an element W ′ in the path algebra KQ′. The graded quivers Q′ and Q are isomorphic by the map ϕ : Q′ → Q sending (α∗)∗ to α and fixing all other arrows. Moreover, since ∂αW = 0 = ∂α∗ W ′ and ∂βW = ∂βW ′ for any β ∈ Q1 ∩ Q′ 1, the map ϕ induces an isomorphism of the Ginzburg dg-algebras Γm+1(Q′, W ′) ∼= Γm+1(Q, W ). (cid:3) For a subset of arrows Ω ⊆ Q1, let QΩ be the subquiver of Q with (QΩ)0 = Q0 and (QΩ)1 = Ω. For the definition of Calabi-Yau completion, see [22, §4]. Lemma 2.13. Suppose that Ω ⊆ Q1 is a set of arrows such that W = Pβ∈Q1\Ω βωβ with ωβ ∈ KQΩ for each β 6∈ Ω. Consider the subquiver Q′ of Q defined by Q′ 1 = Ω ∪ {β∗ : β ∈ Q1 \ Ω}. Let d be the differential on Γm+1(Q, W ). Then: and Q′ (a) d(KQ′) ⊆ KQ′, hence B = (KQ′, d) is a sub-dg-algebra of Γm+1(Q, W ). (b) Γm+1(Q, W ) is isomorphic to the (m + 1)-Calabi-Yau completion of B. 0 = Q0 Proof. The first claim holds since d(α) = 0 for any α ∈ Ω ⊆ Q1 and d(β∗) = ∂βW = (−1)βωβ ∈ KQΩ ⊆ KQ′ for any β 6∈ Ω. This argument also shows that the differential d on KQ′ satisfies the condition in [22, §3.6] via the filtration ∅ ⊆ Ω ⊆ Q′ of the set of arrows. Hence we can use [22, Proposition 6.6] to compute the (m + 1)-Calabi-Yau completion of B and get that it is isomorphic to (KQ′, d′) with the differential d′ given on the generators by d′(α) = ∂α∗W ′ = 0, d′((β∗)∗) = ∂β ∗ W ′ = 0, d′(α∗) = ∂αW ′, d′(β∗) = ∂(β ∗)∗W ′ [γ, γ∗])ei, where W ′ ∈ KQ′ is the element (−1)β ∗(β∗)∗d(β∗) = Xβ∈Q1\Ω (−1)m−1(β∗)∗ωβ. Finally, the isomorphism ϕ : KQ′ → KQ defined on the generators by and d(ti) = (−1)m+1ei(Pγ∈Q′ 1 W ′ =Xα∈Ω (−1)αα∗d(α) + Xβ∈Q1\Ω ϕ(γ) = (−1)m−1γ β γ if γ = α∗ for some α ∈ Q1, if γ = (β∗)∗ for some β ∈ Q1 \ Ω, otherwise induces an isomorphism (KQ′, d′) ∼= Γm+1(Q, W ) of dg-algebras. (cid:3) FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED 7 2.4. Non-positively graded Ginzburg dg-algebras. In this section we restrict at- tention to Ginzburg dg-algebras which are concentrated in non-positive degrees and quote the construction of Guo [17] (generalizing that of Amiot in [1] for the case m = 2) of the generalized cluster category associated to a quiver with superpotential. of the arrows of degree w, in other words, Q(w) Let Q be a graded quiver and let w ∈ Z. Denote by Q(w) the subquiver of Q consisting 1 = {α ∈ Q1 : α = w}. Now fix a graded quiver Q and let m ∈ Z. Let Q denote the quiver constructed in Definition 2.9. Fix a homogeneous superpotential W on Q of degree 2 − m and let Γ = Γm+1(Q, W ) be the Ginzburg dg-algebra. We immediately observe: 0 = Q0 and Q(w) Remark 2.14. Γi = 0 for any i > 0 if and only if all the arrows of Q have non-positive degrees. This condition implies that Hi(Γ) = 0 for any i > 0. Lemma 2.15. Assume that all the arrows of Q have non-positive degrees. Then H0(Γ) ∼= KQ /(dα : α ∈ Q (0) (−1) 1 ). Proof. Since there are no arrows of Q of positive degree, the graded piece Γ0 equals the and the graded piece Γ−1 is spanned by the elements of the form path algebra of Q (0) uαv where u, v ∈ KQ (cid:3) . As d(uαv) = u(dα)v, the claim follows. (−1) and α ∈ Q 1 (0) Lemma 2.16. The following conditions are equivalent: (a) Each arrow of Q has non-positive degree; (b) m ≥ 0 and for any α ∈ Q1 one has 1 − m ≤ α and α ≤ 0. Proof. If m < 0 then the each of the loops ti in Q has positive degree −m. In addition, each other arrow of Q is either α or α∗ for some arrow α ∈ Q1, and its degree is α or 1 − m − α, respectively. These observations imply the statement of the lemma. (cid:3) In the next two examples we discuss the cases m = 0 and m = 1. Example 2.17. Assume that m = 0. Lemma 2.16 implies that the arrows of Q have non-positive degrees if and only if Q has no arrows. In this case Q is a disjoint union of graded quivers of the form • t with t = 0 and dt = 0. Hence Γ is concentrated in degree 0 and it is a finite direct product of polynomial rings k[t]. The algebra k[t] is 1-Calabi-Yau, see [21, §4.2] Example 2.18. Assume that m = 1. Lemma 2.16 implies that the arrows of Q have non-positive degrees if and only if all the arrows of Q are in degree 0, so we can regard Q as an ungraded quiver. Since the superpotential on Q is homogeneous of degree 1, In this case all the arrows α and α∗ of Q are in degree 0 and the it must vanish. differential of each loop ti, whose degree is −1, is given by d(ti) = ei(Pα∈Q1[α, α∗])ei. By Lemma 2.15, H0(Γ) is isomorphic to the preprojective algebra of the quiver Q. When m ≥ 2, the next lemma shows that we may assume that Q(1−m) has no arrows. Lemma 2.19. Assume that m ≥ 2 and that 1 − m ≤ α ≤ 0 for any α ∈ Q1. Then there exist a graded quiver Q′ with 2 − m ≤ α′ ≤ 0 for each α′ ∈ Q′ 1 and a homogeneous superpotential W ′ on Q′ of degree 2 − m such that Γm+1(Q, W ) ∼= Γm+1(Q′, W ′). 8 SEFI LADKANI Proof. We define the graded quiver Q′ as a subquiver of Q; we set Q′ 0 = Q0 and 1 =(Q(0) Q(w) 1 Q′(w) 1 ∪ {α∗ : α ∈ Q(1−m) 1 } if w = 0, if 1 − m < w < 0, 1 with Q′(w) empty for any other w ∈ Z. Then 2 − m ≤ α′ ≤ 0 for any arrow α′ ∈ Q′ 1 by construction. Moreover, since the superpotential W is of degree 2 − m and all the arrows of Q have non-positive degrees, no term of W can contain any arrows of Q(1−m). The result now follows by iterated application of Lemma 2.12 for each of the arrows in Q(1−m). (cid:3) In particular, when m = 2 one can always reduce to the classical setting of an ungraded quiver with potential. Corollary 2.20. Let Q be a graded quiver such that −1 ≤ α ≤ 0 for any α ∈ Q1 and let W be a homogeneous superpotential on Q of degree 0. Then there exist a quiver Q′ concentrated in degree 0 and a superpotential W ′ on Q′ such that Γ3(Q, W ) ∼= Γ3(Q′, W ′). The next lemma generalizes [25, Lemma 2.11]. Lemma 2.21. Assume that m ≥ 2 and 2 − m ≤ α ≤ 0 for any α ∈ Q1. Then H0(Γm+1(Q, W )) ∼= KQ(0)/(∂αW : α ∈ Q(2−m) 1 ). Proof. Observe that since the arrows of Q have non-positive degrees and W is of degree 2 − m, the cyclic derivative ∂αW with respect to any arrow α of degree 2 − m lies in the path algebra of Q(0) and the quotient in the right hand side makes sense. The arrows of Q have non-positive degrees by Lemma 2.16, hence we may apply ). Observe that 1 ∪{α∗ : α ∈ Q(2−m) } (cid:3) Lemma 2.15 to deduce that H0(Γm+1(Q, W )) ∼= KQ Q with d(α) = 0 and d(α∗) = ∂αW for any α ∈ Q1, hence the claim follows. /(dα : α ∈ Q (−1) 1 = Q(−1) is empty by assumption and Q = Q(0) since Q(1−m) (−1) 1 (0) (0) 1 1 Theorem 2.22 ([17, Theorem 3.3]). Let m ≥ 1 be an integer, let Q be a graded quiver, let W be a superpotential on Q of degree 2 − m and denote by Γ = Γm+1(Q, W ) the Ginzburg dg-algebra. Assume that: (i) 1 − m ≤ α ≤ 0 for all α ∈ Q1; (ii) H0(Γ) is finite-dimensional. Then the triangulated category C(Q,W ) = per Γ/Dfd(Γ) is Hom-finite and m-Calabi- Yau. Moreover, the image of Γ in C(Q,W ) is an m-cluster-tilting object whose endomor- phism algebra is isomorphic to H0(Γ). Proof. The condition (i) implies that Hi(Γ) = 0 for all i > 0. Now Theorem 2.11 and condition (ii) imply that Γ satisfies the conditions of Theorem 2.6 and the result is now a consequence of that theorem. (cid:3) 3. The construction 3.1. Superpotentials from quivers with relations. In this section we construct, given a quiver Q, a finite sequence R of relations on Q and an integer m ≥ 2, a graded quiver with homogeneous superpotential of degree 2 − m. The construction generalizes FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED 9 that of Keller in [22, §6.9] for the case where m = 2 and KQ/(R) has global dimension 2. The idea of adding, for each relation, an arrow in the opposite direction appears already in the description of relation-extension algebras by Assem, Brustle and Schiffler [4]. Definition 3.1. Let Q be a quiver and let r be the ideal of KQ generated by all the arrows. A relation on Q is an element of eirej for some i, j ∈ Q0. In other words, a relation is a linear combination of paths of positive lengths starting at i and ending at j. We start with some preparations concerning split extensions of algebras which will be needed for the case m = 2. Definition 3.2. An algebra eA is a split extension of an algebra A if there exist algebra homomorphisms ι : A → eA and π : eA → A such that πι = idA. Let Q be a quiver and let eQ be a quiver such that eQ0 = Q0 and Q1 ⊆ eQ1 (in other words, eQ is obtained from Q by adding arrows). Then the path algebra KeQ is a split extension of the path algebra KQ. Indeed, there are algebra homomorphisms π eQ,Q−−−→ KQ KQ ιQ, eQ−−−→ KeQ π eQ,Q(α) =(α if α ∈ Q1, 0 if α ∈ eQ1 \ Q1. whose values on the generators are given by ιQ, eQ(α) = α (α ∈ Q1) and the algebra KQ/(R). Denote by r′ the ideal of KeQ generated by the arrows in the set eQ1 \ Q1. Let R be a set of relations in KQ and let eR be a set of relations in KeQ such that R ⊆ eR (via the natural embedding ιQ, eQ : KQ ֒→ KeQ). Lemma 3.3. Assume that eR \ R ⊆ r′. Then the algebra KeQ/(eR) is a split extension of ιQ, eQ−−−→ KeQ ։ KeQ/(eR). Since R ⊆ eR, the image π eQ,Q−−−→ KQ ։ KQ/(R) and let ρ ∈ eR. KeQ/(eR). Consider now the composition KeQ that eR \ R ⊆ r′ implies that π eQ,Q(ρ) = 0, so its image vanishes as well. Hence we get a well defined algebra homomorphism π : KeQ/(eR) → KQ/R. The composition πι maps the image of any arrow α ∈ Q in KQ/(R) to itself, therefore it is the identity on KQ/(R). (cid:3) Proof. Consider the composition KQ of any relation ρ ∈ R vanishes and we get an algebra homomorphism ι : KQ/(R) → If ρ ∈ R, then its image obviously vanishes. Otherwise, ρ 6∈ R and our assumption Any quiver with a finite sequence of relations gives rise to a dg-algebra whose under- lying graded algebra is the path algebra of a graded quiver with arrows concentrated in degrees 0 and −1. The details are given in the construction below. Construction 3.4. Let (Q, R) be a pair where Q is a quiver and R = Si,j∈Q0 Ri,j, where each Ri,j is a finite sequence of relations inside eirej and R is the concatenation of these sequences (there may be repetitions inside each sequence Ri,j and moreover the zero element can appear inside several such sequences). For a relation ρ ∈ Ri,j, set s(ρ) = i and t(ρ) = j. 10 SEFI LADKANI We define a graded quiver Q′ as follows: • The set of vertices of Q′ equals that of Q; • The set of arrows consists of -- the arrows of Q, with their degree set to 0; -- an arrow ηρ : s(ρ) → t(ρ) of degree −1 for each relation ρ ∈ R; and denote by B(Q, R) the dg-algebra whose underlying graded algebra is the path algebra KQ′ with the differential acting on the generators by • d(α) = 0 for any α ∈ Q1; • d(ηρ) = ρ for any ρ ∈ R. Obviously, B(Q, R) is concentrated in non-positive degrees and H0(B(Q, R)) is isomor- phic to KQ/(R), but in general B(Q, R) is not quasi-isomorphic to its zeroth homology. Remark 3.5. If B = (KQ′, d) is any dg-algebra whose underlying graded algebra is the path algebra of a graded quiver with arrows concentrated in degrees 0 and −1 and the image of the differential d lies in the ideal generated by the arrows, then B ∼= B(Q, R) for some (Q, R). Indeed, we can take Q = Q′(0) and for each i, j ∈ Q0 let Ri,j be the list of d(α) where α runs over the arrows in Q′(−1) starting at i and ending at j. 1 It turns out (see Lemma 3.10 below) that for any m ≥ 2, the (m + 1)-Calabi-Yau completion of B(Q, R) is a Ginzburg dg-algebra of a graded quiver with homogeneous superpotential of degree 2 − m whose construction is described below. Construction 3.6. Let (Q, R, m) be a triple where (Q, R) is as in Construction 3.4 and m ≥ 2 is an integer. We construct a graded quiver eQ with homogeneous superpotential W of degree 2 − m as follows. -- the arrows of Q, with their degree set to 0; -- an arrow ερ : t(ρ) → s(ρ) of degree 2 − m for each relation ρ ∈ R; of the sequence R and not only on the two-sided ideal (R) it generates in KQ, as we shall see in Example 3.30. • The set of vertices of eQ equals that of Q; • The set of arrows of eQ consists of • The superpotential W is the image of the elementPρ∈R ερρ in KeQ/[KeQ, KeQ]. We denote by Γ(Q, R, m) the Ginzburg dg-algebra Γm+1(eQ, W ). Remark 3.7. The quiver with superpotential (eQ, W ) depends on the particular choice sequence of relations on Q and m ≥ 2. We denote by (eQ, W ) the graded quiver with Γ = Γ(Q, R, m) = Γm+1(eQ, W ) its Ginzburg dg-algebra. We denote the elements of R degree 2 − m in eQ corresponding to the relation ρk, so that W is the image ofPn modulo [KeQ, KeQ]. Similarly, denote by ηk the arrow ηρk and let B = B(Q, R) be the We start by describing the graded quiver eQ underlying Γ occurring in Definition 2.9. by ρ1, ρ2, . . . , ρn and write R = n. For simplicity, we denote by εk the arrow ερk of k=1 εkρk superpotential of degree 2 − m associated to (Q, R, m) as in Construction 3.6, and by For the rest of this section, we fix a triple (Q, R, m) where Q is a quiver, R is a finite dg-algebra of Construction 3.4. FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED 11 arrow degree differential α ε∗ k εk α∗ ti 0 −1 2 − m 1 − m −m 0 (−1)mρk 0 ∂αW d(ti) (α ∈ Q1) (1 ≤ k ≤ n) (1 ≤ k ≤ n) (α ∈ Q1) (i ∈ Q0) Table 1. The arrows of the graded quiver eQ and their differentials. are as given in Table 1. Lemma 3.8. The arrows of the graded quiver eQ, their degrees and their differentials Proof. The description of the arrows and their degrees is evident from Definition 2.9. For the differentials, note that since none of the arrows εk occur in any ρ ∈ R, we have ∂εk W = ∂εk(cid:16) nXℓ=1 for any 1 ≤ k ≤ n. εℓρℓ(cid:17) = ∂εk (εkρk) = (−1)εkρk = (−1)mρk (cid:3) 1 ). Lemma 3.9. Consider the algebras A = KQ/(R) and eA = H0(Γ). (a) If m > 2 then eA ∼= A. (b) If m = 2 then eA is a split extension of A. Proof. By Lemma 2.21, eA ∼= KeQ(0)/(∂αW : α ∈ eQ(2−m) If m > 2 then eQ(0) = Q, the arrows of eQ(2−m) are ε1, ε2, . . . , εn and ∂εk W = (−1)mρk according to Table 1. Hence eA ∼= KQ/(ρ1, ρ2, . . . , ρn). This shows part (a). If m = 2 then all the arrows of the quiver eQ have degree 0, and we can think of eQ as an words, eQ = eQ(0) and Q ⊆ eQ with eQ \ Q = {ε1, ε2, . . . , εn}. Moreover, eA = KeQ/(eR) for eR = {∂αW : α ∈ eQ1}. Now R ⊆ eR since ∂εk W = ρk for each 1 ≤ k ≤ n. addition, for any α ∈ Q1 the element ∂αW =Pn by ε1, ε2, . . . , εn in eQ. Part (b) now follows from Lemma 3.3. In k=1 ∂α(εkρk) lies in the ideal generated (cid:3) ungraded quiver consisting of the arrows of Q and the arrows εk for 1 ≤ k ≤ n. In other The next two lemmas relate the dg-algebra B and the Ginzburg dg-algebra Γ. For a similar result in the case m = 2, see [22, §6.7 and Proposition 6.8]. Lemma 3.10. Γ is the (m + 1)-Calabi-Yau completion of B. Proof. This is a consequence of Lemma 2.13. eQ1 \ Ω = {ε1, . . . , εn} and the superpotential W = Pn Indeed, we may take Ω = Q1 so that k=1 εkρk has the required form. We only note that the differential of Γ restricts to the path algebra of the quiver with arrows Q1 ∪ {ε∗ n} and the resulting dg-algebra is isomorphic to B by mapping each arrow ε∗ (cid:3) Lemma 3.11. H−i(Γ) ∼= H−i(B) for any i < m − 2. k to (−1)mηρk and sending each α ∈ Q1 to itself. 1, . . . , ε∗ 12 SEFI LADKANI Proof. From Table 1 we see that Γ−i ∼= B−i for any i < m − 2, hence H−i(Γ) ∼= H−i(B) for any i < m − 3. The graded piece Γ2−m can be decomposed as Γ2−m ∼= B2−m ⊕ F , where the space F is spanned by the elements of the form uεkv where 1 ≤ k ≤ n and u, v are paths in Q. Since the differential of each such element vanishes, one has d(F ) = 0, hence d(Γ2−m) ∼= d(B2−m) and therefore H3−m(Γ) ∼= H3−m(B) as well. (cid:3) Lemma 3.12. If R is empty then H−i(Γ) = 0 for any 1 ≤ i ≤ m − 2. Proof. If R is empty, then by Lemma 3.8 the arrows in the graded quiver eQ have degrees 0, 1 − m or −m. Hence the graded piece Γ−i vanishes for each 1 ≤ i ≤ m − 2 and the claim follows. (cid:3) The next lemma provides a partial converse to Lemma 3.12. Lemma 3.13. If m > 2 and R ⊆ r2, then dimK H2−m(Γ) ≥ R. Proof. The graded piece Γ2−m is spanned by two types of elements: (1) u1ε∗ k1 u2ε∗ k2 u3 . . . ε∗ km−2 um−1, where u1, u2, . . . , um−1 are paths in Q and 1 ≤ kj ≤ n for each 1 ≤ j ≤ m − 2; (2) uεkv, where u, v are paths in Q and 1 ≤ k ≤ n; As a K-vector space, we may thus decompose Γ2−m into a direct sum E ⊕ E′, where E is the n-dimensional subspace E = {λ1ε1 + λ2ε2 + · · · + λnεn : (λ1, λ2, . . . , λn) ∈ K n} and E′ is spanned by all the elements of type (1) and those of type (2) such that at least one of u, v has positive length. We will show that d(Γ1−m) ⊆ E′ and hence no non-zero element in E lies in the image of the differential d acting on the graded piece Γ1−m. Since d vanishes on E, this will yield an n-dimensional subspace inside H2−m(Γ). If m > 3, the graded piece Γ1−m is spanned by three types of elements: (1) u1ε∗ km−1 um, where u1, u2, . . . , um are paths in Q and 1 ≤ kj ≤ n k2u3 . . . ε∗ k1u2ε∗ for each 1 ≤ j ≤ m − 1; (2) uεkvε∗ (3) uα∗v, where u, v are paths in Q and α ∈ Q1. l w and uε∗ kvεlw, where u, v, w are paths in Q and 1 ≤ k, l ≤ n; If m = 3, in addition to the elements above there is a fourth type (4) uεkvεlw, where u, v, w are paths in Q and 1 ≤ k, l ≤ n. It suffices to prove that the differential of any of these elements belongs to E′. This is clear for the elements of the type (1) since d(u1ε∗ k1u2ε∗ k2u3 . . . ε∗ km−1um) = ±u1ε∗ k1u2 . . . ε∗ kj−1ujρjuj+1ε∗ kj+1 . . . ε∗ km−1um m−1Xj=1 and none of the arrows ε1, ε2, . . . , εn can appear in the right hand side. This is also clear for the elements of type (4) since their differential vanishes. Consider an element of type (2). Then d(uεkvε∗ l w) = uεkvρlw, hence the differential is spanned by elements of the form u′εkv′ where u′, v′ are paths in Q and v′ has positive length. The case of d(uε∗ Consider an element of type (3). Then d(uα∗v) = u(∂αW )v =Pn k=1 u∂α(εkρk)v. Our assumption that R ⊆ r2 implies that each ∂α(εkρk) is a linear combination of terms u′′εkv′′ where at least one of the paths u′′, v′′ has positive length. (cid:3) kvεlw) is similar. FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED 13 Corollary 3.14. If m > 2 and R ⊆ r2, then H2−m(Γ) = 0 if and only if R is empty. Consider the triangulated category C(Q,R,m) = per Γ(Q, R, m)/Dfd(Γ(Q, R, m)). Theorem 3.15. Let Q be a quiver, let R be a finite sequence of relations on Q such that the algebra A = KQ/(R) is finite-dimensional and let m > 2 be an integer. Then: (a) The category C = C(Q,R,m) is Hom-finite and m-Calabi-Yau. (b) The image T of Γ(Q, R, m) in C is an m-cluster-tilting object with EndC(T ) ∼= A. (c) If R ⊆ r2 then dimK HomC(T, Σ−(m−2)T ) ≥ R. superpotential of degree 2 − m associated to the triple (Q, R, m) as in Construction 3.6. Proof. Recall that Γ(Q, R, m) = Γm+1(eQ, W ) where (eQ, W ) is the graded quiver with We claim that (eQ, W ) satisfies the conditions of Theorem 2.22. Indeed, condition (i) holds since the degree of any arrow in eQ is either 0 or 2 − m, and condition (ii) holds since by Lemma 3.9, H0(Γ) ∼= A and the algebra A is assumed to be finite-dimensional. Hence, by Theorem 2.22, the triangulated category C = C(Q,R,m) = C( eQ,W ) is Hom- finite, m-Calabi-Yau and the image T of Γ = Γ(Q, R, m) under the canonical projection per Γ → C is an m-cluster-tilting object whose endomorphism algebra is EndC(T ) ∼= H0(Γ) ∼= A. The last assertion follows from Lemma 2.7 and Lemma 3.13. (cid:3) Remark 3.16. The m-Calabi-Yau category C of Theorem 3.15 depends on Q and R and not only on the algebra A. There exist quivers Q and sequences of relations R and R′ on Q such that the algebras KQ/(R) and KQ/(R′) are finite-dimensional and isomorphic but for any m > 2 the categories C(Q,R,m) and C(Q,R′,m) are not equivalent, see Example 3.30 below. Remark 3.17. Keep the notations and assumptions of Theorem 3.15 and write A as A = ⊕i∈Q0Pi where Pi = eiA are the indecomposable projective right A-modules. The decomposition Γ = ⊕i∈Q0eiΓ for Γ = Γ(Q, R, m) induces a decomposition T = ⊕i∈Q0Ti with Ti being the image of eiΓ under the canonical projection to C. Hence for any finitely generated projective A-module P = ⊕i∈Q0P ei such that ei > 0 for all i ∈ Q0 there exists i an m-cluster-tilting object TP = ⊕i∈Q0T ei i in C with EndC(TP ) ∼= EndA(P ). The next result shows that the m-cluster category of any acyclic quiver can be realized as a category of the form C(Q, R, m). Recall that a quiver is acyclic if it has no cycles of positive length. We refer to [17, Corollary 3.4] for a related result. Proposition 3.18. Let Q be a quiver, let R be a finite sequence of relations on Q such that R ⊆ r2 and the algebra KQ/(R) is finite-dimensional, and let m > 2 be an integer. Then the following conditions are equivalent, where C denotes the m-Calabi-Yau category C(Q,R,m) and T is the canonical m-cluster-tilting object in C. (a) The quiver Q is acyclic and the sequence R is empty; (b) The dg-algebra B(Q, R) is concentrated in degree 0 and has finite total dimension; (c) HomC(T, Σ−iT ) = 0 for any 0 < i < m − 1; (d) HomC(T, Σ−(m−2)T ) = 0. Moreover, if any of these equivalent conditions holds and the field K is algebraically closed, then C is triangle equivalent to the m-cluster category of Q. 14 SEFI LADKANI Proof. The equivalence of (a) and (b) is clear. Let Γ = Γ(Q, R, m). For the implication (a) ⇒ (c), note that if Q is acyclic and R is empty then HomC(T, Σ−iT ) ∼= H−i(Γ) = 0 for any 0 < i < m − 1 by Lemma 2.7 and Lemma 3.12. The implication (c) ⇒ (d) is clear. For the implication (d) ⇒ (a), note that by Lemma 2.7 and Lemma 3.13 dimK HomC(T, Σ−(m−2)T ) = dimK H2−m(Γ) ≥ R, hence if HomC(T, Σ−(m−2)T ) vanishes R must be empty and then Q is acyclic by our assumption that KQ/(R) is finite-dimensional. If any of these conditions holds, then C is an algebraic Hom-finite, m-Calabi-Yau triangulated category with an m-cluster-tilting object T such that EndC(T ) ∼= KQ for an acyclic quiver Q and HomC(T, Σ−iT ) = 0 for any 0 < i < m − 1. By the characterization of higher cluster categories of Keller and Reiten [24, Theorem 4.2]) if K is algebraically closed, then C is triangle equivalent to the m-cluster-category of the quiver Q. (cid:3) 3.2. Systems of relations. Let Q be a quiver and let r be the two-sided ideal of KQ generated by the arrows of Q. An ideal I of KQ is admissible if there exists some N ≥ 2 such that rN ⊆ I ⊆ r2. Definition 3.19 ([7]). Let I be an ideal of KQ. A system of relations for I is a set R of relations such that R, but no proper subset of it, generates I as a two-sided ideal. The following statement is well-known. Lemma 3.20. If I is admissible then there exists a finite system of relations for I. Proof. By assumption, there is some N ≥ 2 such that rN ⊆ I. The algebra KQ/rN is finite-dimensional, as it is spanned by all the paths of Q of length smaller than N . Therefore the space I/rN is also finite-dimensional. For each i, j ∈ Q0, choose a basis of ei(I/rN )ej and choose a set Ri,j inside eiIej whose image modulo rN equals that basis. Then I = (R) for the finite set R given by R = {the paths of length N in Q} ∪ [i,j∈Q0 Ri,j. If R is not a system of relations for I then there is a proper subset R′ of R such that I = (R′). In this way we can repeatedly remove elements and still have a set generating I. Since R is finite, this process must terminate and we eventually end with a system of relations for I. (cid:3) Under some conditions, another approach to the construction of systems of relations involves lifting of basis elements of the space I/(I r + rI), see the discussion in [11, §7]. Lemma 3.21. If I is admissible, then I/(I r + rI) is finite-dimensional. Proof. Let N ≥ 2 be such that rN ⊆ I. Then rN +1 ⊆ (I r + rI) and we have an inclusion and a surjection KQ/r N +1 ⊃ I/r N +1 ։ I/(I r + rI). The claim now follows since the quotient KQ/rN +1 is finite-dimensional. (cid:3) Lemma 3.22. Let I be an ideal of KQ and let R be a set of relations inside I. (a) If I = (R) then the image of R modulo I r + rI spans the vector space I/(I r + rI). FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED 15 (b) Assume that the ideal (R) is admissible and the image of R modulo I r + rI spans the vector space I/(I r + rI). Then I = (R). (c) Assume that the ideal (R) is admissible and the image of R modulo I r + rI is a basis of the vector space I/(I r + rI). Then R is a system of relations for I. Proof. For part (a), observe that since each ρ ∈ R is a relation, multiplying it from the left or from the right by an element of the formPi∈Q0 λiei gives a scalar multiple of ρ. For part (b), we slightly modify the argument in [9, Lemma 3.6]. Let N ≥ 2 such that rN ⊆ (R) and let x ∈ I. By assumption, we can write kr′ x = λ1ρ1 + · · · + λnρn + x′ 1 + · · · + x′ 1r′ k + r′′ 1 x′′ (3.1) 1, . . . , x′′ with scalars λ1, . . . , λn ∈ K, relations ρ1, . . . , ρn ∈ R and x′ ℓ ∈ I, 1, . . . , x′ 1, . . . , r′ r′ ℓ using (3.1) and repeating this process N times, we conclude that x = ρ + r where ρ ∈ (R) and r ∈ rN , hence x ∈ (R). ℓ ∈ r. Writing each of the elements x′ ℓ x′′ k, x′′ 1, . . . , x′′ 1, . . . , x′ k, x′′ 1 + · · · + r′′ 1 , . . . , r′′ k, r′′ ℓ Finally, part (c) follows from (a) and (b). Moreover, R is finite by Lemma 3.21. (cid:3) Example 3.23. The assumption in parts (b) and (c) that the ideal (R) is admissible cannot be dropped. For example, consider the quiver Q given by α • β and let I = (α2 − βαβ, β2 − αβα, α2β). One can check that r5 ⊆ I ⊆ r2 hence the ideal I is admissible. The 8-dimensional algebra KQ/I is an algebra of quaternion type in the sense of Erdmann [14]. When K is algebraically closed of characteristic 2, this algebra is isomorphic to the group algebra of the quaternion group. The image of α2β in I r + rI vanishes, as the following calculation shows: α2β = (α2 − βαβ)β + βα(β2 − αβα) + βα2βα ∈ I r + rI, hence I/(I r + rI) is spanned by the images of the elements α2 − βαβ and β2 − αβα. Nevertheless, the ideal I ′ = (α2 − βαβ, β2 − αβα) is not equal to I. Indeed, by letting α and β act on K as the identity we get a one-dimensional module over KQ/I ′ with a non-zero action of α2β, hence α2β 6∈ I ′. 3.3. Finite-dimensional algebras are (m > 2)-CY-tilted. In this section we assume that the field K is algebraically closed. A finite-dimensional algebra A over K is called basic if AA ∼= P1 ⊕ · · · ⊕ Pr where P1, . . . , Pr are representatives of the isomorphism classes of the indecomposable projective right A-modules. Theorem 3.24 (Gabriel). Let A be a basic, finite-dimensional algebra over K. Then there exist a quiver Q and an admissible ideal I of KQ such that A ∼= KQ/I. Proof. See [15, §4.3]. (cid:3) Let A be a basic, finite-dimensional algebra. By Theorem 3.24, we can write A = KQ/I for a quiver Q and an admissible ideal I of Q. We denote by Si the simple A-module corresponding to a vertex i ∈ Q0 and consider the A-module S =Li∈Q0 Si. Lemma 3.25. If R is a system of relations for I then R ≥ dimK Ext2 A(S, S). 9 9 e e 16 SEFI LADKANI Proof. We have R ≥ dimK I/(I r + rI) = dimK Ext2 a consequence of Lemma 3.22(a) and the right equality is [7, Corollary 1.1]. A(S, S) where the left inequality is (cid:3) Note that Example 3.23 shows that the inequality in Lemma 3.25 can be strict. Theorem 3.26. Let A be a basic finite-dimensional algebra. Then the set of pairs (Q, R) consisting of a quiver Q and a sequence of relations R ⊆ r2 such that A ∼= KQ/(R) is not empty. For any such pair (Q, R) and any integer m > 2, the triangulated category C = C(Q,R,m) is Hom-finite, m-Calabi-Yau and its canonical m-cluster-tilting object T satisfies EndC(T ) ∼= A and dimK HomC(T, Σ−(m−2)T ) ≥ dimK Ext2 Proof. The first claim is a consequence of Theorem 3.24 and Lemma 3.20. The second claim is a consequence of Theorem 3.15 and Lemma 3.25. (cid:3) A(S, S). Corollary 3.27. A finite-dimensional algebra over an algebraically closed field is m- CY-tilted for any m > 2. Proof. We can write A ∼= End ¯A(P ) for a finite-dimensional, basic algebra ¯A and a finitely generated projective ¯A-module P containing as direct summands all the inde- composable projective ¯A-modules. Hence the claim is a consequence of Theorem 3.26 and Remark 3.17. (cid:3) Remark 3.28. If gldim A ≥ 2, then for any of the m-Calabi-Yau categories C of Theo- rem 3.26, the small negative extension HomC(T, Σ−(m−2)T ) of the canonical m-cluster- tilting object T cannot vanish. Had it vanished, Proposition 3.18 would then imply that A is the path algebra of an acyclic quiver, a contradiction. 3.4. Examples. Our first example is similar in spirit to [17, Example 3.5]. Example 3.29. Consider the algebra A = KQ/I where Q is the left quiver • α ?⑦⑦⑦⑦⑦⑦ ❅❅❅❅❅❅ γ • • β ❅❅❅❅❅❅ ?⑦⑦⑦⑦⑦⑦ δ • • α ?⑦⑦⑦⑦⑦⑦ ❅❅❅❅❅❅ γ • η • β ❅❅❅❅❅❅ ?⑦⑦⑦⑦⑦⑦ δ / • • α ?⑦⑦⑦⑦⑦⑦ ❅❅❅❅❅❅ γ • ε • β ❅❅❅❅❅❅ ?⑦⑦⑦⑦⑦⑦ δ • and I = (R) for the system of relations R = {αβ − γδ}. The algebra A has global dimension 2, hence it cannot be 2-CY-tilted by [23, Corollary 2.1]. Let B = B(Q, R) be the dg-algebra of Construction 3.4. Its graded quiver is shown in the middle; the arrows α, β, γ and δ have degree 0 while η has degree −1 and d(η) = αβ − γδ. Observe that the dg-algebra B is quasi-isomorphic to A ∼= H0(B). of the arrows α, β, γ, δ are 0, that of ε is 2− m and the superpotential is W = ε(αβ − γδ). Let m ≥ 2 and let (eQ, W ) be the graded quiver with homogeneous superpotential of degree 2−m of Construction 3.6. The graded quiver eQ is shown on the right; the degrees The Ginzburg dg-algebra Γ = Γm+1(eQ, W ) is the (m + 1)-Calabi-Yau completion of B (Lemma 3.10). Since B is quasi-isomorphic to A and A is derived equivalent to the path algebra of the Dynkin quiver D4, the Morita invariance of Calabi-Yau completions [22, Proposition 4.2] implies that Γ is Morita equivalent to Γm+1(D4, 0), hence by [17, Corol- lary 3.4] (or Proposition 3.18) the generalized m-cluster category CΓ is triangle equivalent to the m-cluster category of type D4.  ?  ?  ?  / ?  ?  o o ? FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED 17 If m = 2 then H0(Γ) ∼= KeQ/(eR), where eR = {αβ −γδ, εα, βε, εγ, δε}. This is a cluster- tilted algebra [9] of type D4, which is the relation-extension [4] of the tilted algebra A. If m > 2 then H0(Γ) ∼= A and A is m-CY-tilted by Theorem 3.15. Example 3.30. Let K be algebraically closed and consider the algebra A = K whose quiver Q is •. Consider the two sequences of relations R = {} and R′ = {0} on Q. Let m > 2. The Ginzburg dg-algebras Γ = Γ(Q, R, m) and Γ′ = Γ(Q, R′, m) are given by the following graded quivers with differentials t=−m d(t)=0 • t ε∗ ε ε∗=−1, ε=−(m−2), t=−m • t d(ε)=d(ε∗)=0 d(t)=εε∗−(−1)mε∗ε A basis for the graded piece Γ′i is given by (ε∗)i if 0 < i < m − 2; (ε∗)m−2, ε if i = m − 2; (ε∗)m−1, εε∗, ε∗ε if i = m − 1 and m > 3; and (ε∗)m−1, εε∗, ε∗ε, ε2 if i = m − 1 and m = 3, hence one computes (3.2) dimK H−i(Γ) =(1 0 if i = 0, if 0 < i < m, dimK H−i(Γ′) = if 0 ≤ i < m − 2, 1 2 if i = m − 2, 2 + δ3,m if i = m − 1. Let C = C(Q, R, m) and C′ = C(Q, R′, m′) be the corresponding m-Calabi-Yau cate- gories and let T ∈ C and T ′ ∈ C′ be the canonical m-cluster-tilting objects. We have EndC(T ) ∼= EndC ′(T ′) ∼= K. By Proposition 3.18, the category C is triangle equivalent to the m-cluster category of Q. Hence the m-cluster-tilting objects in C are the indecomposable objects ΣjT for 0 ≤ j < m. Since HomC(T, Σ−iT ) = 0 for any 0 < i < m, this remains true if we replace T by any of the other m-cluster-tilting objects ΣjT in C. On the other hand, T ′ is an m-cluster-tilting object in C′ with HomC ′(T ′, Σ−iT ′) 6= 0 for any 0 < i < m by (3.2), hence C′ cannot be triangle equivalent to C. The previous example can be generalized as follows. A Dynkin quiver is a quiver obtained by orienting the edges of a Dynkin diagram of type An (n ≥ 1), Dn (n ≥ 4) or En (n = 6, 7, 8). Proposition 3.31. Let Q be a Dynkin quiver and let m > 2. There exists an m-Calabi- Yau triangulated category C′ with an m-cluster-tilting object T ′ such that EndC ′(T ′) ∼= KQ but C′ is not triangle equivalent to the m-cluster category of Q. Proof. Let C be the m-cluster category of Q. Since Q is Dynkin, the category C has only finitely many indecomposable objects, hence the number of m-cluster-tilting objects T in C such that EndC(T ) ∼= KQ is finite. Therefore there exists an integer n such that dimK HomC(T, Σ−(m−2)T ) < n for any such T . Let R = {0, 0, . . . , 0} be a sequence consisting of n zero elements (it does not matter which starting and ending vertex we assign to each zero element) and let C′ = C(Q,R,m). By Theorem 3.15, the category C′ is Hom-finite and m-Calabi-Yau with an m-cluster- tilting object T ′ satisfying EndC ′(T ′) ∼= KQ and dimK HomC ′(T ′, Σ−(m−2)T ′) ≥ n. e e e e   M M 18 SEFI LADKANI If F : C′ ≃ C were a triangulated equivalence, then T = F T ′ would be an m-cluster- tilting object in C with EndC(T ) ∼= KQ and dimK HomC(T, Σ−(m−2)T ) ≥ n, a contra- diction. (cid:3) References 1. Claire Amiot, Cluster categories for algebras of global dimension 2 and quivers with potential, Ann. Inst. Fourier (Grenoble) 59 (2009), no. 6, 2525 -- 2590. 2. Claire Amiot and Steffen Oppermann, Cluster equivalence and graded derived equivalence, Doc. Math. 19 (2014), 1155 -- 1206. 3. , Higher preprojective algebras and stably Calabi-Yau properties, Math. Res. Lett. 21 (2014), no. 4, 617 -- 647. 4. I. Assem, T. Brustle, and R. Schiffler, Cluster-tilted algebras as trivial extensions, Bull. Lond. Math. Soc. 40 (2008), no. 1, 151 -- 162. 5. Karin Baur and Robert J. Marsh, A geometric description of m-cluster categories, Trans. Amer. Math. Soc. 360 (2008), no. 11, 5789 -- 5803. 6. Apostolos Beligiannis, Relative homology, higher cluster-tilting theory and categorified Auslander- Iyama correspondence, J. Algebra 444 (2015), 367 -- 503. 7. Klaus Bongartz, Algebras and quadratic forms, J. London Math. Soc. (2) 28 (1983), no. 3, 461 -- 469. 8. Aslak Bakke Buan, Robert Marsh, Markus Reineke, Idun Reiten, and Gordana Todorov, Tilting theory and cluster combinatorics, Adv. Math. 204 (2006), no. 2, 572 -- 618. 9. Aslak Bakke Buan, Robert J. Marsh, and Idun Reiten, Cluster-tilted algebras of finite representation type, J. Algebra 306 (2006), no. 2, 412 -- 431. 10. 11. Igor Burban, Osamu Iyama, Bernhard Keller, and Idun Reiten, Cluster tilting for one-dimensional , Cluster-tilted algebras, Trans. Amer. Math. Soc. 359 (2007), no. 1, 323 -- 332 (electronic). hypersurface singularities, Adv. Math. 217 (2008), no. 6, 2443 -- 2484. 12. P. Caldero, F. Chapoton, and R. Schiffler, Quivers with relations arising from clusters (An case), Trans. Amer. Math. Soc. 358 (2006), no. 3, 1347 -- 1364. 13. Louis de Thanhoffer de Volcsey and Michel Van den Bergh, Some new examples of nondegenerate quiver potentials, Int. Math. Res. Not. IMRN (2013), no. 20, 4672 -- 4686. 14. Karin Erdmann, Blocks of tame representation type and related algebras, Lecture Notes in Mathe- matics, vol. 1428, Springer-Verlag, Berlin, 1990. 15. Peter Gabriel, Auslander-Reiten sequences and representation-finite algebras, Representation theory, I (Proc. Workshop, Carleton Univ., Ottawa, Ont., 1979), Lecture Notes in Math., vol. 831, Springer, Berlin, 1980, pp. 1 -- 71. 16. Victor Ginzburg, Calabi-Yau algebras, arXiv:math.AG/0612139,. 17. Lingyan Guo, Cluster tilting objects in generalized higher cluster categories, J. Pure Appl. Algebra 215 (2011), no. 9, 2055 -- 2071. 18. Osamu Iyama and Steffen Oppermann, Stable categories of higher preprojective algebras, Adv. Math. 244 (2013), 23 -- 68. 19. Osamu Iyama and Yuji Yoshino, Mutation in triangulated categories and rigid Cohen-Macaulay modules, Invent. Math. 172 (2008), no. 1, 117 -- 168. 20. Bernhard Keller, On triangulated orbit categories, Doc. Math. 10 (2005), 551 -- 581. 21. , Calabi-Yau triangulated categories, Trends in representation theory of algebras and related topics, EMS Ser. Congr. Rep., Eur. Math. Soc., Zurich, 2008, pp. 467 -- 489. 22. , Deformed Calabi-Yau completions, J. Reine Angew. Math. 654 (2011), 125 -- 180, With an appendix by Michel Van den Bergh. 23. Bernhard Keller and Idun Reiten, Cluster-tilted algebras are Gorenstein and stably Calabi-Yau, Adv. Math. 211 (2007), no. 1, 123 -- 151. 24. , Acyclic Calabi-Yau categories, Compos. Math. 144 (2008), no. 5, 1332 -- 1348, With an appendix by Michel Van den Bergh. 25. Bernhard Keller and Dong Yang, Derived equivalences from mutations of quivers with potential, Adv. Math. 226 (2011), no. 3, 2118 -- 2168. FINITE-DIMENSIONAL ALGEBRAS ARE (m > 2)-CALABI-YAU-TILTED 19 26. Hugh Thomas, Defining an m-cluster category, J. Algebra 318 (2007), no. 1, 37 -- 46. 27. Michel Van den Bergh, Calabi-Yau algebras and superpotentials, Selecta Math. (N.S.) 21 (2015), no. 2, 555 -- 603. 28. Anette Wralsen, Rigid objects in higher cluster categories, J. Algebra 321 (2009), no. 2, 532 -- 547. 29. Yu Zhou and Bin Zhu, Cluster combinatorics of d-cluster categories, J. Algebra 321 (2009), no. 10, 2898 -- 2915. Department of Mathematics, University of Haifa, Mount Carmel, Haifa 31905, Israel E-mail address: [email protected]
1209.6544
4
1209
2015-06-17T15:22:01
Two-generated algebras and standard-form congruence
[ "math.RA" ]
Matrix congruence can be used to mimic linear maps between homogeneous quadratic polynomials in $n$ variables. We introduce a generalization, called standard-form congruence, which mimics affine maps between non-homogeneous quadratic polynomials. Canonical forms under standard-form congruence for three-by-three matrices are derived. This is then used to give a classification of algebras defined by two generators and one degree two relation. We also apply standard-form congruence to classify homogenizations of these algebras.
math.RA
math
TWO-GENERATED ALGEBRAS AND STANDARD-FORM CONGRUENCE JASON GADDIS Abstract. Matrix congruence can be used to mimic linear maps between homogeneous quadratic polynomials in n variables. We introduce a general- ization, called standard-form congruence, which mimics affine maps between non-homogeneous quadratic polynomials. Canonical forms under standard- form congruence for three-by-three matrices are derived. This is then used to give a classification of algebras defined by two generators and one degree two relation. We also apply standard-form congruence to classify homogenizations of these algebras. Keywords: Matrix congruence; Isomorphism problems; Two-generated algebras; Automorphism groups; Skew polynomial rings; Homogenization 1. Introduction Let k be an algebraically closed field of characteristic zero. All algebras are k- algebras and all isomorphisms are as k-algebras. We denote by Mn(k) the ring of n × n matrices over k. We denote the center of an algebra A by Z(A). Our interest is in algebras A defined as a factor of the free algebra on two degree one generators by a single degree two relation, i.e., A = khx, y fi, deg(f ) = 2. (1.1) In case f is homogeneous, the classification of such algebras is well-known (see, e.g., [14]). The polynomial f can be represented by a 2 × 2 matrix and matrix congru- ence corresponds to linear isomorphisms between homogeneous algebras. Hence, canonical forms for matrices in M2(k) give a maximal list of algebras to consider. One must verify that there are no non-linear isomorphisms between the remaining algebras. This can be accomplished by considering ring-theoretic properties, re- sulting in four types of algebras: the quantum planes Oq(k2), the Jordan plane J , Ryx, and Rx2 . We give a method for extending this idea to algebras in which f is not necessarily homogeneous. In Section 3, we develop a modified version of matrix congruence called standard-form congruence. Canonical forms in M3(k) under standard-form congruence are determined in Section 4. These forms are in near 1-1 correspondence with isomorphism classes of algebras of the form (1.1). This leads to the following theorem. 2000 Mathematics Subject Classification. Primary 15A21, 16S37; Secondary 16S36. 1 2 JASON GADDIS Theorem 1.1. Suppose A ∼= khx, y fi where f is a polynomial of degree two. Then A is isomorphic to one of the following algebras: Oq(k2), f = xy − qyx (q ∈ k×), J , f = yx − xy + y2, U, f = yx − xy + y, Rx2, f = x2, Ryx, f = yx, Aq 1(k), f = xy − qyx − 1 (q ∈ k×), J1, f = yx − xy + y2 + 1, k[x], f = x2 + y, Rx2−1, f = x2 − 1, S, f = yx − 1. Furthermore, the above algebras are pairwise non-isomorphic, except (k). Many of these algebras are well-known. The algebras Aq Oq(k2) ∼= Oq−1 (k2) and Aq 1(k) ∼= Aq−1 1(k) are the quantum Weyl algebras, U the enveloping algebra of the non-abelian two-dimensional solvable Lie algebra, and J1 the deformed Jordan plane. This list slightly contradicts that given in [14] since S and J1 both have Gelfand-Kirillov (GK) dimension two. We prove this theorem in Section 5. 1 We define one additional algebra, V = khx, y yx − xy + y2 + xi. This algebra is not included in Theorem 1.1 because it is isomorphic to U (Propo- sition 5.1). As a second application of standard-form congruence, we consider a related class of algebras, H = khx, y, z xz − zx, yz − zy, fi, f ∈ khx, y, zi, deg(f ) = 2, f /∈ k[z], f homogeneous. (1.2) Algebras of form (1.2) may be regarded as homogenizations of those of form (1.1). In Section 6, we prove (Theorem 6.1) that canonical forms under sf-congruence are in 1-1 correspondence with isomorphism classes of algebras of the form (1.2). This result may be framed in terms of (Artin-Schelter) regular algebras. We refer the reader to [13] for undefined terms. If H is a global dimension three regular algebra, then H is associated to a point scheme C ⊂ P2 and an automorphism σ of C. Suppose C contains a line fixed by σ (Type S ′ 1 regular algebras). By [13], Proposition 1.2, H may be twisted so that it is isomorphic to a k-algebra on generators x, y, z with defining relations where h is one of the following polynomials xz = zx, yz = zy, h = 0, (I) yx − xy + y2 + z(αx + βy + γz), (II) xy − qyx + z(αx + βy + γz), q ∈ k×, for some α, β, γ ∈ k. Hence, Theorem 6.1 provides a refinement on this classifica- tion. 2. Congruence Let f = ax2 + bxy + cyx + dy2, a, b, c, d ∈ k. By a slight abuse of notation, f =(cid:0)x y(cid:1)(cid:18)a b c d(cid:19)(cid:18)x y(cid:19) . TWO-GENERATED ALGEBRAS AND STANDARD-FORM CONGRUENCE 3 Hence, we can represent any homogeneous quadratic polynomial by an element of M2(k). If A is of the form (1.1), then f is called a defining polynomial for A and the matrix corresponding to f is called a defining matrix for A. The map φ given by x 7→ p11x + p12y and y 7→ p21x + p22y, pij ∈ k, with p11p22− p12p21 6= 0 corresponds to a linear isomorphism between the algebras with defining polynomials f and φ(f ). Similarly, M, M ′ ∈ Mn(k) are said to be congruent and we write M ∼ M ′ if there exists P ∈ GLn(k) such that P T M P = M ′. Matrix congruence is an equivalence relation on the set Mn(k). A canonical form under congruence is a distinguished representative from an equivalence class. When two defining matrices are congruent there is an linear map between the polynomials that they determine. In turn, the algebras with these defining poly- nomials are isomorphic. On the other hand, if there is a linear map between two defining polynomials, then the corresponding algebras are isomorphic. However, two such algebras can still be isomorphic even if there is no linear map between the defining polynomials. Thus, canonical forms for congruent matrices give us a maximal list of algebras to consider and we are then left to determine whether there are any other isomorphisms. The Horn-Sergeichuk forms depend on three block-types which we henceforth refer to as HS-blocks, Jn(λ) = Γn =     0 1 λ 1 λ . . . . . . 0 0 1 λ   −1 1 1 −1 −1 1 , J1(λ) =(cid:0)λ(cid:1) , (−1)n+1 (−1)n . . . . . .   , Γ1 =(cid:0)1(cid:1) , 0 H2n(µ) =(cid:18) 0 Jn(µ) In 0(cid:19) , H2(µ) =(cid:18)0 µ 0(cid:19) . 1 Theorem 2.1 (Horn, Sergeichuk [9]). Each square complex matrix is congruent to a direct sum, uniquely determined up to permutation of summands, of canonical matrices of the three types Jn(0), Γn, and H2n(µ), µ 6= 0, (−1)n+1. Moreover, H2n(µ) is determined up to replacement of µ by µ−1. As a consequence of the previous theorem, there are four HS-block types in dimension two: Γ1 ⊕ J1(0), J2(0), Γ2, and H2(µ). We choose to use J2(0)T in place of J2(0) and let q = µ in H2(µ). These matrices are given explicitly as (cid:18)1 0 0 0(cid:19) ,(cid:18)0 1 0 0(cid:19) ,(cid:18)0 −1 1 (cid:19) ,(cid:18)0 −1 0 (cid:19) , q ∈ k×. 1 q (2.1) We denote these matrices by Mx2, Myx, MJ , and Mq, respectively. It follows from Theorem 2.1, or a quick computation, that Mq ∼ Mq−1 . Moreover, Mp ∼ Mq if and only if p = q±1 (see Corollary 2.3). 4 JASON GADDIS As it will be useful in the general (non-homogeneous) case we compute the stabi- lizer groups for the matrices in (2.1). In general, these stabilizer groups correspond to some orthosymplectic group but, because some of the forms are degenerate, there are shifts in the dimension. Any M ∈ Mn(k) admits a unique decomposition M = A+ S where A, S ∈ Mn(K) with S symmetric and A antisymmetric. Because congruence preserves symmetry (resp. antisymmetry), then the stabilizer group of M is equal to the intersection of the stabilizer groups for A and S. Proposition 2.2. Let M be one of the matrices in (2.1). The group is described below. Stab(M ) = {P ∈ GL2(k) P T M P = M} r 0 s(cid:19)(cid:12)(cid:12)(cid:12)(cid:12) Stab (Mx2) =(cid:26)(cid:18)±1 0 0 r−1(cid:19)(cid:12)(cid:12)(cid:12)(cid:12) Stab (Myx) =(cid:26)(cid:18)r 1(cid:19)(cid:12)(cid:12)(cid:12)(cid:12) Stab (MJ ) =(cid:26)±(cid:18)1 0 r−1(cid:19)(cid:12)(cid:12)(cid:12)(cid:12) Stab (Mq) =(cid:26)(cid:18)r Stab (M−1) =(cid:26)(cid:18)r 0 r−1(cid:19) ,(cid:18) 0 0 0 0 r Stab (M1) = SL2(k). s−1 r, s ∈ k×(cid:27) , r ∈ k×(cid:27) , r ∈ k×(cid:27) , r ∈ k×(cid:27) (q ∈ k×, q 6= ±1), r, s ∈ k×(cid:27) , s 0(cid:19)(cid:12)(cid:12)(cid:12)(cid:12) Proof. Throughout, let P ∈ Stab(M ) and write P =(cid:18)a b d(cid:19). alternating form. Thus, its stabilizer is Sp(2) ∼= SL2(k). c The matrix M1 corresponds to the standard basis non-degenerate dimension two The matrix M−1 corresponds to a non-standard basis non-degenerate dimension two symmetric form. We have P T M−1P =(cid:18) 2ac ac + bd ac + bd 2bd (cid:19) =(cid:18)0 1 1 0(cid:19) . Hence, either a = d = 0 or b = c = 0 and the result follows. In the case of Mx2 we have P T Mx2P =(cid:18)a2 ab b2(cid:19) =(cid:18)1 0 0 0(cid:19) . ab Then a = ±1 and b = 0. We have MJ =(cid:18)0 0 0 1(cid:19) +(cid:18)0 −1 0 (cid:19) . 1 Finally, for q 6= ±1, Thus, Stab(MJ ) = Stab(Mx2)T ∩ Stab(M1). 2 (cid:18)0 −1 0 (cid:19) + Thus, Stab(Mq) = Stab(M1) ∩ Stab(M−1). Mq = q + 1 1 2 (cid:18)0 q − 1 1 1 0(cid:19) . The case of Myx may be seen from the previous computation by letting q = 0. (cid:3) TWO-GENERATED ALGEBRAS AND STANDARD-FORM CONGRUENCE 5 Corollary 2.3. Let p, q ∈ k×. Then Mp ∼ Mq if and only if p = q±1. Proof. Sufficiency is provided by Theorem 2.1. Suppose Mp ∼ Mq and choose P ∈ GL2(k) such that Mp = P T MqP . Write P =(cid:18)a b c P T MqP =(cid:18)(q − 1)ac qad − bc d(cid:19). Then, (q − 1)bd(cid:19) =(cid:18)0 −1 0 (cid:19) . qbc − ad q Observe that, if q = 1, then Mp = P T M1P = (ad − bc)M1, and so p = 1. In general, we see by comparing P T MqP to Mp in (2.2) that ac = bd = 0. Thus, either b = c = 0 or a = d = 0. In the first case, Mp = P T MqP = (ad)Mq, and so p = q. In the second case, Mp = P T MqP = (−qbc)Mq−1, and so p = q−1. (cid:3) 3. Standard Form Congruence In the non-homogeneous case, we write f = ax2 + bxy + cyx + dy2 + αx + βy + γ, a, b, c, d, α, β, γ ∈ k. We can represent f by a 3 × 3 matrix via the rule (2.2) We extend the terms defining polynomial and defining matrix as one would expect. However, our choice of defining matrix is not unique. One could define f by Hence, it is necessary to fix a standard form for the defining matrices of non- homogeneous polynomials. We restrict our attention to the following set, f =(cid:0)x y f =(cid:0)x y 1(cid:1)  1(cid:1)  (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) c  a b α c d β 0 0 γ    x y 1  . 0 0 b d a c x y 1 α β γ   .   b2(cid:19) 6= 0  (cid:18)a1 a2 b1 Every degree two polynomial has a unique corresponding matrix in G3. Consider the matrix ⊂ M3(k). a1 a2 a3 b1 b3 0 b2 0 G3 =    M =  m11 m12 m13 m21 m22 m23 m31 m32 m33   ∈ M3(k). This corresponds to the polynomial f = m11x2 + m12xy + m13x + m21yx + m22y2 + m23y + m31x + m32y + m33 = m11x2 + m12xy + m21yx + m22y2 + (m13 + m31)x + (m23 + m32)y + m33, which in turn corresponds to the matrix   . Hence, we define a k-linear map sf : M3(k) → G3 by m11 m12 m13 + m31 m21 m22 m23 + m32   m33 0 0 m11 m12 m13 m21 m22 m23 m31 m32 m33     7→  m11 m12 m13 + m31 m21 m22 m23 + m32 0 0 m33   . 6 JASON GADDIS Let pij ∈ k and define a k-linear map by φ(x) = p11x + p12y + p13, φ(y) = p21x + p22y + p23, φ(1) = 1. (3.1) If p11p22 − p12p21 6= 0, then φ defines an affine isomorphism between khx, y fi and khx, y φ(f )i. Thus, the matrices corresponding to affine isomorphisms of these algebras should be contained in the set P3 =(cid:26)(cid:18)P1 P2 1(cid:19) ∈ M3(k) P1 ∈ GL2(k), P2 ∈ k2(cid:27) . mial and adds the linear parts. We write M ∈ Mn(k) in block form 0 In general, we want a map that fixes the degree two part of a quadratic polyno- M =(cid:26)(cid:18) M1 M2 3 m(cid:19) M1 ∈ Mn−1(k), M2, M3 ∈ kn−1, m ∈ k(cid:27) . M T (3.2) We call M1 the homogeneous block of M . Define the set Gn =(cid:26)(cid:18)M1 M2 0 m(cid:19) ∈ Mn(k) 0 6= M1 ∈ Mn−1(k), M2 ∈ kn−1, m ∈ k(cid:27) . Then define the map sf : Mn → Gn by (cid:18) M1 M2 3 m(cid:19) 7→(cid:18)M1 M2 + M3 m (cid:19) , M T 0 (3.3) where the matrix is written according to (3.2). The matrices corresponding to affine isomorphisms of these algebras should be contained in the set Pn =(cid:26)(cid:18)P1 P2 1(cid:19) ∈ Mn(k) P1 ∈ GLn−1(k), P2 ∈ kn−1(cid:27) . 0 Proposition 3.1. Pn is a group. Proof. That Pn contains the identity matrix is clear. Let P, P ′ ∈ Pn. Then P P ′ =(cid:18)P1 P2 1(cid:19)(cid:18)P ′ 0 1 P ′ 2 0 1(cid:19) =(cid:18)P1P ′ 0 Since P1 ∈ GLn−1(k), then we can set P ′ It is now clear from the above that P ′ = P −1. 1 = P −1 1 P1P ′ 2 + P2 1 (cid:19) ∈ Pn. 1 ∈ GLn−1(k) and P ′ 2 = −P −1 1 P2. (cid:3) Under ordinary matrix congruence, two matrices which are scalar multiples of each other are always congruent. However, if we restrict to Pn, that is no longer the case. Hence, in our modified definition of congruence, we set scalar multiple matrices to be congruent to each other. Definition 3.2. We say M, N ∈ Mn(k) are standard-form congruent (sf- congruent) and write M ∼sf N if there exist P ∈ Pn and α ∈ k× such that sf(M ) = α · sf(P T N P ). The next proposition shows that sf-congruence is a true extension of congruence. Proposition 3.3. Let M, N ∈ Mn(k) with homogeneous blocks M1, N1, respec- tively. If M ∼sf N , then M1 ∼ N1. TWO-GENERATED ALGEBRAS AND STANDARD-FORM CONGRUENCE 7 Proof. By hypothesis, sf(M ) = α · sf(P T N P ) for some P ∈ Pn, α ∈ k×. Then 0 m(cid:19) = sf(M ) = α · sf(P T N P ) (cid:18)M1 M2 1 P T 2 1 N1P1 = α · sf(cid:18)(cid:18)P T = α · sf(cid:18)(cid:18)P T 1 N1P1, so M1 ∼ N1. ∗ 0 1(cid:19)(cid:18)N1 N2 0 m(cid:19)(cid:18)P1 P2 ∗(cid:19)(cid:19) =(cid:18)α · P T ∗ 0 1(cid:19)(cid:19) 1 N1P1 0 ∗(cid:19) . ∗ (cid:3) Thus, M1 = α · P T The following may be regarded as a sort of converse to Proposition 3.3. Corollary 3.4. Let M, N ∈ Mn(k) with the same homogeneous block L. If P ∈ Pn is such that sf(M ) = α · sf(P T N P ) for some α ∈ k×, then P1 = γQ1 for some Q1 ∈ Stab(L) and γ ∈ k×. Proof. This is an immediate consequence of the computation in the previous propo- sition. We have L = α · P T γ = √α−1. 1 LP1. Let Q1 = √αP1, then Q1 ∈ Stab(M1) and (cid:3) In the next section we will determine equivalence classes in M3(k) under sf- congruence. By Proposition 3.3 and Corollary 3.4, we may immediately divide the matrices into distinguished classes depending on the homogeneous blocks. The next proposition will allow us to show sf-congruence between matrices with the same homogeneous block, but whose column vector M2 or constant m are scalar multiples. Proposition 3.5. Let M ∈ Gn and γ ∈ k×. Then γ−1M2 γ−2m(cid:19) . M ∼sf (cid:18)M1 0 Proof. Let I be the (n − 1) × (n − 1) identity matrix. Let P ∈ Pn with P1 = γI and P2 = 0. Then P T M P =(cid:18)γ2M1 0 γM2 m (cid:19) = γ2 ·(cid:18)M1 0 γ−1M2 γ−2m(cid:19) . (cid:3) Proving that standard-form congruence is an equivalence relation requires the following technical lemmas. Lemma 3.6. If M ∈ Mn(k) and P ∈ Pn, then sf(P T M P ) = sf(P T sf(M )P ). 8 JASON GADDIS Proof. We have, 1 P T 2 sf(P T M P ) = sf(cid:18)(cid:18)P T = sf(cid:18)(cid:18) =(cid:18)P T =(cid:18)P T = sf(cid:18)(cid:18)P T 1 P T 2 0 0 1 M1P1 0 1(cid:19)(cid:18)M1 0 = sf(P T sf(M )P ). 1 M1P1 P T 1 M1P2 + P T 0 1(cid:19)(cid:18) M1 M2 3 m(cid:19)(cid:18)P1 P2 1(cid:19)(cid:19) M T 0 P T 1 M1P1 P T 2 M1P1 + M T 3 P1 P T 2 M1P2 + P T 1 M2 + (P T P T 1 M1P2 + P T P T 2 M1P2 + P T 2 M2 + M T P T 1 M1P2 + P T 1 M2 2 M2 + M T 2 M1P1 + M T 3 P2 + m 1 P2 + P T 3 P2 + m(cid:19)(cid:19) 3 P1)T (cid:19) 2 M1P2 + P T P T M2 + M3 1 M2 + P T 1 M T 2 M2 + P T m (cid:19)(cid:18)P1 P2 0 1 M3 2 M3 + m (cid:19) 1(cid:19)(cid:19) (cid:3) Proposition 3.7. Standard-form congruence defines an equivalence relation. Proof. Reflexivity is obvious. Now suppose M ∼sf M ′, so sf(M ) = α · sf(P T M ′P ) for some α ∈ k× and P ∈ Pn. By Lemma 3.6, (P −1)T sf(M )(P −1) = α · (P −1)T sf(P T M ′P )(P −1) sf(cid:0)(P −1)T sf(M )(P −1)(cid:1) = α · sf(cid:0)(P −1)T sf(P T M ′P )(P −1)(cid:1) α−1 · sf(cid:0)(P −1)T M (P −1)(cid:1) = sf(cid:0)(P −1)T P T M ′P (P −1)(cid:1) α−1 · sf(cid:0)(P −1)T M (P −1)(cid:1) = sf(M ′). Hence, M ′ ∼sf M , so symmetry holds. P, Q ∈ Pn such that Finally, suppose M ∼sf M ′ and M ′ ∼sf M ′′. Then there exists α, β ∈ k× and sf(M ) = α · sf(P T M ′P ) and sf(M ′) = β · sf(QT M ′′Q). By two additional applications of Lemma 3.6, sf(M ) = α · sf(P T M ′P ) = α · sf(cid:0)P T sf(M ′)P(cid:1) = α · sf(cid:0)P T (cid:0)β · sf(QT M ′′Q)(cid:1) P(cid:1) = (αβ) · sf((QP )T M ′′(QP )). Thus, M ∼sf M ′′, so transitivity holds as well. (cid:3) 4. Canonical Forms Canonical forms for these equivalence classes are presented in Theorem 4.2. In this section, we determine equivalence classes for M3(k) under sf-congruence. If M ∼sf N , then M1 ∼ N1 by Proposition 3.3. Thus, we may assume that M ∈ G3 and M1 is one of (2.1). By Proposition 2.2, it is left only to determine which pairs (M2, m) determine distinct forms. Corollary 4.1. Let p, q ∈ k×. Let Wp and Wq be the defining matrices for Ap and Aq Proof. That Wp ∼sf Wq if p = q±1 is an easy check and we omit it. The converse now follows by Corollary 2.3 and Proposition 3.3. 1(k), respectively. Then Ap 1(k) if and only if p = q±1. 1(k) ∼sf Aq 1(k) (cid:3) TWO-GENERATED ALGEBRAS AND STANDARD-FORM CONGRUENCE 9 Our last step is to determine, for each canonical form in M2(k), which pairs (M2, m) give sf-congruent matrices. Theorem 4.2. Canonical forms for M3(k) under sf-congruence are given below: 0 0 1 0 0 0 0 0 0 0 0 0(cid:17)(cid:16) 1 0 0 (cid:16) 1 0 0 0 0 −1(cid:17)(cid:16) 1 0 0 0 0 0(cid:17) 0 0 0(cid:17)(cid:16) 0 0 0 (cid:16) 0 0 0 0 0 −1(cid:17) 1 0 0 1 0 0 1 1 0 1 1 0 1 1 0 0 0 0(cid:17)(cid:16) 0 −1 0 (cid:16) 0 −1 0 0 0 0(cid:17)(cid:16) 0 −1 0 (cid:16) 0 −1 0 0 0 1(cid:17)(cid:16) 0 −1 1 0 0 0(cid:17) 0 0 1(cid:17)(cid:16) 0 −1 0 0 0 0(cid:17) . q 0 0 1 0 1 q 0 0 Moreover, the forms involving q are determined up to replacement by q−1. Proof. Suppose M ∈ M3(k). We perform necessary congruence operations to put M1 in canonical form. Thus, M is sf-congruent to a block matrix of the form N =(cid:18)L N2 n (cid:19) 0 1(cid:19) ∈ P3. where L is one of (2.1), N2 =(cid:0)u v(cid:1)T By Corollary 3.4, we may assume P1 ∈ Stab(L). Write P1 as in Proposition 2.2 and P2 =(cid:0)e ±1. Both cases are similar and we only consider the positive case below, ∈ k2, and n ∈ k. Let P =(cid:18)P1 P2 (Case 1: L = Mx2) There are two cases for the stabilizer of L corresponding to f(cid:1)T ∈ k2. 0 sf(P T N P ) =  1 0 0 0 0 2e + u + rv 0 e2 + eu + f v + n  . sv Because det(P ) 6= 0, then s 6= 0. Thus, sv = 0 if and only if v = 0. In case v 6= 0 we set e = 0, s = v−1, r = −uv−1, and f = −nv−1. This is the defining 2 u. The bottom right entry matrix of k[x]. becomes − 1 4 u2, then we have the defining matrix of Rx2 and otherwise, by Proposition 3.5, that of Rx2−1. In case v = 0, then we set e = − 1 4 u2 + n. Thus, if n = 1 (Case 2: L = Myx) We have sf(P T N P ) =  0 1 0 0 0 r(u + f ) r−1(e + v) 0 f e + eu + f v + n  . Setting f = −u and e = −v gives a bottom right entry of n − uv. Thus, there are two cases corresponding to n = uv and n 6= uv. In the former case we arrive at the defining matrix of Ryx and in the other case, by Proposition 3.5, that of S. (Case 3: L = MJ ) There are two cases for the stabilizer. We consider only the positive case, which gives, sf(P T N P ) = 0 −1 1 1  0 0 u 2f + ru + v f 2 + eu + f v + n  . 2 v and the (3, 3)-entry becomes n − 1 Setting f = − 1 2 (ru + v) allows us to make the (2, 3)-entry zero. If u = 0, we let f = − 1 4 v2 we have the defining matrix for J and otherwise that for J1. If u 6= 0, then by Proposition 3.5 we can assume u = 1. Thus, f 2 + f v = 1 4 (v2− r2)− n so that the (3, 3)-entry is zero, giving the defining matrix for V. 4 (r2− v2), and so we take e = 1 4 v2. Thus, in case n = 1 10 JASON GADDIS (Case 4a: L = M1) Then sf(P T N P ) =  0 −1 0 1 0 0 au + cv bu + dv eu + f v + n  . Suppose u = v = 0. If n = 0, then we have the defining matrix for k[x, y] and otherwise we have the matrix for A1(k). Suppose u = 0 and v 6= 0. Setting a = v, c = 0, d = v−1, and f = −nv−1 gives the defining matrix for U. Similarly for the case v = 0 and u 6= 0. Finally, suppose u, v 6= 0. We choose e, f such that eu + f v = −n. Because det(P1) 6= 0, we can choose a, b, c, d such that au + dv = 0 and bu + dv = 1, giving the defining matrix for U. (Case 4b: L = Mq, q 6= ±1) We note that, in case q = −1, there are additional matrices in the stabilizer group than those considered here. However, they are not needed in this result. We have sf(P T N P ) =  0 −1 0 q 0 0 r(u + (q − 1)f ) r−1(v + (q − 1)e) f e(q − 1) + eu + f v + n  . Set f = u(1 − q)−1 and e = v(1 − q)−1. Then the bottom right entry becomes n − uv(q − 1)−1. Thus, if n = uv(q − 1)−1, then this form corresponds to the defining matrix for Oq(k2) and otherwise, by Proposition 3.5, it corresponds to that of Aq 1(k). Combining this with Corollaries 2.3 and 4.1 completes the result. (cid:3) 5. Classification We wish to show that the list in Theorem 1.1 is complete with no isomorphic repetitions. The observant reader may have noticed a discrepancy in the Theorem 4.2 and Theorem 1.1. Proposition 5.1. The algebras U and V are isomorphic. Proof. Let X, Y be the generators for U and let x, y be the generators for V. Define a map Φ : U → V by Φ(X) = −y, Φ(Y ) = x + y2. This map extends to an algebra homomorphism since Φ(Y )Φ(X) − Φ(X)Φ(Y ) + Φ(Y ) = (x + y2)(−y) − (−y)(x + y2) + (x + y2) = yx − xy + x + y2. We also define Ψ : V → U by Ψ(x) = Y − X 2, Ψ(y) = −X. This map also extends to an algebra homomorphism since Ψ(y)Ψ(x) − Ψ(x)Ψ(y) + Ψ(x) + Ψ(y)Ψ(y) = (−X)(Y − X 2) − (Y − X 2)(−X) + (Y − X 2) − (−X)2 = 0. It is readily checked that Ψ(Φ(X)) = X and Ψ(Φ(Y )) = Y so that Ψ = Φ−1. (cid:3) This is the one case where two algebras are isomorphic even though their defining matrices are not sf-congruent. This makes sense as the map Φ constructed above is not an affine isomorphism. The relationship between U and V is explored further in [5]. In particular, U is a Poincar´e-Birkhoff-Witt (PBW) deformation of k[x, y] while V is a PBW deformation of J . In Section 6, we will show that the respective homogenizations of U and V are not isomorphic. TWO-GENERATED ALGEBRAS AND STANDARD-FORM CONGRUENCE 11 One can divide the remaining algebras into two classes: the domains and non- domains. The non-domains can be distinguished using well-known ring-theoretic results. For details, we refer the interested reader to [7]. Proposition 5.2. The algebras Ryx, Rx2 , Rx2−1 and S are all non-isomorphic. Proof. The algebras Rx2, Rx2−1 and S are prime while Ryx is not. We have gld Rx2−1 = gldS = 1 whereas gld Rx2 = ∞. Finally, gkS = 2 whereas gk Rx2−1 = ∞. (cid:3) The domains can be further subdivided into differential operator rings, quantum Weyl algebras, and quantum planes. We review each of those classes here. Proposition 5.3. Let p, q ∈ k×. Then Aq Proof. When p and q are not roots of unity, this was proved in [2], Corollary 3.11 (c). This result follows in full from [6], Propositions 6.1, 6.3, and 6.4. See also [15] for a more general result that also applies here. (cid:3) 1(k) if and only if p = q±1. 1(k) ∼= Ap The corresponding result for quantum planes is [7], Corollary 4.2.12. However, as a more general result is useful in Section 6, we review it here. We say q = (qij) ∈ Mn(k×) is multiplicatively antisymmetric if qii = 1 and qij = q−1 for all i 6= j. Let Sn be the symmetric group on n letters. If A ∈ Mn(k×) ji is multiplicatively antisymmetric and σ ∈ Sn, then σ acts on A by σ.A = [Aσ(i)σ(j)]. We say p is a permutation of q if there exists σ ∈ Sn such that p = σ.q. For q ∈ Mn(k×) multiplicatively antisymmetric, quantum affine n-space Oq(kn) is defined as the algebra with generating basis {xi}, 1 ≤ i ≤ n, subject to the relations xixj = qij xjxi for all 1 ≤ i, j ≤ n. Theorem 5.4 ([7], Theorem 4.2.11). Op(kn) ∼= Oq(kn) if and only if p is a permutation of q. Proof. (Sketch) Let {xi} be a generating basis for Op(kn) and {yi} that for Oq(kn). If p = σ.q, then one easily constructs an isomorphism Φ : Op(kn) → Oq(kn) given by Φ(xi) = yσ(i). Conversely, any isomorphism determines a permutation of the degree one ele- ments. One then checks that such a permutation must also permute the parameters accordingly. (cid:3) We now review isomorphisms between the rings U, J , and J1. Let S be a ring. Given σ ∈ Aut(S), a k-linear map δ : S → S is said to be a σ-derivation if it satisfies the twisted Leibniz rule, δ(ab) = σ(a)δ(b) + δ(a)b for all a, b ∈ S. The skew polynomial ring R = S[x; σ, δ] is the overring of S with commutation given by xa = σ(a)x + δ(a) for all a ∈ S. If δ = 0, then we write R = S[x; σ]. If σ = idS, then we write R = S[x; δ] and R is said to be a differential operator ring. The algebras U, J , and J1 all have this form with δ(y) = y, y2, and y2 + 1, respectively. Proposition 5.5 (Alev, Dumas, [4], Proposition 3.6). Let k[y][x; δ] and k[Y ][X; d] be differential operator rings with δ(y) = f ∈ k[y] and d(Y ) = g ∈ k[Y ]. Then k[y][x; δ] ∼= k[Y ][X; d] if and only if there exists λ, α ∈ k× and β ∈ k such that f (y) = λg(αy + β). 12 JASON GADDIS Corollary 5.6. The algebras A1(k), U, J and J1 are all non-isomorphic. Proof. The algebra A1(k) is simple and therefore distinct. The algebra U is not isomorphic to J and J1 since deg(xy − yx) = 1. If J1 ∼= J is an isomorphism, then by Proposition 5.5 there exists α, β ∈ k and λ ∈ k× such that (y2 + 1) = λ(αy + β)2 = λ(α2y2 + 2αβy + β2). Comparing coefficients of y we get that α = 0 or β = 0, a contradiction. (cid:3) Combining with results obtained previously, we can now complete the proof of our main theorem. Proof of Theorem 1.1. Let A and A′ be of the form (1.1) with defining matrices If M ∼sf M ′, then A ∼= A′. By Theorem 4.2 M, M ′ ∈ M3(k), respectively. and Proposition 5.1, we need only show that there are no additional isomorphisms between the algebras in the present theorem. The non-domains Ryx, Rx2 , Rx2−1 and S are all non-isomorphic by Proposition 5.2. The algebra with defining polynomial x2 − y is isomorphic to k[x] via the map x 7→ x and y 7→ x2. This algebra, along with O1(k2) ∼= k[x, y] are the only commutative rings considered, and are distinct from one another. As noted above, A1(k) is simple and therefore distinct from the other domains considered. The domains can be divided, as above, into one of three classes: quantum planes, quantum Weyl algebras, and differential operator rings. By Corollary 5.6, Propo- sition 5.3, and Theorem 5.4, the algebras belonging to each class are distinct from one another with the exceptions Oq(k2) ∼= Oq−1 (k2) and Aq (k). Proving that an algebra belongs to exactly one of these classes requires a study of their automorphism groups. 1(k) ∼= Aq−1 1 If q 6= ±1, then Aut(Aq 1(k)) ∼= (k×) and Aut(Oq(k2)) ∼= (k×)2. On the other 1(k)) ∼= k× ⋊ {ω} and Aut(Oq(k2)) ∼= (k×)2 ⋊ {ω} hand, if q = −1, then Aut(Aq where ω is the involution switching the generators x and y (see [1] and [3]). By counting subgroups of order four, it follows that Ap 1(k) ≇ Oq(k2) for all p, q ∈ k×. In particular, k× has one subgroup of order four and (k×)2 has four. On the other hand, in k× ⋊ {ω} there are two subgroups of order four and in (k×)2 ⋊ {ω} there are eight. As a consequence of Proposition 5.5, the automorphism groups of U, J , or J1 are non-abelian semidirect products of a subgroup of k× by k[y] (see also [4], Proposition 3.6). Thus, these rings are distinct from Oq(k2) and Aq 1(k) except perhaps in the case that q = −1. However, in this case, x2 is central and Oq(k2) and Aq 1(k) are not primitive by [11], Proposition 3.2, whereas differential operator rings over k[y] are always primitive (see, e.g., [8]). (cid:3) Our results can be summed up succinctly in the following theorem. Theorem 5.7. Let A and A′ be of the form (1.1) with defining matrices M, M ′ ∈ M3(k), respectively. If M ∼sf M ′, then A ∼= A′. Conversely, if A ∼= A′, then M ∼sf M ′ unless A ∼= U and A′ ∼= V (or vice-versa). 6. Homogenizations Our goal in this section is to show that sf-congruence applies to algebras of the form (1.2) and prove a result analogous to Theorem 1.1 for these algebras. TWO-GENERATED ALGEBRAS AND STANDARD-FORM CONGRUENCE 13 Theorem 6.1. Let H be for the form (1.2). Then H is isomorphic to one of the following algebras, with one representative of f given in each case: 1(k)), f = xy − qyx − z2 (q ∈ k×), H(Oq(k2)), f = xy − qyx (q ∈ k×), H(Aq H(J ), f = yx − xy + y2, H(U), f = yx − xy + yz, H(Rx2), f = x2, H(Ryx), f = yx, H(k[x]), f = x2 + yz. H(J1), f = yx − xy + y2 + z2, H(V), f = yx − xy + y2 + xz, H(Rx2−1), f = x2 − z2, H(S), f = yx − z2, Furthermore, the above algebras are pairwise non-isomorphic, except H(Oq(k2)) ∼= H(Oq−1 (k2)) and H(Aq 1(k)) ∼= H(Aq−1 1 (k)). The key difference in this situation, versus that in the case of two-generated algebras, is that H(U) and H(V) are non-isomorphic (see Proposition 6.7). Proposition 6.2. The algebras H(k[x]), H(Rx2 ), H(Ryx), H(Rx2−1), and H(S) are not domains. Proof. In the case of H(Rx2) and H(Ryx), this is obvious. In H(k[x]), xyz = x(−x2) = (−x2)x = yzx = yxz ⇒ (xy − yx)z = 0. (6.1) If H(k[x]) is a domain, then (6.1) implies H(k[x]) is commutative. This is impossible since H(k[x])/(z) ∼= Rx2. In H(S), y(xy − z2) = yxy − yz2 = (yx)y − z2y = (yx − z2)y = 0. Finally, in H(Rx2−1), (x + z)(x − z) = x2 − xz + zx − z2 = x2 − z2 = 0. (cid:3) Let H of the form (1.2). Consider the linear map given by, φ(x) = p11x + p12y + p13z, φ(y) = p21x + p22y + p23z, φ(z) = z, (6.2) for pij ∈ k with p11p22 − p12p21 6= 0. One should compare this to the maps (3.1). It is clear that this defines an isomorphism khx, y, z xz − zx, yz − zy, fi → khx, y, z φ(xz − zx), φ(yz − zy), φ(f )i. Moreover, it follows that, since z ∈ Z(H) then z ∈ Z(φ(H)). As in the two- dimension general case, we do not assume these constitute all isomorphisms between algebras of the form (1.2). However, a consequence of Theorem 6.1 is that if two such algebras are isomorphic, then there exists an isomorphism of the above form. We can represent H by a triple of matrices, (X, Y, Z) =    0 0 0 1 0 0 −1 0 0  ,  0 0 0 0 0 −1 0 1 0  ,  m11 m12 m13 m21 m22 m23 0 m33 0    ,  m21 m22 ) not the zero matrix. This representation follows by letting ~x = (6.3) with ( m11 m12 (x y z)T so that xz − zx = ~xT X~x, yz − zy = ~xT Y ~x, f = ~xM ~xT . 14 JASON GADDIS As in Section 3, the matrix M is not uniquely determined for f unless we fix a standard form for M . Let H ′ be another algebra of form (1.2) and suppose φ : H → H ′ is a linear iso- morphism given by (6.2). The algebra H ′ is also defined by a triple, say (X, Y, M ′). Since φ(z) = z, then we let P ∈ P3 be the matrix of φ. It is too much to ask that P T XP = X and P T Y P = Y . We can still hope to preserve those relations up to linear combination. Proposition 6.3. Let P ∈ P3 and let X, Y be as in (6.3). The matrices X and Y are linear combinations of P T XP and P T Y P . Proof. Write Let b2 0 1  . a1 a2 a3 b1 b3 0 P =  0  and V = P T Y P =  a1 a2 0 0 0 0 −b1 −b2 b1 b2 0  . U = P T XP =  0 0 0 0 −a1 −a2 We require r, s ∈ k such that rU +sV = X. That is, ra1 +sb1 = 1 and ra2 +sb2 = 0. Since det P 6= 0, then this system has a solution. Similarly, we can find r′, s′ ∈ k such that r′U + s′V = Y . Hence, P fixes the commutation relations for z. (cid:3) As a consequence of the previous proposition, we have that standard form con- gruence preserves the commutation relations for z. Thus, we extend in a natural way the map (3.3) to this case. Moreover, there is no loss in referring to the ma- trix M as the defining matrix of H. If M ∼sf M ′, then the triples (X, Y, M ) and (X, Y, M ′) define isomorphic algebras. Therefore, if H is of the form (1.2), then H is isomorphic to an algebra given by one of the canonical forms from Theorem 4.2. One could now prove Theorem 6.1 in a manner analogous to Theorem 1.1, that is, by considering ring-theoretic properties of the algebras. However, we take a different approach here by considering prime ideals. This will allow us to apply Theorem 1.1 to this situation. Just as each domain of the form (1.1) can be represented as a skew polynomial ring over k[y], so can each domain of the form (1.2) be represented as a skew polynomial ring over k[y, z] (or k[x, z]). In these cases we can completely determine the prime ideals. In the case that A is not a domain, we can partially describe the prime ideals of H. The following is an immediate corollary of [5], Proposition 2.5. Corollary 6.4. Z(H(J )) = Z(H(J1)) = Z(H(U)) = Z(H(V)) = k[z]. Z(H(Oq(k2))) =(k[xn, yn, z] 1(k))) =(k[xn, yn, z] Z(H(Aq k[z] k[z] if q is a primitive nth root of unity otherwise. if q 6= 1 is a primitive nth root of unity otherwise. We say an algebra H of the form (1.2) has trivial center in case Z(H) = k[z]. The proof of Theorem 6.1 will be easier in this case. TWO-GENERATED ALGEBRAS AND STANDARD-FORM CONGRUENCE 15 Lemma 6.5. Suppose H is of the form (1.2). If P is a prime ideal of H with P ∩ k[z] 6= 0, then P contains z − α for some α ∈ k. Proof. Let g ∈ P ∩ k[z] be nonzero. If g is not irreducible in k[z], then g = g1g2 for some nonconstant g1, g2 ∈ k[z]. Because k[z] is central, then g1Hg2 = g1g2H ⊂ P . The primeness of P implies g1 ∈ P or g2 ∈ P . Hence, P contains az − b for some a, b ∈ k, a 6= 0, and so contains a−1(az − b) = z − a−1b. (cid:3) Before proceeding to the main theorem, we need one additional definition. Let J be an ideal in a ring R and σ ∈ Aut(R). Then J is σ-cyclic if J = J1∩···∩Jn where the Ji are distinct prime ideals of R such that σ−1(Ji+1) = Ji and σ−1(J1) = Jn. Let R be a commutative ring. The radical of an ideal I in R is √I = {a ∈ R an ∈ I for some n}. It is not difficult to see that the radical of an ideal is again an ideal in R. The ideal I is said to be primary if ab ∈ I implies a ∈ I or bn ∈ I for all a, b ∈ R and some n ∈ N. If I is primary, then √I is prime. Suppose H is a domain of form (1.2). If z is not a zero divisor in H, then we can localize at the set C = k[z]\{0}. We refer to this ring as HC . Theorem 6.6. Let H be a domain of the form (1.2). If P is a nonzero prime ideal in H, then one of the following holds: (1) z ∈ P and P corresponds to a prime of H/(z); (2) z − α ∈ P , α ∈ k×, and P corresponds to a prime of H/(z − α); (3) xy − yx ∈ P ; (4) P ∩ k[y, z] = (g1 ··· gn) where the gi are irreducible polynomials in k[y, z] (5) P ∩ k[x, z] = (g1 ··· gn) where the gi are irreducible polynomials in k[x, z] disjoint from k[z]; disjoint from k[z]. Proof. First, suppose P ′ = P ∩ k[z] 6= 0. Then P ′ is a prime ideal of k[z] and so, by Lemma 6.5, z − α ∈ P for some α ∈ k. Now assume P ∩ k[z] = 0. In this case, P extends to a prime ideal in HC . Let R = k(z)[y], then R has Krull dimension one. Let I = P ∩ R. By [10], Theorem 7.2, one of the following must hold: • HC /P is commutative; • I is σ-cyclic for some σ ∈ Aut(R); • I is primary with σ(√I) = √I. If HC /P is commutative, then xy − yx ∈ P . If I is σ-cyclic, then I = P1 ∩ ··· ∩ Pn for distinct prime ideals of R. But the prime ideals of R are exactly extensions of prime ideals of k[y, z] disjoint from k[z]. Therefore, I = (gσ(g)··· σn−1(g)) for some irreducible g ∈ k[y, z], g /∈ k[z], σn(g) = g. Otherwise, I is primary. Since √I is prime, then √I = (g) where g ∈ R is irreducible. We claim I = (gn). Because R is a principal ideal domain, I = (h) for some h ∈ R. Write h = tgn where n is maximal such that g does not divide t. We claim t is a constant. Suppose otherwise, then gm /∈ I for any m > 0. This contradicts g ∈ √I, and so the claim holds and I = (gn). For the remaining case, we need only observe that we can rewrite H as a skew polynomial ring with base ring k[x, z] and repeat. (cid:3) Note that the (4) and (5) occur if and only if H = H(Oq(k2)) or H = H(Aq 1(k)) with q a primitive nth root of unity. This is because in this case the center is nontrivial (Corollary 6.4). By Theorem 6.6, it remains only to consider those prime ideals P whose intersection with the base ring is zero. In this case, it suffices to 16 JASON GADDIS localize the base ring k[y, z] to Q = k(y, z) and consider the extension Q[x; σ, δ]. Then we can appeal to [12], Corollary 2.3. Thus, the prime ideals lying over zero in Q are of the form (g) where g ∈ k[xn, yn, z] is irreducible and such that g /∈ k[yn, z] and g /∈ k[xn, z]. Proposition 6.7. Let A and A′ be of the form 1.1 such that Z(A) = Z(A) = k. Let H = H(A) and H ′ = H(A′), respectively. If H ∼= H ′ then either A ∼= A′ and gr(A) ∼= gr(A′), or else A ∼= gr(A′) and A′ ∼= gr(A). Proof. Suppose Φ : H → H ′ is the given isomorphism. Let I and J be the ideal in H generated by z and z − 1, respectively, and let Φ(I) = I ′, Φ(J) = J ′. Since I and J are generated by a central element in H, then I ′ ∩ k[z] 6= 0 and similarly for J ′. By Proposition 6.5, I ′ = (z − α) and J ′ = (z − β) for some α, β ∈ k. This gives, Φ(H/I) ∼= Φ(H)/Φ(I) ∼= H ′/I ′. Similarly, Φ(H/J) ∼= H ′/J ′. (cid:3) We observe that the previous proposition holds so long as the homogenizing element is regular in H and H ′. We can now show that the non-domains are non-isomorphic. Details are available in [7]. Proposition 6.8. The algebras H(Rx2), H(Rx2−1), H(Ryx), H(S), and H(k[x]) are non-isomorphic. Proof. The algebras H(Rx2), H(Rx2−1) and H(S) are prime whereas H(k[x]) and H(Ryx) are not. Moreover, gk(H(Ryx)) = 2 while H(k[x]) has infinite GK dimen- sion. Similarly, gk(H(S)) = 2 whereas gk(H(Rx2)) = gk(H(Rx2−1)) = ∞. (cid:3) Proof of Theorem 6.1. By Proposition 6.8, we need only consider the domains. In this case, the algebras H(J ), H(J1), H(U), H(V) as well as H(Oq(k2)) and H(Aq 1(k)) for q ∈ k× not a root of unity, are all distinct as a consequence of Proposition 6.7 and then an application of Theorem 1.1. This leaves only the root of unity case for H(Oq(k2)) and H(Aq 1(k)), as well as isomorphisms between those. That H(Op(k2)) ∼= H(Oq(k2)) if and only if p = q±1 1(k)) ∼= follows from Theorem 5.4. Similar methods can be applied to show H(Ap 1(k)) if and only if p = q±1 and H(Op(k2)) ≇ H(Aq H(Aq 1(k)) for all p, q ∈ k×. The reader is referred to [7] for more details. (cid:3) We now summarize our results in a similar manner as to Theorem 5.7. The statement, however, is slightly more satisfying. Theorem 6.9. Let H and H ′ be of the form (1.2) with defining matrices M, M ′ ∈ M3(k), respectively. Then M ∼sf M ′ if and only if H ∼= H ′. Acknowledgements The author would like to thank his advisor, Allen Bell, for suggesting this topic and for his patient guidance and support throughout this project. TWO-GENERATED ALGEBRAS AND STANDARD-FORM CONGRUENCE 17 References [1] J. Alev and M. Chamarie, D´erivations et automorphismes de quelques alg`ebres quantiques, Comm. Algebra 20 (1992), no. 6, 1787 -- 1802. [2] J. Alev and F. Dumas, Sur le corps des fractions de certaines alg`ebres quantiques, J. Algebra 170 (1994), no. 1, 229 -- 265. [3] J. Alev and F. Dumas, Rigidit´e des plongements des quotients primitifs minimaux de q(sl(2)) dans l'alg`ebre quantique de Weyl-Hayashi, Nagoya Math. J. 143 (1996), 119 -- 146. [4] J. Alev and F. Dumas, Invariants du corps de Weyl sous l'action de groupes finis, Comm. U Algebra 25 (1997), no. 5, 1655 -- 1672. [5] J. Gaddis, PBW deformations of Artin-Schelter regular algebras, Journal of Algebra and its Applications (to appear) (2013), available at arXiv:1210.0861. [6] J. Gaddis, Isomorphisms of some quantum spaces, Ring theory and its applications, 2014, pp. 107 -- 116. MR3204354 [7] J. D. Gaddis, PBW deformations of Artin-Schelter regular algebras and their homogeniza- tions, ProQuest LLC, Ann Arbor, MI, 2013. Thesis (Ph.D.) -- University of Wisconsin - Mil- waukee. [8] K. R. Goodearl and R. B. Warfield Jr., An introduction to noncommutative Noetherian rings, Second, London Mathematical Society Student Texts, vol. 61, Cambridge University Press, Cambridge, 2004. [9] R. A. Horn and V. V. Sergeichuk, Canonical forms for complex matrix congruence and *congruence, Linear Algebra Appl. 416 (2006), no. 2-3, 1010 -- 1032. [10] R. S. Irving, Prime ideals of Ore extensions over commutative rings. II, J. Algebra 58 (1979), no. 2, 399 -- 423. [11] E. Kirkman and J. Kuzmanovich, Primitivity of Noetherian down-up algebras, Comm. Alge- bra 28 (2000), no. 6, 2983 -- 2997. [12] A. Leroy and J. Matczuk, Prime ideals of Ore extensions, Comm. Algebra 19 (1991), no. 7, 1893 -- 1907. [13] M. Nafari, M. Vancliff, and J. Zhang, Classifying quadratic quantum P2s by using graded skew Clifford algebras, J. Algebra 346 (2011), 152 -- 164. [14] S. P. Smith, Quantum groups: an introduction and survey for ring theorists, Noncommutative rings (Berkeley, CA, 1989), 1992, pp. 131 -- 178. [15] M. Su´arez-Alvarez and Q. Vivas, Automorphisms and isomorphism of quantum generalized Weyl algebras (2013), available at arXiv:1206.4417. Wake Forest University, Department of Mathematics, P. O. Box 7388, Winston- Salem, NC 27109 E-mail address: [email protected]
1801.06474
2
1801
2018-06-20T15:26:11
Some Minimal Rings Related to 2-Primal Rings
[ "math.RA" ]
In a paper on the taxonomy of 2-primal rings, examples of various types of rings that are related to commutativity such as reduced, symmetric, duo, reversible and PS~I were given in order to show that the ring class inclusions were strict. Many of the rings given in the examples were infinite. In this paper, where possible, examples of minimal finite rings of the various types are given. Along with the rings in the previous taxonomy, NI, abelian and reflexive rings are also included.
math.RA
math
SOME MINIMAL RINGS RELATED TO 2-PRIMAL RINGS STEVE SZABO Abstract. In a paper on the taxonomy of 2-primal rings, exam- ples of various types of rings that are related to commutativity such as reduced, symmetric, duo, reversible and PS I were given in order to show that the ring class inclusions were strict. Many of the rings given in the examples were infinite. In this paper, where possible, examples of minimal finite rings of the various types are given. Along with the rings in the previous taxonomy, NI, abelian and reflexive rings are also included. Keywords: finite rings, reversible rings, semicommutative rings, abelian rings, symmetric rings, minimal rings, NI rings, reflexive rings, reduced rings, duo rings, 2-primal rings 1. Introduction and Overview As finite structures, in particular finite rings, become more and more prevalent and useful in various disciplines, having minimal examples be- comes more important. In coding theory for instance, the most general class of rings that are useful are finite Frobenius rings. This was justi- fied by Wood in [17]. So, it is important to be aware of small Frobenius rings. Another reason for minimal examples of various types of rings is simply to have more tangible examples for understanding. In the case of 2-primal rings, it is helpful to know that U2(F2) is 2-primal but M2(F2) is not. In [12], the taxonomy of 2-primal rings, Marks states that, in reac- tion to a question by T. Y. Lam, he provided an example of a finite reversible nonsymmetric ring, namely F2Q8, the F2 group algebra over the quaternion group. This prompted his "funny little problem" as he puts it. Is F2Q8 a minimal reversible nonsymmetric ring? In [15], the present author shows that F2Q8 is indeed such a ring. It is also shown that F2 hu, vi hu3, v3, u2 + v2 + vu, vu2 + uvu + vuvi is a minimal reversible nonsymmetric ring as well. The two stated examples differ in that fact that F2Q8 is right duo but the other ring is 1 2 STEVE SZABO not. Hence minimality is independent of being duo. Finding minimal rings with a given property is many times not a trivial matter. Since there is no full characterization of finite rings and as of yet there is no way of listing rings of a particular order, finding rings with particular properties especial minimal ones is a tedious process. Minimal rings of various types have been found in recent years: in [14] minimal commutative Frobenius nonchain rings, in [20] minimal noncommutative right duo rings, in [18] minimal noncommutative semi- commutative, in [8] noncommutative reversible and reflexive rings. In- terestingly enough, all such minimal rings are of order 16. Some other well known minimal rings are for instance, F2[x] hx2i and Z4, the smallest chain rings that are not fields, F4[x;σ] hx2i , the smallest noncommutative chain ring, U2(F2), the smallest noncommutative ring. A finite ring with identity is a direct sum of rings of prime power order for distinct primes. Representations of finite rings can be found in [16]. There have been full classifications of finite rings of order pn where p is prime and n ≤ 5: p3 in [5], commutative p4 in [14], noncommutative p4 in [3], nonlocal p5 in [1] and local p5 in [2]. The general classification for n ≥ 6 is still open although there was some initial work done in [7] for n = 6. In [13] there is an extensive set of references provided for the various types of rings covered in the taxonomy. For background on NI rings the reader is refered to [6, 11] and for background on reflexive rings to [8, 9]. Although names for most of the ring types mentioned have been settled in the literature, semicommutative rings appear under al- ternative names. For instance in [13], Marks refers to semicommutative rings as rings having the S I property. They have also been called zero insertive rings. In Section 2, definitions of the various ring types discussed are given as well as the ring class inclusions. It also covers some basic results on these ring types some known minimal rings needed. Section 3 has the main results on minimal rings of various types. It is split between into two subsections, one on reflexive rings and one on nonreflexive rings. 2. Preliminaries In this paper a ring has unity unless otherwise stated. Given a ring R, J(R) is the Jacobson radical of R, N(R) is the set of nilpotent elements of R, Nil∗(R) is the lower nil radical of R (the prime radical of R, the intersection of all prime ideals of R) and Nil∗(R) is the upper nil radical of R (the sum of all nil ideals of R). It is well known that SOME MINIMAL RINGS RELATED TO 2-PRIMAL RINGS 3 Nil∗(R) is a nil ideal and that Nil∗(R) is the unique largest nil ideal of R. So, Nil∗(R) ⊂ Nil∗(R) ⊂ N(R). Definition 2.1. A ring R is ... (1) reduced if N(R) = 0 (equivalently, for all a ∈ R, a2 = 0 implies a = 0). (2) symmetric if for all a, b, c ∈ R, abc = 0 implies bac = 0. (3) reversible if for all a, b ∈ R, ab = 0 implies ba = 0. (4) semicommutative if for all a, b ∈ R, ab = 0 implies aRb = 0. (5) reflexive if for all a, b ∈ R, aRb = 0 implies bRa = 0. (6) right (resp. left) duo if for all a, b ∈ R, ba ∈ aR (ba ∈ Rb) (equivalently, every right (left) ideal of R is 2-sided). A ring that is both right and left duo is simply a duo ring. (7) abelian if each idempotent of R is central. (8) said to satisfy (PS I) if for every a ∈ R, R/annR r (aR) is 2- primal. (9) 2-primal if N(R) = Nil∗(R). (10) NI if N(R) = Nil∗(R) (equivalently, N(R) ⊳ R). Of course a search for minimal rings only needs to consider finite rings. It turns out that in the class of finite rings, there is no distinction between the subclasses of PS I, 2-primal and NI rings. Lemma 2.2. Let R be a finite ring. Then Nil∗(R) = Nil∗(R) = J(R) ⊂ N(R). Furthermore, the following are equivalent. (1) R satisfies PS I (2) R is 2-primal (3) R is NI Proof. It is well known that Nil∗(R) is a nil ideal and that Nil∗(R) is the unique largest nil ideal of R. So, Nil∗(R) ⊂ Nil∗(R) ⊂ N(R). From the definitions it is clear then that PS I implies 2-primal which implies NI. By Proposition 10.27 in [10], Nil∗(R) = Nil∗(R) = J(R) ⊂ N(R). So, if R is NI then R is 2-primal. Since R is semilocal (R/J(R) is semisimple) and J(R) is nil (J(R) ⊂ N(R)), by Proposition 3.15 of [13] which says a 2-primal semilocal ring with nil jacobson radical satisfies PS I, if R is 2-primal it satisfies PS I. (cid:3) From now on, NI rings will be used when any of the 3 types in the previous lemma are needed. Lemma 2.3 (Proposition 3 in [19]). A finite ring is right duo if and only if it is left duo. Lemma 2.4. A finite reduced ring is commutative. 4 STEVE SZABO Proof. From Theorem 12.7 in [10], a reduced ring is subdirect product of domains. Since a finite domain is a field, a finite reduced ring is commutative. (cid:3) Lemma 2.5. A semicommutative ring is abelian. Proof. Let R be a semicommutative ring and e an idempotent of R. Then e(1 − e) = 0 and (1 − e)e = 0. Since R is semicommutative, eR(1 − e) = 0 and (1 − e)Re = 0. So, for a ∈ R, ea = ea(1 − e + e) = eae = (1 − e + e)ae = ae and e is central. (cid:3) Lemma 2.6. Let R be a local ring. If R/J(R) is a prime field and J(R)3 = 0 then R is semicommutative. Proof. Assume J(R)3 = 0. Let a, b ∈ R and assume ab = 0. Then a, b ∈ J(R). Let r ∈ R. Now, r = α + r′ where α ∈ R/J(R) and r′ ∈ J(R). So, arb = a(α + r′)b = aαb + ar′b = αab + ar′b = 0 since α ∈ Z(R) and ar′b ∈ J(R)3 = 0. Hence, R is semicommutative. (cid:3) Lemma 2.7. A ring is reversible if and only if it is semicommutative and reflexive. Proof. Clearly, a reversible ring is semicommutative and reflexive. Let R be semicommutative and reflexive. Let a, b ∈ R and assume ab = 0. By semicommutativity, aRb = 0. By reflexivity, bRa = 0. So, ba = 0 and R is reversible. (cid:3) In [1] it was shown that given a finite ring R there exists an orthog- onal set of idempotents {e1, . . . , em} ⊂ R such that e1 + · · · + em = 1, Ri = eiRei is a primary ring (a full matrix ring over a local ring) and for i 6= j, Mij = eiRej is an (Ri, Rj)-bimodule contained in J(R). Fur- thermore, letting S = ⊕iRi and M = ⊕i6=jMij then R = S ⊕ M, S is a subring of R and M is an additive subgroup of J(R) which is an S-bimodule. For the purposes of the work herein, this will simply be called the decomposition of the finite ring R. Clearly, J(R) = J(S)⊕M. Notice, if M 2 = 0 then multiplication in R can be modeled as (2.1) (s, u)(t, v) = (st, su + vt). Lemma 2.8. Let R be a finite ring with ring decomposition {e1, . . . , em}, Ri = eiRei, Mij = eiRej, S = ⊕iRi and M = ⊕i6=jMij. Then (1) R is abelian if and only if M = 0 and Ri is local for i ∈ {1, . . . , m}. (2) R is NI if and only if Ri is local for i ∈ {1, . . . , m}. SOME MINIMAL RINGS RELATED TO 2-PRIMAL RINGS 5 (3) If R is abelian then R is NI. (4) If M 2 = 0 and M 6= 0 then R is nonreflexive. Proof. (1) This follows directly from the definition of an abelian ring. (2) Assume R1 is not local. Since R1 is a primary ring, R1 = Mn(T ) for n > 1 and some local ring T . Let eij be the (i, j) matrix unit of R1. Then e12 and e21 are nilpotent but e12 + e21 is not. So, R in this case is not NI. Now assume Ri is local for i ∈ {1, . . . , m}. Then N(S) = J(S). By Lemma 2.2, J(R) ⊂ N(R). Let r ∈ N(R). Then r = s + u for some s ∈ S and u ∈ M ⊂ J(R) and for some n, 0 = (s + u)n = sn + t for some t ∈ J(R) since M ⊂ J(R). So, sn = −t and then sn ∈ J(R)∩S = N(S). Hence, s ∈ N(S) = J(S) and r ∈ J(R) showing N(R) = J(R) and R is NI. (3) Follows from (1) and (2). (4) Assume M 2 = 0 and M 6= 0. Renumbering if necessary, it may be assumed that M12 6= 0. Since M 2 = 0, multiplication in R can be modeled as in 2.1. Let d ∈ M12 \ 0 and (s, u) ∈ R. Then (0, d)(s, u)(e1, 0) = (0, d)(se1, ue1) = (0, 0). showing (0, d)R(e1, 0) = 0. But, (e1, 0)(e1, 0)(0, d) = (0, d) showing (e1, 0)R(0, d) 6= 0. Hence, R is nonreflexive. (cid:3) Figure 2 has the ring class inclusions of the types of finite rings being considered. The implications not covered in the lemmas above follow directly from the definitions. red. 3 comm. symm. 3 rev. ◆◆◆◆◆◆ ◆◆◆◆◆◆ refl. + <qqqqqqq qqqqqqq ▼▼▼▼▼▼▼ ▼▼▼▼▼▼▼ duo 3 s.comm. 3 abel. 3 NI Figure 1. Finite Rings It is easily seen that if * is one of the ring types being considered, a finite ring is of type * if and only if every ring direct summand is of type *. This is why when searching for minimal rings of these types, only indecomposable rings need to be checked. The only exception is a non-NI nonreflexive ring (see Theorem 3.7). Since a finite ring with identity is a direct sum of rings of prime power order for distinct primes, the search is further limited to rings of prime power order. + + 3 " * + " * 4 k s + + + 6 STEVE SZABO Proposition 2.9 ([4]). For prime p, there are no noncommutative rings of order p or p2 and the only noncommutative ring of order p3 is U2(Fp). Proposition 2.10 ([3] or Corollary 1.10 in [1]). Let p be prime. The noncommutative nonlocal indecomposable rings of order p4 are 0 • F • (cid:18) Z p[x] hx2i Fp Fp ! Fp Fp (cid:19) 0 • M2(Fp) p2 p Fp p[x] hx2i 0 p2 Fp 0 Fp ! • F • (cid:18) Z Fp (cid:19) • (cid:18) Fp F2 0 Fp (cid:19) •     a 0 d 0 0 a 0 0 0 0 b 0 0 c 0 b   a, b, c, d ∈ Fp  p2 and M2(Fp) ⊕ F Proposition 2.11. Let p be prime. There are no non-NI rings of order p, p2 or p3. The only non-NI ring(s) of order p4 is M2(Fp), of order p5 p[x] is M2(Fp) ⊕ Fp and of order p6 are M2(Fp) ⊕ Fp ⊕ Fp, M2(Fp) ⊕ F hx2i , p2. The minimal non-NI ring is M2(F2). M2(Fp) ⊕ Z Proof. Since commutative rings are NI, by Lemma 2.8(2) and Propo- sition 2.9, all rings of order p, p2 or p3 are NI. By Lemma 2.8(2) and Proposition 2.10, the only ring of order p4 that is not NI is M2(Fp) and of order p5 is M2(Fp) ⊕ F2. So, the minimal non-NI ring is M2(F2). Knowing that F2 ⊕ F2, F2[x] p2 are the rings of order 4, by Lemma 2.8(2), the rings M2(Fp) ⊕ F2 ⊕ F2, M2(Fp) ⊕ F2[x] hx2i , M2(Fp) ⊕ Z4 p2 are the only decomposable non-NI rings of order p6. and M2(Fp) ⊕ F The only possible indecomposable non-NI ring of order p6 would be a ring with components R1 = M2(Fp) and R2 = Fp and M = p in its ring decomposition. But, the minimal submodules of M2(Fp) are isomorphic to F2 (cid:3) hx2i , Z4 and F p so no such ring exists. Remark 2.12. The set of noncommutative local rings of order 16 can be deduced from work in [1] or [3]. It turns out that they are precisely the minimal noncommutative semicommutative rings which is the sub- ject of Proposition 2.13. Note σ denotes the Frobenius automorphism on F4. Proposition 2.13 ([18] Theorem 8). A minimal noncommutative semi- commutative ring has order 16. The complete list of such rings is SOME MINIMAL RINGS RELATED TO 2-PRIMAL RINGS 7 • F4[x;σ] hx2i • F2hu,vi hu3,v3,vu,u2−uv,v2−uvi • • • Z4hu,vi hu3,v3,vu,u2−uv,v2−uv,2−uv,2u,2vi F2hu,vi hu3,v2,vu,u2−uvi Z4hu,vi hu3,v2,vu,u2−uv,2−uv,2u,2vi . Two other results on rings of order 16 which are necessary for our classification are provided here. Proposition 2.14 ([20] Theorem 3). A minimal noncommutative duo ring has order 16. The complete list of such rings is • F4[x;σ] hx2i • • F2hu,vi hu3,v3,vu,u2−uv,v2−uvi hu3,v3,vu,u2−uv,v2−uv,2−uv,2u,2vi . Z4hu,vi Proposition 2.15 ([8] Theorem 5). A minimal noncommutative re- flexive ring has order 16. The complete list of such rings is • F4[x;σ] hx2i • M2(F2). 3. Minimal Rings In this section the minimal rings of the various types according to the diagram in Figure 2 are identified. This will be done first for nonreflexive rings and then for reflexive rings. 3.1. Minimal Nonreflexive Rings. In the context of finite nonre- flexive rings, the ring class inclusions are duo 3 semicommutative 3 abelian 3 NI Theorem 3.1 (Minimal Nonreflexive Duo). A minimal nonreflexive duo ring has order 16. The complete list of such rings is • • F2hu,vi hu3,v3,vu,u2−uv,v2−uvi hu3,v3,vu,u2−uv,v2−uv,2−uv,2u,2vi . Z4hu,vi Proof. Follows from Propositions 2.14 and 2.15. (cid:3) Theorem 3.2 (Minimal Nonreflexive Semicommutative Nonduo). A minimal nonreflexive semicommutative nonduo ring has order 16. The complete list of such rings is • F2hu,vi hu3,v2,vu,u2−uvi + + + 8 STEVE SZABO • hu3,v2,vu,u2−uv,2−uv,2u,2vi . Z4hu,vi Proof. Follows from Propositions 2.13, 2.14 and 2.15. (cid:3) From Remark 2.12 and Proposition 2.9, any noncommutative abelian ring of order less than 32 is local semicommutative. Therefore, a non- semicommutative abelian ring is of order at least 32. The next propo- sition shows that such a ring must actually be at least of order 64. Proposition 3.3. A local ring of order less than 64 is semicommuta- tive. Proof. Commutative rings are semicommutative. Let p be a prime. By Proposition 2.9, there are no noncommutative local rings of order p, p2 or p3. By Remark 2.12, there are no nonsemicommutative local rings of order p4. So, a local ring of order less than 32 is semicommutative. For rings of order 32, by Lemma 2.6, only the local noncommutative rings where the cube of its jacobson radical is nonzero need to be checked for semicommutativity. Such rings can be found in the classification of rings of order 32 in [2] which are given in cases 1.2.1, 2.2.b and 2.2.c. There are 7 such rings which are listed here. (1) (2) (3) (4) (5) (6) (7) F2hu,vi hu4,uv,vu−u3,v2i F2hu,vi hu4,uv,vu−u3,v2−u3i Z4hu,vi hu4,uv,vu−u3,v2,u3−2i Z4hu,vi hu4,uv,vu−u3,v2−u3,u3−2i Z4hu,vi hu4,uv,vu−u3,v2,u2−2i Z4hu,vi hu4,uv,vu−u3,v2−u3,u2−2i hu4,uv,vu−u3,v2,u2−2−2ui. Z4hu,vi Let R be any of the rings above. Then R is local, J(R) = F2u+F2v+J 2, J 2 = F2u2 + J 3, J 3 = F u3 and J 4 = 0. In a finite local ring, the jacobson radical is the set of zero divisors. Let a, b ∈ J(R) and c ∈ R. Then for some αi, βi, γi, δi, r ∈ F2, a = α1u + β1v + γ1u2 + δ1u3, b = α2u + β2v + γ2u2 + δ2u3 and c = r + α3u + β3v + γ3u2 + δ3u3. Assume ab = 0. Then 0 = ab = (α1u + β1v + γ1u2 + δ1u3)(α2u + β2v + γ2u2 + δ2u3) = α1α2u2 + x for some x ∈ J(R)3 showing α1α2 = 0. Now, acb = arb+α1α3α2u3 = 0. So, if ab = 0 then aRb = 0 and R is semicommutative. (cid:3) SOME MINIMAL RINGS RELATED TO 2-PRIMAL RINGS 9 Theorem 3.4 (Minimal Nonreflexive Abelian Nonsemicommutative). A minimal nonreflexive abelian nonsemicommutative ring is of order 64 an example of which is F2 hu, vi hu2, v2, uvu − vuvi Proof. By Proposition 3.3, an abelian ring of order less than 64 is semi- commutative. Let R = F2 hu, vi hu2, v2, uvu − vuvi . R is local, J(R) = F2u + F2v + J 2, J 2 = F2uv + F2vu + J 3, J 3 = F2uvu and J 4 = 0. So, R = 64. Notice u2 = 0 but uvu 6= 0 showing R is nonsemicommutative. To see that R is nonreflexive, notice, for α, β, γ, δ, ǫ, ζ ∈ F , u(α + βu + γv + δuv + ǫvu + ζuvu)uv = αu2v = 0 but 0 6= uvu ∈ uvRu. So, uRuv = 0 but uvRu 6= 0 showing R is nonreflexive. (cid:3) Remark 3.5. The ring F2 hu, vi hu2, v2, uvu − vuvi was shown to be a minimal nonreflexive abelian nonsemicommutative ring. From the proof it can be seen that it is actually minimal among all nonsemicommutative rings, reflexive or not. Theorem 3.6 (Minimal Nonreflexive NI Nonabelian). The minimal NI nonabelian nonreflexive ring is U2(F2) and is of order 8. Proof. By Proposition 2.15, U2(F2) is nonreflexive. Clearly U2(F2) is the minimal nonabelian ring since it is not abelian and is the unique minimal noncommutative ring. By Lemma 2.8(2), U2(F2) is NI. (cid:3) Theorem 3.7 (Minimal Non-NI Nonreflexive). A minimal non-NI nonreflexive ring has order 128. The complete list of such rings is M2(F2) (cid:18) F2 0 F2 0 (cid:19) 0 F2 R =    , Rop and M2(F2) ⊕ U2(F2). Proof. By Proposition 2.11, the only non-NI indecomposable rings of order less than 128 are M2(F2) and M2(F3). But, these are both re- flexive. By Theorem 3.6, the smallest nonreflexive ring is U2(F2) which is unique. So, M2(F2) ⊕ U2(F2) is the unique decomposable minimal non-NI nonreflexive of order 128. 10 STEVE SZABO An indecomposable example would have to have at least one of the component rings in its ring decomposition to be nonlocal by Lemma 2.8. Since the minimal right or left modules of M2(F2) are isomorphic to F2 2, the only indecomposable non-NI non-reflexive rings of order 128 are and R =  Rop =  M2(F2) (cid:18) F2 0 F2 0 (cid:19) 0 F2   0 (cid:19) F2   , 0 M2(F2) (cid:18) F2 F2 0 which is clearly not isomorphic to R. By the uniqueness of the compo- nents, it is clear that there are no other such rings. (cid:3) 3.2. Minimal Reflexive Rings. In this section minimal reflexive rings are identified. The following diagram shows the ring class inclusions for finite reflexive rings. reduced 3 commutative symmetric ❘❘❘❘❘❘ ❘❘❘❘❘❘ 9❦❦❦❦❦❦❦ ❦❦❦❦❦❦❦ ❚❚❚❚❚❚❚❚❚❚ ❚❚❚❚❚❚❚❚❚❚ reversible 9❧❧❧❧❧❧❧❧❧ ❧❧❧❧❧❧❧❧❧ duo 3 abelian 3 NI Of course F2 is the minimal reduced ring and the minimal nonreduced commutative rings are the indecomposable rings of order 4 that are not fields namely F2[x] hx2i and Z4. Theorem 3.8 (Minimal Symmetric Duo Noncommutative). The min- imal symmetric duo noncommutative ring is F4[x;σ] hx2i and is of order 16. Proof. Let R = F4[x;σ] hx2i . By Propositions 2.13 and 2.15, R is the minimal semicommutative reflexive duo ring. By Lemma 2.7, R is reversible. In [15] it was shown that a minimal reversible nonsymmetric ring is of order 256. Since R = 16, R is symmetric. The symetricity of R can easily be shown directly. (cid:3) Theorem 3.9 (Minimal Symmetric Nonduo). A minimal symmetric nonduo ring is of order 32 an example of which is F2 hu, vi hu3, v2, u2 + uv + vu, uvui . % - + % - 1 + + 1 SOME MINIMAL RINGS RELATED TO 2-PRIMAL RINGS 11 Proof. By Remark 2.12, the rings listed in Proposition 2.13 are the noncommutative local rings of order 16. By inspection, it is clear that none of these rings are reversible hence they are nonsymmetric. For a prime p, by Proposition 2.9, any local ring of order p, p2 or p3 is com- mutative. So, any symmetric ring of order less than 32 is commutative and therefore duo. Let R = F2 hu, vi hu3, v2, u2 + uv + vu, uvui . First note that any third degree monomial in u and v is 0. It is easy to see then that R is an F2-algebra with basis {1, u, v, uv, vu} and R = 32. Next, R is not left duo since v(u + v) = vu /∈ {av + buva, b ∈ F2} = Rv. By Lemma 2.3, R is not duo. To show R is reversible, assume (a1 + b1u + c1v + d1uv + e1vu)(a2 + b2u + c2v + d2uv + e2vu) = 0 for ai, bi, ci, di, ei ∈ F2. Since R is local, a1 = a2 = 0. Then 0 = (b1u + c1v + d1uv + e1vu)(b2u + c2v + d2uv + e2vu) = (b1c2 + b1b2)uv + (c1b2 + b1b2)vu showing (b1c2 + b1b2) = 0 and (c1b2 + b1b2) = 0. So, 0 = (b1c2 + b1b2)vu + (c1b2 + b1b2)uv = (a2 + b2u + c2v + d2uv + e2vu)(a1 + b1u + c1v + d1uv + e1vu) and R is reversible. From [15], a reversible ring of order less than 256 is symmetric. Since R = 32, R is symmetric. Hence, R is a minimal symmetric nonduo ring. (cid:3) Theorem 3.10 (Minimal Reversible Nonsymmetric Right Duo). A minimal reversible nonsymmetric right duo ring is of order 256 an ex- ample of which is F2Q8. Proof. One of the main results of [15]. (cid:3) Theorem 3.11 (Minimal Reversible Nonsymmetric Nonduo). A min- imal reversible nonsymmetric nonduo ring is of order 256 an example of which is F2 hu, vi hu3, v3, u2 + v2 + vu, vu2 + uvu + vuvi . Proof. One of the main results of [15]. (cid:3) 12 STEVE SZABO Remark 3.12 (Reflexive Abelian Nonsemicommutative). A minimal reflexive abelian nonsemicommutative ring has turned out to be more elusive than the rest. By Proposition 3.3, a minimal reflexive abelian nonsemicommutative ring is of order at least 64. At the moment, there is no known finite local reflexive nonsemicommutative ring. In [13], Lemma 5.3 states that there exists an infinite local ring R that contains a prime ideal P that is not completely prime. So, R/P is a local ring that is prime but not completely prime i.e. a domain, meaning R/P is a prime ring with zero divisors. It is easy to show that a prime ring is reflexive and that prime ring with zero divisors is not semicommutative. Hence, R/P is a local reflexive nonsemicommutative ring. So, such rings do exist. It is important to note that according to [10] Exercise 13.3, a finite prime ring is a matrix ring over a finite field. Hence, a local finite prime ring is a finite field. This shows there does not exist a finite local prime ring with zero divisors. So, if there does exist a finite reflexive abelian nonsemicommutative ring, it is not a prime ring with zero divisors. Example 3.13. The following ring is a nonabelian NI reflexive ring of order 64. On the additive group R = F2[x] hx2i ⊕ F2[x] hx2i ⊕ F2 ⊕ F2 define multiplication as (α1 + β1x, γ1 + δ1x, ǫ1, ζ1)(α2 + β2t, γ2 + δ2x, ǫ2, ζ2) = (cid:0)ǫ1ζ2x + (α1 + β1x)(α2 + β2x), ǫ2ζ1x + (γ1 + δ1x)(γ2 + δ2x), α1ǫ2 + γ2ǫ1, γ1ζ2 + α2ζ1(cid:1) for αj, βj, γj, δj, ǫj, ζj ∈ F2. It is straight forward to check that R is a ring with 1 = (1, 1, 0, 0). Furthermore, e1 = (1, 0, 0, 0) and e2 = (0, 1, 0, 0) are idempotents which give the ring decomposition of R where the direct summands are R1, R2, M12 and M21 respectively. First, R is nonabelian since M 6= 0. Secondly, since R1 and R2 are local, by Lemma 2.8(2), R is NI. Finally, it will be shown that R is also reflexive. Let a, b ∈ R and assume aRb = 0. So a = (a1, a2, a12, a21) and hx2i and a12, a21, b12, b21 ∈ F2. b = (b1, b2, b12, b21) for a1, a2, b1, b2 ∈ F2[x] Then 0 = a(1, 0, 0, 0)b = (a1b1, a21b12x, a1b12, a21b1), SOME MINIMAL RINGS RELATED TO 2-PRIMAL RINGS 13 0 = a(0, 1, 0, 0)b = (a12b21x, a2b2, a12b2, a2b21), 0 = a(0, 0, 1, 0)b = (a1b21x, a21b2x, a1b2, 0) and 0 = a(0, 0, 0, 1)b = (a12b1x, a2b12x, 0, a2b1). This shows that a1b1 = a2b2 = 0 and a21b12, a12b21, a1b21, a21b2, a12b1, a2b12, a1b12, a21b1, a12b2, a2b21, a1b2, a2b1 ∈ hxi . So, for r = (r1, r2, r12, r21) ∈ R, bra = (b1, b2, b12, b21)(r1, r2, r12, r21)(a1, a2, a12, a21) = (b1r1a1 + b1r12a21x + b12r2a21x + b12r21a1x, b2r2a2 + b2r21a12x + b21r1a12x + b21r12a2x, b1r1a12 + b1r12a2 + b12r2a2, b2r2a21 + b2r21a1 + b21r1a1) = 0. Hence, R is reflexive. Theorem 3.14 (Minimal NI Nonabelian Reflexive). A minimal NI nonabelian reflexive ring is of order 64 an example of which is the additive group F2[x] hx2i with multiplication as in Example 3.13. F2[x] hx2i R = ⊕ ⊕ F2 ⊕ F2 Proof. For a prime p, Proposition 2.9 shows that the only indecompos- able nonabelian ring of order p, p2 or p3 is U2(Fp). But this ring is nonreflexive (see Theorem 3.6). From Lemma 2.8(4) and Proposition 2.10, the only indecomposable nonabelian reflexive ring of order p4 is M2(Fp) since all the others have M 6= 0 but M 2 = 0 in their ring de- composition. But M2(Fp) is non-NI by Proposition 2.11. In [1], it was shown that there are only 2 rings of order 32 which have a ring decom- position with M 2 6= 0 (see Lemma 1.5 in [1]). In either one of those two rings, (0, 0, 1, 0)R(0, 0, 0, 1) 6= 0 but (0, 0, 0, 1)R(0, 0, 1, 0) = 0 so they are nonreflexive. By Lemma 2.8, a nonabelian NI ring with M 2 = 0 (nonabelian NI guarantees M 6= 0) is nonreflexive. So, all indecompos- able nonabelian rings of order 32 are nonreflexive. Hence, there are no NI nonabelian reflexive rings of order less than 64. R was shown to be an NI nonabelian reflexive ring of order 64 in Example 3.13. (cid:3) Theorem 3.15 (Minimal Non-NI Reflexive). The minimal non-NI re- flexive rings is M2(F2). 14 STEVE SZABO Proof. By Proposition Proposition 2.15, there are two minimal non- commutative reflexive rings, F4[x;σ] hx2i and M2(F2). By Proposition 2.13, F4[x;σ] is semicommutative and therefore NI. By Lemma 2.8(2), M2(F2) (cid:3) hx2i is not NI. 4. Conclusion Minimal rings of all but one of the types of rings under consideration were found. Reflexive abelian nonsemicommutative, proved more elu- sive and is left for future consideration. From Proposition 3.3, such a ring is at least of order 64. There is no known example of a finite local reflexive nonsemicommutative ring. It was however shown in Remark 3.12 that an infinite ring of this type exists. References 1. B. Corbas and G. D. Williams, Rings of order p 5. I. Nonlocal rings, J. Algebra 231 (2000), no. 2, 677 -- 690. MR 1778165 2. , Rings of order p 5. II. Local rings, J. Algebra 231 (2000), no. 2, 691 -- 704. MR 1778166 3. J. B. Derr, G. F. Orr, and Paul S. Peck, Noncommutative rings of order p Pure Appl. Algebra 97 (1994), no. 2, 109 -- 116. MR 1312757 (95m:16012) 4, J. 4. K. E. Eldridge, Orders for finite noncommutative rings with unity, Amer. Math. Monthly 75 (1968), 512 -- 514. MR 0230772 (37 #6332) 5. Robert Gilmer and Joe Mott, Associative rings of order p 3, Proc. Japan Acad. 49 (1973), 795 -- 799. MR 0369422 6. Seo Un Hwang, Young Cheol Jeon, and Yang Lee, Structure and topological conditions of NI rings, J. Algebra 302 (2006), no. 1, 186 -- 199. MR 2236599 7. P. Karimi Beiranvand, R. Beyranvand, and M. Gholami, Classification of finite 6 by generators and relations, J. Math. (2013), Art. ID 467905, rings of order p 8. MR 3096801 8. Byung-Ok Kim and Yang Lee, Minimal noncommutative reversible and reflexive rings, Bull. Korean Math. Soc. 48 (2011), no. 3, 611 -- 616. MR 2827769 9. Nam Kyun Kim and Yang Lee, Extensions of reversible rings, J. Pure Appl. Algebra 185 (2003), no. 1-3, 207 -- 223. MR 2006427 10. T. Y. Lam, A first course in noncommutative rings, second ed., Graduate Texts in Mathematics, vol. 131, Springer-Verlag, New York, 2001. MR MR1838439 (2002c:16001) 11. Greg Marks, On 2-primal Ore extensions, Comm. Algebra 29 (2001), no. 5, 2113 -- 2123. MR 1837966 12. 13. , Reversible and symmetric rings, J. Pure Appl. Algebra 174 (2002), no. 3, 311 -- 318. MR 1929410 , A taxonomy of 2-primal rings, J. Algebra 266 (2003), no. 2, 494 -- 520. MR 1995125 14. Edgar Mart´ınez-Moro and Steve Szabo, On codes over local Frobenius non- chain rings of order 16, Noncommutative Rings and Their Applications (Steven Dougherty, Alberto Facchni, Andr´e Leroy, Edmund Puczylowski, and Patrick SOME MINIMAL RINGS RELATED TO 2-PRIMAL RINGS 15 Sol´e, eds.), Contemp. Math., vol. 634, Amer. Math. Soc., Providence, RI, 2015, pp. 227 -- 243. 15. Steve Szabo, Minimal reversible nonsymmetric rings, submitted (2017). 16. Robert S. Wilson, Representations of finite rings, Pacific J. Math. 53 (1974), 647 -- 649. MR 0369423 17. Jay A. Wood, Duality for modules over finite rings and applications to cod- ing theory, Amer. J. Math. 121 (1999), no. 3, 555 -- 575. MR MR1738408 (2001d:94033) 18. Liqiong Xu and Weimin Xue, Structure of minimal non-commutative zero- insertive rings, Math. J. Okayama Univ. 40 (1998), 69 -- 76 (2000). MR 1755920 (2001b:16036) 19. Weimin Xue, On strongly right bounded finite rings, Bull. Austral. Math. Soc. 44 (1991), no. 3, 353 -- 355. MR 1138010 20. , Structure of minimal noncommutative duo rings and minimal strongly bounded nonduo rings, Comm. Algebra 20 (1992), no. 9, 2777 -- 2788. MR 1176837 (93i:16003) Department of Mathematics and Statistics, Eastern Kentucky Uni- versity, Richmond, KY 40475 E-mail address: [email protected]
1708.01963
2
1708
2017-08-24T12:35:58
Classification of three-dimensional Jordan superalgebras
[ "math.RA" ]
In this paper, we classify Jordan superalgebras of dimension up to three over an algebraically closed field of characteristic different of two. Our main motivation to obtain such classification comes out from the intention to give an answer to the problem of determining the minimal dimension of exceptional Jordan superalgebras. Our strategy to provide a lower bounded for this dimension is to determine the complete list of Jordan superalgebras of small dimensions and verify which ones are special or exceptional.
math.RA
math
Classification of three-dimensional Jordan superalgebras aInstituto de Matemática e Estatística. Universidade de São Paulo. R. Matão 1010, 05508-090. São Paulo, SP, Brazil. M. E. Martin1,a, Abstract In this paper, we classify Jordan superalgebras of dimension up to three over an algebraically closed field of characteristic different of two. We also prove that all such superalgebras are special. Keywords: Jordan superalgebras, classification of superalgebras, speciality 2010 MSC: 17C27, 17C40, 17C70. Introduction The goal of this paper is to classify Jordan superalgebras of dimension up to three over an algebraically closed field of characteristic different of 2. Our main motivation to obtain such classification comes out from the intention to give an answer to the problem of determining the minimal dimension of exceptional Jordan superalgebras posed in [11]. This problem is analogous to the problem presented in [3] by H. Petersson and A. M. Slin'ko for ordinary Jordan algebras. Our strategy to provide a lower bounded for this dimension is to determine the complete list of Jordan superalgebras of small dimensions and verify which ones are special or exceptional. The classification problem of the algebraic structures of given dimension, i.e. find the list of all non-isomorphic objects in this structure, has been extensively studied. But in the context of graded algebras the results are relatively scarce. Most of the known results focus on the theory of graded Lie algebras. In [8], V. G. Kac gave a brief account of the main features of the theory of finite dimensional Lie superalgebras. The author announced in [6] the complete solution of the classification problem of simple Lie superalgebras under the stimuli of the physicists' interest in the subject. In the context of nonsimple Lie superalgebras, in 1978 N. Backhouse gave a classification of real Lie superalgebras, which are not Lie algebras, up to dimension four (see [1] and [2]). He also noted that none of them are simple. In 1999, A. Hegazi in [4] proved a version of the Kirillov lemma for nilpotent Lie superalgebras and applied its to the classification of nilpotent Email address: [email protected] (M. E. Martin) 1The author was supported by CAPES, PNPD Program, IME-USP. Lie superalgebras up to dimension five. Classifications of five dimensional Lie superalgebras over the complex and real numbers are contributions of N. L. Matiadou and A. Fellouris, see [15, 2005] and [16, 2007] respectively. As expected, there was a similar theory for graded Jordan algebras. The paper [10] of I. Kaplansky, lays the foundations for the study of the Jordan superalgebras case. In 1977, V. G. Kac developed the Kantor's method and applied it to obtain the classification of finite di- mensional simple Jordan superalgebras over an algebraically closed field of characteristic 0 from the classification of simple graded Lie algebras (see [7]). There was one missing case in this classification that was later described by I. L. Kantor in [9]. More than two decades later in [18], M. L. Racine and E. I. Zel'manov took advantage of Jordan theoretic methods, like Peirce decomposition and representation theory, that are less sensitive to the characteristic of the base field to obtain a classification of simple Jordan superalgebras over fields of charac- teristic different from 2 whose even part is semisimple. The remaining case, namely simple Jordan superalgebras with nonsemisimple even part, was tackled in [13] by C. Martinez and E. Zel'manov. However, nonsimple Jordan superalgebras are very plentiful and as yet do not have re- ceived enough attention. In what follows we present the classification of Jordan superalgebras of small dimensions and we determine in each case whether the superalgebras obtained are special or exceptional. Regarding special or exceptional Jordan superalgebras we highlight some central results. In [14] the authors construct universal associative enveloping algebras for a large class of simple Jordan superalgebras showing they are special. On the other hand, in [17] has been proved that the 10-dimensional simple Kac superalgebra is exceptional and showed some new exceptional simple superalgebras appear in characteristic 3. As for exceptional Jordan superalgebras that are not simple, I. Shestakov and others in [11, 2000] have constructed an example of an exceptional Jordan superalgebra of dimension 7 over an algebraically closed field of characteristic different of 2. So far this is the smallest known example. The paper is organized as follows. In Section 1, we recall the basic concepts, examples and some results for finite-dimensional Jordan superalgebras. In Section 2, we describe all non- isomorphic Jordan superalgebras of dimension less or equal to 3 and, finally, we show that all superalgebras are special. 1 Preliminaries In what follows k will represent a field of characteristic not 2. A Jordan algebra J is a commutative k-algebra that satisfies the Jordan identity a2 · (b · a) = (a2 · b) · a (1.1) or, equivalently, the linearization 2 (a·b)·(c·d) + (a·c)·(b·d) + (a·d)·(b·c) = ((a·b)·c)·d + ((a·d)·c)·b + ((b·d)·c)·a for any a, b, c, d ∈ J. In [12] all Jordan algebras up to dimension four over an algebraically closed field were described. To fix notation we present the indecomposable Jordan algebras of dimension less or equal to 3 in Table 1. This algebras will be used in the development we present below. Table 1: Indecomposable Jordan algebras of dimension 6 3 J U1 U2 B1 B2 B3 T1 T2 T3 T4 T5 T6 T7 T8 T9 T10 Multiplication table dim e2 1 = e1 e2 1 = 0 e1 · e2 = e2 e1 · e2 = 1 2 e2 e1 · e2 = 0 e2 2 = 0 e2 2 = 0 e2 2 = 0 e2 1 = e1 e2 1 = e1 e2 1 = e2 e2 1 = e1 e2 2 = e3 e1 · e2 = e2 e1 · e3 = e3 e2 1 = e1 e2 2 = 0 e1 · e2 = e2 e1 · e3 = e3 e2 1 = e2 e2 2 = 0 e1 · e2 = e3 e1 · e3 = 0 e2 1 = e2 e2 2 = 0 e1 · e2 = 0 e1 · e3 = e2 e2 3 = 0 e2 · e3 = 0 e2 3 = 0 e2 · e3 = 0 e2 3 = 0 e2 · e3 = 0 e2 3 = 0 e2 · e3 = 0 e2 1 = e1 e1 · e2 = 0 e2 2 = e2 e1 · e3 = 1 e2 3 = e1 + e2 2 e3 e2 2 = 0 e2 3 = 0 e2 · e3 = 1 2 e3 e1 · e3 = e3 e2 · e3 = 0 e2 2 = 0 e1 · e3 = 1 e2 3 = 0 2 e3 e2 3 = 0 e2 · e3 = 0 e2 2 = e3 e1 · e3 = 0 e2 · e3 = 0 e2 2 = e3 e1 · e3 = e3 e2 3 = 0 e2 · e3 = 0 e2 2 = e2 e1 · e3 = 1 2 e3 e2 3 = 0 e2 · e3 = 1 2 e3 e2 1 = e1 e1 · e2 = 1 2 e2 e2 1 = e1 e1 · e2 = 1 2 e2 e2 1 = e1 2 e2 e2 1 = e1 2 e2 e2 1 = e1 e1 · e2 = 0 e1 · e2 = 1 e1 · e2 = 1 1 1 2 2 2 3 3 3 3 3 3 3 3 3 3 A superalgebra A is a Z2-graded algebra, that is, A = A0 + A1 where A0 and A1 are subspaces of A verifying Ai · Aj ⊆ Ai+j for any i, j ∈ Z2 (here + is a direct sum of vector spaces). Therefore, A0 (called the even part of A) is a subalgebra of A and A1 (the odd part) is a bimodule over A0. If a ∈ Ai, then we say that the element a is homogeneous and we will 3 denote by a the parity of a, that is, a = i. A subspace V of a superalgebra A is called sub-superspace if V = (V ∩ A0) + (V ∩ A1). By a sub-superalgebra (or ideal) of a superalgebra A we mean any sub-superspace that is a subal- gebra (or ideal) of A as an algebra. Given two superalgebras A and B and a homomorphism of algebras φ : A → B, we say φ is a homomorphism of superagebras if it preserves the grading, i.e., φ(Ai) ⊆ Bi for i = 0, 1. A superalgebra A is called simple if A2 6= 0 and it does not contain any non-trivial (graded) ideals. A superalgebra J = J0 + J1 is a Jordan superalgebra if it satisfies the supercommutativity a · b = (−1)abb · a (1.2) and the super Jordan identity (a · b) · (c · d) + (−1)bc(a · c) · (b · d) + (−1)bd+cd(a · d) · (b · c) = ((a · b) · c) · d + (−1)cd+bc((a · d) · c) · b + (−1)ab+ac+ad+cd((b · d) · c) · a (1.3) for any a, b, c, d ∈ J. The even part J0 is a Jordan algebra and the odd part J1 is an J0-bimodule with an operation J1 × J1 → J1. Note that a superidentity is obtained from the corresponding identity following the Ka- plansky rule: any alteration in the order of odd elements causes a change in sign. An associative superalgebra is just an associative algebra with a Z2-graduation but a Jordan superalgebra is not necessarily a Jordan algebra. Example 1. Consider the three-dimensional simple Jordan superalgebra due to I. Kaplansky: K3 = ke + (kx + ky) with multiplication given by e2 = e, x2 = y2 = 0, e · x = x · e = 1 2 x, e · y = y · e = 1 2 y and x · y = −y · x = e. Take a = e + x and b = y in identity (1.1) then (a2 · b) · a − a2(b · a) = a 6= 0. Indeed, a Jordan superalgebra is a Jordan algebra with a Z2-graduation if and only if J2 1 = 0. On the other hand, the same Jordan algebra can have two or more non-isomorphic Z2- graduations. Example 2. The non-associative three-dimensional Jordan algebra T6 (see Table 1) admits four Z2-graduations that, as we will see in Theorem 11, determine four non-isomorphic Jordan superalgebras: S3 12 and the trivial one Ts 6 . 4, S3 9, S3 In fact, an algebra A admits a non-trivial Z2-graduation if and only if there exists an au- tomorphism ϕ ∈ Aut(A) such as ϕ2 = Id and ϕ 6= Id. The relation between ϕ and the Z2-graduation is given by A0 = {a ∈ A ϕ(a) = a} and A1 = {a ∈ A ϕ(a) = −a}. Example 3. Consider the three dimensional associative Jordan algebra T1. We observe that Aut(T1) = {ϕ : T1 → T1 ϕ(e1) = e1; ϕ(e2) = αe2 + βe3; ϕ(e3) = α2e3; with α, β ∈ k} then 4 (T1)0 = ke1 + ke3 and (T1)1 = ke2 is the only (up to graded isomorphism) non-trivial Z2- graduation on T1. Then it is an associative superalgebra which is not a Jordan superalgebra since it does not satisfy the supercommutativity. If A = A¯0 + A¯1 is an associative superalgebra, we can get a Jordan superalgebra structure with the same underlying vector space, A(+), by defining a new product a ⊙ b = 1 2 (ab + (−1)abba) for any a, b ∈ A. A Jordan superalgebra J = J0 + J1 is said to be special is J is a sub-superalgebra of A(+), for some associative superalgebra A. Otherwise, it is called exceptional. We call A an associative envelope for J. The universal associative envelope U(J) of the Jordan superalgebra J is the unital associative superalgebra satisfying the following universal property, which implies that U(J) is unique up to isomorphism: there is a morphism of Jordan superalgebras α : J → U(J)(+) such that for any unital associative superalgebra A and any morphism of Jordan superalgebras β : J → A(+), there is a unique morphism of associative superalgebras γ : U(J) → A satisfying β = γ◦α. Example 4. The Kaplansky superalgebra K3 of Example 1 is special, in fact it is a sub-super- algebra of M(+) 11 (W1) where W1 = alg hξ, η : ξ · η − η · ξ = 1i is the Weyl algebra. The even part and the odd part are respectively, (cid:12)(cid:18) a 0 0 b (cid:19) a, b ∈ W1(cid:13) and (cid:12)(cid:18) 0 c d 0 (cid:19) c, d ∈ W1(cid:13) , then the application of K3 in M(+) ξηe21 is an homomorphism. 11 (W1) such as e 7→ e11, x 7→ 2e12 + 2ξe21 and y 7→ ηe12 + Example 5. (Superalgebra of a superform) Let V = V0 ⊕ V1 be a vector superspace over a field k, and let f : V ×V → k be a supersymmetric bilinear form, i.e., f V0 is symmetric, f V1 is skew- symmetric and f(Vi, Vj) = 0 if i 6= j. Then J(V, f) = k · 1 ⊕ V is a Jordan superalgebra with J0 = k·1⊕V0, J1 = V1 and the product given by (α1+v)·(β1+w) = (αβ+f(v, w))·1+(αw+ βv). Moreover, suppose that f is non-degenerate, dim V0 = n and dim V1 = 2m. It follows from [14] that J(V, f) is an special Jordan superalgebra. In fact J(V, f) ⊆ (Cl(n)e⊗kWm)(+), where Cl(n) = h1, e1, . . . en eiej + ejei = 0, i 6= j, e2 i = 1i is the Clifford superalgebra and Wm = h1, xi, yi, 1 6 i 6 m [xi, yj] = δij, [xi, xj] = [yi, yj] = 0i is the Weyl superalgebra with ei = xj = yk = 1. Example 6. Algebra T6 in Table 1 is special as an ordinary Jordan algebra. Its universal 5 associative envelope is the five-dimensional algebra given by U(T6) 1 e1 e2 e3 e4 e1 e1 e1 1 1 e1 e2 e2 − e4 e3 e4 e3 0 e2 e3 e4 e2 e3 e4 e4 e3 e4 0 0 0 0 0 0 0 0 0 with homomorphism ei 7→ ei for i = 1, 2, 3. Now, consider the Z2-graduation in T6 which result in the superalgebra S3 12 (see Table 6) with dim J0 = 2 and dim J1 = 1. Then the graduation induced on U(T6) = A0 + A1 where A0 = {1, e1, e2, e4} and A1 = {e3} is an associative envelope for S3 12) is the superalgebra with 12 but is not the universal one. In this case, U(S3 basis (cid:8)1, e1, e2, e1e2, ok 1 , k > 1(cid:9) quotient with the ideal: 2, e2o1, o1e2, e2 (cid:10)e2 1 − e1, e1o1 − o1, o1e1 − o1, e2e1 − e2 + e1e2(cid:11) . Example 7. In [7] the 10-dimensional Kac superalgebra K was defining. It is given by K0 = ha1, . . . , a6i and K1 = hξ1, . . . , ξ4i with a1 · ai = ai, i=1,...,5 a1 · a6 = 0, a1 · ξi = a2 · a3 = a1, a2 · ξ3 = ξ1, a2 · ξ4 = ξ2, a3 · ξ1 = a4 · a5 = a1, a4 · ξ2 = ξ1, a4 · ξ4 = ξ3, a5 · ξ1 = a2 6 = a6, a6 · ξi = 1 2 ξi, i=1,...,4; 1 2 1 2 1 2 ξi, i=1,...,4; ξ3, a3 · ξ2 = ξ2, a5 · ξ3 = 1 2 1 2 ξ4; ξ4; ξ1 · ξ2 = a2, ξ2 · ξ3 = a1 + a6, ξ1 · ξ3 = a4, ξ1 · ξ4 = a1 + a6; ξ3 · ξ4 = a3; ξ2 · ξ4 = a5, and products which are not obtained from these transpositions of factors are equal to 0. In [17] the authors proved that K is exceptional. If char k = 3 this superalgebra is not simple, but it has a simple subalgebra of dimension 9, called the degenerated Kac superalgebra. There are two other examples of exceptional simple Jordan superalgebras in char k = 3, see [18]. Example 8. An example of non-simple exceptional Jordan superalgebra was obtained in It is the 7-dimensional superalgebra with even part J0 = T7, odd part generated by [11]. {o1, o2, o3, o4} and multiplication given by e1 · oi = oi · e1 = 1 2 oi for i = 2, 3 n1 · oj = oj · n1 = oj+1 for j = 1, 3 n2 · o1 = o1 · n2 = o3 n2 · o2 = o2 · n2 = −o4 o1 · o2 = −o2 · o1 = n2 with the other product being zero. 6 1.1. Peirce decomposition for Jordan superalgebras Suppose that a Jordan superalgebra J possess an idempotent element then it has an homo- geneous idempotent e such as e ∈ J0. Hence (1.3) gives 0 = ((a · e) · e) · e + ((a · e) · e) · e + a · e − (a · e) · e − (a · e) · e − (a · e) · e 0 = 2((a · e) · e) · e − 3(a · e) · e + a · e 0 = [2R3 e − 3R2 e + Re](a) for any element a ∈ J, then 2R3 e + Re = 0 (where Re : J → J denote the right multiplication by e). Using the standard argument for the Peirce decomposition for Jordan algebras (see [5]), we obtain: e − 3R2 Theorem 9. Let e ∈ J be an homogeneous idempotent element, then J is a direct sum of vector spaces J = P0 ⊕ P 1 2 ⊕ P1, where Pi = {x ∈ J x · e = e · x = ix} with i = 0, 1 2 , 1 which have the following multiplicative properties: P2 1 ⊆ P1, P1 · P0 = (0), P2 , P2 ⊆ P 1 , P1 · P 1 ⊆ P 1 2 2 2 P0 · P 1 2 0 ⊆ P0, ⊆ P0 + P1. 1 2 Indeed, put b = d = e in (1.3) and take a ∈ Pi and c ∈ Pj to obtain (1 − 2i)(a · c) · e = (−1)acj(c · a) − 2ij(a · c). = (−1)2acj(a · c) − 2ij(a · c) = j(1 − 2i)(a · c) (1.4) (1.5) (1.6) (1.7) (1.8) If i = j = 0 we get (a · c) · e = 0 and if i = j = 1 we have (a · c) · e = a · c. Also i = 0, j = 1 and i = 1, j = 0 give (a · c) · e = (a · c) and (a · c) · e = 0, respectively. Hence 0 = (a · c) · e = (−1)ac(c · a) · e = (−1)ac(c · a), thus c · a = 0 = a · c and (1.5) holds. Similarly, i = 0, 1 and j = 1 for i = 0, 1. Now, putting c = d = e and taking a, b ∈ P 1 2 in (1.7) give Pi · P 1 in (1.3) we obtain ⊆ P 1 2 2 2 (a · b) · e + 1 2 (a · b) = ((a · b) · e) · e + Writing a · b = c0 + c1 + c 1 a · b ∈ P0 + P1. Thus (1.6) holds. 2 1 4 a · b + (−1)ab 1 4 where ci ∈ Pi we have(cid:0) 1 2 − 1 4(cid:1) c 1 2 b · a = ((a · b) · e) · e + 1 2 a · b. = 0. Hence c 1 2 = 0 and More generally, we have the refined Peirce decomposition: Theorem 10. If e = Pn into a direct sum of subspaces i=1 ei, is a sum of pairwise orthogonal idempotents, then J decomposes J = M06i6j6n Pij 7 (1.9) where P00 = {x ∈ J x · ei = 0 for all i} , Pii = {x ∈ J x · ei = x, x · ek = 0 for k 6= i and i 6= 0} , P0i = (cid:12)x ∈ J x · ei = Pij = (cid:12)x ∈ J x · ei = x · ej = 1 2 x, x · ek = 0 for k 6= i and i 6= 0(cid:13) , 1 2 x i 6= j, x · ek = 0 for 0 6= i < j and k 6= i, j(cid:13) Note that P00 = ∩n P 1 2 (ei) ∩ P 1 2 (ej) ∩n k=1 k6=i,j i=1P0(ei), Pii = P1(ei) ∩n P0(ek) for 0 6= i < j and P00 = P0i = 0 if e = 1 is unity in J. Then using P0(ek), P0i = P 1 P0(ek), Pij = (ei) ∩n k=1 k6=i 2 k=1 k6=i the previous decomposition relative to one idempotent we have that the Peirce components Pij satisfy the following relations: P2 ii ⊆ Pii, Pij · Pii ⊆ Pij, P2 ij ⊆ Pii + Pjj, Pij · Pjk ⊆ Pik, Pii · Pjj = Pii · Pjk = Pij · Pkl = (0) where the indices i, j, k, l are all distinct. Peirce decompositions are inherited by ideals or by subalgebras containing e1, . . . , en. The latter is the case of J0 since the idempotents are supposed to be homogeneous. On the other hand, note that this also happens in J1. Indeed, taking x ∈ J1 we can write x = Σpij with pij ∈ Pij , 0 6 i 6 j 6 n. Multiplying successively x by appropriate idempotents ei and using ij = J1 ∩ Pij. the fact that ei · J1 ⊆ J1 we get pij ∈ J1. Therefore J1 =L06i6j6n P1 ij where P1 2 Classification of Jordan superalgebras In the next sections we will present the complete classification of Jordan superalgebras of dimensions 1, 2 and 3. From now on k will be understood as an algebraically closed field of char 6= 2. Henceforth, for convenience we drop · and denote the multiplication in a superal- gebra J simply as ab. Products that we do not specify are understood to be 0 or be determined by commutativity or anticommutativity. We will say that J = J0 + J1 is a Jordan superalgebra of type (n, m) if n = dim J0 and m = dim J1. We will denote by ei the elements in J0 and by oi the ones which belong to J1. It follows from the supercommutativity (1.2) that o2 i = 0 for i = 1, . . . , m. Every indecompos- able superalgebra obtained in the classification will be denoted by Si j where the superscript i represent its dimension. The description of Jordan superalgebras will be organized according to all possible values of n and m. For example, we will look at the most trivial cases. Suppose that n = 0, then {o1, . . . , om} is a basis for J = J1 an m-dimensional Jordan superalgebra of type (0, m). Since oioj ∈ J0 = 0 for any 1 6 i, j 6 m then there exists only one such J and it is a direct sum of m copies of S1 1 = 0. On the other hand, the Jordan superalgebras of type (n, 0) 1 = ko1 where o2 8 correspond to the ordinary n-dimensional Jordan algebras with the trivial Z2-graduation. We denote trivial indecomposable superalgebras by Us k with multiplication given, re- spectively, by Ui, Bj and Tk in Table 1 for i = 1, 2, j = 1, 2, 3 and 1 6 k 6 10. Henceforward, we will suppose n and m both not null. j and Ts i , Bs 2.1. Jordan superalgebras of dimension 2 Suppose that J = J0 + J1 is a Jordan superalgebra of type (1, 1) and let {e1, o1} be a basis of J. According to Table 1, we have two possibilities for the even part J0 = U1 or J0 = U2. Since o2 1 = 0 we only have to determinate β ∈ k such as e1o1 = βo1. 1 ⊕ S1 1, S2 2 ⊕ S1 1. Writing the Jordan superidentity (1.3) for the basis in the first case, i.e. J0 = U1, we obtain only one equation (β − 1)β(2β − 1)o1 = 0 with solutions β = 0, 1 2, 1 which defines, respec- tively, three non-isomorphic superalgebras: Us 2 (see Table 2). Proceeding in the same way in case of J0 = U2 we still obtain one equation 2β3o1 = 0, then necessarily β = 0 and the superalgebra is Us 1 and S2 Every Jordan superalgebra of dimension two satisfies J2 1 = 0 so they are ordinary Jordan algebras. Since non-isomorphic Jordan algebras have non-isomorphic Z2-graduations, super- algebras in different lines in Table 2 are non-isomorphic. On the other hand, isomorphism of superalgebras preserves the grading then superalgebras in different columns in Table 2 are also non-isomorphic. Consequently, all two-dimensional Jordan superalgebras here presented are pairwise non-isomorphics. Table 2: Two-dimensional Jordan superalgebras Algebra B1 B2 B3 U1 ⊕ U1 U1 ⊕ U2 U2 ⊕ U2 Type (0, 2) Superalgebras Type (1, 1) S2 2 : e2 S2 1 : e2 1 = e1 e1o1 = o1 1 = e1 e1o1 = 1 2 o1 1 ⊕ S1 S1 1 Us Us 1 ⊕ S1 1 2 ⊕ S1 1 Type (2, 0) Bs 1 Bs 2 Bs 3 1 ⊕ Us 1 1 ⊕ Us 2 2 ⊕ Us 2 Us Us Us 2.2. Jordan superalgebras of dimension 3 2.2.1. Jordan superalgebras of type (1, 2) Let J be a three-dimensional Jordan superalgebra of type (1, 2). The even part, J0, is one of the one-dimensional Jordan algebras J0 = U1 or J0 = U2. If {¯e1, ¯o1, ¯o2} is a basis of J, we must determine the products ¯e1 ¯o1 = α ¯o1 + β ¯o2, ¯e1 ¯o2 = γ ¯o1 + δ ¯o2 ¯o1 ¯o2 = ε¯e1. 1. Suppose that J0 = U2. We claim that J is one of the superalgebras in Table 3. Indeed, the 9 Jordan superidentity (1.3) for the basis provides the system of equations 2(cid:0)α3 + 2αβγ + βγδ(cid:1) ¯o1 + 2β(cid:0)α2 + αδ + βγ + δ2(cid:1) ¯o2 = 0 ε(cid:0)(α − δ)2 + 4βγ(cid:1) ¯e1 = 0 2γ(cid:0)α2 + αδ + βγ + δ2(cid:1) ¯o1 + 2(cid:0)αβγ + 2βγδ + δ3(cid:1) ¯o2 = 0 ε(cid:0)α2 − αδ + 2βγ(cid:1) ¯o1 + βε(α + δ) ¯o2 = 0 ε(δ(δ − α) + 2βγ) ¯o2 + γε(α + δ) ¯o1 = 0 2ε(αδ − βγ)¯e1 = 0 with the following solutions: (a) γ = − α2 β and δ = −α. Suppose ε 6= 0 then J ≃ S3 1: if α 6= 0 the isomorphism is given by ¯e1 7→ e1, ¯o1 7→ − ¯e1 7→ e1, ¯o1 7→ − 1√βε o1 and ¯o2 7→ −q β with change of basis ¯e1 7→ e1, ¯o1 7→ − β ¯e1 7→ e1, ¯o1 7→ o1 and ¯o2 7→ βo2 if α = 0. √β α√ε o2 and ¯o2 7→ α√βε o1 +q β ε o2, but if α = 0 then ε o2. In case of ε = 0, we obtain J ≃ S3 3 α2 o2 and ¯o2 7→ o1 + β α o2 for α 6= 0 or (b) α = β = γ = δ = 0. If we suppose ε 6= 0, the superalgebra J is S3 2 with isomor- 1 ⊕ S1 1. phism ¯e1 7→ εe1, ¯o1 7→ o1 and ¯o2 7→ o2. Otherwise, J ≃ Us 2 ⊕ S1 (c) α = β = δ = 0. If γ = 0 we are in the previous case, so we can consider γ 6= 0. 1 with isomorphism ε o1. But if ε = 0, then again we Suppose further that ε 6= 0 then we obtain the superalgebra S3 given by ¯e1 7→ e1, ¯o1 7→ − i√γε o2 and ¯o2 7→ −ip γ 3 with change of basis ¯e1 7→ e1, ¯o1 7→ o2 and ¯o2 7→ γo1. get J ≃ S3 Table 3: Jordan superalgebras of type (1, 2) with J0 = U2. J Multiplication table Observation S3 1 S3 2 S3 3 e1o1 = o2 o1o2 = e1 o1o2 = e1 e1o1 = o2 2 ⊕ S1 1 ⊕ S1 1 Us associative associative associative 2. Suppose that J0 = U1, then J has an even homogeneous idempotent element. Using the and the corresponding decomposition 2, 1. Then J is completely i to which o1 and o2 belong. Peirce decomposition (1.4) we get J = P0⊕P1⊕P 1 of the odd part J1 = P1 defined by the product o1o2 = εe1 and the Peirce subspace P1 In this way we obtain eight non-isomorphic superalgebras given in Table 4. i = J1 ∩ Pi, i = 0, 1 where P1 0 ⊕ P1 1 ⊕ P1 1 2 2 J S3 4 Table 4: Jordan superalgebras of type (1, 2) with J0 = U1. Multiplication table Observation S2 1 ⊕ S1 1 1 = e1 e1o1 = o1 e1o2 = 1 e2 2 o2 10 o1 ∈ P0, o2 ∈ P 1 o1 ∈ P1, o2 ∈ P 1 2 2 Us S2 2 ⊕ S1 1 1 ⊕ S1 1 ⊕ S1 1 1 = e1 e1o1 = 1 2 o1 e1o2 = 1 e2 2 o2 e2 1 = e1 e1o1 = o1 e1o2 = o2 1 = e1 e1o1 = 1 e2 2 o2 o1o2 = e1 e2 1 = e1 e1o1 = o1 e1o2 = o2 o1o2 = e1 2 o1 e1o2 = 1 S3 5 S3 6 S3 7 S3 8 o1 ∈ P0, o2 ∈ P1, associative o1, o2 ∈ P0 associative o1, o2 ∈ P 1 ε = 0 2 o1, o2 ∈ P1 ε = 0 associative o1, o2 ∈ P 1 ε 6= 0 o1, o2 ∈ P1 ε 6= 0 2 Up to permutation of o1 and o2, we have six possibilities: . If ε = 0 we get the superalgebra S3 (a) o1, o2 ∈ P 1 thus J ≃ S3 7. 2 (b) o1, o2 ∈ P1. Analogously, if ε = 0 we obtain S3 and we get the superalgebra S3 8. 5, but if ε 6= 0 we can choose ε = 1 6, otherwise we can choose ε = 1 (c) o1, o2 ∈ P0, thus it follows from the multiplicative properties of Peirce components 0 ⊆ P0 = J1 but o1o2 ∈ J0 then o1o2 = 0 and we obtain the 1 ⊕ S1 1. (1.5) that o1o2 ∈ P2 1 ⊕ S1 superalgebra Us (d) o1 ∈ P0, o2 ∈ P1, then o1o2 ∈ P0P1 = 0 and J ≃ S2 ⊆ P 1 (e) o1 ∈ P0, o2 ∈ P 1 1 ⊕ S1 1. (f) o1 ∈ P1, o2 ∈ P 1 , it follows that o1o2 ∈ P0P 1 , analogously o1o2 ∈ P1P 1 get J ≃ S2 ⊆ P 1 2 2 2 2 2 2 ⊕ S1 1. = ko2 thus o1o2 = 0 and we = ko2 then o1o2 = 0 and we obtain the superalgebra S3 4. 2 2.2.2. Jordan superalgebras of type (2, 1) Let J = J0 + J1 be a three-dimensional Jordan superalgebra of type (2, 1) and let {e1, e2, o1} be a basis of J. In this case, the even part J0 is one of the six two-dimensional Jordan algebras given in Table 1 and J1 = S1 1. All that remains is to determine the action of J0 in o1, namely, to found scalars α, β ∈ k such as e1o1 = αo1 and e2o1 = βo1. 1. Suppose J0 = B1, so we have one idempotent e1 relative to which J1 = P1 0 ⊕ P1 1 ⊕ P1 1 2 with e1, e2 ∈ P1. We claim that J is one of the superalgebras in Table 5. Table 5: Jordan superalgebras of type (2, 1) with J0 = B1. J S3 9 S3 10 Multiplication table Observation Bs 1 ⊕ S1 1 1 = e1 e1e2 = e2 e1o1 = 1 e2 2 o1 e2 1 = e1 e1e2 = e2 e1o1 = o1 o1 ∈ P0, associative o1 ∈ P 1 2 o1 ∈ P1, associative Indeed, according to the Peirce subspace Pi to which o1 belongs we have: (a) o1 ∈ P0 then e2o1 ∈ P1P0 = 0 and we obtain the superalgebra Bs (b) o1 ∈ P 1 , writing the Jordan superidentity (1.3) for the basis we get the equations 1 ⊕ S1 1. 2 −β2o1 = 0 and 2β3o1 = 0, then necessarily β = 0 and J ≃ S3 9. (c) o1 ∈ P1, proceeding in the same way the equation 2β3o1 = 0 gives β = 0, thus J ≃ S3 10. 2. If J0 = B2, analogously we have one idempotent e1 relative to which J1 = P1 0 ⊕ P1 1 ⊕ P1 1 2 11 with e1 ∈ P1, e2 ∈ P 1 . Whatever the Peirce subspace that o1 belongs to, it follows from the multiplicative properties (1.5) and (1.6) and the fact that e2o1 ∈ J1 that the product e2o1 is always zero. So, we obtain three non-isomorphic Jordan superalgebras given in Table 6. 2 Table 6: Jordan superalgebras of type (2, 1) with J0 = B2. J S3 11 S3 12 Multiplication table Observation Bs 2 ⊕ S1 1 1 = e1 e1e2 = 1 e2 1 = e1 e1e2 = 1 e2 2 e2 e1o1 = 1 2 o1 2 e2 e1o1 = o1 o1 ∈ P0 o1 ∈ P 1 o1 ∈ P1 2 3. Consider J0 = B3, since B3 is a nilpotent algebra J does not have any idempotent ele- ment, therefore Peirce decomposition is not available. Then, computing the superiden- tity in the basis elements we get the system α(cid:0)2α2 − 3β(cid:1) o1 = 0 β(cid:0)2α2 − β(cid:1) o1 = 0 2αβ2o1 = 0 2β3o1 = 0 whose solution is α = β = 0 (still when char k = 3). Consequently, we obtain the associative (then Jordan) superalgebra Bs 3 ⊕ S1 1. 4. Now, if J0 = U1 ⊕U1 then J has two even homogeneous orthogonal idempotent elements which implies in the following decomposition of J1 in Peirce subspaces J1 = P1 00 ⊕ P1 01 ⊕ P1 02 ⊕ P1 11 ⊕ P1 12 ⊕ P1 22. Thus J is completely defined by the Peirce component P1 provides us the four non-isomorphic superalgebras: Us if o1 ∈ P01 (or, analogously, o1 ∈ P02), S2 and the indecomposable one S3 the case of o1 ∈ P12. ij to which o1 belongs. This 1 ⊕ Us 1 1 if o1 ∈ P11 (or, analogously, o1 ∈ P22) 2 o1 in 2 = e2, e1o1 = 1 1 if o1 ∈ P00, S2 2o1, e2o1 = 1 13 given by e2 1 = e1, e2 1 ⊕ Us 2 ⊕ Us 1 ⊕ S1 5. Assume J0 = U1 ⊕ U2, then J has an idempotent e1 such as J1 = P1 with e1 ∈ P1 and e2 ∈ P0. necessarily β has to be zero for the respective superalgebras to satisfy the Jordan superidentity: 2β3o1 = 0 in the first case and β2o1 = 0, 2β3o1 = 0 in the second one. We obtain the superalgebras Us 2 ⊕ S1 1 and S2 2 , respectively. Lastly, if o1 ∈ P1 then e2o1 ∈ P0P1 = 0 and the resulting superalgebra is S2 If o1 ∈ P0 or o1 ∈ P 1 1 ⊕ Us 1 ⊕ Us 0 ⊕ P1 1 ⊕ P1 1 2 2 2 ⊕ Us 2 . 6. Finally, if J0 is the null algebra U2 ⊕ U2 then again Peirce decomposition is not available. Computing the Jordan superidentity in the basis we have: 2α3o1 = 0 2αβ2o1 = 0 2α2βo1 = 0 2β3o1 = 0 which has as solution α = β = 0. Hence, we obtain the associative superalgebra Us 2 ⊕ 12 Us 2 ⊕ S1 1. Until now, we have proved that any three-dimensional Jordan superalgebra J over an alge- braically closed field of characteristic not 2 is isomorphic to one of the superalgebras presented in this subsection. The following theorem completes the algebraic classification. Theorem 11. All superalgebras in Section 2.2 are pairwise non-isomorphic. Proof. Firstly, consider the superalgebras such as J2 = 0, namely those algebras in Table 7. 1 Following an analogous reasoning to that done in dimension two and taking into account that decomposable superalgebras are guaranteed to be non-isomorphics, we only have to verify whether S3 12 ? ≃ S3 9. The result follows from (S3 It remains to analyze superalgebras with J2 8. They all have type (1, 2), the first two have even part U2 while J0 = U1 in the remaining two superalgebras. S3 2 is an associative superalgebra while S3 1 is not. On the other hand, the Jordan superalgebra 8 has a unity e1 whereas S3 S3 7 is K3 the Kaplansky superalgebra, one of the few examples of finite dimensional simple nonunital Jordan superalgebras. 7 has not, indeed S3 12)0 = B2 6≃ B1 = (S3 1 6= 0, namely S3 1, S3 9)0. 2, S3 7 and S3 Table 7: Three-dimensional Jordan superalgebras with J2 1 = 0 Algebra Superalgebras (0, 3) (1, 2) (2, 1) (3, 0) T1 T2 T3 T4 T5 T6 T7 T8 T9 T10 B1 ⊕ U1 B1 ⊕ U2 B2 ⊕ U1 B2 ⊕ U2 B3 ⊕ U1 B3 ⊕ U2 S3 10 S3 12 S3 9 S3 11 S3 13 S2 2 ⊕ Us 1 S2 2 ⊕ Us 2 1 ⊕ S1 Bs 1 S2 1 ⊕ Us 1 S2 1 ⊕ Us 2 2 ⊕ S1 Bs 1 Bs 3 ⊕ S1 1 S3 6 S3 3 S3 4 S3 5 S2 2 ⊕ S1 1 S2 1 ⊕ S1 1 13 Ts 1 Ts 2 Ts 3 Ts 4 Ts 5 Ts 6 Ts 7 Ts 8 Ts 9 Ts 10 Bs Bs 1 ⊕ Us 1 1 ⊕ Us 2 Bs Bs 2 ⊕ Us 1 2 ⊕ Us 2 Bs Bs 3 ⊕ Us 1 3 ⊕ Us 2 U1 ⊕ U1 ⊕ U1 U1 ⊕ U1 ⊕ U2 U1 ⊕ U2 ⊕ U2 U2 ⊕ U2 ⊕ U2 S1 1 ⊕ S1 1 ⊕ S1 1 Us 1 ⊕ Us 1 ⊕ Us 2 ⊕ Us 1 ⊕ S1 2 ⊕ S1 2 ⊕ S1 1 Us 1 Us 1 Us Us 1 ⊕ Us 1 ⊕ Us 1 ⊕ Us 2 ⊕ Us 1 ⊕ Us 1 1 ⊕ Us 2 2 ⊕ Us 2 2 ⊕ Us 2 Us Us 1 ⊕ S1 2 ⊕ S1 1 ⊕ S1 1 ⊕ S1 1 Us 1 Us Theorem 12. All Jordan superalgebras of dimension up to 3 are special. Proof. It follows from [19] that ordinary Jordan algebras up to dimension 3 are special, then it is clear that Jordan superalgebras up to dimension 3 such as J2 1 = 0 are also special since the graduation on the associative enveloped algebra is induced by the graduation of J. Associative Jordan superalgebras are trivially special, it is the case of S3 2. Furthermore, we have already proved in Example 4 that K3 ≃ S3 7 is also special. Now, observe that S3 8 is the simple Jordan superalgebra of the non-degenerate supersym- metric bilinear form f : V × V → k where V = V1 is a vector superspace over k such as dim V1 = 2, given by f(oi, oi) = 0 for i = 1, 2 and f(o1, o2) = 1 = −f(o2, o1). Therefore, the speciality follows from Example 5. Finally, superalgebra S3 1 is exactly the algebra supercommutative, solvable of index 2 and nonnilpotent described in Example 1 of [20] and proved to be special by exhibiting an embed- ding in the superalgebra A(+) for the matrix superalgebra A = M1,2 3 (k), where A0 = (cid:12)(cid:18) a 0 0 b (cid:19) , a ∈ k, b ∈ M2(k)(cid:13) and A1 = (cid:12)(cid:18) 0 x y 0 (cid:19) , x ∈ M1,2(k), y ∈ M2,1(k)(cid:13) putting e1 = e23 ∈ A0, o1 = e13 + 4e31 ∈ A1, o2 = e1 ⊙ o1. As a consequence, we obtain a bound for the minimal dimension of exceptional Jordan superalgebras as posed in [11]. We observe that, up to our knowledge, the dimension 7 for the Example 8 is the least dimension for the known examples of exceptional Jordan superalgebras. Corollary 13. The minimal dimension d of an exceptional Jordan superalgebra satisfies 4 6 d 6 7. 14 References References [1] N. Backhouse, A classification of four-dimensional Lie superalgebras, J. Math. Phys., 19 (1978), pp. 2400–2402. [2] , On the construction of graded Lie algebras, Springer Berlin Heidelberg, Berlin, Hei- delberg, 1978, pp. 364–366. [3] V. T. Filippov, V. K. Kharchenko, and I. Shestakov, eds., Dniester notebook: unsolved problems in the theory of rings and modules, Mathematics Institute, Russian Academy of Sciences Siberian Branch, Novosibirsk, 4 ed., 1993. [4] A. S. Hegazi, Classification of nilpotent Lie superalgebras of dimension five II, International Journal of Theoretical Physics, 38 (1999), pp. 2681–2693. [5] N. Jacobson, Structure and representations of Jordan algebras, vol. 39 of American Math- ematical Society Colloquium Publications, American Mathematical Society, Providence, 1968. [6] V. G. Kac, Classification of simple Lie superalgebras, Functional Analysis and Its Applica- tions, 9 (1975), pp. 263–265. [7] , Classification of simple Z-graded Lie superalgebras and simple Jordan superalgebras, Communications in Algebra, 5 (1977), pp. 1375–1400. [8] , Lie superalgebras, Advances in Mathematics, 26 (1977), pp. 8 – 96. [9] I. L. Kantor, Connection between Poisson brackets and Jordan and Lie superalgebras, Lie Theory, Differential Equations and Representation Theory, (1990), pp. 213 – 225. [10] I. Kaplansky, Graded Jordan algebras I, preprint, (1975), pp. 1–14. [11] M. C. López-Díaz, I. Shestakov, and S. Sverchkov, On speciality of Bernstein Jordan algebras, Communications in Algebra, 28 (2000), pp. 4375–4387. [12] M. E. Martin, Four dimensional Jordan algebras, International Journal of Mathematics, Game Theory and Algebra, 20 (2013), pp. 41–59. [13] C. Martínez and E. Zel'manov, Simple finite-dimensional Jordan superalgebras of prime characteristic, Journal of Algebra, 236 (2001), pp. 575 – 629. [14] , Specializations of Jordan superalgebras, RACSAM, 95 (2001), pp. 1–6. [15] N. L. Matiadou and A. Fellouris, A classification of the five-dimensional Lie superalge- bras over the complex numbers, Mathematica Balkanica, 19 (2005), pp. 143–154. 15 [16] , Classification of the five-dimensional Lie superalgebras over the real numbers, Inter- national Journal of Theoretical Physics, 46 (2007), pp. 451–470. [17] Y. Medvedev and E. Zel'manov, Some counter-examples in the theory of Jordan algebras, Nonassociative Algebraic Models, Nova Sci. Publ., (1992), pp. 1–16. [18] M. Racine and E. Zel'manov, Simple Jordan superalgebras with semisimple even part, Journal of Algebra, 270 (2003), pp. 374–444. [19] H. Sherlukov, Jordan algebras in small dimensions, masters dissertation, University of Novosibirsk, 1989. [20] I. Shestakov, Superalgebras and counterexamples, Siberian Mathematical Journal, 32 (1991), pp. 1052–1060. 16
1012.5505
1
1012
2010-12-26T09:40:26
Diameters of commuting graphs of matrices over semirings
[ "math.RA" ]
We calculate the diameters of commuting graphs of matrices over the binary Boolean semiring, the tropical semiring and an arbitrary nonentire commutative semiring. We also find the lower bound for the diameter of the commuting graph of the semiring of matrices over an arbitrary commutative entire antinegative semiring.
math.RA
math
DIAMETERS OF COMMUTING GRAPHS OF MATRICES OVER SEMIRINGS DAVID DOLZAN, DAMJANA KOKOL BUKOVSEK, POLONA OBLAK Abstract. We calculate the diameters of commuting graphs of matrices over the bi- nary Boolean semiring, the tropical semiring and an arbitrary nonentire commutative semiring. We also find the lower bound for the diameter of the commuting graph of the semiring of matrices over an arbitrary commutative entire antinegative semiring. 1. Introduction Definition. A semiring is a set S equipped with binary operations + and · such that (S, +) is a commutative monoid with identity element 0, and (S, ·) is a monoid with identity element 1. In addition, operations + and · are connected by distributivity and 0 annihilates S. A semiring is commutative if ab = ba for all a, b ∈ S. A semiring S is called antinegative, if a + b = 0 implies that a = b = 0. Antinegative semirings are also called antirings (or zero-sum-free semirings). A semiring is entire (or zero-divisor-free) if ab = 0 implies that a = 0 or b = 0. A semiring is a division semiring if all nonzero elements have multiplicative inverses. The simplest example of an antinegative semiring is the binary Boolean semiring, the set {0, 1} with 1 + 1 = 1 · 1 = 1. We will denote the binary Boolean semiring by B. Moreover, the set of nonnegative integers (or reals) with the usual operations of addition and multiplication, is a commutative entire antinegative semiring, and all distributive lattices are antinegative semirings. On the set R ∪ {−∞}, we define operations a ⊕ b = max{a, b} and a ⊙ b = a + b, where −∞ + a = a + (−∞) = −∞. It is easy to verify that (R ∪ {−∞}, ⊕, ⊙) is a semiring. It is denoted by T and called the tropical semiring, sometimes also the max-plus semiring. Tropical semiring is a commutative entire antinegative division semiring and it is closely related to the max algebra, i.e. the semiring of nonnegative reals R+, where the addition is the same as in the tropical semiring and the multiplication is the ordinary multiplication on reals. Recently, commuting matrices in max algebra were studied in [10]. Over past decades, the tropical semirings and other tropical structures were widely investigated. Let us mention only a few pioneering works [4, 5, 13] that connect the theory of matrices over classical and tropical worlds. We denote by Mn(S) the semiring of all n × n matrices over a semiring S and by GLn(S) the group of all invertible matrices in Mn(S). By In ∈ Mn(S), we denote the Date: July 19, 2018. 2010 Mathematics Subject Classification. 15A27, 16Y60, 05C50, 05C12. Key words and phrases. semiring, Boolean semiring, tropical semiring, commuting graph, diameter. 1 identity matrix and by 0n ∈ Mn(S) the zero matrix. The matrix with the only nonzero entry 1 in the i-th row and the j-th column will be denoted by Ei,j. If X is a subset of S, let denote the centralizer of X in S. For x ∈ S we also define CS(x) = CS({x}). CS(X) = {s ∈ S; sx = xs for all x ∈ X} For any subset T of a semiring S, we denote by Γ(T ) the commuting graph of T . The vertex set V (Γ(T )) of Γ(T ) is the set of elements in T \CS(T ). An unorderded pair of vertices x − y is an edge of Γ(T ) if x 6= y and xy = yx. The sequence of edges x0 − x1, x1 − x2, ..., xk−1 − xk is called a path of length k and is denoted by x0 − x1 − . . . − xk. The distance between two vertices is the length of the shortest path between them. The diameter of the graph is the longest distance between any two vertices of the graph Γ and will be denoted by diam(Γ). For example, the commuting graph of the set of all 2×2 nilpotent matrices over an entire antinegative semiring S, is a disconnected graph with two components (corresponding to the strictly upper, and strictly lower triangular matrices), where both components are isomorphic to a complete graph on S − 1 vertices. Recently, the commuting graphs of matrix rings and semirings ([1, 2, 3, 6, 7, 8, 11]) and commuting graphs of various algebraic structures ([9, 12]) have been studied. They give an illustrative way of describing centralizers of elements. It was proved in [2, Cor. 7] that the diameter of the commuting graph of the full matrix ring over an algebraically closed field is equal to 4. For rings and fields that are not algebraically closed, the commuting graph of the full matrix ring might not be connected at all, or if it is connected, its diameter can be larger than 4. (See e.g. [6, Ex. 2. 15], where it has been proven that 5 ≤ diam(Γ(M9(Z2))) < ∞.) In this paper, we continue with the investigation of the diameters of commuting graphs In [7, Prop. 10] it has been shown that the diameter of the of full matrix semirings. commuting graph of the full matrix semiring over B is bounded between 3 and 4. In the second section, we prove that it is equal to 4. This implies that the diameter of the commuting graph of Mn(S) is at least 4 for every commutative entire antinegative semiring S. Using this, we prove in Theorem 3.2 that for the tropical semiring T the diameter of Γ(Mn(T)) is equal to 4. In Section 4, we prove that diam(Γ(Mn(S))) = 3 for every nonentire commutative semiring S and all n ≥ 2, thus generalizing [8, Thm. 1.1], where a similar result has been proven for Mn(Zm), where m is not a prime number. 2. The commuting graph of the full matrix semiring over B In this section, we prove that the diameter of the commuting graph of the full n × n matrix semiring over Boolean semiring B is equal to 4 for all n ≥ 3. We start with a general lemma, which can be easily proved by a straightforward calcu- lation. Denote by Jn the nilpotent n × n matrix E1,2 + E2,3 + . . . + En−1,n. 2 Lemma 2.1. If S is a semiring and n ≥ 2, then the centralizer of Jn is equal to CMn(S)(Jn) = {a0In + a1Jn + a2J 2 ; ai ∈ S}, and the centralizer of J T n is equal to CMn(S)(J T ; bi ∈ S}. (cid:4) n + . . . + an−1J n−1 n ) = {b0In + b1J T n n(cid:1)2 n + b2(cid:0)J T + . . . + bn−1(cid:0)J T n(cid:1)n−1 The following Theorem is the main result of this section. Theorem 2.2. If B is a binary Boolean semiring, then diam(Γ(M2(B))) = ∞ and diam(Γ(Mn(B))) = 4 for n ≥ 3. Proof. It was proved in [7, Prop. 10] that diam(Γ(M2(B))) = ∞. Let n ≥ 3 and let E ∈ Mn(B) be a matrix of all ones. It was also proved in [7, Prop. 10] that the distance between any matrix A ∈ Mn(B) and matrix E is at most 2. It follows that diam(Γ(Mn(B))) ≤ 4 for n ≥ 3. To prove the equality, we have to find two matrices with the distance between them at least 4. Let n = 3 and let It is easy to check, that for any pair of matrices C ∈ A and D ∈ B, C and D do not commute, so that the distance between A and B is at least 4 and thus diam(Γ(M3(B))) = 4. Now, let n ≥ 4. Let A, B ∈ Mn(B) be A = 0 0 · · · 0 1 ... 1 J T n−1   0 1   , 0 B =(cid:20)1 0 Jn−1(cid:21) . Note that the centre of Mn(B) consists only of 0n and In. Suppose that the distance between A and B is at most 3. Then there exist nonscalar matrices C, D ∈ Mn(B) such that A − C − D − B is a path in Γ(Mn(B)). Observe that C is not a diagonal matrix, otherwise all of its diagonal entries are equal, since C commutes with A. So, C + I is not in the centre and it commutes with A and D. Since C and C + I have the same centralizer, we can therefore assume that all the diagonal entries of C are equal to 1. 3 A straight-forward calculation shows that the set of all matrices with distance 1 to matrix A is . , 1 0 0 0 0 1 0 0 1 0 0 0 1 0 1 0 1 0 0 0 0 B = 1 1 0 A =     A =   , 1 1 1 , 0 0 1 , 0 0 1 , 1 1 1 1 1 1             B =   0 0 1 , 0 0 1 , 0 0 0 , 0 0 1 , 0 0 0             1 1 1 0 0 0 1 1 1 0 1 0 1 1 0 0 1 0 1 1 0 0 0 0 1 0 0 0 0 0 1 0 0 0 1 1 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 1 1 . and the set of all matrices with distance 1 to matrix B is Now, suppose that D is diagonal. Since it commutes with B, it has the form 0 D =(cid:20)1 0 0n−1(cid:21) or 0 D =(cid:20)0 0 In−1(cid:21) . In both cases, since C and D commute, C has the form 0 C =(cid:20)1 0 C1(cid:21) . Since C commutes with A, C1 also commutes with J T n−1 and the last row of C1 is equal D is not diagonal and again we can assume that all diagonal entries of D are equal to 1. 0 1(cid:3). So, C1 = In−1 and C is in the centre, which is a contradiction. Thus, to (cid:2)0 · · · Now, since D and B commute, we have 1 c2,1 ... cn,1 C =  c1,2 1 ... cn,2 · · · · · · . . . · · · c1,n c2,n ... 1   and D = where di 6= 0 for some i ∈ {2, 3, . . . , n − 1}. 0 1 0 0 1 d2 0 0 ... ... 0 0 0 0 1 0 0   · · · · · · . . . . . . · · · · · · 0 0 dn−2 dn−1 dn−2 ... d2 1 . . . 1 0 ,   Since A and C commute, we have for every i = 2, ..., n − 1 that 0 = (AC)2,i = (CA)2,i = c2,i+1 and 0 = (AC)2,n = (CA)2,n = c2,1, so (1) c2,i = 0 for every i 6= 2. Also, for every i = 2, ..., n − 1 we have (AC)1,i = (CA)1,i and thus (2) cn,i = c1,i+1. Further, for every i = 3, ..., n − 1 we have c1,i = c1,i + c2,i = (AC)3,i = (CA)3,i = c3,i+1 and c1,n = (AC)3,n = (CA)3,n = c3,1. For i ≥ j ≥ 3 and using (3) c1,i + cj−1,i = (AC)j,i = (CA)j,i = cj,i+1, we prove by induction that (4) and (5) cj,i+1 = c1,i + c1,i−1 + ... + c1,i−j+3 for every i ≥ j ≥ 3 cj,1 = c1,n + c1,n−1 + ... + c1,n−j+3 for every j ≥ 3. Let 3 ≤ i < j ≤ n − 1. First cj,3 = (CA)j,2 = (AC)j,2 = c1,2 + cj−1,2 and cj,i = (CA)j,i−1 = (AC)j,i−1 = c1,i−1 + cj−1,i−1 and by induction we have cj,i = c1,2 + ... + c1,i−1 + cj−i+2,2 for every 3 ≤ i < j ≤ n − 1. Since D is not diagonal, at least one of d2, ..., dn−1 is nonzero. Let k be the greatest index, such that dk 6= 0, so dk = 1. Note that the second row of D is therefore equal to · · · dk−1 1 0 · · · (cid:2)0 1 d2 Suppose first that k = n − 1. Since C and D commute, we have 0 = (CD)2,1 = (DC)2,1 = c2,1 + d2c3,1 + ... + dn−1cn,1 = c2,1 + d2c3,1 + ... + dn−2cn−1,1 + cn,1, thus cn,1 = 0 and by (5), we have c1,3 + ... + c1,n = cn,1 = 0. It follows that c1,i = 0 for all i ≥ 3. Furthermore, 0 = c1,n = (DC)1,n = (CD)1,n = c1,2dn−1 = c1,2 so c1,2 = 0 and by (4) it follows that C is lower-triangular. 0(cid:3). 4 Suppose now that k < n − 1. Since C and D commute, we have 0 = (CD)2,1 = (DC)2,1 = c2,1 + d2c3,1 + ... + dkck+1,1 = c2,1 + d2c3,1 + ... + dk−1ck,1 + ck+1,1, thus ck+1,1 = 0 and by (5) it follows that c1,n−k+2 + ... + c1,n = 0. Therefore, c1,i = 0 for every i ≥ n − k + 2. Furthermore, 0 = c1,n = (DC)1,n = (CD)1,n = c1,n−k+1dk = c1,n−k+1. By induction, c1,n−k−i+2 = c1,n−k−i+2dk = (CD)1,n−i+1 = (DC)1,n−i+1 = c1,n−i+1 = 0 for every i = 1, ..., n − k, so that c1,j = 0 for every j ≥ 2 and by (4), C is lower-triangular. Now, we have cj,i = 0 for every i > j and by applying (3) it follows that (6) cj,i = cj−1,i−1 = . . . = cj−i+2,2 for every 3 ≤ i < j ≤ n − 1. Since C is lower-triangular, (2) implies that cn,i = 0 for i ≥ 2 and cn,1 = 0 by (5). Therefore we have for every i = 2, ..., n − 2 that 0 = cn,i+1 = (CA)n,i = (AC)n,i = cn−1,i, which by (6) implies that cn−i+1,2 = 0, so again by (6), cj,i = 0 for all 3 ≤ i < j ≤ n − 1. Together with (1) we have that C = In, a contradiction. So, we have proved that the distance between A and B cannot be less than 4 and (cid:4) therefore diam(Γ(Mn(B))) = 4. Corollary 2.3. If S is a commutative entire antinegative semiring, then diam(Γ(M2(S))) = ∞ and diam(Γ(Mn(S))) ≥ 4, for n ≥ 3. Proof. For a matrix A ∈ Mn(S), let us denote by supp(A) ∈ Mn(B) the unique (0, 1)- matrix with the property Ai,j 6= 0 if and only if (supp(A))i,j 6= 0 for all 1 ≤ i, j ≤ n. Since S is a commutative entire antinegative semiring, AB = BA for A, B ∈ Mn(S) implies that supp(A)supp(B) = supp(B)supp(A) for supp(A), supp(B) ∈ Mn(B). Thus, it follows that diam(Γ(Mn(S))) ≥ diam(Γ(Mn(B))). Now, the statement follows by Theorem 2.2. (cid:4) 3. The commuting graph of the full matrix semiring over T The two operations ⊕ and ⊙ in T naturally induce the matrix addition and multi- plication on the semiring (Mn(T), ⊕, ⊙), namely for A = [ai,j], B = [bi,j] ∈ Mn(T) we have (A ⊕ B)i,j = ai,j ⊕ bi,j, and (A ⊙ B)i,j = ai,1 ⊙ b1,j ⊕ ai,2 ⊙ b2,j ⊕ . . . ⊕ ai,n ⊙ bn,j. Let In be the identity matrix in Mn(T), i.e. matrix with zeros on the diagonal and −∞ offdiagonal, and let E be the matrix with all entries equal to 0 ∈ R. For a ∈ T and A = [ai,j] ∈ Mn(T) we also define the matrix aA in the natural way, i.e. (aA)i,j = a ⊙ aij = a + aij. It was proved in [7, Cor. 11] that diam(Γ(Mn(T))) ≥ 3 for all n ≥ 3. Here, we will prove that diam(Γ(Mn(T))) = 4 for all n ≥ 3. 5 Lemma 3.1. The centralizer CMn(T)(E) consists of exactly all matrices A = [ai,j], such that there exists some element a ∈ T, with the property max j {ai,j} = a for all i = 1, 2, . . . , n and max i {ai,j} = a for all j = 1, 2, . . . , n. Proof. For the matrix A = [ai,j] we denote a = maxi,j=1,...,n{ai,j}. If A commutes with E, then max{ai,1, ai,2, ..., ai,n} = ai,1 ⊕ ai,2 ⊕ ... ⊕ ai,n = (A ⊙ E)i,1 = (E ⊙ A)i,1 = a1,1 ⊕ a2,1 ⊕ ... ⊕ an,1 = max{a1,1, a2,1, ..., an,1} for every i = 1, ..., n. So all rows of A have the same maximum a, thus a appears in every row of A. Similarly, a appears in every column of A. Conversely, if a appears in every row and column of A, then clearly E ⊙ A = aE = A ⊙ E. (cid:4) Theorem 3.2. For the tropical semiring T, we have diam(Γ(M2(T))) = ∞ and diam(Γ(Mn(T))) = 4 for n ≥ 3. Proof. By Corollary 2.3 we have that diam(Γ(M2(T))) = ∞ and diam(Γ(Mn(T))) ≥ 4. Suppose now n ≥ 3. If D = [dk,l] is a diagonal matrix, where di,i = dj,j for some i, j, then let us define the n × n matrix F = [fk,l], such that fk,l =(0, −∞, otherwise . k = l or (k, l) = (i, j) or (k, l) = (j, i), Now, (F ⊙ D)j,i = (F ⊙ D)i,j = dj,j = di,i = (D ⊙ F )i,j = (D ⊙ F )j,i. Furthermore, (F ⊙ D)k,k = dk,k = (D ⊙ F )k,k for all k and (F ⊙ D)k,l = −∞ = (D ⊙ F )k,l for all k 6= l, and {k, l} 6= {i, j}. Thus D − F − E is a path in Γ(Mn(T)) by Lemma 3.1. If A = [ai,j] is a nondiagonal matrix, let a = max{ai,j}, and then, A − A ⊕ aIn − E is a path in Γ(Mn(T)) by Lemma 3.1. We have thus proved that d(A, E) ≤ 2 for all matrices A except for the diagonal matrices with all of their diagonal entries distinct. We will now prove that d(D, A) ≤ 4 for a diagonal matrix D with all diagonal entries distinct and an arbitrary A ∈ Mn(T). If A is diagonal as well, it is clear that d(D, A) = 1. So, suppose A = [ai,j] is nondiagonal and let µ = max{ai,j} and ε = min{ai,j; ai,j 6= −∞}. Denote by B = [bi,j] the n × n matrix, defined by bi,j =(µ, ε, i = j, i 6= j . Note that ε + ai,j ≤ ε + µ ≤ ak,l + µ for all i, j, k, l and thus for every 1 ≤ i, j ≤ n we have (A ⊙ B)i,j = ai,j + µ = (B ⊙ A)i,j. For the matrix it is easy to see that B ⊙ C = C ⊙ B. Therefore, −∞ µ ε ε µ −∞ µIn−2 C =  ,   D −(cid:20)d1,1I2 −∞ d2,2In−2(cid:21) − C − B − A −∞ 6 is a path in Γ(Mn(T)) and thus d(D, A) ≤ 4. (cid:4) As a Corollary of [7, Thm. 7] we have the following. Proposition 3.3. For the tropical semiring T, we have diam(Γ(GLn(T))) =(5, ∞, n prime, otherwise. Remark. Note that [2, Thm. 14, 15] state that for an infinite commutative division ring R, we have the equality diam(Γ(Mn(R))) = diam(Γ(GLn(R))) for all n ≥ 2. With Theorem 3.2 and Proposition 3.3, we proved that this result cannot be generalized to commutative division semirings. 4. The commuting graph of the full matrix semiring over a nonentire commutative semiring In this section, we prove that the diameter of the commuting graph of the full matrix semiring over a nonentire commutative semiring is always equal to 3. This generalizes the result from [8, Thm. 1.1], where it has been proved that the diameter of the commuting graph of the full matrix ring over the ring Zm for a composite number m is always equal to 3. First, we find the lower bound for the diameter of the commuting graph of matrices over an arbitrary commutative semiring. Proposition 4.1. If S is a commutative semiring, then diam(Γ(Mn(S))) ≥ 3 for n ≥ 2. Proof. By Lemma 2.1, the only matrices in the intersection of the centralizer of Jn and the centralizer of J T n are scalar matrices, but these are of course central. Thus, the distance between matrices Jn and J T (cid:4) n in Γ(Mn(S)) is at least 3. We now prove that this bound is sharp, since the diameter is equal to 3 for all commuting graphs of matrices over nonentire commutative semirings. Theorem 4.2. If S is a nonentire commutative semiring, then diam(Γ(Mn(S))) = 3 for n ≥ 2. Proof. Since S is not entire, there exist nonzero x, y ∈ S such that xy = yx = 0. (Note that it may happen that x = y.) Choose arbitrary noncentral matrices A, B ∈ Mn(S). Case 1: Suppose xA and yB are noncentral matrices in Mn(S). Then A − xA − yB − B is a path of length 3 in Γ(Mn(S)). 7 Case 2: Suppose xA is central and yB is a noncentral matrix in Mn(S). Then AxE1,2 = xAE1,2 = E1,2xA = xE1,2A, so A − xE1,2 − yB − B is a path of length 3 in Γ(Mn(S)). Similarly, we treat the case when yB is central and xA is not. Case 3: Suppose xA and yB are central matrices in Mn(S). Then A − xE1,2 − yE1,2 − B is a path of length 3 in Γ(Mn(S)). The three cases considered show that the distance between any two matrices in Mn(S) is at most 3, and therefore diam(Γ(Mn(S))) ≤ 3. By Proposition 4.1, it follows that diam(Γ(Mn(S))) = 3. (cid:4) References [1] A. Abdollahi, Commuting graphs of full matrix rings over finite fields, Linear Algebra Appl., 428 (2008), 2947 -- 2954. [2] S. Akbari, A. Mohammadian, H. Radjavi, P. Raja: On the diameters of commuting graphs, Linear Algebra Appl., 418 (2006), 161 -- 176. [3] S. Akbari, P. Raja: Commuting graphs of some subsets in simple rings, Linear Algebra Appl., 416 (2006), 1038 -- 1047. [4] M. Akian, S. Gaubert, A. Guterman: Linear independence over tropical semirings and be- yond, Tropical and idempotent mathematics, 138, Contemp. Math., 495, Amer. Math. Soc., Providence, RI, 2009. [5] M. Develin, F. Santos, B. Sturmfels: On the rank of a tropical matrix, Combinatorial and computational geometry, Math. Sci. Res. Inst. Publ., 52, Cambridge Univ. Press, Cambridge, 2005, 213-242. [6] G. Dolinar, B. Kuzma, P. Oblak: On maximal distances in a commuting graph, preprint. [7] D. Dolzan, P. Oblak: Commuting graphs of matrices over semirings, Linear Algebra Appl., doi: 10.1016/j.laa.2010.04.014. [8] M. Giudici, A. Pope: The diameters of commuting graphs of linear groups and matrix rings over the integers modulo m, Australasian Journal of Combinatorics, 48 (2010), 221 -- 230. [9] A. Iranmanesh, A. Jafarzadeh: On commuting graph associated with the symmetric and al- ternating groups, J. Alg. Appl., 7 (2008), no. 1, 129 -- 146. [10] R. D. Katz, H. Schneider, S. Sergeev: On commuting matrices in max algebra and in classical nonnegative algebra, Linear Algebra Appl., doi: 10.1016/j.laa.2010.08.027. [11] A. Mohammadian, On commuting graphs of finite matrix rings, Commun. Algebra, 38 (2010), 988 -- 994. [12] Y. Segev: The commuting graph of minimal nonsolvable groups, Geom. Dedicata, 88 (2001), 55 -- 66. [13] I. Simon: On semigroups of matrices over the tropical semiring, RAIRO Inform. Thor. Appl., 28 (1994), no. 3-4, 277 -- 294. D. Dolzan: Department of Mathematics, Faculty of Mathematics and Physics, University of Ljubljana, Jadranska 19, SI-1000 Ljubljana, Slovenia; e-mail: [email protected] D. Kokol Bukovsek: Department of Mathematics, Faculty of Mathematics and Physics, University of Ljubljana, Jadranska 19, SI-1000 Ljubljana, Slovenia; e-mail: [email protected] lj.si P. Oblak: Faculty of Computer and Information Science, Trzaska 25, SI-1000 Ljubljana, Slovenia; e-mail: [email protected] 8
1602.01627
2
1602
2017-02-14T12:46:39
Covers of the arithmetic site
[ "math.RA" ]
We give an explicit description of the Barr- and Diaconescu covers of the arithmetic site, which are relevant to cohomology. Further, we construct the arithmetic site as the commutative shadow of a non-commutative topological space.
math.RA
math
COVERS OF THE ARITHMETIC SITE LIEVEN LE BRUYN b e F 4 1 ] . A R h t a m [ 2 v 7 2 6 1 0 . 2 0 6 1 : v i X r a Abstract. We give an explicit description of the Barr- and Diaconescu covers of the arithmetic site, which are relevant to cohomology. Further, we construct the arithmetic site as the commutative shadow of a noncommutative topolog- ical space. 1. The arithmetic site The arithmetic site, introduced and studied by A. Connes and C. Consani in [3] and [4], is an algebraic geometric object deeply related to the non-commutative geometric approach to the Riemann hypothesis. It involves two elaborate math- ematical concepts: the notion of topos in geometry and that of characteristic 1 structures in algebra. topos of sheaves on the small category C consisting of one object • with monoid of endomorphisms isomorphic to the multiplicative semigroup N× + of strictly posi- It is defined as a topos bC endowed with a structure sheaf O. Here, bC is the tive integers and equipped with the chaotic Grothendieck topology. Thus,bC is the category of contravariant functors from C to Sets, the category of sets. Any such functor Cop ✲ Sets is fully determined by a set X = X(•), equipped with a commuting family of endomorphisms Ψn : X ✲ X for all n ∈ N× +, with Ψ1 the identity morphism. That is, bC is equivalent to the category Sets − N× + of all sets equipped with a right action by the monoid N× + and action preserving maps as morphisms. The connection with characteristic one structures comes from the fact that this action is fully determined by the commuting endomorphisms Ψp for p ∈ P (the set of all prime numbers), which can be viewed as Frobenius morphisms. automorphisms of the monoid C (such as arbitrary permutations of the prime num- However, there is a large group of automorphisms of the topos bC arising from bers). For this reason, Connes and Consani equipbC with a structure sheaf, turning the presheaf toposbC in the arithmetic site (bC, Zmax). Here, Zmax is the fundamental Two topos-theoretic objects associated tobC carry a lot of arithmetic information. semiring in characteristic 1. That is, Zmax = (Z ∪ {−∞}, max, +), which means that ordinary addition is replaced by x⊕ y = max(x, y) and ordinary multiplication by x ⊗ y = x + y, see [3] and [4]. The points of the topos can be identified with the finite ad`ele classes [4] and the subobject-classifier is a complete Heyting algebra on the set of all (right) ideals of N× +. 1.1. The points ofbC : Recall that a point p of the toposbC is a geometric morphism from Sets to bC, see [11, VII.5]. Using Grothendieck's description via filtering 1 2 LIEVEN LE BRUYN subgroup is of the form functors, see [11, VII.6], a point p corresponds to a set P having a free left- N× +- action such that P is of rank one meaning that for all x, y ∈ P there exists an element z ∈ P and numbers n, m ∈ N× + such that x = n.z and y = m.z. As such, points correspond to additive subgroups of Q. If Af is the ring of finite ad`eles of Q, that is Af = Q ⊗Qp∈PbZp, then it is proved in [4, Prop. 2.5] that any such additive where bZ∗ is the multiplicative group of invertible elements in the ring of profinite integers bZ =Qp∈PbZp acting by (right) multiplication on Af . Moreover, the map Pa = {q ∈ Q a.q ∈bZ} for some a ∈ Af /bZ∗ a 7→ Pa induces a canonical bijection pts(bC) = Q× +\Af /bZ∗ = [Af ] between the isomorphism classes of points of the arithmetic site and finite ad`ele classes [Af ]. see [4, Prop. 2.5]. Alternatively one can describe additive subgroups of Q by supernatural numbers as in [2]. Recall that a supernatural number (also called a is a formal product s =Qp∈P psp where p runs over all prime numbers P and each sp ∈ N ∪ {∞}. The set S of all supernatural numbers forms a multiplicative semigroup with multiplication defined by exponent addition and the multiplicative semigroup N× + embeds in S via unique factorization. If s ∈ S, the corresponding additive subgroup is Ps = {q ∈ Q s.q ∈ S} In [2] it is shown that isomorphism classes of additive subgroups of Q correspond to equivalence classes on S defined by s ∼ s′ iff (sp = ∞ ⇔ s′ sp = s′ p = ∞ p for all but at most finitely many p [Af ] = pts(bC) = [S] [S] of supernatural numbers. The connection between the two descriptions description via supernatural numbers and will denote the isomorphism class of the point Hs by the corresponding equivalence class [s]. Note also from [10, 2.2] or That is, we have natural identifications between points ofbC and equivalence classes is induced via the identifications S = bZ/bZ∗. In this note we will always use the [4, §8] that we can view pts(bC) as the moduli space of noncommutative spaces 1.2. The subobject classifier Ω : The subobject-classifier Ω of the toposbC co- incides by with the set of all sieves, that is with all right ideals in the monoid N× +, see [11, I.4]. Any sieve S ∈ Ω is of the form corresponding to UHF-algebras. S =[i∈I niN× + for some (finite or infinite) set of positive integers ni which are incomparable with respect to the ordering by division. As a subobject-classifier in a topos, Ω is a (complete) Heyting algebra. Recall from [11, I.8] that a Heyting algebra H is a partially ordered set under ≤, with unique minimal element 0 and unique maximal element 1 and equipped COVERS OF THE ARITHMETIC SITE 3 with 2-ary operations ∧ and ∨ and an additional 2-ary operation → satisfying the following conditions for all x, y, z ∈ H: (1) x ∧ (y ∧ z) = (x ∧ y) ∧ z = x ∧ y ∧ z (2) x ∨ (y ∨ z) = (x ∨ y) ∨ z = x ∨ y ∨ z (3) x ∧ y = y ∧ x and x ∨ y = y ∨ x (4) x ∧ x = x and x ∨ x = x (5) 1 ∧ x = x and 0 ∨ x = x (6) x ∧ (y ∨ x) = x = (x ∧ y) ∨ x (7) x ∧ (y ∨ z) = (x ∧ y) ∨ (x ∧ z) and x ∨ (y ∧ z) = (x ∨ y) ∧ (x ∨ z) (8) x ≤ y iff x = x ∧ y iff y = x ∨ y (9) (x ∧ y) ≤ z iff x ≤ (y → z) In an Heyting algebra one can also define the 1-ary 'negation' operation ¬ by ¬x = (x → 0) and one always has x ≤ ¬¬x. A Heyting algebra is called Boolean if for all x ∈ H we have ¬¬x = x, or equivalently that x ∨ ¬x = 1. We will now make these operations explicit for the subobject-classifier Ω of the presheaf toposbC using [11, Prop. I.8.5]. Assume S, T ∈ Ω with mjN× + niN× then niN× mjN× + lcm(ni, mj)N× + + and T = [j∈J + ∪ [j∈J S =[i∈I S ∨ T = S ∪ T =[i∈I S ∧ T = S ∩ T = [(i,j)∈I×J [∀i:lcm(e,ni)∈T ¬S =(0 if S 6= 0 + and 0 = ∅ 1 if S = 0 1 = N× S → T = eN× + 1.3. The Grothendieck topologies on C. In addition to the Heyting algebra structure on Ω there is also a right N× S ⊙ n = n−1.S ∩ N× gcd(ni, n) N× + +-action ⊙ on Ω. ni + =[i∈I Recall from [11, III.2] that a Grothendieck topology on C is a subset G ⊂ Ω satisfying the following properties (1) 1 ∈ G (2) (stability) if S ∈ G, then S ⊙ N× (3) (transitivity) if S ∈ G and if R ∈ Ω such that R ⊙ S = {R ⊙ s s ∈ S} ⊂ G, + = {S ⊙ n n ∈ N× +} ⊂ G then R ∈ G. Observe that it follows that if S ∈ G and S ⊂ S' in Ω, then also S' ∈ G. The coarsest Grothendieck topology on C, with Gch = {1}, is called the chaotic topology on the category C. There are uncountable many different Grothendieck topologies on C. 4 LIEVEN LE BRUYN Proposition 1. Let P ⊂ P be a subset of prime numbers, then GP = {S ∈ Ω ∃m : mN× + ⊂ S and all prime divisors of m belong to P } is the smallest Grothendieck topology on C containing the sieves S(p) = pN× p ∈ P . + for all Proof. One uses the third property of Grothendieck topologies to deduce that S(m) = mN× + must belong to GP if all prime divisors of m belong to P using S(m) ⊙ S(p) =(S(m) if p ∤ m p ) if p m S( m But then all sieves S of the required form belong to GP and one verifies easily that these sieves indeed form a Grothendieck topology. (cid:3) But there are plenty of other Grothendieck topologies. If G is a Grothendieck topology on C and if ∪i∈I niN× + ∈ G for all possible prime divisors pi of ni. Hence, to G one can associate a set of subsets of prime numbers {Pj : j ∈ J} with the Pj minimal with respect to the property that ∪p∈Pj pN× + ∈ P. + ∈ G, then also all ∪i∈I piN× 2. Topos theoretic covers of the arithmetic site +- • 7→ {∗} 1 : C ✲ Sets We have seen that the subobject classifier ofbC is Ω with its natural right N× action. The terminal object of the toposbC is given by the functor +-action. Open objects inbC corre- where {∗} is the singleton with trivial right N× spond to subobjects of 1, that is to right N× be a sieve fixed under the N× N× +-maps {∗} ✲ Ω so its image must +-action. There are only two such sieves: ∅ = 0 and + = 1. That is Opens(bC) = {0, 1}, or equivalently, the toposbC is two-valued. 2.1. The Diaconescu cover. For every Grothendieck topos E there exists a locale X and an open surjective geometric morphism Sh(X) ✲ E, [11, IX.9 Thm 1]. The locale X is then called a Diaconescu cover of E. In this section we will determine the Diaconescu covers of Sh(C, G) of the arithmetic site equipped with a Grothendieck topology. As the topos of sheaves of sets on a site with underlying small category a partially ordered set is a locale by [11, IX.5 Thm 1], we first introduce the poset corresponding to the monoid category C, and call it the big cell. Definition 1. The big cell D is the category with one object [k] for every strictly positive integer k ∈ N+ and with morphisms induced by the partial ordering by reverse division [k] ≤ [l] if and only if lk That is, there is exactly one arrow [k] ✲ if and only if [k] ≤ [l]. There is a π ✲ C sending each object [k] to • and every morphism natural covariant functor D [k] / [l] to the endomorphism corresponding to k l . The terminology 'big cell' s due to John Conway in [6]. In order to under- stand groups commensurable with the modular group Γ occurring in moonshine, he looked at (projective classes of) lattices commensurable with the standard lat- tice < ~e1, ~e2 > and showed that they have a canonical form L =< M~e1 + g h~e2, ~e2 > / COVERS OF THE ARITHMETIC SITE 5 with M ∈ Q+ and g introduced a hyper-distance h ∈ Q/Z. For any other such lattice L′ =< N~e1 + i j ~e2, ~e2 > he δ(L, L′) = det(αDLL′) ∈ Z where α is the minimal strictly positive rational number such that αDLL′ ∈ M2(Z) with DLL′ =(cid:20)M g 1(cid:21)−1 1(cid:21) .(cid:20)N i 0 0 h j The hyperdistance is symmetric and depends only on the projective classes of lat- tices. We can turn the set of all classes of lattices into a graph by connecting lattices having prime hyperdistance. Conway calls the resulting graph the big picture and proved that is the product, over all prime numbers p, of the subgraphs of lattices with hyperdistance p, which is itself an infinite p + 1-valent tree, [6]. The big cell is the subgraph consisting of the lattices LM with M ∈ N+, and is therefore the product of an infinite number of graphs of type A∞. A Grothendieck topology G on C can be extended, in a canonical way, to a Grothendieck topology Gc on D by taking for each object [k] in D the set of sieves Gc([k]) = G where we mean for each sieve S ∈ Ω that S([k]) = { [l] / [k] : l k ∈ S}. With respect to these Grothendieck topologies on D and C the functor π satisfies the covering lifting property (clp) as well as the property of preserving covers of [11, p. 507]. It follows that the conditions of [11, Prop. IX.8.1] are satisfied and we obtain the following result. Proposition 2. For any Grothendieck topology G on C, the induced map from π on the corresponding sheaf toposes f : Sh(D, Gc) ✲ Sh(C, G) is an open, surjective geometric morphism. As D is a poset, the topos Sh(D, Gc) is localic, that is, Sh(D, Gc) is a Diaconescu cover of Sh(C, G). Recall that a point of a topos is a geometric morphisms from Sets to the topos. As composition of geometric morphisms remain geometric, the above functor f defines a map on the level of points We will now investigate this map in case G is the chaotic topology, that is, Sh(C, G) = pts(D, Gc) ✲ pts(C, G) + closed under taking divisors and least common multiples. As such they correspond naturally to super- PSh(C) =bC in which case Sh(D, Gc) = PSh(D) which topos we will denote bybD. Proposition 3. The points ofbD correspond to subsets S ⊂ N× natural numbers: pts(bD) = S. Proof. Recall from [11, VII,§5-6] that a point in the presheaf topos correspond to covariant functors satisfying the following conditions • There is some [k] such that P ([k]) 6= ∅ P : D ✲ Sets / as lcm(k, l)m it follows that also lcm(k, l) ∈ SP . To a subset S ⊂ N× number s ∈ S with s =Yp∈P psp 6 LIEVEN LE BRUYN • Given elements a ∈ P ([k]) and b ∈ P ([l]), there is an [m] with maps / [l] and an element c ∈ P ([m]) such that u(c) = a u v [k] [m] and v(c) = b. As D does not have parallel arrows, the third condition of [11, p. 386] is vacuous. Note that for all [k] we have that either P ([k]) is the empty set or a singleton. For, suppose a 6= b in P ([k]), apply the second condition to k = l. As there is a unique map from [m] to [k] it must follow that a = u(c) = b. By the first condition we have some [k] such that P ([k]) = {∗k}. If lk there is a unique map [k] u / [l] and therefore u(∗k) ∈ P ([l]) 6= ∅. Hence the set SP = {k ∈ N× + P ([k]) 6= ∅} is closed under division. It is also closed under taking least common multiples, for if k, l ∈ SP then by the second condition there is an m such that km and lm such that for the unique maps u and v from [m] to resp. [k] and [l] we have u(∗m) = ∗l and v(∗m) = ∗l + satisfying these conditions one can associate a supernatural where sp is the maximal exponent d such that pd ∈ S. Conversely, if s ∈ S then the subset is closed under division and least common multiples. (cid:3) S = {n ∈ N× + ns} / [l] 7→ id{∗} 1 : D ✲ Sets are described in the following result. ([k] 7→ {∗} [k] 2.2. The locale S. The terminal object inbD is given by the contravariant functor By definition, the set of opens in the toposbD correspond to subfunctors of 1, which Proposition 4. Opens(bD) correspond to subsets of N× between the opens inbD and sieves in C. Proof. A subfunctor S ∈ Sub(1) assigns to each [k] a set Sk which is either {∗} or the emptyset. If kl we must have the commuting diagram ples, that is, there is a natural one-to-one correspondence Opens(bD) ↔ Ω + closed under taking multi- 1 : S : {∗} id / {∗} Sk / Sl idSk so the set of k ∈ N× right ideal of the monoid N× + such that Sk = {∗} is closed under taking multiples, so is a (cid:3) +, that is, a sieve in C. o o / / / / O O / O O COVERS OF THE ARITHMETIC SITE 7 With operations as before, Ω is a frame, that is, a lattice with finite meets, finite and infinite joins, satisfying the infinite distributive law. More precisely, we have for all S, T, Ti ∈ Ω: (1) S ≤ T iff S ⊂ T. (2) S ∧ T = S ∩ T. (3) S ∨ T = S ∪ T. (4) S ∧ (∨iTi) = ∨i(S ∩ Ti). (5) 0 = ∅ and 1 = N× +. If cat is a poset category, thendcat is generated by the subobjects of the terminal object, and is called a localic topos as dcat ≃ Sh(X), the category of sheaves on a locale X, where the category of locales is defined to be the opposite of the category of frames, see for example [11, Chp. IX]. The locale X has a frame isomorphic to the frame of open sets of a topological space X if and only if X has enough points, that is, if elements of the corresponding frame can be distinguished by points of X, [11, Prop. IX.3.3]. Here, a point of X is a frame morphism p−1 : O(X) = Open(dcat) ✲ {0, 1} Theorem 1. The localic toposbD is equivalent to the category of sheaves of sets on the topological space S of all supernatural numbers, with open sets corresponding to S = ∪iniN× + ∈ Ω where bD = Sh(S) Xl(S) = Xl(∪iniN× +) = {s ∈ S ∃i : nis} Proof. As D is a poset category,bD ≃ Sh(X) for some locale X. A point of X is a frame morphism or equivalent, a map satisfying the following conditions: p−1 : O(X) = Open(bD) = Ω ✲ {0, 1} +) = 1 (1) p−1(N× (2) p−1(S ∧ S') = 0 iff p−1(S) = 0 or p−1(S') = 0 (3) p−1(∨Si) = 0 iff p−1(Si) = 0 for all i If Ps is the point of bD corresponding to the supernatural number s ∈ S, that is, : ks}, then there is a corresponding point ps of the locale X determined Ps = {[k] by the map p−1 s = Ω ✲ {0, 1} p−1(∪iniN× +) =(0 1 iff ∀i : ni ∤ s iff ∃i : nis as one easily verifies that this map satisfies the required properties. But then, the locale X has enough points. For any two distinct elements S, S′ ∈ Ω = O(X), there is some point p such that p−1(S) 6= p−1(S′). Indeed, let k ∈ S − S′ then p−1 k (S′) = 0. To finish the proof we have to show that pts(X) = S. k (S) = 1 whereas p−1 Let p−1 : Ω ✲ {0, 1} be a point of X and consider the set Dp = {n ∈ N+ p−1(nN× + it follows from the second condition on p−1 that Dp is closed under divisors and least common multiples, whence corresponds to a supernatural number s ∈ S. (cid:3) +) = 1}. As nN× + = lcm(m, n)N× + ∧ mN× 8 LIEVEN LE BRUYN This localic topology on S has a countable basis of open sets of the form Xl(n) = {s ∈ S : ns} Observe that these opens are clopen in the compact Hausdorff topology on S via 2.3. The projection map. We have already seen that the functor π : D ✲ C the identification withQp∈P(N ∪ {∞}) (see also the next section). induces an open surjective geometric morphismbD that the corresponding map between the points f ✲✲ bC. We now want to verify is the natural map, that is sending a supernatural number to its equivalence class. This requires a chase through the defining functors. pts(bD) = S ✲ pts(bC) = [S] corresponding to s ∈ S is defined by the covariant flat functor We have identified points ofbD with the set of supernatural numbers S. The point Ps : D ✲ Sets [k] 7→({∗k} ∅ if ks if k ∤ s This functor induces a geometric morphism p(s) : Sets ✲ bD determined by the adjoint functors p(s)∗ Sets p(s)∗ p(s)∗ = HomD(Ps, −) p(s)∗ = − ⊗D Ps see [11, VII.5 Thm 2, VII.2 Thm 1]. Here, HomD(Ps, S) is the contravariant functor (presheaf) if lks if ls but k ∤ s if k, l ∤ s {∗k} ✲ {∗l} ∅ ✲ {∗k} ∅ ✲ ∅ 7→ )bD [k] 7→(HomSets({∗k}, S) = S HomSets(∅, S) = {ik} if ks if k ∤ s [k] / [l] D ✲ Sets and with [k] / [l] mapping to the composition if lks {∗k} >⑥ ⑥ ⑥ ⑥ ⑥ ⑥ ⑥ ⑥ S ik ∅ >⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤ {∗l} {∗l} S ∅ ∅ S @✁ ✁ ✁ ✁ ✁ il ✁ ✁ ✁ and to the canonical maps S 7→ {ik} if ls but k ∤ s and {il} ✲ {ik} if k, l ∤ s. In general, a presheaf G ∈ bD is a contravariant functor G : D ✲ Sets and : Gl ✲ Gk is defined by assigning a set Gk to all [k], and a morphism gk,l whenever lk. Working through the definition of [11, p. 356] we find that G ⊗D Ps is the set of equivalence classes of the set Gk with gk ∼ gl iff gk,l(gl) = gk Gks / ) j j / / /   > / /   > / /   @ COVERS OF THE ARITHMETIC SITE 9 The functor π : D ✲ C induces by [11, VII.2 Thm 2] a geometric morphism π∗ π∗ ( C bD where π∗ assigns to a N× sition +-set M , that is a functor M : Cop ✲ Sets, the compo- π∗(M ) : Dop πop ✲ Cop M ✲ Sets Concretely, π∗(M ) is the presheaf inbD with all Gk = M and the maps gk,l are given l on M whenever lk. by the right action of k Theorem 2. The functor π : D ✲ C induces a map sending a supernatural number s to its equivalence class [s]. π : S = pts(bD) ✲ pts(C) = S/ ∼ Proof. In view of the foregoing, we have to prove that the composition p(s)∗ ◦ π∗ Sets p(s)∗ p(s)∗ )bD −⊗CQ+(s) π∗ π∗ C is naturally isomorphic to the functor − ⊗C Q+(s) where Q+(s) = { n k n ∈ N+, ks} is the set with left N× +-action by multiplication corresponding to the flat functor C ✲ Sets determining the point [s] ∈ pts(C). Let M be a set with a right N× +-action, then p(s)∗(π∗(M )) is the set of equivalence classes of M with [m′]k ∼ [m]1 iff m′ = m.k Gks that is, we should view m ∈ M in component k as m. 1 the set M ⊗C Q+(s). k and hence we recover indeed (cid:3) 2.4. The Barr cover. Barr's theorem [11, Thm. IX.9.2] asserts that for every Grothendieck topos E there exists a complete Boolean algebra B and a surjective geometric morphism Sh(B) ✲✲ E. The purpose of this theorem is to generalize the Godement resolution by flabby sheaves to the context of cohomology of arbitrary toposes. We will now describe the Barr cover of the arithmetic site. Theorem 3. Consider the complete Boolean algebra then there are surjective geometric morphisms That is, B is the Barr cover of the arithmetic site. {0, 1} B = 2Ω = YS∈Ω Sh(B) ✲✲ Sh(S) ✲✲ bC ( h h ) ( ( j j h h a a 10 LIEVEN LE BRUYN Proof. We have already seen that the locale S is a topological space with the frame of opens Open(S) ↔ Ω. This allows us to determine the Heyting algebra structure on Open(S) as in [11, I.8] and verify that it coincides with the Heyting algebra structure on Ω given before. In particular we have for each non-empty S that its negation ¬S = 0 = ∅. Following the construction of the proof of [11, Lemma IX.9.3], we have to deter- mine the frame of ¬¬-fixed points of the frame Open(S − S) of the closed sublocale S − S of S. Now, by definition Open(S − S) = {T ∈ Ω S ≤ T} ∪ {0} and by the above remark on the negation in Open(S) we have that the double- negation frame Open(S − S)¬¬ ≃ {0, 1} The claims now follow from the proof of [11, Lemma IX.9.3]. (cid:3) 3. Noncommutative covers of the arithmetic site Rather than studying Grothendieck topologies on C and their associated toposes of sheaves, we will consider in this section a number of ordinary topologies on the set of points pts(bC) = [Af ] = [S]. We then construct a noncommutative topolog- ical space, in the sense of [1], with commutative shadow [S] and a corresponding noncommutative Heyting algebra Θ, in the sense of [7], with commutative quotient the subobject classifier Ω. These results are inspired by a remark of A. Connes in [5, §5] where he asserts that the arithmetic site is but a semiclassical shadow of a still mysterious structure dealing with compactifications of Spec(Z). For this reason we first consider three topologies on the points [S] of the arithmetic site and the corresponding continuous maps from Spec(Z). We then construct a noncommutative frame Θ, elements of which can be viewed as constructible truth fluctuations on open sets in the sieve topology on the finite ad`ele classes. 3.1. The arithmetic topology: The locally compact topology on the finite ad`eles Af induces a weak remnant on the set of points of the arithmetic site, which we call the arithmetic topology. If we identify S = Qp∈P(N ∪ {∞}, view each of the factors as a point point compactification of the discrete topology on N then the arithmetic topology is the product topology turning S into a compact Hausdorff. The arithmetic topology is the induced topology on the equivalence classes [S] and was described in [10, Thm. 1]. It has a countable basis of open sets, corresponding to finite subsets P = {p1, . . . , pk} of prime numbers, defined by Xa(P ) = {[s] ∈ [S] ∀p ∈ P : sp 6= ∞} (note that this does not depend on the choice of representative in [s]). There is an obvious connection with the Zariski topology on the prime spectrum Spec(Z) which is P ∪ {0} with open sets of the form XZ (n) = {p ∈ P p ∤ n} ∪ {0}. We can map a prime number p to the class determined by the element (1, . . . , 1, 0, 1, . . .) ∈bZ with a zero in the factor bZp and ones in the other factors. A direct calculation proves the following result. Proposition 5. The inclusion map Spec(Z) ⊂ i ✲ pts(bC) = [S] given by p 7→ [p∞] COVERS OF THE ARITHMETIC SITE 11 is continuous with respect to the Zariski topology on Spec(Z) and the arithmetic topology on [S] as i−1(Xa(P )) = XZ (Qp∈P p). As a consequence, the direct image sheaf i∗OZ has as sections over the arithmetic topology on [S] Γ(i∗OZ, Xa(P )) = Z[ 1 ] Qp∈P p The stalk of i∗OZ in a point [s] of the arithmetic site is then (i∗OZ)[s] = { a b (b, p) = 1 ∀p ∈ P : sp = ∞} so, in particular, the stalk in [p∞] is the local ring Zp. 3.2. The sieve topology: In [10] we introduced another topology on the set of points of the arithmetic site, called the sieve topology as the basic open sets corre- spond to the sieves S ∈ Ω and are defined as Xs(S) = {[s] ∈ [S] ∃n1, n2, . . . ∈ S : nis} ∞Yi=1 (this definition does not depend on the choice of representative in [s]). The 'morale' behind this definition is that Xs(S) are precisely the points of the arithmetic site which are also points in the monoid category of S ∪ {id}. In [10, Thm. 6] it was shown that this sieve topology has some properties one might expect of the mythical space Spec(Z): it is compact, does not admit a countable basis of opens, every non-empty open set is dense and it satisfies the T1-separation property on incomparable points. Further note that the frame of open sets in the sieve topology is isomorphic to the lattice structure of the Heyting algebra Ω. For the connection with the arithmetic topology, note that if P = {p1, . . . , pk} we have Xa(P ) = [S] − Xs(p1N× + ∪ . . . ∪ pkN× +) That is, basic opens of the arithmetic topology are closed in the sieve topology. Still, we have a nice connection with Spec(Z). This time we map the prime ideal (p) to the class of the element (0, . . . , 0, 1, 0, . . .) ∈ bZ with a one in the factor corresponding to bZp and zeroes elsewhere. In this case we calculate: Proposition 6. The inclusion map Spec(Z) ⊂ given by j ✲ pts(bC) = [S] p 7→ [Yq6=p q∞] is continuous with respect to the Zariski topology on Spec(Z) and the sieve topology on [S] as for each sieve S = ∪i∈I niN× + we have with gcd(S) = gcd(ni, i ∈ I) j−1(Xs(S)) = Xa(gcd(S)) As a consequence the direct image sheaf j∗OZ has as sections with respect to the sieve topology Γ(j∗OZ, Xs(S)) = Z[ 1 gcd(S) ] Therefore, the stalk of j∗OZ in a point [s] is equal to (j∗OZ)[s] = Z[ 1 p : p∞s] 12 LIEVEN LE BRUYN or, in terms of the additive subgroups of Q (j∗OZ)[s] = \[t]=[s] Pt In particular, the stalk of j∗OZ at the image j(p) is the localization Zp. This result shows that the sieve topology and its induced structure sheaf from the connection with Spec(Z) is close to the intended structure sheaf of the arith- metic site as defined by Connes and Consani in [3] and [4]. The stalk of the structure sheaf O at a point [s] ∈ pts(bC), which as we have seen corresponds to the (isomorphism class) of the additive subgroup Ps of Q, will be the semiring Ps,max = (Ps ∪ {−∞}, max, +) as sub-semiring of Qmax. Clearly, if one ever wants to have a concrete realization of this "stalk" as a genuine stalk over some topology on the set of all points of the arithmetic site one has to dispose of the ambiguity that different semirings Ps,max defining the same point [s] are only isomorphic as semirings, and not equal. Replacing Ps.max by the intersection ∩[t]=[s]Pt,max is an obvious choice, which gives us the exact stalk of the sheaf j∗OZ in the sieve topology. 3.3. The patch topology: At this moment we have two topologies on pts(bC) = [S] and two natural continuous maps from Spec(Z) to [S] such that in both cases at least the stalks of the direct image structure sheaf give the expected ring Zp. The arithmetic topology might be better to transport arithmetic (ad`elic) information to the arithmetic site whereas the sieve topology, by its very nature, is better at encoding topos-theoretic information. In order to have the best of both worlds, we consider a common refinement of the two topologies, the patch topology (or constructible topology) with respect to the sieve topology. That is, open sets in the patch topology are unions of locally closed subsets in the sieve topology on pts(bC). That is, a basic open set in the patch topology is of the form Xp(S, T) = Xs(S) ∩ Vs(T) where S, T ∈ Ω and Vs(T) = [S] − Xs(T). As we have seen that the basic open sets in the arithmetic topology are closed in the sieve topology we have: Proposition 7. The patch topology on the points of the arithmetic site is a com- mon refinement of both the arithmetical and the sieve topology. It is the topology generated by both the open and closed sets of the sieve topology. 3.4. A noncommutative topology with shadow Ω. Our aim is to equip the set of points E = [S] × {0, 1} with a noncommutative topology such that its classical commutative shadow gives us the sieve topology on [S]. Here, a noncommutative topology has a corresponding 'frame' of open sets Θ which will be a skew-lattice on which the operations ∧ and ∨ are no longer commutative. By the shadow property we will mean that any skew-lattice map to a (commutative) lattice must factor through the lattice Ω of all opens of the sieve topology on [S]. It turns out, see for example [1] or [7], that in passing to the noncommutative setting we need to sacrifice either the top element 1 or the bottom element 0 in the definition of a skew-lattice. In this section we choose to sacrifice 1 as our construction will involve taking local sections of sheaves and whereas there is always a unique such section over 0 = ∅ there are usually lots of global sections. COVERS OF THE ARITHMETIC SITE 13 Definition 2. A noncommutative frame is a set Θ with 2-ary operations ∧ and ∨ (intersection resp. union of open sets) and a minimal element 0 such that for all x, y, z ∈ Θ the following conditions are satisfied: (1) x ∧ (y ∧ z) = (x ∧ y) ∧ z = x ∧ y ∧ z (2) x ∨ (y ∨ z) = (x ∨ y) ∨ z = x ∨ y ∨ z (3) x ∧ x = x (4) x ∨ x = x (5) x ∧ (x ∨ y) = x = x ∨ (x ∧ y) (6) (y ∨ x) ∧ x = x = (y ∧ x) ∨ x (7) x ∧ 0 = 0 = 0 ∧ x (8) x ∨ 0 = x = 0 ∨ x (9) x ∧ (y ∨ z) = (x ∧ y) ∨ (x ∧ z) (10) (y ∨ z) ∧ x = (y ∧ x) ∨ (z ∧ x) (11) x ∧ y ∧ x = x ∧ y (12) x ∨ y ∨ x = y ∨ x (13) x ∧ y ∧ z = x ∧ z ∧ y Here, (1)-(4) state that the operations are associative and idempotent, (5)-(6) are called the absorption properties, (9)-(10) are the strongly distributive properties and (11)-(12) are the left-handed properties, see [1] for more details. Θ becomes a partially ordered set via x ≤ y ⇔ x ∧ y = x = y ∧ x ⇔ x ∨ y = y = y ∨ x and (7)-(8) state that 0 is a minimal element with respect to this partial order. Condition (13) follows from the others and states that (Θ, ∧) is a left-normal semi- group. One defines an equivalence relation on the elements of a noncommutative frame Θ by x ∼ y ⇔ x ∧ y ∧ x = x and y ∧ x ∧ x = y A result of Jonathan Leech, see for example [1, Thm. 2.1] asserts that the induced operations turn the equivalence classes [Θ] into a (commutative) lattice without top element, and moreover, any noncommutative frame morphism Θ ✲ Λ where Λ is a lattice factors through [Θ]. The main result of Bauer et al. [1] on noncommutative Priestly duality tells us that any noncommutative topology Θ with commutative semiclassical shadow [Θ] ≃ Ω comes from the local sections of a sheaf with respect to the patch topology for Ω. We will now construct the simplest such sheaf in the case of interest to us, that is, when Ω is the commutative frame of opens of the sieve topology on the points of the arithmetic site. Definition 3. The sheaf Oc of constructible truth fluctuations has as sections over the open set Xs(S) for S ∈ Ω Γ(Oc, Xs(S)) = {x : Xs(S) ✲ B = {0, 1} continuous} Here, continuous is with respect to the discrete topology on the Boolean semifield B = {0, 1} and the induced patch topology on Xs(S). Alternatively, one can think of x as the characteristic function of an open subset of Xs(X) in the patch topology. 14 LIEVEN LE BRUYN Using the sheaf of constructible truth fluctuations Oc we will now construct the noncommutative frame Θ which is the set of 'opens' of a noncommutative topology on E = [S] × B. Theorem 4. Let Θ be the set of all pairs (S, x) where S ∈ Ω and x ∈ Γ(Xs(S), Oc). On Θ we define 2-ary operations ∧ and ∨ as follows: (S, x) ∧ (T, y) = (S ∧ T, xXs(S)∩Xs(T)) (S, x) ∨ (T, y) = (S ∨ T, yXs(T) ∪ xXs(S)−Xs(T)) With respect to these operations, Θ is a noncommutative frame with semiclassical shadow [Θ] ≃ Ω. there is an embedding of noncommutative frames Ω ⊂ ✲ Θ given by sending S to (S, 1Xs(S)). Further, (S, x) commutes with (T, y) for ∧ or ∨ if and only if xXs(S)∩Xs(T) = yXs(S)∩Xs(T). To each (S, x) ∈ Θ we associate the 'open' set in E = [S] × B Xnc(S, x) = {([s], x([s])) : [s] ∈ Xs(S)} The natural projection om the first factor makes E into an ´etale space over [S] with respect to the patch topology on [S]. Proof. All claims follow from computations, or by invoking [1]. Here, we will merely make the partial ordering explicit as well as the equivalence relation. Let (S, x) and (T, y) be elements of Θ. Then, if (S, x) ∧ (T, y) = (S ∧ T, xXs(S)∩Xs(T)) = (S, x) this implies that S ≤ T. The reverse condition (T, y) ∧ (S, x) = (T ∧ S, yXs(T)∩Xs(S)) = (S, x) asserts that S ≤ T and that yXs(S) = x. That is, the partial ordering on Θ (S, x) ≤ (T, y) ⇔ S ≤ T and yXs(S) = x is given by extension of local sections. Using this, we also have that if (S, x) ∧ (T, y) ∧ (S, x) = (S ∧ T, xXs(S)∩Xs(T)) = (S, x) is equivalent to S ≤ T whereas the other condition (T, y) ∧ (S, x) ∧ (T, y) = (S ∧ T, yXs(T)∩Xs(S)) = (T, y) is equivalent to T ≤ S. That is, (S, x) ∼ (T, y) iff S = T. As a consequence, [Θ] is just projection on the first factor so is isomorphic to the lattice Ω. (cid:3) We can, of course, repeat this construction starting from more involved sheaves with respect to the sieve topology on [S]. A natural choice would be to consider F to be the disjoint union of all the stalks of the structure sheaf j∗OZ. That is, F is equal to the following subset of [S] × Qmax: (j∗OZ)[s] = {([s], q) ∈ [S] × Qmax ∀[t] = [s] : q.t ∈ S} ∪ {([s], −∞) [s] ∈ S} G[s]∈S One can then consider the sheaf of constructible functions O having as its sections over Xs(S) {x : Xs(S) ✲ Qmax : Graf (x) ⊂ F and locally constant wrt. patch topology} Using the same operations as above we can then define a noncommutative frame structure on the collection of all (S, x) with S ∈ Ω and x ∈ Γ(O, Xs(S)) having as its semiclassical shadow Ω. COVERS OF THE ARITHMETIC SITE 15 3.5. A noncommutative Heyting algebra with shadow Ω. In [7] K. Cvetko- Vah introduced the notion of a skew-Heyting algebra. The starting point is again a skew-lattice but, in view of the crucial role of the top 1 as truth in logic, this time with a top element but without bottom element, to ensure noncommutativity of ∧ and ∨. The additional requirements for a skew-lattice with 1 to a a skew-Heyting algebra are by [7, Thm. 3.2] that for all x, y, z and u we have (1) (x → y) = (y ∨ x ∨ y → y) (2) (x → x) = 1 (3) (x ∧ (x → y) ∧ x) = x ∧ y ∧ x (4) (y ∧ (x → y)) = y and ((x → y) ∧ y) = y (5) (x → u ∨ (y ∧ z) ∨ u) = (x → (u ∨ y ∨ u)) ∧ (x → (u ∨ z ∨ u)) If we exchange the definition of ∨ with that of ∧ in theorem 4, reverse the partial ordering and define 1 = ∅ one can extend the resulting skew-lattice with top to a skew-Heyting algebra as this is an instance of the partial maps with poset domain example of [7, 4.4]. However, this is rather artificial and we want to keep the definitions of ∨ and ∧ of theorem 4 on Θ. For this reason we proceed differently and immediately define the 2-ary operation → on Θ (using the corresponding operation on Ω) as follows (S, x) → (T, y) = (S → T, y ∪ 1Xs(S→T)−Xs(T)) Observe that in the Heyting algebra Ω we always have that T ≤ (S → T) so the extension of the function y to Xs(S → T) makes sense. Of course, as we do not have a top element in Θ we cannot hope to satisfy condition (2) of a skew-Heyting algebra. That is, in the noncommutative world we have to sacrifice absolute truth. Based on the example below, K. Cvetko-Vak [8] formalized a non-commutative Heyting algebra to be a noncommutative frame (with bottom 0) with a 2-ary op- eration → satisfying the following axioms. Here, t is a distinguished element of T , the set of all top class elements of the poset. (NH1) x → y = (y ∨ (t ∧ x ∧ t) ∨ y) → y, (NH2) x → x = x ∨ t ∨ x, (NH3) x ∧ (x → y) ∧ x = x ∧ y ∧ x, (NH4) y ∧ (x → y) = y and (x → y) ∧ y = y, (NH5) x → (t ∧ (y ∧ z) ∧ t) = (x → (t ∧ y ∧ t)) ∧ (x → (t ∧ z ∧ t)). Theorem 5. With the above definition of (S, x) → (T, y), the noncommutative frame Θ becomes a noncommutative Heyting algebra. Moreover, any morphism of noncommutative Heyting algebras Θ ✲ Λ where Λ is a Heyting algebra, factors through the Heyting algebra Ω. Proof. Let x = (S, x), y = (T, y), z = (V, z) and t = (1, t). Using the definitions x∧y = (S∧T, x), x∨y = (S∨T, y∪xXs(S)−Xs(T), x → y = (S → T, y∪1Xs(S→T)−Xs(T) one verifies that both sides of the equalities in (NH1)-(NH5) are equal, see also [8, Example 3.1]. (cid:3) Acknowledgement: I like to thank K. Cvetko-Vah for pointing out that the example above did not satisfy the axioms given in a previous version of this paper and for providing the corrected axioms (NH1)-(NH5). 16 LIEVEN LE BRUYN References [1] A. Bauer, K. Cvetko-Vah, M. Gehrke, S.J. Van Gook and G. Kudryavtseva, A non- commutative Priestly duality, arXiv:1206.5848 (2012) [2] Ross A. Beaumont and H. S. Zuckerman, A characterization of the subgroups of the additive rationals, Pacific J. Math. 1, 169-177 (1951) [3] Alain Connes and Caterina Consani, The Arithmetic Site, Le Site Arithm´etique, arXiv:1405.4527 (2014) [4] Alain Connes and Caterina Consani, Geometry of the Arithmetic Site, arXiv:1502.05580 (2015) [5] Alain Connes, An essay on the Riemann hypothesis, arXiv:1509.05576 (2015) [6] John H. Conway, Understanding groups like Γ0(N ), In "Groups, difference sets, and the Monster", Walter de Gruyter (1996) [7] Karin Cvetko-Vah, On skew Heyting algebras, arXiv:1410.8780 (2014) [8] Karin Cvetko-Vah, Non-commutative frames, preprint (2017) [9] Lieven Le Bruyn, Supernatural numbers and a new topology on the Arithmetic Site, arXiv:1407.5538 (2014) [10] Lieven Le Bruyn, The sieve topology on the arithmetic site, Journal of Algebra and Applica- tions (2016) [11] Saunders Mac Lane and Ieke Moerdijk, Sheaves in Geometry and Logic, a first introduction to topos theory, Universitext, Springer-Verlag (1992) Department of Mathematics, University of Antwerp, Middelheimlaan 1, B-2020 Antwerp (Belgium), [email protected]
1902.09354
1
1902
2019-02-25T15:16:21
Centrosymmetric nonnegative realization of spectra
[ "math.RA" ]
A list $\Lambda =\{\lambda _{1},\lambda _{2},\ldots ,\lambda _{n}\}$ of complex numbers is said to be realizable if it is the spectrum of an entrywise nonnegative matrix. In this paper we intent to characterize those lists of complex numbers, which are realizable by a centrosymmetric nonnegative matrix. In particular, we show that lists of nonnegative real numbers, and lists of complex numbers of Suleimanova type (except in one particular case), are always the spectrum of some centrosymmetric nonnegative matrix. For the general lists we give sufficient conditions via a perturbation result. We also show that for $n=4,$ every realizable list of real numbers is also realizable by a nonnegative centrosymmetric matrix.
math.RA
math
Centrosymmetric nonnegative realization of spectra∗ b e F 5 2 ] . A R h t a m [ 1 v 4 5 3 9 0 . 2 0 9 1 : v i X r a Ana I. Julio, Oscar Rojo, Ricardo L. Soto† Departamento de Matem´aticas, Universidad Cat´olica del Norte Casilla 1280, Antofagasta, Chile. Abstract A list Λ = {λ1, λ2, . . . , λn} of complex numbers is said to be real- izable if it is the spectrum of an entrywise nonnegative matrix. In this paper we intent to characterize those lists of complex numbers, which are realizable by a centrosymmetric nonnegative matrix. In particular, we show that lists of nonnegative real numbers, and lists of complex numbers of Suleimanova type (except in one particular case), are al- ways the spectrum of some centrosymmetric nonnegative matrix. For the general lists we give sufficient conditions via a perturbation result. We also show that for n = 4, every realizable list of real numbers is also realizable by a nonnegative centrosymmetric matrix. AMS classification: Key words: Inverse eigenvalue problem, nonnegative matrix, centrosym- 15A18, 15A29 metric matrix. 1 Introduction The nonnegative inverse eigenvalue problem (hereafter NIEP) is the prob- lem of finding necessary and suffcient conditions for the existence of a n × n entrywise nonnegative matrix with prescribed complex spectrum Λ = ∗Supported by conicyt-fondecyt 1170313, Chile; conicyt-pai 79160002, 2016, Chile. †Corresponding author, [email protected], (Ana I Julio), [email protected] (Oscar Rojo), [email protected] (Ricardo L. Soto) 1 {λ1, λ2, . . . , λn}. If there exists an n × n nonnegative matrix A with spec- trum Λ we say that Λ is realizable and that A is the realizing matrix. A complete solution for the NIEP is known only for n ≤ 4, which shows the difficulty of the problem. Throughout this paper, if Λ = {λ1, λ2, . . . , λn} is realizable by a nonnegative matrix A, then λ1 = ρ(A) = max{λi , λi ∈ Λ} is the Perron eigenvalue of A. We shall denote the transpose of a matrix A by AT , ⌊x⌋ and ⌈x⌉ denote the largest integer less than or equal to x and the smallest integer greater than or equal to x, respectively. J will denote the counteridentity matrix, that is, J = [en en−1 · · · e1]. Then it is clear that J T = J, J 2 = I. Observe that multiplying a matrix A by J from the left results in reversing its rows, while multiplying A by J from the right results in reversing its columns. A vector x is called symmetric if Jx = x. The set of all n× n real matrices with constant row sums equal to α ∈ R will be denote by CS α. It is clear that e = [1, 1, . . . , 1]T is an eigenvector of any matrix in CS α, corresponding to the eigenvalue α. The relevance of matrices with constant row sums is due to the well known fact that the problem of finding a nonnegative matrix A with spectrum Λ = {λ1, . . . , λn} is equivalent to the problem of finding a nonnegative matrix B ∈ CS λ1 with spectrum Λ, that is, A and B are similar if the Perron eigenvalue is simple and they are cospectral otherwise (see [4]). In this paper we study the NIEP for centrosymmetric matrices. Centrosym- metric matrices appear in many areas: physics, communication theory, dif- ferential equations, numerical analysis, engineering, statistics, etc. Now we state the definition and certain properties about centrosymmetric matrices. Definition 1.1 A matrix C = (cij) ∈ Mm,n is said to be centrosymmetric, if its entries satisfy the relation ci,j = cm−i+1,n−j+1. The definition means that a centrosymmetric matrix C can be written as JmCJn = C, where Jn is the n × n counteridentity matrix. That is, Jn = [en en−1 · · · e1] . For m = n, we shall write J instead Jn. 2 The following properties and results on centrosymmetric matrices are easy to verify (see [2]). 1 , if exists, ii) C T Lemma 1.1 [2] Let C1 and C2 be centrosymmetric matrices, and α1, α2 ∈ R. Then, i) C−1 1 , iii) α1C1 ± α2C2, iv) C1C2 are all centrosymmetric. Lemma 1.2 [2] Let C be an n×n centrosymmetric nonnegative matrix. If v is an eigenvector of C corresponding to the eigenvalue λ, then Jv is also an eigenvector of C corresponding to λ. Moreover, if λ1 is the Perron eigenvalue of C, then there is a nonnegative eigenvector x such that Jx = x. Theorem 1.1 [2] Let C be an n × n centrosymmetric matrix. i) If n = 2m, then C can be written as C =(cid:20)A JBJ B JAJ(cid:21) , where A, B and J are m × m matrices. ii) If n = 2m + 1, then C can be written as A x JBJ yT yT J B Jx JAJ c C =    , where A, B and J are m × m matrices, x and y are m-dimensional vectors, and c is a real number. Theorem 1.2 [2] Let C be an n × n centrosymmetric matrix. B JAJ(cid:21), then C is orthogonally similar to the matrix i) If C =(cid:20)A JBJ (cid:20)A + JB A − JB(cid:21) . Moreover, if C is nonnegative with the Perron eigenvalue λ1, then λ1 is the Perron eigenvalue of A + JB. ii) If C is written as C =  A x JBJ yT yT J B Jx JAJ c 3  , then C is orthogonally similar √2yT to the matrices  c √2x A + JB  A + JB √2x  √2yT c  Perron eigenvalue λ1, then λ1 is the Perron eigenvalue of (cid:20) c  . Moreover, if C is a nonnegative matrix with the √2yT √2x A + JB(cid:21).   and A − JB A − JB The following theorem, due to R. Rado and published by H. Perfect in [6], will be used to throughout the paper to show some of our results. Rado's theorem show how to modify r eigenvalues of an n × n matrix, r < n, via a rank-r perturbation, without changing any of the remaining n−r eigenvalues (see [3, 9] for the way in which Rado's result has been applied to the NIEP). The case r = 1, is the well known Brauer's theorem [1], which states that If A has eigenvalues λ1, λ2, . . . , λn, then A + vqT , has eigenvalues λ1, . . . , λk−1, λk + vT q, λk+1, . . . , λn, where Av = λkv and q ∈ Cn. (1) Theorem 1.3 Rado [6] Let M be an n × n arbitrary matrix with spectrum Λ = {λ1, λ2, . . . , λn}. Let X = [x1 · · · xr] be such that rank(X) = r and Mxi = λixi, i = 1, . . . , r, r < n. Let C be an r×n arbitrary matrix. Then M + XC has eigenvalues µ1, . . . , µr, λr+1, . . . , λn, where µ1, . . . , µr are eigenvalues of the matrix Ω + CX with Ω = diag{λ1, . . . , λr}.   In [10] the authors prove that a realizable list of complex numbers of Suleimanova type Λ = {λ1, λ2, . . . , λn}, that is, with λ1 being the Perron eigenvalue, and λi ∈ F = {λi ∈ C : Reλi ≤ 0,Reλi ≥ Imλi}, i = 2, . . . , n, is in particular realizable with spectrum Λ and with prescribed diagonal entries ω1, ω2, . . . , ωn if and only if ωi = λi. This result, which we shall use in Section 3, follows directly from the following lemma and (1), which we set here for sake of completeness: n Pi=1 n Pi=1 4 n Pi=2 n n n n Pi=2 Lemma 1.3 Let Λ′ = {− λi, λ2, . . . , λn} be a realizable list of complex numbers, with Perron eigenvalue − λi, the list Λ = {λ1, λ2, . . . , λn} is the spectrum of a nonnegative matrix with prescribed diagonal entries Γ = {ω1, ω2, . . . , ωn}, if and only if Proof. Since Λ′ is realizable, there exists a nonnegative matrix B ∈ CS β, λi, with spectrum Λ′ and tr(B) = 0. Let qT = [ω1, . . . , ωn] . where β = − Then from (1), A = B + eqT is a nonnegative matrix with spectrum Λ and with diagonal entries ω1, ω2, . . . , ωn. Pi=2 λi. Then for any λ1 ≥ − Pi=1 Pi=1 Pi=2 ωi = λi. n 2 Real centrosymmetric matrices with pre- scribed spectrum In this section we show that a list of complex numbers Λ = {λ1, λ2, . . . , λn}, with Λ = Λ, is always the spectrum of a real centrosymmetric matrix (not necessarily nonnegative). That is, the real centrosymmetric inverse eigen- value problem for a list of conjugate complex numbers has always a solution. Theorem 2.1 Let Λ = {λ1, λ2, . . . , λn} be a list of complex numbers, with Λ = Λ, n ≥ 3. Then Λ is the spectrum of an n × n real centrosymmetric matrix. Proof. We shall distinguish two cases: Case 1. Let n be even. First we consider Λ with only two real numbers, that is, Λ = {λ1, λ2, z1, z1, . . . , zm, zm}, zj = aj +ibj , aj ∈ R, bj > 0, j = 1, . . . , m. If m is even, we take the partition Λ = Λ1 ∪ Λ2 with Λk = {λk1, zk1, zk1, . . . , zk m 2 , zk m 2 }, k = 1, 2, λ11 = λ1, λ21 = λ2. Then, from Theorem 1.2 the (m + 1) × (m + 1) matrices a1j (cid:21) and A − JB = λ2 Mj=1(cid:20)a1j −b1j A + JB = λ1 b1j m 2 m 2 Mj=1(cid:20)a2j −b2j a2j (cid:21) b2j 5 have spectrum Λ1 and Λ2 respectively. Then A = 1 and B = 1 2(A + JB + (A − JB)) 2 J(A + JB − (A − JB)). Therefore C =(cid:20)A JBJ B JAJ(cid:21) is real centrosymmetric with spectrum Λ. If m is odd, we take the partition Λ = Λ1 ∪ Λ2 with Λ1 = {λ11, λ12, z11, z11, . . . , z1⌊ m 2 ⌋, z1⌊ m Λ2 = {z21, z21, . . . , z2⌈ m 2 ⌉}. 2 ⌉, z2⌈ m 2 ⌋}, λ11 = λ1, λ12 = λ2 Then, A + JB = λ1 ⊕ λ2 A − JB = ⌊ m 2 ⌋ b1j Mj=1(cid:20)a1j −b1j a1j (cid:21) and a2j (cid:21) Mj=1(cid:20)a2j −b2j ⌈ m 2 ⌉ b2j have the spectra Λ1 and Λ2, respectively and the proof follows as above. It is clear that if Λ has r real numbers, r, m even, we take the partition Λ = Λ1∪Λ2 as above, with Λk, k = 1, 2, having m + r 2 numbers, m complex numbers and r 2 real numbers. If m is odd and Λ has r real numbers, r even, then Λ1 will have ⌊ m real numbers, while Λ2 will have ⌈ m 2 ⌉ complex numbers plus r−2 real numbers. Then the proof follows as before. 2 ⌋ complex numbers plus r+2 2 2 Case 2: Let n be odd. First we consider Λ with only one real number, that is, Λ = {λ1, z1, z1, . . . , zm, zm}, zj = aj + ibj , aj ∈ R, bj > 0, j = 1, . . . , m. If m is even we take the partition Λ = Λ1 ∪ Λ2 with Λ1 = {λ11, z11, z11, . . . , z1 m Λ2 = {z21, z21, . . . , z2 m , z2 m , z1 m 2 }. 2 2 2 }, λ11 = λ1, Then the matrices λ1 m 2 Mj=1(cid:20)a1j −b1j a1j (cid:21) =(cid:20)λ1 b1j A + JB(cid:21) and 6 A − JB = m 2 Mj=1(cid:20)a2j −b2j a2j (cid:21) , b2j have spectrum Λ1 and Λ2, respectively. Then A = 1 and B = 1 2 J(A + JB − (A − JB)). Hence from Theorem 1.2 2 (A + JB + (A − JB)) A 0 JBJ 0 λ1 B 0 JAJ 0     is real centrosymmetric with spectrum Λ. On the other hand, if m is odd, a partition Λ = Λ1 ∪ Λ2 must be of the form Λ1 = {z11, z11, . . . , z1⌈ m Λ2 = {λ21, z21, z21, . . . , z2⌊ m 2 ⌉, z1⌈ m 2 ⌉}, 2 ⌋, z2⌊ m 2 ⌋}, λ21 = λ1, k = 1, 2 Then the matrices ⌈ m 2 ⌉ Mj=1(cid:20)a1j −b1j a1j (cid:21) = b1j a11 −b11 0 b11 0 0 ... 0   0 · · · 0 A + JB   A − JB = λ1 ⌊ m 2 ⌋ a2j (cid:21) Mj=1(cid:20)a2j −b2j b2j and have spectrum Λ1 and Λ2 respectively. Then A = 1 and B = 1 2 J(A + JB − (A − JB)). Hence 2(A + JB + (A − JB)) A x JBJ yT a11 yT J B Jx JAJ     where x = 1√2[b11, 0 · · · , 0]T and yT = 1√2 [−b11,· · · , 0], is a real centrosym- metric matrix with spectrum Λ. It is easy to see that the list Λ = {λ1, z1, z1, . . . , zm, zm} can be extended 7 to a list Λ′ = {λ1, . . . , λp, z1, z1, . . . , zm, zm} with p real numbers, p odd, which always admit a partition in two self-conjugate lists Λ1, Λ2 such that Λ1 has ⌈ 2m+p 2 ⌉ eigenvalues and Λ2 has the remaining eigenvalues, and a real centrosymmetric matrix with spectrum Λ′ can be obtained as above. 3 Centrosymmetric nonnegative inverse eigen- value problem In this section we study the NIEP for centrosymmetric matrices. First, we show that lists of real nonnegative numbers are always realizable for a cen- trosymmetric nonnegative matrix. Second, we show that lists of complex numbers of Suleimanova type [11] are also realizable for centrosymmetric nonnegative matrices, except if the list has only one real number and m pairs of conjugated complex numbers, with m being odd. Third, for the gen- eral lists, we give sufficient conditions for the existence of a centrosymmetric nonnegative matrix with prescribed complex spectrum via a perturbation re- sult. Finally, we study the centrosymmetric realizability of lists of complex numbers of size n = 4 with prescribed diagonal entries. We start by showing that a list of real nonnegative numbers Λ = {λ1, . . . , λn} is always realizable by a centrosymmetric matrix. In addition, if λ1 is simple, Λ is realizable by a centrosymmetric positive matrix. Theorem 3.1 Let Λ = {λ1, λ2, . . . , λn} be a list of nonnegative real numbers with λ1 ≥ λ2 ≥ · · · ≥ λn ≥ 0. Then Λ is realizable by an n × n centrosym- metric matrix. Proof. For even n = 2m, we take the partition Λ = Λ1 ∪ Λ2, where Λ1 = {λ1, . . . , λm}, Λ2 = {λm+1, . . . , λn}. Then for A + JB = diag{λ1, . . . , λm} and A − JB = diag{λm+1, . . . , λn} we have that A = 1 2 diag{λ1 + λm+1, . . . , λm + λn}, B = 1 2 Jdiag{λ1− λm+1, . . . , λm − λn}, are nonnegative matrices, and a solution matrix is of the form B JAJ(cid:21) . C =(cid:20)A JBJ 8 For odd n = 2m + 1, we take the partition Λ = Λ1 ∪ Λ2, where Then for Λ1 = {λ1, . . . , λ⌈ n 2 ⌉+1, . . . , λn}. 2 ⌉}, Λ2 = {λ⌈ n c (cid:21) = diag{λ1, . . . , λ⌈ n 2 ⌉} (cid:20)A + JB √2x √2yT and A − JB = diag{λ⌈ n c = λ⌈ n 2 ⌉. Therefore 2 ⌉+1, . . . , λn}, we have A + JB = diag{λ1, . . . , λ⌊ n 2 ⌋}, A = B = 1 2 1 2 diag{λ1 + λ⌈ n Jdiag{λ1 − λ⌈ n 2 ⌉+1, . . . , λ⌊ n 2 ⌉+1, . . . , λ⌊ n 2 ⌋ + λn}, 2 ⌋ − λn}, are nonnegative matrices and a solution matrix is 0 A 0 λ⌈ n 2 ⌉ 0 B JBJ 0 JAJ C =    . In [5] Perfect introduces the n × n matrix · · · 1 1 1 · · · 1 −1 1 · · · −1 0 1 ... ... ... · · · 1 −1 · · · 0 0 1 1 1 ... P =     , (2) and she proves that if D = diag{λ1, λ2, . . . , λn}, with λ1 > λ2 ≥ · · · ≥ λn ≥ 0, then A = P DP −1 is a positive matrix in CS λ1. As a consequence, we have the following result, which gives a very simple way to compute a centrosymmetric positive matrix with prescribed nonnegative spectrum. Theorem 3.2 Let Λ = {λ1, λ2, . . . , λn} be a list of nonnegative real numbers with λ1 > λ2 ≥ · · · ≥ λn ≥ 0. Then Λ is realizable by an n × n centrosym- metric positive matrix. 9 Proof. For even n = 2m, we take the partition Λ = Λ1 ∪ Λ2, with Λ1 = {λ1, . . . , λm}, Λ2 = {λm+1, . . . , λn}. We set A+JB = P DP −1 > 0, where D = diag{λ1, . . . , λm}, P is the Perfect matrix in (2), and A − JB = diag{λm+1, . . . , λn}. Then A = 1 2 (P DP −1 + diag{λm+1, . . . , λn}) > 0, B = 1 2 J(P DP −1 − diag{λm+1, . . . , λn}). and Therefore, C =(cid:20)A JBJ B JAJ(cid:21) (3) is a centrosymmetric matrix with spectrum Λ. It remains to prove that C is positive. In fact, if djj, j = 1, 2, . . . , m, are the diagonal entries of P DP −1, we must show that It is enough to show that B is positive. djj > λm+j, for all j = 1, 2, . . . , m. It is easy to see that the diagonal entries of the matrix P DP −1 are given by: 1 2m−1 λ1 + 1 2m−2 λ1 + 1 2m−1 λ2 + 1 2m−2 λ2 + 1 2m−2 λ3 + · · · + 1 2m−3 λ3 + · · · + 1 22 λm−1 + 1 22 λm−2 + 1 2 1 2 λm = d22 λm−1 d11 = d33 = ... ... dm−1,m−1 = dmm = 1 2 λ3 1 1 22 λ2 + 22 λ1 + 1 1 λ1 + λ2. 2 2 For j = 1, d11 > λm+1. In fact: since 1 2m−1 λ1 > 1 2m−1 λm+1, 1 2m−1 λ2 ≥ 1 2m−1 λm+1, . . . , 1 2 λm ≥ 1 2 λm+1, 10 then by adding the inequalities we have d11 > ( 1 2m−1 + 1 2m−2 + · · · + 1 1 22 + 2m−1 + 1 + 1 + 2 + 22 + · · · + 2m−3 + 2m−2 1 + (2m−1 − 1) 2m−1 λm+1 = = 1 2 )λm+1 λm+1 2m−1 = λm+1. Since d11 = d22 and λm+1 ≥ λm+2, then d22 > λm+2. By proceeding in the same way we have djj > λm+j, j = 3, 4, . . . , m. There- fore B > 0, and the matrix C in (3) is centrosymmetric positive. If n = 2m + 1 is odd, then we take the partition Λ = Λ1 ∪ Λ2 with Then for (cid:20)A + JB √2x √2yT A − JB = diag{λ⌈ n Λ1 = {λ1, . . . , λ⌈ n 2 ⌉}, Λ2 = {λ⌈ n c (cid:21) = P DP −1 =(cid:20)A11 2 ⌉+1, . . . , λn}, we have bT 2 ⌉+1, . . . , λn}. am+1,m+1(cid:21) > 0, and a A = 1 2 B = (A11 + diag{λ⌈ n 1 2 J(A11 − diag{λ⌈ n 2 ⌉+1, . . . , λn}) > 0, 2 ⌉+1, . . . , λn}). B is positive from the same argument as in the even case. Therefore the matrix C =  A 1√2a 1√2bT am+1,m+1 B J 1√2 a JBJ 1√2bT J JAJ ,   is centrosymmetric positive with spectrum Λ. Next we shall see an anomalous case. That is, we shall prove that if a list realizable Λ has only one real positive number and m pairs of conjugated complex numbers, with m being odd, then Λ cannot be the spectrum of a centrosymmetric nonnegative matrix. 11 Theorem 3.3 Let Λ = {λ1, z1, z1, . . . , zm, zm} be a realizable list of complex numbers, with odd m, zj = aj + ibj j = 1, . . . , m, a ∈ R, bj > 0. Then Λ cannot be the spectrum of a centrosymmetric nonnegative matrix. Proof. Suppose that Λ is the spectrum of a centrosymmetric nonnegative matrix C of order 2m + 1. Then C is of the form C =  c A x JBJ yT J yT B Jx JAJ  , where A and B are m × m nonnegative matrices, x, y are nonnegative m × 1 matrices, and c is a nonnegative real number. From Theorem 1.2 C is orthogonally similar to the matrix  A − JB  √2yT c √2x A + JB   , √2yT where (cid:20) c √2x A + JB(cid:21) is an (m + 1) × (m + 1) nonnegative matrix with m + 1 eigenvalues of C including the Perron eigenvalue. That is, C has m (an odd number) complex eigenvalues, which is a contradiction. Now we consider the centrosymmetric realizability of lists of Suleimanova type. We start with the following simple result: Lemma 3.1 Let Λ = {λ1, λ2, . . . , λn} be the spectrum of a centrosymmetric nonnegative matrix and let ǫ > 0. Then {λ1 + ǫ, λ2, . . . , λn} is also the spectrum of a centrosymmetric nonnegative matrix. Proof. Let C be a centrosymmetric nonnegative matrix with spectrum Λ. Then from Lemma 1.2, there exists v ≥ 0, Cv = λ1v, with Jv = v, and from Brauer's Theorem (see (1)) the matrix C + ǫ vT v vvT , is centrosymmetric nonnegative with spectrum {λ1 + ǫ, λ2, . . . , λn}. It is well known that lists of complex numbers Λ = {λ1, λ2, . . . , λn} of 12 Suleimanova type are realizable by a nonnegative matrix if only ifPn i=1 λi ≥ 0. We prove that a list of this type is in particular realizable by a centrosym- metric nonnegative matrix, except if the list is as in the Theorem 3.3, that is, it has only one real positive number and m pairs of conjugated complex numbers, with m being odd. The following result show that any realizable list of complex numbers of Suleimanova type, with two real numbers and m pairs of complex numbers is always the spectrum of a centrosymmetric nonnegative matrix of order n = 2m + 2. As a consequence, all realizable lists of complex numbers of Suleimanova type, with an even number of elements, are always realizable by centrosymmetric matrices. Lemma 3.2 Let Λ = {λ1, λ2, z1, z1, . . . , zm, zm}, with λ2, zj, zj ∈ F , zj = aj + ibj, aj ∈ R, bj > 0, j = 1, . . . , m, be a realizable list of complex numbers. Then Λ is the spectrum of a centrosymmetric nonnegative matrix. Proof. Since Λ is realizable if only if Pn Λ′ = {λ′1, λ2, z1, z1, . . . , zm, zm}, with λ′1 = −λ2 − 2 i=1 λi ≥ 0, we take the list aj, and aj = Rezj. m Xj=1 For even m we take the partition Λ = Λ1 ∪ Λ2 with Λ1 = {λ11, z11, z11, . . . , z1 m Λ2 = {λ21, z21, z21, . . . , z2 m 2 2 , z1 m , z2 m 2 }, λ11 = λ′1, 2 }, λ21 = λ2. Then, A − JB = λ2 m 2 a2j (cid:21) Mj=1(cid:20)a2j −b2j b2j has spectrum Λ2, and from Lemma 1.3 we can always compute a nonnegative matrix A + JB with spectrum Λ1 and diagonal entries −λ2,−a21,−a21, . . . ,−a2 m 2 ,−a2 m 2 . Since Rezj ≥ Imzj , j = 1, . . . , m, both matrices, A = 1 2 (A + JB + A − JB) and B = 1 2 J((A + JB) − (A − JB)). 13 are nonnegative and C′ =(cid:20)A JBJ B JAJ(cid:21) is centrosymmetric nonnegative with spectrum Λ′. Finally, from Lemma 3.1, C = C′ + Pn i=1 λi vT v vvT , where v is the Perron eigenvector of C′, is centrosym- metric nonnegative with spectrum Λ. For odd m we take the partition Λ = Λ1 ∪ Λ2 with 2 ⌋, z1⌊ m 2 ⌉}, λ11 = λ′1, λ12 = λ2, Λ1 = {λ11, λ12, z11, z11, . . . , z1⌊ m Λ2 = {z21, z21, . . . , z2⌈ m 2 ⌉, z2⌈ m 2 ⌋}, and the proof follows as above. More generally, if Λ has r ≥ 2 real numbers, with even r, we have the following result: Corollary 3.1 Let Λ = {λ1, . . . , λr, z1, z1, . . . , zm, zm}, with zj, zj ∈ F , zj = aj + ibj, aj ∈ R, bj > 0, j = 1, . . . , m; λj ∈ F , j = 2, . . . , r, be a realizable list of complex numbers. Then Λ is the spectrum of a centrosym- metric nonnegative matrix. Proof. We consider the list Λ′ = {λ′1, λ2, . . . , λr, z1, z1, . . . , zm, zm}, with λ′1 = − λi − 2 m r aj, where aj = Rezj, j = 1, . . . , m. Xi=2 Xj=1 Then, for even m we take the partition of Λ′ = Λ1 ∪ Λ2 with: Λ1 = {λ11, λ12, . . . , λ1 r Λ2 = {λ21, λ22, . . . , λ2 r 2 2 , z11, z11, . . . , z1 m 2 , z21, z21, . . . , z2 m 2 while for odd m we take , z1 m , z2 m 2 }, λ11 = λ′1, 2 }, Λ1 = {λ11, λ12, . . . , λ1, r Λ2 = {λ21, λ22, . . . , λ2, r 2 +1, z11, z11, . . . , z1⌊ m 2−1, z21, z21, . . . , z2⌈ m 2 ⌋, z1⌊ m 2 ⌉, z2⌈ m 2 ⌋}, λ11 = λ′1 2 ⌉}, and the proof follows as the proof of Lemma 3.2. Now, we consider lists of complex numbers of Suleimanova type with an odd number of elements. We start with the following result: 14 Lemma 3.3 Let Λ = {λ1, z1, z1, . . . , zm, zm} be a list of complex numbers with zj, zj ∈ F , zj = aj + ibj, aj ∈ R, bj > 0, j = 1, . . . , m, m even, which is realizable. Then Λ is the spectrum of a centrosymmetric nonnegative matrix. Proof. We consider the list Λ′ = {−2 m Xj=1 aj, z1, z1, . . . , zm, zm}, with the partition Λ′ = Λ1 ∪ Λ2, where m Xj=1 Λ1 = {−2 Λ2 = {z21, z21, . . . , z2 m 2 aj, z11, z11, . . . , z1 m 2 } , z1 m 2 , z2 m Then 2 }. Mj=1(cid:20)a2j −b2j a2j (cid:21) is an m × m real matrix with spectrum Λ2, and aT A − JB = √2yT b2j m 2 √2x A + JB(cid:21) =(cid:20)0 (cid:20) c b A22(cid:21) ≥ 0, of order m + 1, has spectrum Λ1 and diagonal entries 0,−a21,−a21, . . . ,−a2 m 2 ,−a2 m 2 , 1 which there exists from Lemma 1.3. Then A = 1 2 J(A22 − (A − JB)), are both nonnegative and the matrix C′ =  b√2 A aT 0 √2 B J b√2 JBJ aT J √2 JAJ 2(A22 + A − JB) and B =   is centrosymmetric nonnegative with spectrum Λ′. Thus, C = C′+ Pn i=1 λi vT v vvT , where v is the Perron eigenvector of C′, is centrosymmetric nonnegative with spectrum Λ. More generally, if Λ has p real numbers, with odd p, we have the follow- ing result: 15 Corollary 3.2 Let Λ = {λ1, . . . , λp, z1, z1, . . . , zm, zm}, with zj, zj ∈ F , zj = aj + ibj, aj ∈ R, bj > 0, j = 1, . . . , m; λk ∈ F , k = 2, . . . , p, be a realizable list of complex numbers. Then Λ is the spectrum of a centrosym- metric nonnegative matrix. Proof. Case even m. We consider the list Λ′ = {− p Xk=2 λk − 2 m Xj=1 aj, λ2, . . . , λp, z1, z1, . . . , zm, zm}, and take the partition Λ′ = Λ1 ∪ Λ2 with, p Λ1 = {− Xk=2 Λ2 = {λ⌈ p λk − 2 n Xj=1 aj, λ2, . . . , λ⌈ p 2⌉, z11, z11, . . . , z1 m 2 2 } , z1 m 2⌉+1, . . . , λp, z21, z21, . . . , z2 m 2 , z2 m 2 }. Then A − JB = diag{λ⌈ p 2⌉+1, . . . , λp} m 2 a2j (cid:21) Mj=1(cid:20)a2j −b2j b2j is a real matrix with spectrum Λ2, and there exists a nonnegative matrix A + JB with spectrum Λ1 and diagonal entries 0,−λ⌈ p 2⌉+1, . . . ,−λp,−a21,−a21, . . . ,−a2 m 2 ,−a2 m 2 . Then the proof follows as before. Case odd m: We consider a partition Λ = Λ1 ∪ Λ2, in which the list Λ1 has the Perron eigenvalue and only one more element than the list Λ2. Both lists, Λ1 and Λ2 must be self-conjugated. Partitions of this type always exist if p ≥ 3. The construction of a nonnegative centrosymmetric matrix follows as in the proof of Lemma 3.3. Remark 3.1 According to the results in this section, it is clear that a real- izable list of real numbers of Suleimanova type is in particular realizable by a centrosymmetric nonnegative matrix. 16 We conclude this section by presenting a sufficient condition for the existence and construction of centrosymmetric nonnegative matrices with prescribed spectrum. Let Λ = {λ1, λ2, . . . , λn} be a realizable list of complex numbers. In order to construct a centrosymmetric nonnegative matrix A with spectrum Λ we consider the following partition of Λ : Λ = Λ0 ∪ Λ1 ∪ · · · ∪ Λ p0 2 ∪ Λ p0 2 ∪ · · · ∪ Λ1, for even p0, Λ = Λ0 ∪ Λ1 ∪ · · · ∪ Λ⌊ p0 2 ⌋ ∪ Λ⌈ p0 2 ⌉ ∪ Λ⌊ p0 2 ⌋ ∪ · · · ∪ Λ1, for odd p0, with Λ0 = {λ01, λ02, . . . , λ0p0}, λ01 = λ1, Λk = {λk1, λk2, . . . , λkpk}, k = 1, 2, . . . , p0 2 (⌈ p0 2 ⌉ for odd p0), (4)   where some of the lists Λk can be empty. For each list Λk, k 6= ⌈ p0 associate the list 2 ⌉, we Γk = {ωk, λk1, λk2, . . . , λkpk}, 0 ≤ ωk ≤ λ1, k = 1, 2, . . . , p0 2 ⌋ for odd p0), (5) which is realizable by a (pk+1)×(pk+1) nonnegative matrix Ak. In particular, Ak can be chosen as Ak ∈ CS ωk . To the sub-list Λ⌈ p0 2 ⌉ we associate the list Γ⌈ p0 2 ⌉, which is the spectrum of a centrosymmetric nonnegative matrix A⌈ p0 2 ⌉ of order p⌈ p0 2 ⌉+1. Then, the block diagonal matrices p0 2 (⌊ A = diag{A1, A2, . . . , A p0 A = diag{A1, A2, . . . , A⌊ p0 , JA p0 2 ⌋, A⌈ p0 2 2 J, . . . , JA2J, JA1J}, for even p0, and 2 ⌋J, . . . , JA2J, JA1J}, for odd p0, ) 2 ⌉, JA⌊ p0 (6) are centrosymmetric nonnegative with spectrum Γ1 ∪ Γ2 ∪ · · · ∪ Γ p0 Γ1 ∪ Γ2 ∪ · · · ∪ Γ⌊ p0 2 ⌋ ∪ Γ⌈ p0 2 ∪ Γ p0 2 ∪ · · · ∪ Γ2 ∪ Γ1, even p0 and 2 ⌋ ∪ · · · ∪ Γ2 ∪ Γ1, odd p0, 2 ⌉ ∪ Γ⌊ p0 respectively. Of course, the matrices J in (6) have the same order pk + 1 of the corresponding matrices Ak, k = 1, 2, , . . . ,⌊ p0 2 ⌋. Let X be an n × p0 matrix whose columns are nonnegative eigenvectors of 17 the matrix A in (6), that is, x1 . . . X =   x p0 2 x p0 2 . . . x1   , for even p0, (7) and X = x1 . . . x⌊ p0 2 ⌋ y⌈ p0 2 ⌉ x⌊ p0 2 ⌋ . . . x1     , for odd p0. (8) where, xk = eT = [1, 1, . . . , 1] is the Perron eigenvector of Ak in (6), k = 1, 2, . . . , p0 2 ⌉ = Jy⌈ p0 2 ⌉ ≥ 0 (symmetric vector). Observe that 2 ⌉ is the Perron eigenvector of A⌈ p0 2 ⌋), and y⌈ p0 2 ⌉, with y⌈ p0 2 (⌊ p0 if Ake = ωke then JAkJe = ωke. Now we state the main result of this section. First, we consider the even p0 case: Theorem 3.4 Let Λ = {λ1, λ2, . . . , λn} be a list of complex numbers with λi ≥ 0. Suppose there exists a Λ = Λ, λ1 ≥ λi , i = 2, 3, . . . , n, and partition of Λ (as defined in (4)), n Pi=1 2 ∪ · · · ∪ Λ1, with even p0, Λ = Λ0 ∪ Λ1 ∪ · · · ∪ Λ p0 Λ0 = {λ01, λ02, . . . , λ0p0}, λ01 = λ1 Λk = {λk1, λk2, . . . , λkpk}, k = 1, 2, . . . , 2 ∪ Λ p0 p0 2 , 18 where some of the lists Λk can be empty, such that the following conditions are satisfied: i) For each k = 1, 2, . . . , p0 2 , there exists a nonnegative matrix with spectrum Γk = {ωk, λk1, λk2, . . . , λkpk}, 0 ≤ ωk ≤ λ1, ii) There exists a centrosymmetric nonnegative matrix of order p0, with spec- trum Λ0 and diagonal entries ω1, ω2, . . . , ω p0 Then Λ is realizable by an n × n centrosymmetric matrix. Proof. From i) let Ak be a (pk + 1) × (pk + 1) nonnegative matrix with spectrum Γk, k = 1, 2, . . . , p0 2 . We may assume that Ak ∈ CS ωk. Then Ake = ωke, The matrix , . . . , ω2, ω1. , ω p0 2 2 A = A1 ⊕ A2 ⊕ · · · ⊕ A p0 2 ⊕ JA p0 2 J ⊕ · · · ⊕ JA2J ⊕ JA1J is centrosymmetric nonnegative with spectrum Γ = Γ1 ∪ · · · ∪ Γ p0 2 ∪ Γ p0 2 ∪ · · · ∪ Γ1. Let X be the matrix in (7). Then X is centrosymmetric nonnegative of zeros and ones. Now, from ii) and Theorem 1.3 let B = Ω+CX centrosymmetric nonnegative matrix of order p0 with spectrum Λ0 and diagonal entries ω1, . . . , ω p0 2 , ω p0 2 , . . . , ω1. b p0 2 2 · · · Jp0b1i is centrosymmetric 2 , are the columns of B − Ω. Jp0b1]. (9) · · · Jp0b p0 Then CX = B − Ω =hb1 nonnegative, where bk and Jp0bk, k = 1, . . . , p0 Therefore the p0 × n matrix C can be obtained as follows 2 · · · 0 . . . 0 {z } p1−times C = [b1 0 . . . 0 {z } p1−times {z } 0 . . . 0 p0 · · · b p0 0 . . . 0 p0 {z } 2 −times 2 −times Jp0b p0 2 It is easy to see that C is centrosymmetric nonnegative. Then the pertur- bation A + XC, with A, X,C as in (6),(7),(9) respectively, is nonnegative centrosymmetric and by Theorem 1.3, A + XC have the spectrum Λ. Now we consider the odd p0 case: 19 n Theorem 3.5 Let Λ = {λ1, λ2, . . . , λn} be a list of complex numbers with Λ = Λ, λ1 ≥ λi , i = 2, 3, . . . , n, and λi ≥ 0. Suppose there exists a partition of Λ (as defined in (4)), Pi=1 Λ = Λ0 ∪ Λ1 ∪ · · · ∪ Λ⌊ p0 2 ⌉ ∪ Λ⌊ p0 2 ⌋ ∪ · · · ∪ Λ1, with odd p0, Λ0 = {λ01, λ02, . . . , λ0p0}, λ01 = λ1 2(cid:25), Λk = {λk1, λk2, . . . , λkpk}, k = 1, 2, . . . ,(cid:24) p0 2 ⌋ ∪ Λ⌈ p0 where some of the lists Λk can be empty, such that the following conditions are satisfied: i) For each k = 1, 2, . . . ,⌊ p0 2 ⌋, there exists a nonnegative matrix with spectrum Γk = {ωk, λk1, λk2, . . . , λkpk}, 0 ≤ ωk ≤ λ1, while for k = ⌈ p0 2 ⌉ there exists a centrosymmetric nonnegative matrix with 2 ⌉. spectrum Γ⌈ p0 ii) There exists a centrosymmetric nonnegative matrix of order p0, with spec- trum Λ0 and diagonal entries ω1, ω2, . . . , ω⌊ p0 2 ⌉, ω⌊ p0 Then Λ is realizable by an n × n centrosymmetric matrix. 2 ⌉ is realizable by a centrosymmetric nonnegative Proof. Case 1. The list Γ⌈ p0 matrix of odd order: In this case the proof follows as the proof of Theorem 3.4, with a perturbation of the form A+ XC, with A, X as in (6), (8) respectively, and 2 ⌋, . . . , ω2, ω1. 2 ⌋, ω⌈ p0 · · · b⌊ p0 Jp0b⌊ p0 ⌈ 0 · · · 0 {z } p0 2 ⌉ 2 −times Jp0b1]. b⌈ p0 2 ⌉ 0 · · · 0 {z } p0 2 ⌉ 2 −times ⌈ C = [b1 0 · · · 0 {z } p1−times 0 · · · 0 {z } ⌊ p0 2 ⌋−times 2 ⌋ 0 · · · 0 {z } ⌊ p0 2 ⌋−times 2 ⌋ · · · 0 · · · 0 {z } p1−times Case 2. The list Γ⌈ p0 2 ⌉ is realizable by a centrosymmetric nonnegative matrix of order even: In this case we consider A as in (6), X as in (8) with all its columns normalized, and in ii) we take B = Ω + C. Then C = B − Ω, is centrosymmetric nonnegative, and by Lemma 1.1 and Theorem 1.3, the perturbation A+XCX T is centrosymmetric nonnegative with spectrum Λ. 20 To apply Theorem 3.4 and Theorem 3.5, we need to know conditions un- der which there exists a p0 × p0 centrosymmetric nonnegative matrix with spectrum Λ0 and diagonal entries ω1, ω2, . . . , ω p0 ω1, ω2, . . . , ω⌊ p0 , ω p0 2 ⌋, ω⌈ p0 , . . . , ω2, ω1, for even p0, or 2 ⌉, ω⌊ p0 2 ⌋, . . . , ω2, ω1 for odd p0. 2 2 In [8, Theorem 3.1] (see also [7]) it has been proved that the spectrum of a 3 × 3 nonnegative centrosymmetric matrix is real. Then, since bisymmet- ric matrices are centrosymmetric, we may use the necessary and sufficient conditions given in [3], for the existence of a 3 × 3 centrosymmetric nonneg- ative matrix with real eigenvalues λ1, λ2, λ3 and diagonal entries ω1, ω2, ω1. For n = 4 we have, in the Theorems 3.7 and 3.8 below, sufficient conditions for the existence and construction of a centrosymmetric nonnegative matrix with prescribed eigenvalues and diagonal entries. The following result show that for lists of four real numbers, both prob- lems, the nonnegative inverse eigenvalue problem and the centrosymmetric nonnegative inverse eigenvalue problem, are equivalent. Theorem 3.6 Let Λ = {λ1, λ2, λ3, λ4} be a list realizable of real numbers. Then Λ is in particular realizable by a centrosymmetric nonnegative matrix. Proof. Case 1: If λ1 ≥ λ2 ≥ λ3 ≥ λ4 ≥ 0, the result follows from Theorem 3.1 when n = 4. Case 2: If λ1 > 0 ≥ λ2 ≥ λ3 ≥ λ4, that is, if the list is of real Suleimanova type, then the result follows from Remark 3.1. Case 3: If λ1 ≥ λ2 ≥ λ3 ≥ 0 > λ4, we have the following general result: A list realizable of real numbers with only one negative eigenvalue is also real- izable by a centrosymmetric nonnegative matrix. In fact, let Λ = {λ1, . . . , λn}, with λ1 ≥ λ2 ≥ · · · ≥ λn−1 ≥ 0 > λn. If n = 2m is even we take the partition Λ = Λ1 ∪ Λ2, with Λ1 = {λ1, . . . , λm}, Λ2 = {λm+1, . . . , λn}, and we set A + JB = diag{λ1, λ2, . . . , λm}, A − JB = diag{λn, λm+1, . . . , λn−1}, 21 and the proof follows as before. If n = 2m + 1 is odd we take the partition Λ = Λ1 ∪ Λ2, with 2 ⌉+1 . . . , λn}. Λ1 = {λ1, . . . , λ⌈ n 2 ⌉}, Λ2 = {λ⌈ n and we set (cid:20)A + JB √2x √2yT c (cid:21) = diag{λ1, λ2, . . . , λ⌊ n 2 ⌉+1, . . . , λn−1}. A − JB = diag{λn, λ⌈ n 2 ⌋, λ⌈ n 2 ⌉}, Then, the proof follows as before. Case 4: If λ1 ≥ λ2 ≥ 0 > λ3 ≥ λ4, with λ2 + λ3 > 0; we take the partition Λ = Λ1 ∪ Λ2, with Λ1 = {λ1, λ2}, Λ2 = {λ3, λ4}, and we set A + JB = diag{λ1, λ2}, A − JB = diag{λ4, λ3}. Then, the proof follows as before. If λ1 ≥ λ2 ≥ 0 > λ3 ≥ λ4, with λ2 + λ3 < 0; we take the partition Λ1 = {λ1, λ2}, Λ2 = {λ3, λ4} and we set (−λ3)(λ1 + λ2 + λ3) − λ1λ2 λ1 + λ2 + λ3(cid:21) A − JB = diag{λ3, λ4}. A + JB =(cid:20) −λ3 1 Then A = B = 1 0 −(λ2 + λ3)(λ1 + λ3) λ1 + λ2 + λ3 + λ4(cid:21) , 2(cid:20) −(λ2 + λ3)(λ1 + λ3) λ1 + λ2 + λ3 − λ4(cid:21) J(cid:20) −2λ3 1 2 1 1 are both nonnegative matrices, and C =(cid:20)A JBJ B JAJ(cid:21) , is a 4 × 4 centrosymmetric nonnegative matrix. Now we give a sufficient condition for the existence and construction of a 4 × 4 centrosymmetric nonnegative matrix with prescribed eigenvalues and diagonal entries. We start with lists of real numbers. 22 2(λ1 + λ2 + λ3 + λ4), Theorem 3.7 Let Λ = {λ1, λ2, λ3, λ4} be a list of real numbers withP4 i=1 λi ≥ 0, λ1 ≥ λj, j = 2, 3, 4. Let {ω1, ω2, ω2, ω1} be a list of nonnegative numbers such that the following conditions are satisfied: i) 0 ≤ ωk ≤ λ1 k = 1, 2, ii) ω1 + ω2 = 1 iii) ωk ≥ λk+2 k = 1, 2, iv) (2ω1 − λ3)(2ω2 − λ4) ≥ λ1λ2. Then, there exists a centrosymmetric nonnegative matrix with espectrum Λ and diagonal entries ω1, ω2, ω2, ω1. Proof. Let Λ be particioned as Λ = Λ1 ∪ Λ2, with Λ1 = {λ1, λ2} and Λ2 = {λ3, λ4}.We set (2ω1 − λ3)(2ω2 − λ4) − λ1λ2 2ω2 − λ4(cid:21) , A−JB = diag{λ3, λ4}, A+JB =(cid:20) 2ω1 − λ3 1 with spectrum Λ1 and Λ2 respectively. Then ω1 2((2ω1 − λ3)(2ω2 − λ4) − λ1λ2) ω2(cid:21) , 2((2ω1 − λ3)(2ω2 − λ4) − λ1λ2) ω2 − λ4 1 2 1 A =(cid:20) B =(cid:20) 1 are both nonnegative matrices and (cid:21) 1 ω1 − λ3 B JAJ(cid:21) C =(cid:20)A JBJ is centrosymmetric nonnegative matrix with spectrum Λ and diagonal entries ω1, ω2, ω2, ω1. Note that in the above theorem, if Λ is a list of real numbers of Suleimanova type, then the conditions iii) and iv) are always satisfied. Then i) and ii) become necessary and sufficient conditions. In [8, Theorem 3.1] the authors show that λ1+λ2−2a ≥ 0 and λ1−λ2−2b ≥ 0 are necessary and sufficient conditions for the list {λ1, λ2, a + ib, a − ib}, with λ1, λ2, a ∈ R, b > 0 to be the spectrum of a normal centrosymmetric nonnegative matrix. Now, we give a sufficient condition for the existence and construction of a centrosymmetric nonnegative matrix with prescribed spectrum and diagonal entries. 23 Theorem 3.8 Let Λ = {λ1, λ2, a + ib, a − ib} be a list of complex numbers with λ1, λ2, a ∈ R, b > 0, λ1 + λ2 − 2a ≥ 0 and λ1 − λ2 − 2b ≥ 0. Let {ω1, ω2, ω2, ω1} be a list of nonnegative numbers, such that the following con- ditions are satisfied: i) 0 ≤ ωk ≤ λ1, k = 1, 2, ii) 1 iii) (2ω1 − a)(2ω2 − a) ≥ λ1λ2 + b2, iv) ωk ≥ a, k = 1, 2. Then, there exists a centrosymmetric nonnegative matrix with spectrum Λ and diagonal entries ω1, ω2, ω2, ω1. 2(λ1 + λ2 + 2a) = ω1 + ω2, Proof. Let Λ be particioned as Λ = Λ1 ∪ Λ2 with Λ1 = {λ1, λ2}, Λ2 = {a + ib, a − ib}. We set −b2 a(cid:21) , A + JB =(cid:20) (2ω1 − a)(2ω2 − a) − λ1λ2 2ω2 − a(cid:21) , A − JB =(cid:20) a 2ω1 − a 1 1 with spectrum Λ1 and Λ2, respectively. Then 1 ω1 A =(cid:20) B =(cid:20) 1 2 ((2ω1 − a)(2ω2 − a) − λ1λ2 − b2) ω2(cid:21) , (cid:21) , 2((2ω1 − a)(2ω2 − a) − λ1λ2 + b2) ω2 − a ω1 − a 1 0 are both nonnegative matrices, and C =(cid:20)A JBJ B JAJ(cid:21) , is nonnegative centrosymmetric matrix with spectrum Λ and diagonal entries ω1, ω2, ω2, ω1. Note that in the above theorem, if Λ is a list of complex numbers of Suleimanova type, then the conditions λ1 + λ2 − 2a ≥ 0 and λ1 − λ2 − 2b ≥ 0 are always satisfied. Hence, for n = 4, a list of complex numbers of Suleimanova type is always realizable by a centrosymmetric matrix. Moreover, conditions iii) and iv) are always satisfied for this kind of lists. Then, conditions i) and ii) become necessary and sufficient conditions. 24 4 Examples Example 4.1 Let Λ = {20,−1,−2,−3,−2 + 2i,−2− 2i,−3 + i,−3− i,−1 + i,−1 − i}. We shall use Corollary 3.1 to construct a centrosymmetric non- negative matrix with spectrum Λ. Then we consider the list Λ′ = {18,−1,−2,−3,−2 + 2i,−2 − 2i,−3 + i,−3 − i,−1 + i,−1 − i}, partitioned as Λ′ = Λ1 ∪ Λ2 with Λ1 = {18,−1,−2,−2 + 2i,−2 − 2i}, Λ2 = {−3,−3 + i,−3 − i,−1 + i,−1 − i}. Then A − JB =  −3  −3 −1 1 −3 −1 −1 1 −1   has spectrum Λ2. Now, from Lemma 1.3, we construct the nonnegative matrix A + JB = = (cid:2)3 3 3 1 1(cid:3) 1 1 1 1 1     + ,     0 1 2 2 2 1 0 2 2 2 2 1 0 2 2 4 1 2 0 0 0 1 2 4 0 3 4 5 3 3 4 3 5 3 3 5 4 3 3 3 7 4 5 1 1 3 4 5 5 1     with spectrum Λ1 and diagonal entries 3, 3, 3, 1, 1. Then A = 1 2   0 4 5 3 3 4 0 4 3 3 5 5 0 3 3 7 4 5 0 0 3 4 5 6 0   , B = 1 2   3 4 5 4 2 7 4 5 2 2 5 3 6 3 3 4 6 6 3 3 6 4 5 3 3   , 25 and  0 4 5 3 3 3 3 5 4 6 4 0 4 3 3 3 3 6 6 4 5 5 0 3 3 3 3 6 3 5 7 4 5 0 0 2 2 5 4 7 3 4 5 6 0 2 4 5 4 3 3 4 5 4 2 0 6 5 4 3 7 4 5 2 2 0 0 5 4 7 5 3 6 3 3 3 3 0 5 5 4 6 6 3 3 3 3 4 0 4 6 4 5 3 3 3 3 5 4 0 is centrosymmetric nonnegative with spectrum Λ′. Then  C′ = 1 2   C = C′ + 2 eT e eeT = 1 10   22 27 17 17 17 17 27 22 32 2 2 22 17 17 17 17 32 32 22 22 17 17 17 17 32 17 27 27 27 2 12 12 27 22 37 2 37 22 27 2 2 17 22 27 32 12 22 27 22 17 32 27 22 17 2 17 22 27 22 12 27 22 37 37 22 27 12 12 2 2 27 27 27 17 32 17 17 17 17 2 22 32 32 17 17 17 17 22 2 22 2 32 22 27 17 17 17 17 27 22   is centrosymmetric nonnegative with spectrum Λ. Example 4.2 Let Λ = {10, 3, 1 + i, 1− i,−2 + 2i,−2− 2i,−2 + 2i,−2− 2i}. Now we use Theorem 3.4 and Theorem 3.8 to construct a centrosymmetric nonnegative matrix with spectrum Λ. We take the partition Λ = Λ0 ∪ Λ1 ∪ Λ2 ∪ Λ2 ∪ Λ1, with Λ0 = {10, 3, 1 + i, 1 − i}, Λ1 = {−2 + 2i,−2 − 2i}, Λ2 = ∅, and consider the associated realizable lists Γ1 = {4,−2 + 2i,−2 − 2i}, Γ2 = { 7 2}, with realizing matrices A1 =  0 0 4 2 0 2 0 4 0   , A2 =(cid:2) 7 2(cid:3) = JA2J, JA1J =  0 4 0 2 0 2 4 0 0   . 26   and X = 7 2 7 2 0 4 0 2 0 2 4 0 0 1 1 1 1 1 1 1 1   .   From Theorem 3.8 we compute the centrosymmetric nonnegative matrix with spectrum Λ0 and diagonal entries {4, 7 2 , 4} 2 , 7 Then A = 0 0 4 2 0 2 0 4 0   Then B =  4 11 2 13 2 3 1 0 5 7 2 2 7 5 2 2 0 1 . 3 13 2 11 2 4   C =  0 11 2 13 2 3 0 0 1 0 0 0 0 0 0 5 0 0 5 0 0 0 1 0 0 3 2 0 0 13 2 0 0 0 11 2 0 2   is centrosymmetric nonnegative. Therefore by Theorem 3.4 0 2 0 11 2 13 2 3 3 3   A + XC = References 0 4 1 0 0 0 0 2 1 0 0 0 4 0 1 0 0 0 0 0 7 0 0 5 0 0 0 1 0 4 0 0 0 1 2 0 0 0 0 1 4 0 3 3 3 2 0 0 13 2 0 0 11 2 0 2 0 7 2 5 2 2 is the desired matrix.   [1] A. Brauer, Limits for the characteristic roots of a matrix IV. Applica- tions to stochastic matrices, Duke Math. J. 19 (1952) 75-91. 27 [2] A. Cantoni, P. Butler, Eigenvalues and eigenvectors of symmetric cen- trosymmetric matrices, Linear Algebra Appl. 13 (1976) 275-288. [3] A. I. Julio, R. L. Soto. Persymmetric and bisymmetric nonnegative in- verse eigenvalue problem, Linear Algebra Appl. 469 (2015) 130-152. [4] A. I. Julio, C. Mariju´an, M. pisonero, R. L. Soto, On universal realiz- ability of spectra, Linear Algebra Appl. 563 (2019) 353-372. [5] H. Perfect, Methods of constructing certain stochastic matrices. Duke Math. J. 20 (1953) 395-404. [6] H. Perfect, Methods of constructing certain stochastic matrices II, Duke Math. J. 22 (1955) 305-311. [7] S. Somphotphisut, K. Wiboonton, On the bisymmetric nonnegative in- verse eigenvalue problem, Linear Algebra Appl. 543 (2018) 42-71. [8] S. Somphotphisut, K. Wiboonton On the normal centrosymmetric non- negative inverse eigenvalue problem, arXiv: 1710.08757v1. [9] R. L. Soto, O. Rojo, C. B. Manzaneda, On nonnegative realization of partitioned spectra, Electron.J. Linear Algebra 22 (2011) 557-572. [10] R. L. Soto, A. I. Julio, M. Collao, Brauer's theorem and nonnegative matrices with prescribed diagonal entries, submited (2018). [11] H. R. Suleimanova, Stochastic matrices with real characteristic values, Dokl. Akad. Nauk SSSR 66 (1949) 343-345. 28
1210.3520
1
1210
2012-10-12T14:07:27
Distributive lattices determined by weighted double skeletons
[ "math.RA" ]
Related to his S-glued sum construction, the skeleton S(L) of a finite lattice L was introduced by C. Herrmann in 1973. Our theorem asserts that if D is a finite distributive lattice and its second skeleton, S(S(D)), is the trivial lattice, then D is characterized by its weighted double skeleton, introduced by the second author in 2006. The assumption on the second skeleton is essential.
math.RA
math
DISTRIBUTIVE LATTICES DETERMINED BY WEIGHTED DOUBLE SKELETONS G ´ABOR CZ´EDLI, JOANNA GRYGIEL, AND KATARZYNA GRYGIEL Abstract. Related to his S-glued sum construction, the skeleton S(L) of a finite lattice L was introduced by C. Herrmann in 1973. Our theorem asserts that if D is a finite distributive lattice and its second skeleton, S(S(D)), is the trivial lattice, then D is characterized by its weighted double skeleton, introduced by the second author in 2006. The assumption on the second skeleton is essential. ] . A R h t a m [ 1 v 0 2 5 3 . 0 1 2 1 : v i X r a 1. Introduction Let L be a finite modular lattice. Then, according to Herrmann [11], L is the union of its maximal complemented (equivalently, atomistic) intervals, which are glued together along a lattice S = S(L), the skeleton of L. His construction of S(L) makes sense even without modularity, so we drop this assumption until otherwise stated. It appeared somewhat later that S(L) is a factor lattice of L by a tolerance relation in the sense of the first author [3]. Define S0(L) := L and Si+1(L) := S(cid:0)Si(L)(cid:1). Then there is a smallest n such that Sn(L) = 1, which we will call the Herrmann rank of L. We say that L is H n-irreducible if its Herrmann rank is at most n. Equivalently, L is H n-irreducible iff Sn(L) = 1. H 1-irreducibility was previously called H-irreducibility by the second author in the monograph [9] and in many of her papers, including [9] and [10]. The skeleton of L does not tell too much on L. Indeed, the second author [9, Corollary 3.2.6] proved that each finite lattice S is the skeleton of infinitely many pairwise non-isomorphic finite distributive lattices. The weighted double skeleton S wd(L) of L, introduced by the second author in [10] and to be defined in the present paper soon, carries much more information on the initial lattice. Let K be a class of finite distributive lattices, and let L ∈ K. If for any L′ ∈ K such that S wd(L′) is isomorphic to S wd(L) the lattice L′ is isomorphic to L, then we say that L is determined by its weighted double skeleton in the class K. As usual, the partially ordered set (in short, the poset, in other words, the order) of all non-zero join-irreducible elements of L is denoted by Ji(D) = (Ji(D), ≤). The sets {1, 2, 3, . . . } and {0, 1, 2, 3, . . . } are denoted by N and N0, respectively. The Date: October 27, 2011; revised August 21, 2012; September 5, 2012; October 12, 2012. 2000 Mathematics Subject Classification. Primary 06B99, Secondary 06C15, 06D05. Key words and phrases. S-glued sum, skeleton of a lattice, double skeleton, weighted double skeleton, glued tolerance, lattice tolerance, Herrmann rank. This research of the first author was supported by the NFSR of Hungary (OTKA), grant numbers K77432 and K83219. The second author was supported by the NSC of Poland, grant number 2011/01/B/HS1/00944. The third author was supported by the NSC of Poland, grant number 2011/01/B/HS1/00944, and by the Polish Ministry of Science and Higher Education, grant number NN206 376137. 1 2 G. CZ´EDLI, J. GRYGIEL, AND K. GRYGIEL length of a finite poset Q is length(Q) := max{n ∈ N0 : Q has an n + 1-element chain}. A nontrivial lattice is a lattice that has at least two elements. Postponing the rest of definitions to the next section, our main result reads as follows. Theorem 1.1. Let L be a finite nontrivial lattice. (i) If L is modular and H 2-irreducible, then length(Ji(L)) ≤ 1. (ii) If L is distributive and H 2-irreducible, then L is determined by its weighted double skeleton in the class of finite distributive lattices. (iii) If L is distributive and length(Ji(L)) ≤ 1, then L is determined by its weighted double skeleton in the class of finite distributive lattices D satisfying the in- equality length(Ji(D)) ≤ 1. Notice that S wd(L) determines some properties of a modular L even if H 2- irreducibility is not assumed. Namely, S wd(L) clearly determines length(L), and see Lemma 3.1 for further properties in the distributive case. However, we will soon prove the following remark, which indicates that Theorem 1.1 is optimal in some sense. Remark 1.2. There exist H 3-irreducible finite distributive lattices L1 and L2 such that S wd(L1) is isomorphic to S wd(L2) but L1 is not isomorphic to L2. Also, there is a finite distributive lattice L such that length(Ji(L)) ≤ 1 but L is not H 2-irreducible. A well-known economic way of describing a finite distributive lattice D by a little amount of data is to consider Ji(D) = (Ji(D), ≤). The next remark outlines a more economic way for certain distributive lattices. Remark 1.3. Let D be a finite distributive lattice with length(Ji(D)) ≤ 1. Assume that D is the union of few maximal boolean intervals but D is large. Then S wd(D) constitutes an economic description of D. 2. Basic concepts and statements For the basic concepts of Lattice Theory the reader is referred to Gratzer [7]. By a tolerance of a lattice L we mean a reflexive, symmetric, compatible relation of L. Equivalently, a tolerance of L is the image of a congruence by a surjective lattice homomorphism onto L, see the first author and Gratzer [4]. Let R be a tolerance of L. If X ⊆ L is a maximal subset with respect to the property X × X ⊆ R, then X is called a block of R. Blocks are convex sublattices by Bandelt [1] and Chajda [2]. Let α and β be blocks of R. As it follows immediately from Zorn's Lemma, there are blocks γ and δ of R such that (1) {x ∨ y : x ∈ α, y ∈ β} ⊆ γ =: α ∨ β, {x ∧ y : x ∈ α, y ∈ β} ⊆ δ =: α ∧ β. The first author [3] proved that γ and δ are uniquely determined, and the set L/R of all blocks of R with the join and meet defined by (1) is a lattice. This lattice, also denoted by L/R, is called the factor lattice (or quotient lattice) of L modulo R. Notice that there is an alternative way, which does not rely on the axiom of choice (and, therefore, on Zorn's Lemma), to define L/R in an order-theoretic way and to prove that it is a lattice, see Gratzer and Wenzel [8]. In the rest of the paper, all lattices will be assumed to be finite. Then the blocks of a tolerance R are intervals. So if α is a block of R, then α equals the interval DISTRIBUTIVE LATTICES DETERMINED BY WEIGHTED DOUBLE SKELETONS 3 Figure 1. Non-isomorphic lattices with isomorphic double skeletons [0α, 1α] of L. It was proved in [3] and [6] that, for all α, β ∈ L/R, (2) 0α ∨ 0β = 0α∨β, 1α ∧ 1β = 1α∧β, α ≤ β (in L/R) ⇐⇒ 0α ≤ 0β ⇐⇒ 1α ≤ 1β. 1α ∨ 1β ≤ 1α∨β, 0α ∧ 0β ≥ 0α∧β, The most important particular case of L/R, under the name skeleton, was discov- ered by Herrmann [11] much earlier; we survey it partly and only for the finite case. A tolerance R of (a finite lattice) L is called a glued tolerance, see Reuter [12], if its transitive closure R∗ is the total relation L2. The (unique) smallest glued tolerance of L is called the skeleton tolerance of L, and it is denoted by Θ(L). There are two easy ways to see that Θ(L) exists. Firstly, we know from the second author [9], and it is routine to check, that for any tolerance R of a finite lattice L, (3) R is a glued tolerance ⇐⇒ (x, y) ∈ R for all x ≺ y ∈ L. This clearly implies that the intersection of all glued tolerances of L is a glued tolerance again, whence it is the skeleton tolerance of L. Secondly, we know from [5] that the transitive closure of lattice tolerances commutes with their (finitary) intersections, which also implies the existence of Θ(L). The factor lattice L/Θ(L) is called the skeleton S(L) of L. We claim that length(S(L)) < length(L). Indeed, assume that k = length(S(L)) and α0 ≺ α1 ≺ · · · ≺ αk is a maximal chain in S(L) = L/Θ(L). It follows from (2) and (3) that 0α0 < 0α1 < · · · < 0αk < 1αk , showing that length(S(L)) = k < k + 1 ≤ length(L). The inequality length(S(L)) < length(L) shows that each finite lattice has a Herrmann rank. It is clear from (2) that both {0α : α ∈ S(L)} and {1α : α ∈ S(L)}, as sub- posets of L, are order isomorphic to S(L). Their union carries a lot of information on L provided we equip it with an appropriate structure. Following the second author [10], a structure (P, ≤, K, η0, η1, w) will be called an abstract weighted double skeleton if (P, ≤) is a finite poset, K is a lattice, η0 : K → P is a join-preserving (and, therefore, order-preserving) embedding, η1 : K → P is a meet-preserving order-embedding, P = η0(K) ∪ η1(K), η0(x) ≤ η1(x) holds for all x ∈ K, and w is a mapping of the covering relation {(a, b) ∈ P 2 : a ≺ b} into N. The underlying set of (P, ≤, K, η0, η1, w) is P , and we often denote the structure (P, ≤, K, η0, η1, w) simply by P . 4 G. CZ´EDLI, J. GRYGIEL, AND K. GRYGIEL Figure 2. length(Ji(L)) ≤ 1 does not imply H 2-irreducibility Let (P ′, ≤′, K ′, η′ 0, η′ 1, w′) be another abstract weighted double skeleton, and let (ψ, κ) be a pair of bijective mappings. We say that (ψ, κ) : (P, ≤, K, η0, η1, w) → (P ′, ≤′, K ′, η′ 0, η′ 1, w′) is an isomorphism if ψ : (P, ≤) → (P ′, ≤′) is an order isomorphism, κ : K → K ′ is a lattice isomorphism, ψ(cid:0)ηi(x)(cid:1) = η′ i(cid:0)κ(x)(cid:1) for all x ∈ K and i ∈ {0, 1}, and w(x, y) = w′(ψ(x), ψ(x)) for all x, y ∈ P such that x ≺ y. If there is such a (ψ, κ), then the two abstract weighted double skeletons are called isomorphic. By the (concrete) weighted double skeleton of L we mean the structure (4) S wd(L) := (cid:0){0α : α ∈ S(L)} ∪ {1α : α ∈ S(L)}, ≤, S(L), η0, η1, w(cid:1) where ≤ is the ordering inherited (restricted) from L, η0(α) := 0α and η1(α) := 1α for all α ∈ S(L), and w(x, y) := length([x, y]L) for any x ≺Swd(L) y. For example, consider Lj given in Figure 1 for j ∈ {1, 2}. Then S(Lj) is the three-element chain {ζ0 ≺ α ≺ β}, and S wd(Lj) is depicted in the middle of the figure. For x ≺ y in S wd(Lj), the edge x ≺ y of the diagram is labeled by w(x, y). Since L1 6∼= L2 and Sn(Lj) is the (4 − n)-element chain for n ∈ {1, 2, 3} and j ∈ {1, 2}, Figure 1 together with the self-explanatory Figure 2 proves Remark 1.2. We have defined all the concepts Theorem 1.1 is based on. The rest of the paper is devoted to proofs, including some auxiliary statements. 3. Proofs and auxiliary statements 3.1. The number of join-irreducible elements in a block. Unless otherwise stated, by a block of a lattice L we mean a block of its skeleton tolerance Θ(L), that is, a member of the skeleton S(L). Throughout this subsection, L denotes a finite modular lattice. We are going to extend the weight function w of S wd(L), see (4), to a function w∗ : S wd(L) × S wd(L) → N0. If x, y ∈ S wd(L) and x 6< y, then we let w∗(x, y) := 0. If x, y ∈ S wd(L) and x < y, then take a maximal chain z0 = x ≺Swd(L) z1 ≺Swd(L) · · · ≺Swd(L) zt = y in S wd(L), and define w∗(x, y) := t−1 X i=0 w(zi, zi+1). The lattice theoretical Jordan-Holder theorem applies on L and we conclude that w(x, y) := length([x, y]L) for any x ≤Swd(L) y. This guarantees that w∗(x, y) does not depend on the maximal chain chosen. Given a poset (Q, ≤), the Mobius function DISTRIBUTIVE LATTICES DETERMINED BY WEIGHTED DOUBLE SKELETONS 5 µQ : Q2 → Z is defined recursively as follows: µQ(x, y) = 1, − X 0, x≤z<y µQ(x, z), if x = y; if x < y; if x 6≤ y.   If L is a finite modular lattice, then every α ∈ S(L) is an atomistic lattice by Herrmann [11]. In this case, Ji(α) stands for the set of join-irreducible elements of α that are distinct from 0α. The set of atoms of α is denoted by At(α). We let (5) Jα := Ji(L) ∩ Ji(α) = Ji(L) ∩ At(α) = Ji(L) ∩ (α \ {0α}). Since S wd(L) determines S(L), the next lemma, based on the notation above, im- plies that Jα is determined by S wd(L), provided L is distributive. Lemma 3.1. Let L be a finite distributive lattice. Then for each α ∈ S(L), (6) Jα = X β≤α, β∈S(L) µS(L)(β, α) · w∗(0α, 1β). Proof. For k ∈ N and a poset K, let Jik(K) denote the set of elements of K with exactly k lower covers. Notice that Ji(L) = Ji1(L). Reuter [12, Corollary 3] asserts, even when L is only modular, that for each α ∈ S(L) and k ∈ N, (7) Jik(L) ∩ Jik(α) = X β≤α, β∈S(L) µS(L)(β, α) · Jik(α ∩ β). For k = 1, the lefthand side of (6) equals that of (7). Hence it suffices to show that w∗(0α, 1β) = Ji1(α ∩ β) holds for β ≤ α. This is obvious if α ∩ β = ∅ since then 0α 6≤ 1β follows from (2). Hence we assume that α ∩ β 6= ∅. Then, again by (2), α ∩ β = [0α, 1β] is a principal ideal of α, whence α ∩ β is a boolean sublattice of the boolean interval α. Thus, Ji1(α ∩ β) = Ji([0α, 1β]) = At([0α, 1β]) = length([0α, 1β]) = w∗(0α, 1β). (cid:3) 3.2. More about blocks. Although the following lemma requires a proof in the present setting, it is a part of the original definition of S(L) given by Herrmann [11]. For the reader's convenience, we present an easy proof. Lemma 3.2 (Wille [13, Proposition 9]). Let L be a finite lattice. If α ≺S(L) β, then α ∩ β 6= ∅. Proof. Assume that α ≺S(L) β, and let a := 1α. Since 1α < 1β by (2), we can take an element b ∈ L such that a = 1α ≺ b ≤ 1β. Since L = Sν∈S(L) ν, there is a γ1 ∈ S(L) containing b. By (1), γ2 := α ∨ γ1 contains b = a ∨ b, and γ3 := β ∧ γ2 also contains b = 1β ∧ b. Clearly, α ≤ γ3 ≤ β. Taking b ∈ γ3 \ α and α ≺S(L) β into account, we conclude that b ∈ γ3 = β. Next, {a, b}2 ⊆ Θ(L) since a ≺ b. Hence there is a block γ ∈ S(L) such that {a, b} ⊆ γ. Using (1) repeatedly, we obtain that a = a ∨ a ∈ α ∨ γ, b = a ∨ b ∈ α ∨ γ, a = a ∧ b ∈ (α ∨ γ) ∧ β and b = b ∧ b ∈ (α ∨ γ) ∧ β. That is, {a, b} ⊆ (α ∨ γ) ∧ β. On the other hand, α ≤ (α ∨ γ) ∧ β ≤ β together with α ≺S(L) β yields that α = (α ∨ γ) ∧ β or β = (α ∨ γ) ∧ β. Hence {a, b} ⊆ α or {a, b} ⊆ β, and we conclude that α ∩ β 6= ∅. (cid:3) 6 G. CZ´EDLI, J. GRYGIEL, AND K. GRYGIEL For the reader's convenience, we also prove the following lemma. Due to the forthcoming formula (8), the present approach is slightly simpler than the original one of the second author [9]. Lemma 3.3 ([9, Theorem 2.2.10]). Let L be a finite lattice. Assume that α, β ∈ S(L) such that (α, β) ∈ Θ(S(L)). Then α ∩ β 6= ∅. Proof. A straightforward induction based on (1) shows that, for any lattice term p(x1, . . . , xn) and for any ν1, . . . , νn ∈ S := S(L), (8) {p(x1, . . . , xn) : x1 ∈ ν1, . . . , xn ∈ νn} ⊆ p(ν1, . . . , νn). Next, let S = {σ1, . . . , σt}, and let κ1 ≺S λ1, . . ., κk ≺S λk be a list of all covering pairs of S. Since the skeleton tolerance Θ(S) of S is generated by {(κ1, λ1), . . . , (κk, λk)}, it coincides with the subalgebra of S2 generated by {(κ1, λ1), . . . , (κk, λk), (λ1, κ1), . . . (λk, κk), (σ1, σ1), . . . , (σt, σt)}. Hence there exists a (2k + t)-ary lattice term p such that (α, β) = p(cid:0)(κ1, λ1), . . . , (κk, λk), (λ1, κ1), . . . , (λk, κk), (σ1, σ1), . . . , (σt, σt)(cid:1) = (cid:0)p(κ1, . . . , κk, λ1, . . . , λk, σ1, . . . , σt), p(λ1, . . . , λk, κ1, . . . , κk, σ1, . . . , σt)(cid:1). It follows from Lemma 3.2 that there are x1, . . . , xk, y1, . . . , yt ∈ L such that xi ∈ κi ∩ λi = λi ∩ κi for i = 1, . . . , k and yj ∈ σj for j = 1, . . . , t. Hence the above expression for (α, β) together with (8) yields that p(x1, . . . , xk, x1, . . . , xk, y1, . . . , yt) ∈ α ∩ β. (cid:3) 3.3. More about join-irreducible elements in blocks. Notation 3.4. Let Ji+(L) := Ji(L) \ At(L). Let ζ0 = [0, z0] be the least element of S(L), and let S+(L) := S(L) \ {ζ0}. For x ∈ L, domin(x) := {y ∈ At(L) : y ≤ x} is called the set of atoms dominated by x. Similarly, for α ∈ S+(L), domin(α) := {y ∈ At(L) : y ≤ 0α} is the set of atoms dominated by α. The next lemma is easy. Having no reference at hand, we will give a proof. Lemma 3.5. Let L be a finite modular lattice. Then [0,Wx∈At(L) x] = ζ0. Further- more, if α ∈ S(L) such that Jα ∩ At(L) 6= ∅, then α = ζ0. Proof. Let z0 := Wx∈At(L) x. Since (0, x) ∈ Θ(L) for all x ∈ At(L), we obtain that (0, z0) ∈ Θ(L). Hence we can extend {0, z0} to a block α = [0, y] of Θ(L). Obviously, z0 ≤ y. We know from Herrmann [11] that α is an atomistic lattice. Hence y = Wx∈At(α) x ≤ Wx∈At(L) x = z0, and we conclude that [0, z0] = [0, y] = α ∈ S(L). It is the smallest element of S(L), that is ζ0, by (2). Finally, if an atom a ∈ At(L) belongs to Jα, then 0α ≺ a implies 0α = 0 = 0ζ0, whence α = ζ0 by (2). (cid:3) Lemma 3.6. Let L be a finite modular lattice. Then (i) Ji(L) = S{Jα : α ∈ S(L)}; (ii) for all α, β ∈ S(L), if α 6= β, then Jα ∩ Jβ = ∅; (iii) Ji+(L) = S{Jα : α ∈ S+(L)} and At(L) = Jζ0 = At(ζ0). DISTRIBUTIVE LATTICES DETERMINED BY WEIGHTED DOUBLE SKELETONS 7 Proof. Assume that a ∈ Ji(L), and let a− stand for its unique lower cover. Then {a−, a} ⊆ Θ(L) since Θ(L) is a glued tolerance. We can extend {a−, a} to a block α ∈ S(L). Then a ∈ Ji(L) ∩ (α \ {0α}) = Jα. This proves that Ji(L) ⊆ S{Jα : α ∈ S(L)}. The reverse inclusion in part (i) is trivial. Assume that x ∈ Jα ∩ Jβ. Then, by (5), x ≻ 0α and x ≻ 0β. Hence x ∈ Ji(L) implies that 0α = 0β. This together with (2) yields α = β, which proves part (ii). Finally, parts (i) and (ii) together with Lemma 3.5 imply part (iii). (cid:3) Lemma 3.7. Let α, β and ζ be distinct blocks of a finite modular lattice L such that ζ < α, ζ < β and {α, β, ζ}2 ⊆ Θ(cid:0)S(L)(cid:1). Then a k b holds for all a ∈ Jα and b ∈ Jβ. Proof. Assume that a is comparable with b. It follows from Lemma 3.6(ii) that a 6= b. Hence we can assume that a < b. We infer α ∩ ζ 6= ∅ and β ∩ ζ 6= ∅ by Lemma 3.3. This together with ζ < α and ζ < β yields that 0ζ < 0α ≤ 1ζ and 0ζ < 0β ≤ 1ζ. Since a ∈ Jα ⊆ At(α) by (5), we have that 0α ≺ a. Similarly, 0β ≺ b. Since b ∈ Jβ ⊆ Ji(L), 0β is the only lower cover of b. This together with a < b implies that a ≤ 0β. Therefore, 0ζ < 0α ≺ a ≤ 0β ≤ 1ζ. This means that a ∈ ζ but, since Ji(ζ) = At(ζ), a is join-reducible in ζ, whence it is also join-reducible in L. This contradicts a ∈ Jα ⊆ Ji(L). (cid:3) Proof of Theorem 1.1(i). Let us assume for a contradiction that there exist a1, a2, a3 ∈ Ji(L) such that a1 < a2 < a3. By Lemma 3.6(i), we can choose α1, α2, α3 ∈ S(L) such that ai ∈ Jαi , for i ∈ {1, 2, 3}. Since Jαi ⊆ At(αi) is an antichain for i = 1, 2, 3, the blocks α1, α2, α3 are pairwise distinct. Hence at least two of them, say αj and αk, are distinct from the smallest element ζ0 of S(L). Since S2(L) = S(L)/Θ(cid:0)S(L)(cid:1) is the singleton lattice, Θ(S(L)) is the full relation on S(L). Therefore, applying Lemma 3.7 to αj, αk and ζ0, we obtain that aj k ak, a contradiction. (cid:3) Clearly, Ji+(L) 6= ∅ iff length(Ji(L)) ≥ 1. Hence the next lemma would (vacu- ously) also hold if length(Ji(L)) was 0. Notation 3.4 will be in effect. Lemma 3.8. Let L be a finite distributive lattice such that length(Ji(L)) = 1. Let α, α1, . . . , αn ∈ S+(L) such that none of Jα, Jα1 , . . . , Jαn is empty. Then (i) domin(α) 6= ∅; (ii) α1 ≤ α2 iff domin(α1) ⊆ domin(α2); (iii) domin(α1) ∪ . . . ∪ domin(αn) = w∗(0, 0α1∨···∨αn ). Proof. Since 0 6= 0α, part (i) is trivial. If α1 ≤ α2, then 0α1 ≤ 0α2 by (2), whence domin(α1) ⊆ domin(α2). To prove the reverse implication of (ii), assume that α1 6≤ α2. Then (2) implies 0α1 6≤ 0α2, which yields an x ∈ Ji(L) such that x ≤ 0α1 but x 6≤ 0α2. Since Jα1 6= ∅ by the assumption, there is a y ∈ Ji(L) such that x ≤ 0α1 < y. This together with length(Ji(L)) = 1 shows that x ∈ At(L). Hence x ∈ domin(α1) \ domin(α2), proving part (ii). Next, we claim that (9) domin(α1) ∪ . . . ∪ domin(αn) = {x ∈ At(L) : x ≤ 0α1∨···∨αn}. The "⊆" inclusion is an evident consequence of (2). To prove the converse inclusion, assume that x belongs to the righthand side of (9). Then, by (2) and distributivity, x = x ∧ 0α1∨···∨αn = x ∧ (0α1 ∨ · · · ∨ 0αn ) = (x ∧ 0α1) ∨ · · · ∨ (x ∧ 0αn). 8 G. CZ´EDLI, J. GRYGIEL, AND K. GRYGIEL By the join-irreducibility of x, there exists an i ∈ {1, . . . , n} such that x = x ∧ 0αi. Hence x ≤ 0αi implies that x ∈ domin(αi), proving (9). For i ∈ {1, . . . , n}, 0αi is the join of some (possibly only one) join-irreducible elements of L. These elements are necessarily atoms since length(Ji(L)) = 1 and Jαi 6= ∅. Therefore all the 0αi belong to ζ0, and so does their join, which is 0α1∨···∨αn by (2). Since ζ0 is a boolean lattice, the number of atoms below 0α1∨···∨αn , that is the size of the set given in (9), is length([0, 0α1∨···∨αn ]) = w∗(0, 0α1∨···∨αn ). This together with (9) proves part (iii). (cid:3) 3.4. A lemma on bipartite graphs. In order to formulate a statement that we need in the proof of Theorem 1.1(ii)-(iii), we have to associate a number-valued function with bipartite graphs. By a finite directed bipartite graph we shall mean a structure G = (U, X, E) where U and X are finite nonempty sets, referred to as upper and lower vertex sets, and E ⊆ U × X is an arbitrary relation. The power set, that is the set of all subsets, of U is denoted by P (U ), and P (X) has the analogous meaning. Let P ∞(U ) := P (U ) ∪ {∞} where ∞ is a symbol not in P (U ). For V ∈ P (U ), we let dG(V ) := {x ∈ X : there is a v ∈ V such that (v, x) ∈ E}. This set is called the set of (lower) vertices dominated by V . (We shall not use the word "covered" in this context since we want to avoid any confusion with the order- theoretic covering relation.) We define dG(∞) := X. Let d♯ G(V ) stand for dG(V ); if V = {v}, then we write d♯ G, called the domination function associated with G, is a P ∞(U ) → N0 mapping. If ϕ : U → U ′ is a bijection and V ∈ P ∞(U ), then ϕ(V ) := {ϕ(v) : v ∈ V } for V ∈ P (U ) while ϕ(∞) := ∞ ∈ P ∞(U ′). G({v}). This way d♯ G(v) rather than d♯ Lemma 3.9. Let G = (U, X, E) and G′ = (U ′, X ′, E′) be finite directed bipartite graphs. Then these two graphs are isomorphic iff there is a bijection ϕ : U → U ′ that preserves the domination function, that is, d♯ G(V ) holds for all V ∈ P ∞(U ). G′(ϕ(V )) = d♯ Proof. In order to prove the non-trivial direction of the lemma, assume that ϕ : U → U ′ is a bijection that preserves the domination function. We associate two addi- tional mappings with G as follows: sG : P (U ) → P (X), eG : P (U ) → P (X), V 7→ {x ∈ X : (v, x) ∈ E for all v ∈ V }, V 7→ {x ∈ X : (v, x) ∈ E for all v ∈ V and (u, x) /∈ E for all u ∈ U \ V }. The corresponding number-valued functions are denoted by s♯ G, that is, s♯ G(V ) := sG(V ) and e♯ G(V ) := eG(V ). These functions will be called the strong domination function and the exact domination function, respectively. Replacing G by G′, we obtain the definition for s♯ G′. Usually, we will elaborate our formulas only for G since, sometimes implicitly, we will rely on the fact that the analogous formulas hold for G′ as well. G′ and e♯ G and e♯ G′(ϕ(V )) = s♯ Firstly, we prove that ϕ preserves the strong domination function. Let V ∈ P (U ); we show s♯ G(∅) = X = d♯ G(∞), and the desired equality follows easily. The case V = 1, say V = {v}, is even easier since s♯ G(v). Next, assume that 1 < n ∈ N, V = {v1, . . . , vn} is an n-element subset of U , and the desired equality holds for all subsets of U G(V ) by induction on V . If V = 0, then s♯ G(v) = d♯ DISTRIBUTIVE LATTICES DETERMINED BY WEIGHTED DOUBLE SKELETONS 9 with less than n elements. Based on the inclusion-exclusion principle, also called (logical) sieve formula, T1 ∪ · · · ∪ Tn = n X i=1 (−1)i−1 X I⊆{1,...,n} I=i \ j∈I (cid:12)(cid:12)(cid:12) , Tj)(cid:12)(cid:12)(cid:12) and using that sG agrees with dG on singleton sets and satisfies the identity sG(V1)∩ sG(V2) = sG(V1 ∪ V2), we can compute as follows. d♯ G(V ) = dG(V ) = dG(v1) ∪ · · · ∪ dG(vn) = sG(v1) ∪ · · · ∪ sG(vn) = (−1)n−1(cid:12)(cid:12)(cid:12) n \ j=1 sG(vj )(cid:12)(cid:12)(cid:12) n−1 + X i=1 (−1)i−1 X I⊆{1,...,n} I=i \ j∈I (cid:12)(cid:12)(cid:12) sG(vj)(cid:12)(cid:12)(cid:12) = (−1)n−1s♯ G(V ) + n−1 X i=1 (−1)i−1 X I⊆{1,...,n} I=i s♯ G({vj : j ∈ I}). Now, ϕ preserves all summands but (−1)n−1s♯ G(V ) in the previous line by the induction hypothesis. Since d♯ G(V ) is pre- served either, completing the induction. Thus, ϕ preserves the strong domination function. G(V ) is also preserved, we conclude that s♯ G′(ϕ(V )) = e♯ Next, to show that ϕ preserves the exact domination function, let V ∈ P (U ). We want to show that e♯ G(U ) = s♯ G(U ) and the strong domination function is preserved. Hence we can assume that V 6= U . Let W := U \ V . It is a k-element set for some k ∈ N, so we can write W = {w1, . . . , wk}. For i = 1, . . . , k, let Ai := {x ∈ sG(V ) : (wi, x) ∈ E}. Notice that Ai = sG(V ∪ {wi}). Using the inclusion-exclusion principle again, we obtain that G(V ). This is clear if V = U since e♯ k e♯ sG(V ) \ G(V ) = eG(V ) = (cid:12)(cid:12)(cid:12) X = sG(V ) + k i=1 [ Ai(cid:12)(cid:12)(cid:12) (−1)i X i=1 I⊆{1,...,k} = s♯ G(V ) + = s♯ G(V ) + I=i k X i=1 k X i=1 (−1)i X I⊆{1,...,k} I=i (−1)i X I⊆{1,...,k} I=i k i=1 [ Ai(cid:12)(cid:12)(cid:12) Aj(cid:12)(cid:12)(cid:12) = sG(V ) − (cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12) \ sG(cid:0)V ∪ {wj : j ∈ I}(cid:1)(cid:12)(cid:12)(cid:12) j∈I (cid:12)(cid:12)(cid:12) s♯ G(V ∪ {wj : j ∈ I}(cid:1). Therefore, since ϕ preserves the strong domination function, it preserves the exact domination function either. Now, we are ready to define an isomorphism (ϕ, ξ) : G → G′. That is, ϕ was originally given, and we intend to define a bijection ξ : X → X ′ such that E′ = 10 G. CZ´EDLI, J. GRYGIEL, AND K. GRYGIEL {(ϕ(u), ξ(x)) : (u, x) ∈ E}. Clearly, (10) eG(V1) ∩ eG(V2) = ∅ for all V1 6= V2 ∈ P (U ), and X = [ V ∈P (U) eG(V ); and the analogous assertion holds for G′. Notice at this point that the elements of X with degree 0 belong to eG(∅). For each V ∈ P (U ), let us fix a bijection ξV : eG(V ) → eG′(ϕ(V )); this is possible since e♯ G′(ϕ(V )). Then ξ := SV ∈P (U) ξV is an X → X ′ bijection by (10). Observe that the role of (G, ϕ, ξ) and that of (G′, ϕ−1, ξ−1) can be interchanged. Hence, in order to prove that (ϕ, ξ) is an isomorphism, it suffices to show that (ϕ, ξ) sends edges to edges. To do so, assume that (u, x) ∈ E. Let V := {v ∈ U : (v, x) ∈ E}. Then u ∈ V and x ∈ eG(V ). Hence ϕ(u) ∈ ϕ(V ) and ξ(x) = ξV (x) ∈ eG′(ϕ(V )). By the definition of eG′, this implies that (ϕ(u), ξ(x)) belongs to E′, as desired. (cid:3) G(V ) = e♯ 3.5. The end of the proof. Based on the auxiliary statements given so far, we are now in the position to complete the proof of the main result. Proof of Theorem 1.1 (ii) and (iii). Assume that L and L′ are finite distributive lattices and (ψ, κ) : (cid:0)S wd(L), ≤, S(L), η0, η1, w(cid:1) → (cid:0)S wd(L′), ≤′, S(L′), η′ 0, η′ 1, w′(cid:1) is an isomorphism between their weighted double skeletons. Remember that η0 and η1 were defined right after (4), the meaning of η′ 1 is analogous, and the diagram 0 and η′ (11) commutes for i ∈ {0, 1}. Observe that (12) length(Ji(L)) ≤ 1 and length(Ji(L′)) ≤ 1. Indeed, in case of part (iii) this is assumed. In case of part (ii), the assump- tion together with the meaning of κ implies that L′ is also H 2-irreducible, whence length(Ji(L)) ≤ 1 and length(Ji(L′)) ≤ 1 follow from part (i). Firstly, assume that S(L) = 1. Then S(L′) = κ(S(L)) = 1. It is well-known, and follows from Lemmas 3.5 and 3.6(iii), that L is boolean iff 1L = W At(L). There- fore, we obtain from Lemma 3.5 that S(L) = 1 iff L is boolean iff length(Ji(L)) = 0, and the same holds for L′. Therefore length(L) = w∗(0L, 1L) = w∗′(ψ(0L), ψ(1L)) = w∗′(0L′, 1L′) = length(L′), and we conclude that L ∼= L′. Observe that the role of L and that of L′ in the above argument can be interchanged, whence we also conclude that length(Ji(L)) = 0 iff length(Ji(L′)) = 0. In the rest of the proof, we assume that length(Ji(L)) = 1. Then, by the previous paragraph and (12), length(Ji(L′)) = 1 also holds. We are going to define some auxiliary sets and structures associated with S wd(L); their "primed" counterparts associated with S wd(L′) are understood analogously. DISTRIBUTIVE LATTICES DETERMINED BY WEIGHTED DOUBLE SKELETONS 11 Let U := Ji+(L), X := At(L), and E := {(u, x) ∈ U × X : u > x}. Notice that none of U , X and E is empty since length(Ji(L)) = 1. Obviously, the directed bipartite graph G := (U, X, E) determines the poset Ji(L). Therefore, G and G′ determine L and L′, respectively, up to isomorphism. Consequently, by Lemma 3.9, it suffices to find a bijection ϕ : U → U ′ such that (13) d♯ G′(ϕ(V )) = d♯ G(V ) holds for all V ∈ P ∞(U ). It follows from the commutativity of (11) that, for γ ∈ S(L), (14) ψ(0γ) = ψ(η0(γ)) = η′ 0(κ(γ)) = 0κ(γ) and, similarly, ψ(1γ) = 1κ(γ). For α ∈ S+(L), Lemma 3.1 and (14) imply that Jα = X β≤α, β∈S(L) µS(L)(β, α) · w∗(0α, 1β) = X β≤α, β∈S(L) = X β≤α, β∈S(L) µS(L′)(κ(β), κ(α)) · w∗′(ψ(0α), ψ(1β)) µS(L′)(κ(β), κ(α)) · w∗′(0κ(α), 1κ(β)) = X β ′≤κ(α), β ′∈S(L′) µS(L′)(β′, κ(α)) · w∗′(0κ(α), 1β ′) = Jκ(α). This allows us to fix a bijection ϕα : Jα → Jκ(α). (Notice that if Jα happens to be empty, then ϕα = ∅ is the empty mapping.) Let ϕ be the union of all these ϕα, α ∈ S+(L). It follows from Lemma 3.6(ii) that ϕ is a mapping. Since the union of the corresponding Jα, α ∈ S+(L), is Ji+(L) = U by Lemma 3.6(iii), and the analogous assertion holds for U ′, ϕ : U → U ′ is a bijective mapping. It follows from Lemma 3.6(ii)-(iii) that for each u ∈ U , there is a unique α(u) ∈ S+(L) such that u ∈ Jα(u). Similarly, for each u′ ∈ U ′, there is a unique α′(u′) ∈ S+(L′) such that u′ ∈ Jα′(u′). The definition of ϕ implies that (15) α′(cid:0)ϕ(u)(cid:1) = κ(cid:0)α(u)(cid:1), for all u ∈ U . Assume that u ∈ U . Then u is not an atom of L, and its only lower cover in L is 0α(u). Hence, for any a ∈ At(L), we have that u > a ⇐⇒ 0α(u) ≥ a ⇐⇒ a ∈ domin(α(u)). This yields that, for any V ∈ P (U ), dG(V ) = Su∈V domin(α(u)). Therefore, taking the meaning of η0 into account and using Lemma 3.8, (16) G(V ) = w∗(cid:16)η0(ζ0), η0(cid:0) _ d♯ u∈V α(u)(cid:1)(cid:17). Indicating the referenced formulas or their "primed version" at the equation signs and using that (ψ, κ) preserves the extended weight function, we obtain that G′(ϕ(V )) =(16)′ d♯ w∗′(cid:16)η′ 0(ζ′ 0), η′ =(15) w∗′(cid:16)η′ 0(κ(ζ0)), η′ = w∗′(cid:16)η′ 0(κ(ζ0)), η′ u∈V 0(cid:0) _ 0(cid:0) _ 0(cid:16)κ(cid:0) _ α′(ϕ(u))(cid:1)(cid:17) κ(α(u))(cid:1)(cid:17) α(u)(cid:1)(cid:17)(cid:17) u∈V u∈V 12 G. CZ´EDLI, J. GRYGIEL, AND K. GRYGIEL =(11) w∗′(cid:16)ψ(η0(ζ0)), ψ(cid:16)η0(cid:0) _ = w∗(cid:16)η0(ζ0), η0(cid:0) _ α(u)(cid:1)(cid:17) =(16) d♯ u∈V α(u)(cid:1)(cid:17)(cid:17) u∈V G(V ). This proves (13) for V ∈ P (U ). We are left with the case V = ∞ ∈ P ∞(U ). Then, using Lemma 3.6(iii), the validity of (13) is obtained as follows: G(∞) = At(L) = At(ζ0) = w∗(0ζ0 , 1ζ0) = w∗′(ψ(0ζ0 ), ψ(1ζ0 )) d♯ =(14) w∗′(0κ(ζ0), 1κ(ζ0)) = w∗′(0ζ ′ = At(ζ′ 0) = At(L′) = d♯ 0) 0, 1ζ ′ G′(∞) = d♯ G′(ϕ(∞)). (cid:3) References [1] Bandelt, H.J.: Tolerance relations of lattices. Bulletin of the Australian Math. Soc. 23, 367 -- 381 (1981) [2] Chajda, I.: Algebraic Theory of Tolerances. Palacky University Olomouc (1991) [3] Cz´edli, G.: Factor lattices by tolerances. Acta Sc. Math. (Szeged) 44, 35 -- 42 (1982). [4] Cz´edli, G., Gratzer, G.: Lattice tolerances and congruences. Algebra Universalis 66, 5 -- 6 (2011) [5] Cz´edli, G, Horv´ath, E.K., Radeleczki, S.: On tolerance lattices of algebras in congruence modular varieties. Acta Math. Hungar. 100, 9 -- 17 (2003) [6] Cz´edli, G., Klukovits, L.: A note on tolerances of idempotent algebras. Glasnik Matematicki (Zagreb) 18 (38), 35 -- 38 (1983) [7] Gratzer, G.: Lattice Theory: Foundation. Birkhauser/Springer, Basel (2011) [8] Gratzer, G., Wenzel G.H.: Notes on tolerance relations on lattices. Acta Sci. Math. (Szeged) 54, 229 -- 240 (1990) [9] Grygiel, J.: The concept of gluing for lattices. Wydawnictwo WSP, Cz¸estochowa (2004) [10] Grygiel, J.: Weighted double skeletons. Bulletin of the Section of Logic 35, 37 -- 47 (2006) [11] Herrmann, Ch.: S-verklebte Summen von Verbanden. Math. Z. 130, 255 -- 274 (1973) [12] Reuter, K.: Counting formulas for glued lattices. Order 1, 265 -- 276 (1985) [13] Wille, R.: Complete tolerance relations of concept lattices (1983, preprint) E-mail address: [email protected] URL: http://www.math.u-szeged.hu/~czedli/ University of Szeged, HUNGARY 6720 E-mail address: [email protected] URL: http://www.j.grygiel.eu/ Institute of Mathematics and Computer Science, Jan D lugosz University of Cze¸stochowa, Poland E-mail address: [email protected] URL: http://tcs.uj.edu.pl/Grygiel Theoretical Computer Science Department, Faculty of Mathematics and Computer Science, Jagiellonian University, ul. Prof. Lojasiewicza 6, 30-348 Krak´ow, Poland
1912.10855
1
1912
2019-12-20T12:10:12
Inverse eigenproblems and approximation problems for the generalized reflexive and antireflexive matrices with respect to a pair of generalized reflection matrices
[ "math.RA" ]
A matrix $P$ is said to be a nontrivial generalized reflection matrix over the real quaternion algebra $\mathbb{H}$ if $P^{\ast }=P\neq I$ and $P^{2}=I$ where $\ast$ means conjugate and transpose. We say that $A\in\mathbb{H}^{n\times n}$ is generalized reflexive (or generalized antireflexive) with respect to the matrix pair $(P,Q)$ if $A=PAQ$ $($or $A=-PAQ)$ where $P$ and $Q$ are two nontrivial generalized reflection matrices of demension $n$. Let ${\large \varphi}$ be one of the following subsets of $\mathbb{H}^{n\times n}$ : (i) generalized reflexive matrix; (ii)reflexive matrix; (iii) generalized antireflexive matrix; (iiii) antireflexive matrix. Let $Z\in\mathbb{H}^{n\times m}$ with rank$\left( Z\right) =m$ and $\Lambda=$ diag$\left( \lambda_{1},...,\lambda_{m}\right) .$ The inverse eigenproblem is to find a\ matrix $A$ such that the set ${\large \varphi }\left( Z,\Lambda\right) =\left\{ A\in{\large \varphi}\text{ }|\text{ }AZ=Z\Lambda\right\} $ nonempty and find the general expression of $A.$\newline In this paper, we investigate the inverse eigenproblem ${\large \varphi}\left( Z,\Lambda\right) $. Moreover, the approximation problem: $\underset{A\in{\large \varphi}}{\min\left\Vert A-E\right\Vert _{F}}$ is studied, where $E$ is a given matrix over $\mathbb{H}$\ and $\parallel \cdot\parallel_{F}$ is the Frobenius norm.
math.RA
math
Inverse eigenproblems and approximation problems for the generalized reflexive and antireflexive matrices with respect to a pair of generalized reflection matrices1 Haixia Chang aSchool of Statistics and Mathematics, Shanghai Lixin University of Accounting and Finance, Shanghai 201209, P.R. China Abstract A matrix P is said to be a nontrivial generalized reflection matrix over the real quaternion algebra H if P ∗ = P 6= I and P 2 = I where ∗ means conjugate and trans- pose. We say that A ∈ Hn×n is generalized reflexive (or generalized antireflexive) with respect to the matrix pair (P, Q) if A = P AQ (or A = −P AQ) where P and Q are two nontrivial generalized reflection matrices of demension n. Let ϕ be one of the following subsets of Hn×n : (i) generalized reflexive matrix; (ii)reflexive matrix; (iii) generalized antireflexive matrix; (iiii) antireflexive matrix. Let Z ∈ Hn×m with rank(Z) = m and Λ = diag(λ1, ..., λm) . The inverse eigenproblem is to find a matrix A such that the set ϕ (Z, Λ) = {A ∈ ϕ AZ = ZΛ} nonempty and find the general expression of A. In this paper, we investigate the inverse eigenproblem ϕ (Z, Λ). Moreover, the approxi- is studied, where E is a given matrix over H and k · kF mation problem: min kA − EkF A∈ϕ is the Frobenius norm. Keywords inner inverse of a matrix; reflexive inverse of a matrix; generalized reflexive matrix, generalized antireflexive matrix, Frobenius norm, approximation problem 2000 AMS Subject Classifications 15A24, 15A33, 15A57, 15A09 1. Introduction Throughout Hm×n denotes the set of all m × n matrices over the real quaternion algebra H = {a0 + a1i + a2j + a3k i2 = j2 = k2 = ijk = −1 and a0, a1, a2, a3 are real numbers}; the symbols I, A∗, r(A), A(1) A+, k A kF , stand for the identity matrix with the appropriate size, the conjugate transpose, the rank, the inner inverse, the reflective inverse of a matrix A ∈ Hm×n and Frobenius norm of A ∈ Hm×n, respectively; define inner product, hA, Bi = trace (B ∗A) for all A, B ∈ Hm×n, then Hm×n is a Hilbert inner product space and the norm that is generated by this inner product is Frobenius norm. The two matrices LA and RA stand for LA = I − A+A, RA = I − AA+ where A+ is an any but fixed reflexive inverse of A. Vn denotes the n × n backward identity matrix whose elements along the southwest-northeast diagonal are ones and whose remaining elements are zeros. The real quaternion matrices play an important role in computer science, quantum physicis, and so on ( [20]-[22]). The more interests of quaternion matrices have been witnessed recently (e.g., [1], [23]). As H is noncommutative for its mutiplication, i.e., ab 6= ba, for a, b ∈ H in general, it bring some obstacles in the study of quatenion matrices. Many authors has used the method of embeddings of the quaternions into complex vector spaces, through symplectic representations, such as D.R. Farenick and B. A.F. Pidkowich in [3] and homotopy theory, such as Zhang in [1]. 1This research was supported by the Natural Science Foundation of China (11601328), the research fund of Shanghai Lixin University of Accounting and Finance (AW-22-2201-00118). 1 2 Since left and right scalar multiplications are different, it force us to consider Ax = λx, and Ax = xλ separately. A quaternion λ is said to a left (right) eigenvalue if Ax = λx (Ax = xλ) . In 1985, Wood proposed that every n × n quaternion matrix has at least one left eigenvalue in H and Zhang in [1] give its proof with the homotopy theory method. But the problem that how many left eigenvalues a square quaternion matrix has has not been solved yet. While the right eigenvalues of a square quaternion matrix has been well studied, Zhang in [1] explicitly refer to any n × n quaternion matrix A has exactly n right eigenvalues which are complex numbers with nonnegative imaginary parts (standard eigenvalues of A). Weighing the above cases, we only investigate the right inverse eigenproblems of a square quaternion matrix in this paper. Reflexive and antireflexive matrices with respect to a generalized reflection matrix have been widely [10]-[15]. But the generalized reflexive and generalized antireflexive matrices with respect studied, e.g. to the generalized reflection matrix pair have not been widely studied yet. In 1998, Chen in [4] defined that A ∈ Hm×n is generalized reflexive (or generalized antireflexive) and give two special subsets of the space Cm×n. The application of the generalized reflexive (or generalized antireflexive) matrix is very wide in engineering and science, such as the altitude estimation of a level network, electric network and structural analysis of trusses and so on, see [4]. Definition 1.1. A matrix A ∈ Hn×n is generalized reflexive with respect to the matrix pair (P, Q) if A = P AQ and A ∈ Hn×n is generalized antireflexive with respect to the matrix pair (P, Q) if A = −P AQ,where P and Q are two nontrivial generalized reflection matrices of demension n, i.e., P ∗ = P 6= I, P 2 = I, and Q∗ = Q 6= I, Q2 = I. The generalized reflexive and the generalized antireflexive matrix are further generalization of reflexive and antireflexive, respectively. From this definition, it is clear that A is a reflexive martix if generalized reflection matrices P = Q, i.e., A = P AP and a centrosymmetric matrix if P = Q = Vn, i.e., A = VnAVn. Centrosymmetric and centroskew matrices was investigated by many authors ,such as Andrew [5],[8], Weaver [9], Boullion and Atchison [6], Wang [2], and the others. Define two special subspaces of Hn×n Hn×n r Hn×n a (P, Q) =(cid:8)A A ∈ Hn×n and A = P AQ(cid:9) , (P, Q) =(cid:8)A A ∈ Hn×n and A = −P AQ(cid:9) , where P and Q are two generalized reflection matrices of dimension m and n, respectively. Hn×n If A ∈ (P, Q)) , then A is a generalized reflexive (generalized antireflexive) matrix with (P, Q) (∈ Hn×n r a respect to nontrivial generalized reflection matrix pair (P, Q) . The inverse eigenproblems of quaternion matrices: given matrices Z ∈ Hn×m and Λ =diag(λ1, ..., λm) , find A ∈ Hn×n satisfying AZ = ZΛ, where λ1, ..., λm are complex numbers with nonnegative imaginary parts. The inverse problems and inverse eigenproblems of matrices has been wide topics, (e.g., [14], [16]-[19]) with the method involing Moore-Penrose inverse or singular value decompositions of matrices related to (Z, Λ) , respectively. In this paper, we investigate the inverse (right) eigenproblem of (Z, Λ) , find A ∈ Hn×n r (P, Q) (∈ Hn×n (P, Q)) a (P, Q) and present the general expression of A. We make use of the structure properties of A ∈ Hn×n (∈ Hn×n (P, Q)) to deal with the inverse eigenproblem. Moreover, the approximation problem: min kA − EkF a r , where E is a given matrix over H and ϕ is one of Hn×n (P, Q). The explicit expression of A is also presented. Futhermore, it is pointed that some results in recent papers are special cases of this paper. (P, Q) and Hn×n a r A∈ϕ 2. The solution of the inverse eigenproblems of (Z, Λ) 3 In this section, we first give a structure property of generalized reflexive matrix and a generalized antireflexive matrix. Then we make use of the structure property to derive the general expression of A ∈ Hn×n (P, Q)) satisfying AZ = ZΛ. (P, Q) (∈ Hn×n r a By Proposition 2.1 in ([3]), we know that R ∈ Hn×n has infinitely many nonreal right eigenvalues if R has a nonreal right eigenvalue. Because if (λ, ξ) is a right eigenvalue, then (cid:0)w−1λw, ξw(cid:1) is also a right eigenpair of R. Then we introduce the orbit θ(λ), i.e., a class from a partition of H. For example, a similarity orbit θ(λ) of λ: and a conjugacy class θ(λ) of λ: θ(λ) =(cid:8)w−1λw w ∈ H, w 6= 0(cid:9) θ(λ) = { ¯wλw w ∈ H, w = 1} . Lemma 2.1. (See Theorem 3.3 in [3]) If R ∈ Hn×n is normal, then there are matrices D, U ∈ Hn×n such that : (1) U is unitary matrix, D is a diagonal matrix, and U ∗RU = D; (2) each diagonal entry of D is a complex number contained in the closed upper halfplane C+. (3) q ∈ H is a right eigenvalue of R if and only if q ∈ θ(λ) for some diagonal element λ of D. Lemma 2.2. Suppose that P ∈ Hn×n is a nontrivial generalized reflection matrix; then there exists a unitary matrix U ∈ Hn×n such that P = U" Ir1 0 −In−r1 # U ∗. 0 (2.1) Proof. A matrix P ∈ Hn×n is a nontrivial generalized reflection matrix, i.e., P ∗ = P 6= I, P 2 = I. Obviously, P is a normal matrix. According to the minimal polynomial of P, we know 1, -1 are all right engivalues (or standard eigenvalues ) of P. By Lemma 2.1, there exists a unitary matrix U satisfying (2.1). (cid:3) If a matrix Q ∈ Hn×n is a nontrivial generalized reflective matrix, by Lemma 2.2, we get Q = V " Ir2 0 −In−r2 # V ∗, 0 (2.2) where V is a unitary matrix. We can use a staightforward method to obtain U and V mentioned above. In fact, by P 2 = I, i.e., (I − P ) (I + P ) = 0 = 0 or (I + P ) (I − P ) = 0, we know the column vectors of I + P and I − P are the eigenvector belonging to the right eigenvalues λ = 1, λ = −1 of the matrix P, respectively. We can only apply the Gram-Schmidt process to the columns of I + P and I − P,respectively. Let and in (2.1) I + P Gram − Schmidt −−−−−−−−−−−−−→ I − P Gram − Schmidt −−−−−−−−−−−−−→ U1 U2 where U ∗ 1 U1 = Ir1 , U ∗ 2 U2 = Im−r1 , U ∗ 1 U2 = 0. Similarily, we can get the factorizaton of V in (2.2) U =h U1, U2 i V =h V1, V2 i (2.3) (2.4) where V ∗ 1 V1 = Ir2 , V ∗ 2 V2 = In−r2 , V ∗ 1 V2 = 0. By (2.1)-(2.4), we obtain where and 0 P =h U1, U2 i" Ir1 Q =h V1, V2 i" Ir2 1 U ∗ 0 −In−r1 #" U ∗ 2 # , 0 −In−r2 #" V ∗ 2 # , 1 V ∗ 0 U ∗ 1 U1 = Ir1 , U ∗ 2 U2 = Im−r1 , U ∗ 1 U2 = 0 1 V1 = Ir2 , V ∗ V ∗ 2 V2 = In−r2 , V ∗ 1 V2 = 0. 4 (2.5) (2.6) (2.7) (2.8) Theorem 2.3. A matrix A ∈ Hn×n is generalized reflexive matrix with respect to the nontrivial gener- alized reflection matrix pair (P, Q) if and only if A can be expressed A =h U1, U2 i" A11 0 where 0 A22 #" V ∗ 1 V ∗ 2 # , A11 = U ∗ 1 AV1, A22 = U ∗ 2 AV2 and U1, U2, V1, V2 are defined as (2.3) and (2.4). Proof. By the definition of A ∈ Hn×n r (P, Q) , (2.5) and (2.6), we have A = P AQ =h U1, U2 i" Ir1 0 0 −In−r1 #" U ∗ 1 U ∗ 2 # Ah V1, V2 i" Ir2 0 0 −In−r2 #" V ∗ 1 V ∗ 2 # , (2.9) (2.10) (2.11) (2.12) (2.13) i.e., Put 0 1 U ∗ " U ∗ 2 # Ah V1, V2 i =" Ir1 0 −In−r1 #" U ∗ " U ∗ A21 A22 # , 2 # Ah V1, V2 i =" A11 A12 2 # Ah V1, V2 i" Ir2 1 U ∗ 1 U ∗ 0 0 −In−r2 # where A11 ∈ Hr1×r2 , A12 ∈ Hr1×(n−r2), A21 ∈ H(n−r1)×r2 , A22 ∈ H(n−r1)×(n−r2). Substituting (2.13) into (2.12), we have " A11 A12 A21 A22 # =" Ir1 0 −In−r1 #" A11 A12 A21 A22 #" Ir2 0 −In−r2 # =" A11 −A12 −A21 A22 # , 0 0 yielding A12 = 0, A21 = 0. (2.11) becomes (2.9). By (2.9), (2.7) and (2.8), it is easy to get (2.10). Conversly, if (2.9) holds it is easy to verify A is generalized reflexive matrix with respect to the nontrivial generalized reflection matrix pair (P, Q). (cid:3) Similarly, we can obtain the factorization of generalized antireflexive matrix with respect to the gen- eralized reflection matrix pair (P, Q). We have the following Theorem. Theorem 2.4. A matrix A ∈ Hn×n a (P, Q) if and only if A can be expressed as A =h U1, U2 i" 0 A21 where A12 0 #" V ∗ 1 V ∗ 2 # , A12 = U ∗ 1 AV2, A21 = U ∗ 2 AV1, 5 and U1, U2, V1, V2 are defined as (2.3) and (2.4). Now we discuss the solution of the inverse eigenproblems of (Z, Λ) . Lemma 2.5. Given B ∈ Hm×t X ∈ Hs×t. Then the inverse problem is consistent if and only if AX = B BX +X = B. In that case, the general form of A ∈ Hn×n is where W is an arbitrary matrix over H with appropriate size. A = BX + + W RX Theorem 2.6. Given Z ∈ Hn×m, Λ =diag(λ1, ..., λm). Let U1, U2, V1, V2 be defined as (2.3), (2.4), 0 Ψ # , Z =h V1X1, V2X2 i =h U1Y1, U2Y2 i , Λ =" Φ 0 (2.14) where 0 < k < m, X1 ∈ Hr1×k, X2 ∈ H(n−r1)×(m−k), Y1 ∈ Hr2×k, Y2 ∈ H(n−r2)×(m−k), Φ =diag(λ1, ..., λk) , Ψ =diag(λk+1, ..., λm) . Then the set is nonempty if and only if ϕ1 (Z, Λ) =(cid:8)A ∈ Hn×n r (P, Q) AZ = ZΛ(cid:9) Y1ΦX1X + 1 = Y1Φ, Y2ΨX2X + 2 = Y2Ψ. In that case, the general expression of A is A =h U1, U2 i" Y1ΦX + 0 1 + W1RX1 0 2 + W2RX2 #" V ∗ 1 V ∗ 2 # , Y2ΨX + (2.15) (2.16) (2.17) where W1, W2 are arbitrary matrices over H with appropriate sizes. Proof. Since A ∈ Hn×n into AZ = ZΛ. We get r i.e., (P, Q) , A has the form of (2.9). By (2.3) and (2.4), substituting (2.9) and (2.14) " A11X1 0 0 A22X2 # =" Y1Φ 0 0 Y2Ψ # , A11X1 = Y1Φ, A22X2 = Y2Ψ. The set ϕ (Z, Λ) is nonempty if and only if the inverse problem A11X1 = Y1 and A22X2 = Y2Ψ are consistent. By Lemma 2.5, the invese problem A11X1 = Y1 and A22X2 = Y2Ψ are consistent if and only if (2.16) holds and their general solution are A11 = Y1ΦX + A22 = Y2ΨX + 1 + W1RX1 , 2 + W2RX2 , (2.18) respectively. Then substituting (2.18) into (2.9), we get (2.17). Conversly, if (2.16) holds and A has the expression of (2.9), it is easy to verify A ∈ ϕ (Z, Λ) . (cid:3) If A ∈ Hn×n r (P, P ) , i.e., A is a reflexive matrix with respect to a generalized reflection matrix P. We have the following Corollary. Corollary 2.7. Given Z ∈ Hn×m, Λ =diag(λ1, ..., λm) . Let U1, U2, V1, V2 be defined as (2.3) and (2.4), 6 0 Ψ # , Z =h U1X1, U2X2 i , Λ =" Φ 0 where 0 < k < m, X1 ∈ Hr1×k, X2 ∈ H(n−r1)×(m−k), Φ =diag(λ1, ..., λk) , Ψ =diag(λk+1, ..., λm) . Then the set is nonempty if and only if ′′ ϕ 1 (Z, Λ) =(cid:8)A ∈ Hn×n r (P, P ) AZ = ZΛ(cid:9) (2.19) In that case, the general expression of A is X1ΦX1X + 1 = X1Φ, X2ΨX2X + 2 = X2Ψ. A =h U1, U2 i" X1ΦX + 0 1 + W1RX1 0 2 + W2RX2 #" U ∗ 1 U ∗ 2 # , X2ΨX + where W1, W2 are arbitrary matrices over H with appropriate sizes. Theorem 2.8. Given Z ∈ Hn×m, Λ =diag(λ1, ..., λm). Let U1, U2, V1, V2 be defined as (2.3), (2.4), 0 Ψ # , Z =h V2X1, V1X2 i =h U1Y1, U2Y2 i , Λ =" Φ 0 where 0 < l < m, X1 ∈ H(n−r2)×l, X2 ∈ Hr2×(m−l), Y1 ∈ Hr2×l, Y2 ∈ H(n−r2)×(m−l), Φ =diag(λ1, ..., λl) , Ψ =diag(λl+1, ..., λm) . Then the set ϕ (Z, Λ) = {A ∈ Hn×n a ϕ2 (Z, Λ) =(cid:8)A ∈ Hn×n a (P, Q) AZ = ZΛ(cid:9) (P, Q) AZ = ZΛ} is nonempty if and only if In that case, the general expression of A is Y1ΦX1X + 1 = Y1Φ, Y2ΨX2X + 2 = Y2Ψ. (2.20) A =h U1, U2 i" 0 Y1ΦX + 1 + W1RX1 Y2ΨX + 2 + W2RX2 0 #" V ∗ 1 V ∗ 2 # , where W1, W2 are arbitrary matrices over H with appropriate sizes. Proof. Similar to the proof of the Theorem 2.6. (cid:3) If A ∈ Hn×n a (P, P ) , i.e., A is a antireflexive matrix with respect to a generalized reflection matrix P. We have the following Corollary. Corollary 2.9. Given Z ∈ Hn×m, Λ =diag(λ1, ..., λm) . Let U1, U2 be defined as (2.3), 0 Ψ # , Z =h U1X1, U2X2 i , Λ =" Φ 0 where 0 < l < m, X1 ∈ H(n−r1)×l, X2 ∈ Hr1×(m−l), Φ =diag(λ1, ..., λl) , Ψ =diag(λl+1, ..., λm) . Then the set is nonempty if and only if ′′ ϕ 2 (Z, Λ) =(cid:8)A ∈ Hn×n a (P, P ) AZ = ZΛ(cid:9) (2.21) X1ΦX1X + In that case, the general expression of A is 1 = X1Φ, X2ΨX2X + 2 = X2Ψ. A =h U1, U2 i" 0 X1ΦX + 1 + W1RX1 X2ΨX + 2 + W2RX2 0 #" U ∗ 1 U ∗ 2 # , 7 where W1, W2 are arbitrary matrices over H with appropriate sizes. Remark 2.1. We find it is not necessary that P and Q are hermitian involutionary matrices in the process of dealing with inverse eigenproblems. So we can only consider that P and Q are involutionary matrices and obtain some corresponding conclusions. Furthermore, when P = Q are only involutionary matrix, we can get some results of inverse eigenproblems of [14]. 3. The approximation problem to the solution to the inverse eigenproblems In this section, we consider the approximation problem: min kA − EkF A∈ϕ matrix over H and ϕ is either Hn×n r (P, Q) or Hn×n a (P, Q) . , where E ∈ Hm×n is a given Lemma 3.1. Suppose that E ∈ Hm×n, Γ ∈ Hm×m and ∈ Hn×n where Γ2 = Γ = Γ∗ and 2 = = ∗. Then the nearness problem min kΓX − EkF is consistent if and only if X ∈Hm×n In that case, Proof. Note that Then Γ(X − E) = 0. min X ∈Hm×n kΓX − EkF = kΓE − EkF ΓX − E = (ΓE − E) + Γ(X − E). (ΓX − E)∗ (ΓX − E) = (ΓE − E)∗(ΓE − E) + [Γ(X − E)]∗ Γ(X − E) + G + G∗ (3.1) where G = (ΓE − E)∗Γ(X − E) = (E ∗Γ − E ∗)Γ(X − E) = ( − I) E ∗Γ(X − E) Suppose (λ, x) is a right eigenpair for the matrix G ∈ Hn×n, i.e., Gx = xλ with λ 6= 0. Since 2 = , i.e., ( − I) = 0, we obtain Gx = ( − I) E ∗Γ(X − E)x = xλ = 0 i.e. x = 0. yielding x = 0. Hence, G has nonzero right eigenvalues. Consequently, taking traces in (3.1) yields kΓX − Ek2 F = kΓX − Ek2 F + kΓ(X − E)k2 F . min X ∈Hm×n kΓX − EkF is equivalent to min Clearly, when X = E + LΓY R, with appropriate size. Hence kΓ(X − E)kF . kΓ(X − E)kF = 0 where Y is an arbitrary matrix over H X ∈Hm×n min X ∈Hm×n min X ∈Hm×n kΓX − EkF = kΓE − EkF . Theorem 3.2. Given a matrix E ∈ Hn×n; " U ∗ 2 # Eh V1, V2 i =" E11 E12 E21 E22 # . 1 U ∗ (cid:3) (3.2) where U1, U2, V1, V2 are defined as (2.3) and (2.4) and E11 ∈ Hr1×r2 , E12 ∈ Hr1×(n−r2), E21 ∈ H(n−r1)×r2 , E22 ∈ H(n−r1)×(n−r2). Then the approximation problem: min kA − EkF has a unique solu- A∈ϕ1 tion 8 Ar =h U1, U2 i" Y1ΦX + 0 1 + E11RX1 0 2 + E22RX2 #" V ∗ 2 # 1 V ∗ Y2ΨX + (3.3) where ϕ1 are defined as (2.15). Proof. A ∈ ϕ1, by Theorem 2.6 and (3.2), kA − Ek2 2 F 0 0 0 0 1 U ∗ Y2ΨX + 1 + W1RX1 1 + W1RX1 F =(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) 2 # Eh V1, V2 i(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) " Y1ΦX + 2 + W2RX2 # −" U ∗ =(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) E21 E22 #(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) " Y1ΦX + 2 + W2RX2 # −" E11 E12 =(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) 2 + W2RX2 − E22 #(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) " Y1ΦX + =(cid:13)(cid:13)W1RX1 −(cid:0)E11 − Y1ΦX + F +(cid:13)(cid:13)W2RX2 −(cid:0)E22 − Y2ΨX + 1 (cid:1)(cid:13)(cid:13) 2 (cid:1)(cid:13)(cid:13) F is consistent is equivalent to 1 + W1RX1 − E11 kA − Ek2 Y2ΨX + Y2ΨX + −E12 −E21 2 F 2 F 2 Therefore, min A∈ϕ1 2 F + kE12k2 F + kE21k2 F . min(cid:13)(cid:13)W1RX1 −(cid:0)E11 − Y1ΦX + 1 (cid:1)(cid:13)(cid:13) min(cid:13)(cid:13)W2RX2 −(cid:0)E22 − Y2ΨX + 2 (cid:1)(cid:13)(cid:13) 2 F 2 F , (3.4) (3.5) = RXi = R∗ Xi , i = 1, 2, it foillows from Lemma 3.1 that (3.4) is consistent if min(cid:13)(cid:13)W1RX1 −(cid:0)E11 − Y1ΦX + 1 (cid:1) −(cid:0)E11 − Y1ΦX + 1 (cid:1) RX1(cid:13)(cid:13)F are consistent. Since R2 Xi and only if and and (3.5) is consistent if and only if and (cid:2)W1 −(cid:0)E11 − Y1ΦX + 1 (cid:1)(cid:3) RX1 = 0 1 (cid:1)(cid:13)(cid:13)F =(cid:13)(cid:13)(cid:0)E11 − Y1ΦX + 1 − Y1ΦX + =(cid:13)(cid:13)E11X1X + (cid:2)W2 −(cid:0)E22 − Y2ΨX + 2 (cid:1)(cid:3) RX2 = 0 2 (cid:1)(cid:13)(cid:13)F =(cid:13)(cid:13)(cid:0)E22 − Y2ΨX + 2 − Y2ΨX + =(cid:13)(cid:13)E22X2X + 2 (cid:13)(cid:13)F 1 (cid:13)(cid:13)F W1 = E11 − Y1ΦX + W2 = E22 − Y2ΨX + 1 + T1X1X + 1 , 2 + T2X2X + 2 , (3.6) (3.7) (3.8) (3.9) min(cid:13)(cid:13)W2RX2 −(cid:0)E22 − Y2ΨX + 2 (cid:1) −(cid:0)E22 − Y2ΨX + . 2 (cid:1) RX2(cid:13)(cid:13)F It is easy to know the solutions of (3.6) and (3.7) are respectively, where T1, T2 are arbitary matrices with appropriate sizes. Substituting (3.8) and (3.9) into (2.17), we easily get (3.3). (cid:3) Corollary 3.3. Given a matrix E ∈ Hn×n; " U ∗ 2 # Eh U1, U2 i =" E11 E12 E21 E22 # . 1 U ∗ 9 where U1, U2 are defined as (2.3) and E11 ∈ Hr1×r1 , E12 ∈ Hr1×(n−r1), E21 ∈ H(n−r1)×r1 , E22 ∈ H(n−r1)×(n−r1). Then the approximation problem: min A∈ϕ kA − EkF has a unique solution ′′ 1 Ar =h U1, U2 i" X1ΦX + 0 1 + E11RX1 0 2 + E22RX2 #" U ∗ 2 # 1 U ∗ X2ΨX + ′′ where ϕ 1 are defined as (2.19). Theorem 3.4. Given a matrix E ∈ Hn×n; Suppose " U ∗ 2 # Eh V1, V2 i =" E11 E12 E21 E22 # , 1 U ∗ where U1, U2, V1, V2 are defined as (2.3) and (2.4) and E11 ∈ Hr1×r2 , E12 ∈ Hr1×(n−r2), E21 ∈ H(n−r1)×r2 , E22 ∈ H(n−r1)×(n−r2). Then the approximation problem: Aa = arg min kA − EkF has a A∈ϕ2 unique solution Aa =h U1, U2 i" 0 Y1ΦX + 1 + E12RX1 Y2ΨX + 2 + E21RX2 0 #" V ∗ 2 # 1 V ∗ where ϕ2 are defined as (2.20). Proof. Combing Theorem 2.7, similarily to the proof of Theorem 3.2, we easily complete the proof the Theorem. (cid:3) Corollary 3.5. Given a matrix E ∈ Hn×n; Suppose " U ∗ 2 # Eh U1, U2 i =" E11 E12 E21 E22 # , 1 U ∗ where U1, U2 are defined as (2.3) and (2.4) and E11 ∈ Hr1×r1 , E12 ∈ Hr1×(n−r1), E21 ∈ H(n−r1)×r1 , E22 ∈ H(n−r1)×(n−r1). Then the approximation problem: Aa = arg min kA − EkF has a unique solution A∈ϕ ′′ 2 Aa =h U1, U2 i" 0 X1ΦX + 1 + E12RX1 X2ΨX + 2 + E21RX2 0 #" U ∗ 2 # 1 U ∗ ′′ where ϕ 2 are defined as (2.21). 4. Conclusion We in this paper used the matrix decomposition method to give the properties of the generalized re- flexive and antireflexive matrices with respect to a pair of generalized reflection matrices over quaternion algebra. We studied the inverse eigenproblems and the approximation problems of the generalized reflex- ive and antireflexive matrices with respect to a pair of generalized reflection matrices. We also showed the explicit expressions and formulas. References 10 [1] F. Zhang, Quaternions and matrices of quaternions, Linear Algebra Appl. 251 (1997): 21-57. [2] Q.W. Wang, Bisymmetric and centrosymmetric solutions to systems of real quaternion matrix equations, Comput. Math. Appl., 49/5-6(2005), 641-650. [3] D.R. Farennick, B.A.F. Pidkowich, The spectral theorem in quaternions, Linear Algebra Appl. 371 (2003): 75-102. [4] H.C. Chen, Generalized reflexive matrices: special properties and application, SIAM J. Matrix Anal. Appl. 19 (1998): 140-153. [5] A.L. Andrew, Centrosymmetric matrices, SIAM Rev. 40(1998): 697-698. [6] W.C. Pye, T.L. Boullion, T.A. Atchison, The pseudoinverse of a centrosymmetric matrix, Linear Algebra Appl. 6 (1973): 201-204. [7] I.J. Good, The inverse of a centrosymmetric matrix, Technometrics 12 (1970): 925-928. [8] A.L. Andrew, Solution of equations involing centrosymmetric matrices, Technometrics 15 (1973): 151-162. [9] J.R. Weaver, Centrosymmetric (cross-symmetric) matrices, their basic problems, eigenvalues, and eigenvectors, Amer. Math. Monthly 92 (1985): 711-717. [10] Z.-Y. Peng, X.Y. Hu, The reflexive and anti-reflexive solutions of matrix equation AX = B, Linear Algebra Appl. 375 (2003): 147-155. [11] C.J. Meng, X.Y. Hu, The skew-symmetric orthogonal solutions of the matrix equation AX = B, Linear Algebra Appl. 402 (2005): 303-318. [12] F.Z. Zhou, X.Y. Hu and L. Zhang, The solvability conditions for the inverse problems of symmetric ortho-symmetric matrices, Appllied Math. and Comput. 154(2004):153-166. [13] W.F. Trench, Characterization and properties of matrice with generalized symmetry or skew symmetry, Linear Algebra Appl. 377 (2004): 207-218. [14] W.F. Trench, Inverse eigenproblems and associated approximation problems for matrices with generalized symmetry or skew symmetry, Linear Algebra Appl. 380 (2004): 199-211. [15] W.F. Trench, Hermitian, hermitian R−symmetric, and hermitian R−skew symmetric Procrustes problem, Linear Algebra Appl. 387 (2004): 83 -- 98. [16] Z.J. Bai, R.H. Chan, Inverse eigenproblem for centrosymmetric and centroskew matrices and their approximation, Theor. Comput. Sin., in press. [17] D. Xie, Y. Sheng, Inverse eigenproblem of anti-symmetric and persymmetric matrices and its approximation, Inverse Problems, 19 (2003): 217 -- 225. [18] F.Z. Zhou, X.Y. Hu, L. Zhang, The solvability conditions for the invese eigenvalue problems of centro-symmetric matrices, Linear Algebra Appl. 364 (2003): 147 -- 160. [19] D.X., X.Y. Hu, L. Zhang, The solvability conditions for the invese eigenvalue problems of symmetric and anti- persymmetric matrices and its approximation, Numer. Linear Algebra Appl. 10 (2003): 223 -- 234. [20] J.W. Shuai, The quaternion NN model: The identification of colour images (in Chinese), Acta Comput. Sinica 18(5), 372-379, (1995). [21] A. Rezon and L.P. Horwitz, Uniqueness of the scalar product in the tensor product of quaternion Hilbert modules, J. Math. Physical Sci.33 (9), 3098-3104, (1992). [22] S.L. Adler, Quaternionic Quantum Mechanics and Quantum Fields, Oxford University Press, Oxford, 1995. [23] D.I. Merino, V. Sergeichuk, Littlewood's algorithm and quaternion matrices, Linear Algebra Appl. 298 (1999): 193-208.
1610.04425
3
1610
2018-05-08T12:03:41
Verbally prime T-ideals and graded division algebras
[ "math.RA" ]
Let $F$ be an algebraically closed field of characteristic zero and let $G$ be a finite group. We consider graded Verbally prime $T$-ideals in the free $G$-graded algebra. It turns out that equivalent definitions in the ordinary case (i.e. ungraded) extend to nonequivalent definitions in the graded case, namely verbally prime $G$-graded $T$-ideals and strongly verbally prime $T$-ideals. At first, following Kemer's ideas, we classify $G$-graded verbally prime $T$-ideals. The main bulk of the paper is devoted to the stronger notion. We classify $G$-graded strongly verbally prime $T$-ideals which are $T$-ideal of affine $G$-graded algebras or equivalently $G$-graded $T$-ideals that contain a Capelli polynomial. It turns out that these are precisely the $T$-ideal of $G$-graded identities of finite dimensional $G$-graded, central over $F$ (i.e. $Z(A)_{e}=F$) which admit a $G$-graded division algebra twisted form over a field $k$ which contains $F$ or equivalently over a field $k$ which contains enough roots of unity (e.g. a primitive $n$-root of unity where $n = ord(G)$).
math.RA
math
VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS ELI ALJADEFF AND YAAKOV KARASIK Abstract. Let F be an algebraically closed field of characteristic zero and let G be a finite group. We consider graded Verbally prime T -ideals in the free G-graded algebra. It turns out that equivalent definitions in the ordi- nary case (i.e. ungraded) extend to nonequivalent definitions in the graded case, namely verbally prime G-graded T -ideals and strongly verbally prime T - ideals. At first, following Kemer's ideas, we classify G-graded verbally prime T -ideals. The main bulk of the paper is devoted to the stronger notion. We classify G-graded strongly verbally prime T -ideals which are T -ideal of affine G-graded algebras or equivalently G-graded T -ideals that contain a Capelli polynomial. It turns out that these are precisely the T -ideal of G-graded iden- tities of finite dimensional G-graded, central over F (i.e. Z(A)e = F ) which admit a G-graded division algebra twisted form over a field k which contains F or equivalently over a field k which contains enough roots of unity (e.g. a primitive n-root of unity where n = ord(G)). 1. introduction Let F be an algebraically closed field of characteristic zero. The study of PI algebras over F is closely related to the study of T -ideals of the noncommutative free associative algebra F hXi where X is a countable set of variables. Since any T -ideal Γ appears as the ideal of polynomial identities of a suitable algebra A, it is natural to consider special types of T -ideals and try to understand what algebras have them as their ideal of identities. In the ungraded case two types of primeness on T -ideals are considered, namely prime T -ideals and verbally prime T -ideals. By definition a T -ideal I is prime if for any two ideals J1, J2 in F hXi such that J1J2 ⊆ I, either J1 ⊆ I or J2 ⊆ I whereas I is verbally prime if a similar condition holds whenever the ideals J1 and J2 are T -ideals. We adopt the definition from T -ideals and say that an algebra A is verbally prime if its T -ideal of identities Id(A) is verbally prime. As for primeness, we recall that an algebra A is prime if for ideals I and J in A with IJ = 0 we must have I = 0 or J = 0, hence we cannot just define primeness in terms of the corresponding T -ideal of identities. Nevertheless, by structure theorems of Amitsur ([5]) and Posner ([10], section 1.11) we have Theorem 1.1. Let A be a PI algebra. Then it is PI equivalent to a prime algebra B if and only if its T-ideal of polynomial identities Id(A) is a prime T-ideal. Fur- thermore, A is a prime PI algebra if and only if it is PI equivalent to Mn(F ) for some n > 0. Key words and phrases. graded algebras, polynomial identities, verbally prime, graded division algebras. 1 VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 2 As for the classification of verbally prime PI algebras recall the following funda- mental result which is due to Kemer [12]. Theorem 1.2. A is a verbally prime PI algebra if and only if it is PI equivalent to the Grassmann envelope of a finite dimensional Z/2Z−simple F -algebra A. It follows that if A is also affine then it is PI equivalent to a prime PI algebra. Posner's Theorem was recently extended to the G-graded setting by Karasik (see [11]). As a corollary he obtains a generalization of Theorem 1.1 for G-graded algebras (see Theorem 1.5 below). Our goal in this paper is to extend Theorem 1.2 to the G-graded setting where G is an arbitrary finite group. Somewhat more precisely, we wish to classify G−graded algebras (up to graded PI equivalence) which are PI as ungraded algebras and whose T -ideal of G-graded identities satisfy conditions which are analogue to verbally prime (see below for the precise definitions). Remark 1.3. A key ingredient in Kemer's proof of Theorem 1.2 is his own celebrated Representability Theorem which states that every PI algebra is PI equivalent to the Grassmann envelope of a finite dimensional Z/2Z− graded algebra. Also in the G- graded setting an important tool in our proofs is the Representability Theorem for G-graded algebras (see Theorem (A) below or ([1], Theorems 1.1 and 1.3)). Since the Representability Theorem makes sense only for G-graded algebras that are ungraded PI, we restrict our discussion to algebras of that type. It may seem that the generalization to G− graded algebras is a natural extension of Kemer's original work. Surprisingly, this is not the case as we shall soon explain. It is well known that for ordinary T -ideals (i.e. ungraded) the property of a T -ideal I being verbally prime may be expressed also in terms of polynomials, that is, I is verbally prime if and only if the following holds: if f, g ∈ F hXi are polynomials defined on disjoint sets of variables with f g ∈ I, then either f or g is in I. Note that if I is the T -ideal of identities of an algebra A, then the above condition on f and g says that if f g is an identity of A then either f or g is an identity of A. Most of the time we shall work with that terminology. It turns out that the equivalence of the two conditions mentioned above for verbally primeness of T -ideals is not longer valid when considering G−graded T - ideals and hence we obtain two primeness conditions on G−graded T -ideals. One finds that the corresponding condition for G-graded T -ideals expressed in terms of polynomials is strictly stronger and hence we will say that G-graded T -ideals (or G-graded algebras) satisfying that property are strongly verbally prime. For future reference we record below the following definitions. Definition 1.4. Let Γ be a G-graded T -ideal which contains a nonzero PI. (1) We say Γ is G-graded prime if for any G-graded ideals I and J with IJ ⊆ Γ, then I ⊆ Γ or J ⊆ Γ. (2) We say Γ is G-graded verbally prime if for any G-graded T -ideals I and J with IJ ⊆ Γ, then I ⊆ Γ or J ⊆ Γ. (3) We say Γ is G-graded strongly verbally prime if for any G-graded homoge- neous polynomials f and g defined on disjoint sets of variables with f g ∈ Γ, then f ∈ Γ or g ∈ Γ. VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 3 As mentioned above, Posner's theorem was generalized to the G-graded setting by Karasik ([11], Corollary 4.7). In particular it gives the classification of G-prime T -ideals. Theorem 1.5. Let A be a G-graded algebra which is PI as an ungraded algebra. Then its T -ideal of identities is prime if and only if A is G-graded PI equivalent to a finite dimensional G-simple F -algebra. The classification of G-graded verbally prime T -ideals (or algebras) was obtained by Berele and Bergen in [7] and independently by Di Vincenzo in [8] for the impor- tant case where G = Z2. The precise result is as follows. Theorem 1.6. Let A be a G−graded algebra which is also PI as an ungraded algebra. Then A is verbally prime if and only if it is G−graded PI equivalent to the Grassmann envelope of a finite dimensional G2 = Z/2Z × G−simple F -algebra. If A is also affine, then A is G-verbally prime if and only if it is G-prime, that is, if and only if A is G−graded PI equivalent to a finite dimensional G−simple F -algebra. The classification of G-graded T -ideals satisfying the stronger condition, namely G-strongly verbally prime, appears to be more involved. One needs to translate the language of G−graded polynomial identities into the algebraic structure of G- simple algebras. In this paper we provide a full answer in the affine case, namely we will classify up to G−graded PI equivalence G−strongly verbally prime algebras which are affine. At this point, the nonaffine case remains open. From Theorem 1.6 and the fact that strongly verbally primeness implies verbally primeness we have that in order to classify the G-graded affine algebras which are strongly verbally prime we need to determine the finite dimensional G-simple alge- bras A which satisfy the following condition: if f and g are G-graded homogeneous polynomials (with respect to the G-grading) with disjoint sets of graded variables and such that f g is an identity of A, then f or g is an identity of A. In order to state our main results we recall the structure of finite dimensional G-graded algebras which are G-simple. This result is key and is due to Bahturin, Sehgal and Zaicev [6]. Theorem 1.7. Let A be a f.d. G−simple algebra over an algebraically closed field F of zero characteristic. Then there is a subgroup H of G, a two cocycle c ∈ Z 2(H, F ∗) (the H−action on F ∗ is trivial) and g = (g1, . . . , gm) ∈ G(m), such that A ∼= F cH ⊗ Mm(F ), where (by this identification) the G−grading on A is given by Ag = spanF(cid:8)uh ⊗ ei,jg = g−1 i hgj(cid:9) . It is easy to see that up to a G-graded isomorphism the algebra A does not depend on the 2-cocycle c but only on its cohomology class [c] ∈ H 2(H, F ∗). We therefore denote the G-grading on the algebra A by PA = (H, [c], g). We also say that (H, [c], g) is a presentation of the G-graded algebra A. Note that if an algebra A is G-graded then it is U -graded in a natural way whenever G is a subgroup of U (just by putting Au = 0 for u ∈ U − G). It is clear in that case that A is strongly verbally prime as a G-graded algebra if and only if A is strongly verbally prime as a U -graded algebra. We therefore assume for the rest of the paper that the grading is connected. This means that the support of the grading generates the group G. Here is one of the two main results of the paper. VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 4 Theorem 1.8. Let Γ be a G-graded T -ideal where G is a finite group. Suppose Γ contains an ungraded Capelli polynomial cn for some integer n (equivalently, Γ is the T -ideal of G-graded identities of an affine PI algebra). Then the ideal Γ is G-graded strongly verbally prime if and only if it is the T -ideal of G-graded identities of a finite dimensional G-simple algebra A with presentation PA = (H, α, g = (g1, . . . , gk)) satisfying the following conditions: (1) The group H is normal in G. (2) The different cosets of H in G are equally represented in the k-tuple g = (g1, . . . , gk). In particular the integer k is a multiple of [G : H]. (3) The cohomology class α ∈ H 2(H, F ∗) is G-invariant. Here G acts on H 2(H, F ∗) via conjugation on H and trivially on F ∗. The following special cases are of interest. Corollary 1.9. Let A be a G-simple algebra with presentation PA = (H, α, g). Suppose H is normal and H-cosets representatives are equally represented in g. If α is trivial then A is strongly verbally prime. Corollary 1.10. Suppose G is finite abelian and let A be a G-simple algebra with presentation PA = (H, α, g). Then A is strongly verbally prime if and only if the H-cosets representatives are equally represented in g. In particular we have Corollary 1.11. Let A be a finite dimensional Z2 = {e, σ}-simple algebra over F with presentation PA = (H, α, g). Then A is strongly verbally prime if and only if H ∼= Z2 or else H = {e} and g = (e, . . . , e, σ, . . . , σ) where e and σ have the same multiplicity. One of the main features of finite dimensional strongly verbally prime algebras is its intimate relation to finite dimensional G-graded division algebras, that is finite dimensional G-graded algebras whose nonzero homogeneous elements are invertible (e.g. the group algebra F G). Naturally, these algebras will be defined over fields K which are usually nonalgebraically closed. Nonetheless, for our purposes, we'll only consider fields which contain F , and hence any algebra we consider in this paper is by default an F -algebra. Let A be a finite dimensional G-simple F -algebra and suppose further that It is easy to see that if A Z(A)e = F 1A where e is the identity element of G. is a G-graded division algebra, then necessarily A is G-graded strongly verbally prime. Considerably more generally, if an algebra A admits a G-graded K-form BK (in the sense of descent ) for which every nonzero homogeneous element is in- vertible then again A is strongly verbally prime. We say that A has a G-graded K-form division algebra. Using Theorem 1.8 we obtain the second main result of the paper. Notation as above. Theorem 1.12. Let A be a finite dimensional algebra G−simple F -algebra where Z(A)e = F 1A. Then A is strongly verbally prime if and only if it has a G-graded division algebra form. That is, there exists a finite dimensional G-graded division algebra B over K where Z(B)e = K1B, and a field E which extends K (and F ) such that BE and AE are G-graded isomorphic algebras over E. Combining Theorems 1.8 and 1.12 we obtain the main corollary of the paper. VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 5 Corollary 1.13. Suppose F is an algebraically closed field of characteristic zero and let A be a finite dimensional G-graded F -algebra. Then A admits a G-graded K-form division algebra B, some field K, if and only if A is G-simple whose pre- sentation PA = (H, α, g = (g1, . . . , gk)) satisfies conditions (1) − (3) in Theorem 1.8. Once again, it is immediate that if A is finite dimensional and has a G-graded K-form division algebra then A is strongly verbally prime (i.e. if f and g are G- homogeneous polynomials on disjoint sets of variables such that f g ∈ IdG(A) then either f or g is in IdG(A)). However, it turns out that in that case one can remove the condition on the disjointness of sets of the variables. In fact we have Theorem 1.14. Notation as above. Let A be a G−graded F -algebra (possibly infi- nite dimensional). Then A is G−PI equivalent to a finite dimensional G−division algebra over some field K if and only if for any two G-homogeneous polynomials f and g such that f g ∈ IdG(A) then either f ∈ IdG(A) or g ∈ IdG(A). Conse- quently, any of these conditions holds if and only if A is G−strongly verbally prime and G−PI equivalent to a finite dimensional algebra. Here is the outline of the paper. In section §2 we introduce some basic results and notation in graded PI theory. As mentioned earlier, Theorem 1.6 appears in [7] although there is some confusion with the different definitions of verbally primeness. For completeness of this article we devote a short section (section §3) for its proof. In section §4 we discuss the strongly verbally prime condition and show the conditions of Theorem 1.8 are necessary. In the same section we discuss also their sufficiency however the proof of Theorem 1.8 is completed only in section §5 after we discuss G-graded division algebra twisted forms and prove Theorems 1.12 and 1.14. 2. Preliminaries 2.1. G−graded PI. We fix for the rest of the article a finite group G and an algebraically closed field of characteristic zero F . We are considering algebras A having a G−graded structure, that is A = ⊕g∈GAg, where Ag is an F −vector space contained in A, and AgAh ⊆ Agh for every g, h ∈ G. An element in the set ∪g∈GAg is said to be homogenous. Sometimes we will say that a ∈ Ag is an element of degree g and denote dega = g. A G−graded polynomial is an element of the noncommutative free algebra F hXGi generated by the variables of XG = {xi,gi ∈ N, g ∈ G}. It is clear that F hXGi is itself G−graded, where F hXGig is the span of all monomials xi1,g1 · · · xin,gn , where g1 · · · gn = g. For elements in F hXGi we adopt the following terminology. A G-graded poly- nomial p is said to be G-homogeneous if it belongs to F hXGig for some g ∈ G. if any variable xig appears the same Moreover, we say p is multihomogeneous number of times in each monomial of p. More restrictive, we say p is multilinear if it is multihomogeneous and any variable xig appears at most once in each monomial of p. Note that unless G is abelian, multihomogeneous or multilinear polynomials are not necessarily G-homogeneous. We say that a G−graded polynomial f (xi1,g1 , . . . , xin,gn ) is a G−graded identity of a G−graded algebra A if f (a1, . . . , an) = 0 for all a1 ∈ Ag1 , . . . , an ∈ Agn . The set of all such polynomials is denoted by IdG(A) and it is evident that it is an ideal VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 6 of F hXGi which is G-graded. In fact it is a G−graded T-ideal, that is, an ideal which is closed under G−graded endomorphisms of F hXGi. It is often convenient to view any ungraded polynomial as G−graded via the embedding F hXi → F hXGi , sense that if f ∈ Id(A) (the T −ideal of ungraded identities of A) then f ∈ IdG(A). As in the ungraded case, the set of G−homogeneous multilinear identities of A where xi →Pg∈G xi,g. This identification respects the G−graded identities in the  Xσ∈Λn,g ⊆Sn ασxiσ(1) ,gσ(1) · · · xiσ(n),gσ(n) ∈ IdG(A) g ∈ G, ασ ∈ F, i1, . . . , in are all distinct T (G−)generates IdG(A). Here, Λn,g denotes the set of permutations which yield monomials of G-degree g. Let f ∈ F hXGi, A a G−graded algebra and S ⊆ ∪g∈GAg. We write f (S) for the subset of A consisting of all graded evaluations of f on elements of S. More generally, if S ⊆ A (i.e. not necessarily homogeneous elements) we set f (S) := f (S∩(∪g∈GAg)). Note that if f is G-graded multilinear then f is a graded identity of A if and only if f (S) = 0 whenever S contains a basis of A consisting of homogeneous elements. 2.2. Grassmann envelope. Let V be a countably generated F −vector space. Denote by T (V ) the unital tensor F −algebra of V . That is T (V ) = F ⊕ V ⊗k ∞Mk=1 with the obvious addition and multiplication. The unital Grassmann algebra E is defined to be E = T (V )/hT0(V )2i, where hSi is the ideal generated by S and T0(V ) = V ⊗k. ∞Mk=1 In other words, if e1, e2, . . . is a basis of V , we may see E as the unital F −algebra generated by 1, e1, e2, ... and satisfies the relations eiej = −ejei (so e2 i = 0). In fact, the elements ai1,..,ik := ei1 · · · eik , where k = 0, 1, ... and i1 < i2 < · · · < ik ∈ N, form a basis of E (for k = 0 we just mean a = 1). It is easy to see that E is C2 = Z/2Z−graded: E = E0 ⊕E1, where E0 is spanned by elements ai1,...,ik where k is even and E1 is spanned by elements ai1,...,ik where k is odd. Moreover, it is easy to check that E0 is the center of E. Suppose that A is a G2 = C2 × G−graded algebra. We denote by E(A), the Grassmann envelope of A, E(A) =Mg∈G(cid:0)A(0,g) ⊗ E0(cid:1) ⊕(cid:0)A(1,g) ⊗ E1(cid:1) . which may be viewed as a G-graded algebra and also as a G2−graded algebra. A basic property of the Grassmann envelope is the following (proof is omitted). Proposition 2.1. IdG2(A) ⊆ IdG2(B) ⇐⇒ IdG2 (E(A)) ⊆ IdG2(E(B)). VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 7 3. G−verbally prime T -ideals In this section we prove Theorem 1.6. In order to proceed, let us recall the G-graded analog of Kemer's Representability theorem (see [1]). As usual, all algebras are defined over F , an algebraically closed field of characteristic zero. Theorem (A). The following hold. (1) Let W be an affine G−graded algebra which is PI as an ungraded alge- bra. Then W is G−graded PI equivalent to a finite dimensional G−graded algebra A. (2) Let W be a G−graded algebra which is PI as an ungraded algebra, then W is G−graded PI equivalent to the Grassmann envelope of an affine G2 = C2 × G−graded algebra W0. Thus, by part 1, W is G−graded PI equivalent to the Grassmann envelope of a finite dimensional G2−graded algebra A. We start with the proof of Theorem 1.6. Lemma 3.1. Let A = A1 × · · · × Ak be a direct product of G−graded algebras. If A is verbally prime then IdG(A) = IdG(Ai0 ) for some i0. Moreover, if A = A1 × · · · × Ak is a product of G2−graded algebras such that E(A) is G−verbally prime, then IdG(E(A)) = IdG(E(Ai0 )) for some i0. Proof. If IdG(A1) is contained in IdG(A), then IdG(A) = IdG(A1) and we are done. Moreover, if IdG(A′ = A2 × · · · × Ak) ⊆ IdG(A), then IdG(A′) = IdG(A) and so if the theorem holds for A′ it surely holds for A. Therefore, by induction we may assume that k > 1 and IdG(A1), IdG(A′) * IdG(A) and IdG(A1)IdG(A′) ⊆ IdG(A1) ∩ IdG(A′) = IdG(A). This contradicts A being verbally prime, so k = 1 as desired. The second part follows from the first part and from the equality E(A) = E(A1) × · · · × E(Ak). (cid:3) The following definition is nonstandard. It is used only in this section. Definition 3.2. A finite dimensional algebra A over F is said to be is [G : G]− minimal (or just G-minimal) if it is G-graded and for any finite dimensional G- graded algebra B we have IdG(A) = IdG(B) =⇒ dimF A ≤ dimF B. We say that a finite dimensional algebra A is [G2 : G]− minimal if it is G2-graded and for any finite dimensional G2-graded algebra B we have IdG(E(A)) = IdG(E(B)) =⇒ dimF A ≤ dimF B. Clearly, any finite dimensional G-graded algebra is G-PI equivalent to some [G : G]-minimal algebra. Similarly, the Grassmann envelope E(A) of any finite dimensional G2−graded algebra is G-graded PI equivalent to E(B) for some [G2 : G]−minimal algebra B. It is therefore sufficient to characterize T -ideals by minimal algebras. Lemma 3.3. The following holds. VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 8 (1) If A is G−minimal and A is G−verbally prime, then A is semisimple. (2) If A is [G2 : G]-minimal and E(A) is G−verbally prime, then A is semisim- ple. Proof. We show the Jacobson radical J of A is zero. Since J is G-graded (resp. G2−graded)(see [9]), the algebra Ass = A/J is semisimple G-graded (resp. G2−graded). Suppose J 6= 0. Then, by minimality of A, we have IdG(A) IdG(Ass) (resp. IdG(E(A)) IdG(E(Ass))). Let p be any multilinear polynomial in IdG(Ass) \ IdG(A) (resp. IdG(E(Ass)) \ IdG(E(A))). If we consider evaluations on the span- ning set Ass ∪ J (resp. E(Ass) ∪ E(J)), we see that these evaluations are nonzero only if at least one of its variables is evaluated on an element of J (resp. E(J)). Thus, p(A) ⊆ J (resp. p(E(A)) ⊆ E(J)). Since J (resp. E(J)) is a nilpotent ideal, there is some integer 2 ≤ m ≤ the nilpotency index of J (resp. E(J)), such that p(X)p(X) · · · p(X) zgp(Y ) ∈ /∈ IdG(A) (resp. IdG(E(A))) but p(X)p(X) · · · p(X) m−1 {z } IdG(A) (resp. IdG(E(A))). m−1 {z } The following lemma shows that A (resp. E(A)) is not verbally prime. Contra- (cid:3) diction. Lemma 3.4. A G−graded algebra A is not verbally prime if and only if the fol- lowing holds: There are two G−graded polynomials p(X), q(Y ) defined on disjoint sets of variables which are not in IdG(A), but pzgq ∈ IdG(A) = Γ for every g ∈ G. Equivalently, A is G-graded verbally prime if and only if for any two polynomials p and q defined on disjoint sets of variables, nonidentities of A, the product pzgq is not a G-graded identity for some g ∈ G. Here zg is an extra variable, g-homogeneous, not in X ∪ Y . Proof. Suppose A is verbally prime and take two polynomials p(X), q(Y ), with disjoint sets of variables, such that pzgq ∈ Γ for every g ∈ G. We show p or q is in Γ. Since every element of hpiT hqiT is T −generated by pzgq, where g runs over the elements of G, we get that hpiT hqiT ⊆ Γ and the result follows by definition of verbally prime. Now suppose that A is not verbally prime and let I, J be two G−graded T −ideals not contained in Γ such that IJ ⊆ Γ. Choose p ∈ I − Γ and q ∈ J − Γ. Since pzg ∈ I, for every g ∈ G, we have (by our assumption) that pzgq ∈ Γ. But clearly, we may assume that p is defined on a set of variables disjoint from the ones of q and zg and so we are done. (cid:3) We can now prove Theorem 1.6. Proof. Suppose Γ contains a Capelli polynomial (or equivalently, Γ is the T -ideal of an affine G-graded algebra which is ungraded PI (see[1])). Then by part 1 of Theorem A, Γ = IdG(A), where A is finite dimensional G−graded algebra. Assume also that A is G−minimal. By Lemma 3.3 we obtain that A is semisimple. Since every semisimple G−graded algebra is a direct product of G−simple algebras, invoking Lemma 3.1 we can replace A by a G−simple algebra. In the general case, by part 2 of Theorem A, Γ = IdG(E(A)), where A is finite dimensional G2−graded algebra. We assume that A is [G2 : G]−minimal and continue the proof as above. This proves one direction of each one of the statements in the theorem. For the converse, suppose A is a finite dimensional G−graded simple algebra. Since the evaluation of any T −ideal I on A is a G−graded ideal I of A, in case VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 9 verbally prime. I * Γ we get I = A. So if I, J * Γ we have fIJ = I J = A, so IJ * Γ. Thus, A is Finally, we prove that if A is a G2−simple finite dimensional algebra, then E(A) is G−verbally prime. Suppose I is a G−graded T −ideal not contained in Γ = IdG(E(A)). Denote IA = {a ∈ Ab ⊗ a = f (x1, . . . , xn), b 6= 0, f ∈ I ⊆ F hXGi} Here, f is multilinear and G-homogeneous in F hXGi and xi ∈ E(A) is of the form ei1ei2 · · · eik ⊗ ai. Note that SpanF (IA) is a nonzero G2−graded ideal of A. Thus SpanF (IA) = A. Hence, for any two G−graded T −ideals I, J not contained in Γ, we have SpanF (IA)SpanF (JA) = A and hence I(A)J(A) 6= 0 which says that IJ is not contained in Γ. This completes the classification of G−graded verbally prime ideals. (cid:3) 4. strongly verbally prime ideals As mentioned in the introduction, we shall give a complete characterization of G-graded strongly verbally prime ideals Γ in case Γ is the T -ideal of an affine G-graded algebra which is ungraded PI. The first step is to show Corollary 4.1. If Γ is G-graded strongly verbally prime, then it is G-graded verbally prime. Proof. Suppose not and consider p, q as in the second part of the proof of Lemma 3.4. Since q /∈ Γ, pzg ∈ Γ for every g ∈ G. Similarly, since p /∈ Γ, zg ∈ Γ for all g ∈ G. We get that Γ is equal to the whole free algebra and so p (and q) are in Γ. Contradiction. (cid:3) In case G is trivial it is not hard to prove (see [10], Lemma 1.3.10) that a vector space T −generated by a single polynomial p is in fact a Lie T −ideal, so any one- sided T −ideal must be a two-sided T −ideal. Hence, pze is in the left T −ideal hpiT , so pzeq ∈ hpqiT . In other words pzeq is an identity if pq is such. Thus, in the ungraded case the opposite of Corollary 4.1 holds. In contrast to the ungraded case, we shall see that if the group G is nontrivial then there exist algebras which are verbally prime but not strongly verbally prime. For instance, it follows easily from our classification that the algebra of 3 × 3−matrices over F with the elementary Z2−grading given by the vector (e, e, σ) where Z2 = hσi is verbally prime but not strongly verbally prime. Before embarking into the proof of Theorem 1.8 we need some more preparations. Let Γ be a G-graded strongly verbally prime T -ideal which contains a Capelli polynomial. By Kemer's theory for G-graded algebras (see [1]) we have that Γ is the T -ideal of identities of a G-graded finite dimensional algebra A over F . Furthermore, by Theorem 1.6 and the fact that strongly verbally primeness implies verbally primeness (Corollary 4.1) we may assume the algebra A is G-simple. Our goal in the first part of the proof is to find necessary conditions on presentations of the G-simple algebra A so that IdG(A) is G-graded strongly verbally prime. The word the in the last sentence needs justification. It is trivial to construct nonisomorphic finite dimensional algebras which are PI equivalent. On the other hand, PI equivalent finite dimensional simple algebras over an algebraically closed VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 10 field F are F −isomorphic by e.g. the Amitsur-Levitzki theorem. This is true also for finite dimensional G-simple algebras over F . Indeed, it was proved by Koshlukov and Zaicev that if finite dimensional G-simple algebras A and B, G abelian, are G-graded PI equivalent, then they are G-graded isomorphic [13]. This result was extended to arbitrary groups by the first named author of this article and Haile [3]. In particular, note that if A is G -graded verbally prime, the minimal algebra B with IdG(B) = IdG(A) is uniquely determined up to a G-graded isomorphism. Indeed, as noted in the proof of Theorem 1.6 any G-minimal algebra and G-verbally prime is necessary G-simple. We record this in the following Proposition 4.2. G-minimal, G-graded verbally prime algebras B and B′ are G- graded PI equivalent if and only if they are G-graded isomorphic. As mentioned in the introduction, the G-graded structure of a finite dimensional G-simple algebra is presented by a triple (H, [c], g). We recall that a G-graded alge- bra may admit different presentations, that is algebras with presentations (H, [c], g) and (H ′, [c′], g′) (different parameters) may be G-graded isomorphic. In fact, in [3] the authors present three type of moves on presentations, M1, M2, M3 (see below) such that (1) Mi((H, [c], g)) ⋍ G (H ′, [c′], g′) if and only if (H ′, [c′], g′) may be obtained from (2) (H, [c], g)) ⋍ G (H, [c], g), i = 1, 2, 3 (G−isomorphic) (H, [c], g) by composing a sequence of such moves. For the reader convenience let us recall the moves M1, M2, M3. M1 : g′ = (gσ(1), . . . , gσ(m)), where σ ∈ Sm, and H = H ′, c = c′. M2 : g′ = (h1g1, . . . , hmgm), where h1, . . . , hm ∈ H, and H = H ′, c = c′. M3 : For g ∈ G. g′ = (gg1, . . . , ggm), H ′ = gHg−1 and c′ ∈ Z 2(H ′, F ∗) is defined by c′(gh1g−1, gh2g−1) = c(h1, h2). Applying these moves we obtain easily the following normalization on the pre- sentation of a G-simple algebra (see also [3]). Corollary 4.3. Any finite dimensional G-simple algebra has a presentation with ) ∈ Gm, where the gi's are different representatives of g = (g1, . . . , g1 , . . . , gk, . . . , gk Let PA = (H, [c], g) be a presentation of a G-simple algebra A. Suppose the presentation is normalized as above. We denote by e(i,j) r,s the element em0+···mi−1+r,m0+···mj−1+s ∈ Mm(F ) where 1 ≤ i, j ≤ k, m0 = 0 and r ∈ {1, . . . , mi}, s ∈ {1, . . . , mj). In case i = j we slightly simplify the notation and replace e(i,i) r,s by e(i) r,s. For a fixed i we refer to the linear span of {ue ⊗ e(i) r,s}r,s as the ith e−block of A. Note that the linear span of all e−blocks (i = 1, . . . , k) is equal to Ae, the e−component of A. Suppose A is G-graded strongly verbally prime. Notation as above. Lemma 4.4. The following hold. (1) k = [G : H] m1 {z } mk {z } right H−cosets, 0 < m1 ≤ · · · ≤ mk and g1 = e. VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 11 (2) m1 = mk and so m1 = · · · = mk Proof. Let us show first all right H-cosets are represented in g. If not, it fol- lows from Lemma 3.3 in [2] that the G-grading on A is degenerate (recall that a G-grading on an algebra A is nondegenerate if the product of homogeneous compo- nents Ag1 Ag2 · · · Ags is nonzero, for any s > 0 and any s-tuple (g1. . . . , gs) ∈ G(s); equivalently, the T -ideal of G-graded identities has no G-graded multilinear mono- mials). It follows that IdG(A) contains multilinear monomials. Since the grading is assumed to be connected, we have monomials of the form xg1 xg2 · · · xgn ∈ IdG(A) where gi ∈ SuppG(A) and hence xgi /∈ IdG(A). Clearly, this shows that A is not G-graded strongly verbally prime and the first part of the lemma is proved. Next, suppose by contradiction that m1 < mk (mi are positive integers). For i = 1, . . . , k consider the following monomial of e-variables Zi = y(i) 0 x(i) 1 y(i) 1 · · · x(i) m2 i y(i) m2 i and denote Z = Z1w1Z2 · · · wk−1Zk, where wi is a g−1 i gi+1−graded variable. Finally let p = AltX Z, where X is the set of all x variables. We refer to the y variables as frames and the w variables as bridges. Let us show that p is a nonidentity of A. It is well known that one can find an ordering on the elementary matrices er1,s1, . . . , erm2 i of Mmi(F ) such that ,sm2 i = 1. i i − 1. 0 = x(i) 1 := x(i) if t = 0. This yields Zi = ue ⊗ e(i) (1) r1 = sm2 (2) st = rt+1 for t = 1, . . . , m2 Evaluate x(i) t = ue ⊗ e(i) t 's by e-homogeneous elements such that Zi 6= 0, namely y(i) rt,st. Notice that there is a unique evaluation of the y(i) st,st if t > 0 t and y(i) 1,1. Finally, we set wi = ue ⊗ e(i,i+1) and obtain Z = ue ⊗ e(1,k) 1,1 . We claim that any nontrivial alternation of the x's gives zero. Indeed, if the alternation sends an x corresponding to Zi to x′ corresponding to Zj (i 6= j), we get zero since the frames of Zj are evaluated on elements of the j−block and these do not match with the indices of x. On the other hand if the alternation sends some x of Zi to a different x′ of Zi we also get zero since x and x′ are evaluated on different elementary matrices and again the indices of the frames do not match. All in all, we get that p = Z 6= 0. t = ue ⊗ e(i) 1,1 Next, we claim that p(A) ⊆ F cH ⊗ R, where R is spanned by e(i,j) r,s , where mi = m1 and mj = mk (in particular i < j). Indeed, since p is multilinear it is enough to consider only evaluations on elements of the form uh ⊗ ei,j. Consider such an evaluation: x, y, w. Obviously, we may assume that p 6= 0 and so without loss of generality we may assume that Z 6= 0. Note that since the x, y (alternating variables and frame variables) have been chosen to be homogeneous of degree e, all variables of each Zi must be evaluated on elements of the same e−block. Moreover, since the x variables are alternating in p, their evaluation must consist of linearly independent elements, thus consists of a basis of Ae. Thus, the x variables of each Zi are evaluated on a basis of some e−block of Ae where for i 6= j the evaluation is on different e-blocks. It follows that each Zi must be evaluated on elements of an e−block of dimension m2 i . Consequently Z(A) ⊆ F cH ⊗ R (evaluations of the monomial Z on A). In order VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 12 to show that p(A) ⊆ F cH ⊗ R we proceed as follows. Any evaluated monomial fZ ′ resulting from a permutation of the evaluated x variables of Z is in fact equal to Z after reevaluation of the x variables. The previous argument shows that Z ′(A) ⊆ F cH ⊗ R and hence also p(A) ⊆ F cH ⊗ R. Remark 4.5. In fact we can strengthen the statement in the last part of the proof above. We claim that if the following conditions hold (1) All variables are evaluated on elements of A of the form uh ⊗ ei,j (2) The variables of Zi are homogeneous of degree e. (3) Z(A) 6= 0 then for any monomial Z ′ in p obtained from Z by a nontrivial permutation of the the polynomial p (i.e. an evaluation of the x's, the y's and the w's) which yields a nonzero value of the monomial Z, we have that the value of the x's is determined by the value of the y's (frames). Since Z ′ is obtained from Z by permuting nontrivially x-variables we havefZ ′ = 0. Indeed, as noted above, for any nonzero evaluation of the x's and keeping the y's, its valuefZ ′ must be zero. We complete now the proof of the lemma. Since m1 < mk, we have (F cH ⊗ R)2 = 0. It follows that pq ∈ IdG(A) where q is the polynomial p but with a disjoint set of variables - contradiction to A being strongly verbally prime. We let gset = {g1, . . . , gk} be a set of representatives of the right cosets of H in G. Denote mblock = m1 = · · · = mk. Proposition 4.6. gset = {g1, . . . , gk} normalizes H (i.e. H is normal in G). Proof. First let us define an equivalence relation ∼ on gset: gi ∼ gj iff g−1 i Hgj ∩ H 6= ∅, (cid:3) and denote by [g] the equivalence class of g ∈ gset. Clearly, the equivalence rela- tion among the gi's determines an equivalence relation among the corresponding e-blocks. Notice that the claim of the proposition holds if and only if the equivalence classes are of cardinality 1. Let g∼ = {γ1, . . . , γk} ⊆ gset, k ≤ k, be a full set of representatives of ∼. Changing representatives we may write {z } {z } m1 {z } mk {z } ([g1], . . . , [g1] , . . . , [gk], . . . , [gk] ) = ([γ1], . . . , [γ1] , . . . , [γk], . . . , [γk] ), mblock mblock where mi = mblock ·[γi]. Here [γi] denotes the cardinality of the equivalence class in gset represented by γi. Moreover, since e ∈ G normalizes H, we may assume (1) [γ1] = [e](= {e}). (2) 0 < m1 ≤ · · · ≤ mk. We make similar conventions to the ones we made before Lemma 4.4. Denote the element e m0+··· mi−1+r, m0+··· mj−1+s ∈ Mm(F ), where m0 = 0 and is in the r,s = uh ⊗ e[γi,γi] by e[i,j] r,s r ∈ {1, . . . , mi}, s ∈ {1, . . . , mj}, 1 ≤ i, j ≤ k. We say that uh ⊗ e[i,j] r,s [i, j]−block. Moreover, we denote by uh ⊗ e[i] and call its block the [i]−block. r,s the element uh ⊗ e[i,i] r,s VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 13 The idea of the proof is somewhat similar to the one above. We construct a "Capelli type" polynomial p(X), obtained by alternating some variables of a suitable G-graded monomial Z. For i = 1, . . . , k, consider the monomial of e-variables Zi = y(i) 0 x(i) 1 y(i) 1 · · · x(i) m2 i y(i) m2 i where mi = mblock and let Z = Z1w1Z2 · · · wk−1Zk, where wj is a g−1 j hjgj+1−graded variable and hj ∈ H to be chosen, j = 1, . . . , k −1. If gj and gj+1 are nonequivalent we know that g−1 j hjgj+1 is not in H for any hj ∈ H and so we take hj = e for simplicity. On the other hand if gj and gj+1 are equivalent we choose hj = hj ∈ H such that g−1 hjgj+1 ∈ H. Note that by our construction w1, w2, . . . , w m1/mblock−1 are elements in H, w m1/mblock /∈ H, then the next m2/mblock − 1 variables w's have homogeneous degrees in H, followed by w m1+ m2/mblock whose homogeneous degree is not in H and so on. j Let us introduce an equivalence relation on submonomials: we say that sub- monomials Zi and Zj are equivalent if and only if i = j or they are separated by w's whose homogeneous degrees is in H. We denote the equivalent class of Zi by [Zi]. Note that we have constructed precisely k equivalence classes. Let p(X) be the polynomial obtained by alternating all xr's variables of Z. Lemma 4.7. The polynomial p(X) is a graded nonidentity of A. Furthermore, evaluating the polynomial p on A yields elements in F cH ⊗ R, where R is spanned by elements e[i,j] r,s with i and j satisfying mi = m1 and mj = mk. Using the lemma, since [F cH ⊗ R]2 = 0, by taking the product of two such polynomials as p(X) with disjoint sets of variables, we see that A is not strongly verbally prime and so the proof of the proposition is complete. Note that with this we have proved the necessity of conditions 1 and 2 in Theorem 1.8. Proof. (of the lemma) By the construction the monomial Z has a nonzero value on A as follows. We evaluate the x's in each segment Zi of the monomial Z on r,s, the y's (frames) on e-elements of the form ue ⊗ e[i] e-elements of the form ue ⊗ e[i] r,r and finally the variables wi (bridges), i = 1, . . . , k − 1, on uhi ⊗ e[i,i+1] where hi = e if gi and gi+1 are nonequivalent and hi = hi if gi and gi+1 are equivalent. Other monomials of p(X) obtained from Z by alternating the x's yield a zero value since the values on the y's and the x's do not match. This shows p(X) is a nonidentity of A. 1,1 In order to prove the second claim of the lemma, note that by the multilinearity of p(X) it is sufficient to check evaluations on basis elements of the form uh ⊗ e[i,j] r,s . From now on we fix an evaluation of p(X) of that kind. We'll show the value is in F cH ⊗ R. Clearly, we may assume the value is nonzero and so there exists a monomial Z whose value is nonzero. In that case, by the alternation of the x's in p(X), their values must consist of the full basis of the e-homogeneous component of A. Since the y's are homogeneous of degree e, their value is determined uniquely by the x's and the nonvanishing of the monomial Z. Therefore as above, any monomial Z ′ obtained from Z by a nontrivial permutation vanishes. In order to complete the proof we must show the value of the monomial Z is in F cH ⊗R. As noted above, the VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 14 evaluation of the monomial Z establishes a one to one correspondence between the submonomials Zi and e-blocks. Furthermore, equivalent classes of submonomials [Zi] must be evaluated on equivalent classes of e-blocks such that the sizes of the equivalence classes coincide. The proof of the lemma now follows easily and so the proof of Proposition 4.6 is now complete. (cid:3) (cid:3) We pause for a moment and summarize what we have so far. We showed that if Γ is a G-graded T -ideal which contains a Capelli set and is G-graded strongly verbally prime then it is the T -ideal of identities of a finite dimensional G-simple algebra. Of course, there may be other algebras (finite dimensional or not) whose T -ideal of G-graded identities is Γ. However, if we restrict our attention to finite dimensional G-simple algebras A whose IdG(A) = Γ, the algebra A is uniquely determined up to a G-graded isomorphism. We know by Bahturin-Sehgal-Zaicev's theorem that any G-simple algebra and hence the algebra A, is represented by a triple (H, [c], g), where H is a subgroup of G, [c] ∈ H 2(H, F ∗) and g = (g1, . . . , gm) ∈ Gm. We know the presentation (H, [c], g) of A is unique up to 3 type of "moves" M1, M2, M3. We showed that the strongly verbally prime condition on A implies the group H is normal in G and H cosets of G are represented equally in g = (g1, . . . , gm) ∈ Gm. In particular m/[G : H] is an integer. The above considerations lead to the following characterization of G-simple crossed products. We recall Definition 4.8. A G-graded algebra B is said to be a G-crossed product if Bg has an invertible element for any g ∈ G. Note that this implies dimF (Bg) = dimF (Bg′ ) for any g, g′ ∈ G. Proposition 4.9. Let A be a G−simple algebra over an algebraically closed field of characteristic zero. Then A is a G-crossed product if and only if A has a pre- sentation (H, [c], g) where H is a subgroup of G (not necessarily normal) and the right H cosets of G are equally represented in g = (g1, . . . , gm) ∈ Gm. Proof. Suppose A has a presentation as above where right H-cosets are equally represented. We know the elements of the form uh⊗ei,j ⊗E, where i, j ∈ {1, . . . , [G : H]}, E ∈ Mr(F ) are homogeneous of degree g−1 i hgj and span A. We note the homogeneous components are concentrated in block permutation matrices which means that for any g ∈ G and any i ∈ {1, . . . , [G : H]} there exist a unique h = h(i) and unique j = j(i) such that for every E ∈ Mr(F ) the element uh ⊗ ei,j ⊗ E has homogeneous degree g. It follows that the element Xi∈{1,...,[G:H]} uh(i) ⊗ ei,j(i) ⊗ Ir, where Ir is the identity matrix of rank r, is invertible and homogeneous of degree g. The inverse is Xi∈{1,...,[G:H]} c−1(h(i), h(i)−1)uh(i)−1 ⊗ ej(i),i ⊗ Ir. As noted above, in this case the dimensions of the homogeneous components of A coincide and equal [G : H]r2 = dimF (A)/ G . VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 15 For the converse let r1, . . . , r[G:H] be the multiplicities of the right H-cosets in g and suppose are not all equal. Clearly r1 +· · ·+r[G:H] = m. Moreover, by definition of the G-grading on A, dimF (Ae) = r2 [G:H] which strictly exceeds dimF (A)/ G . This implies the dimension of the homogeneous components are not equal and hence A is not a G-crossed product. (cid:3) 2 + · · · + r2 1 + r2 In particular we have Corollary 4.10. Let A be a finite dimensional G-simple algebra with presenta- tion (H, [c], g). Suppose H is normal and multiplicities of H-coset representatives are equal (= r). Then the homogeneous components consist of block permutation matrices. Our next step is to put restrictions (i.e. necessary conditions) on the cohomology class [c] provided the G-simple algebra A is strongly verbally prime. This will lead to a necessary condition on [c] which together with the conditions on H and on g mentioned above turns out to be also sufficient for strongly verbally primeness. In order to proceed we recall briefly the theory and general terminology which relate the cohomology group H 2(H, F ∗) with H-graded PI theory (see [4], [3]). Let H be a finite, c : H × H → F ∗ a 2-cocycle and [c] the corresponding cohomology class. Let F cH be the corresponding twisted group algebra and let {uh}h∈H be a set of representatives for the H-homogeneous components in F cH. We have uh1uh2 = c(h1, h2)uh1h2 for hi ∈ H. Let n be a positive integer. For h = (h1, . . . , hn) ∈ H n and σ ∈ Sn consider Zh,σ = xi.hi − nYi=1 xσ(i),hσ(i) , nYi=1 c(h) c(hσ) αh,σ {z} where c(h) ∈ F ∗ (slightly abusing notation) is the element determined by uh1 · · · uhn = c(h)uh1···hn and hσ = (hσ(1), . . . , hσ(n)). We are interested in the binomials Zh,σ which are H-graded identities of F cH. This happens precisely when h1 · · · hn = hσ(1) · · · hσ(n). Note that if h1 · · · hn = hσ(1) · · · hσ(n), the polynomialQn is an H-graded identity if and only if λ = αh,σ. i=1 xi.hi −λ·Qn We refer to these binomials as the binomial identities of the twisted group algebra F cH. It is known that the binomial identities generate the T -ideal of H-graded identities of F cH (see [3] ,Theorem 4). Furthermore, one sees easily that the scalars αh,σ depend on the cohomology class [c] but not on the representative c. i=1 xσ(i),hσ(i) Next it is convenient to introduce into our discussion presentations of the group H. Let F be the free group generated by Ω = {xi,h i ∈ N , h ∈ H} and consider the exact sequence 1 / R / F / H / 1 where the map F → H is given by xi,h 7→ h. This induces the central extension 1 / R/[F , R] / F /[F , R] / H / 1 . Consider the central extension 1 / F ∗ / Γ / H / 1 / / / / / / / / / / / / VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 16 which corresponds to the cocycle c (i.e. {uh h ∈ H} is a set of representatives in Γ and uh1uh2 = c(h1, h2)uh1h2). The map ψc : F /[F , R] → Γ, given by ψc(xi,h) = uh, induces a map of extensions and its restriction ψc : [F , F ]∩R/[F , R] = M (H) → F ∗ is independent of the presentation and corresponds to [c]. That is, Φ([c]) = ψc where Φ : H 2(G, F ∗) → HomZ(M (H), F ∗) is the well known isomorphism of the Universal Coefficient Theorem. Here, M (H) is the Schur multiplier of the group H and the equality with [F , F ] ∩ R/[F , R] is the well known Hopf formula. It follows that Φ([c])x1,h1 · · · xn,hn (xσ(1),hσ(1) · · · xσ(n),hσ(n) )−1  = uh1 · · · uhn(uhσ(1) · · · uhσ(n) )−1 } {z z = c(h) c(hσ) = αh,σ Now, it is clear that z ∈ [F , F ] and moreover, by the condition we imposed on h and σ ∈ Sn, z ∈ R and hence z ∈ R ∩ [F , F ]. It is not difficult to show that modulo [F , R] all elements of M (H) are of this form (see [4], Lemma 11), and so, we readily see that the binomial identities of the twisted group algebra F cH determine uniquely the cohomology class [c]. We are ready to prove the necessity of the third condition in Theorem 1.8 for A to be strongly verbally prime, namely the cohomology class [c] is G-invariant. Recall that G acts on H 2(H, F ∗) via conjugation, that is for [β] ∈ H 2(H, F ∗) (g · β) (h1, h2) = β(gh1g−1, gh2g−1). Applying the isomorphism Φ one checks the cohomology class [c] is G−invariant if and only if (4.1) ∀g ∈ G : αh,σ = αghg−1,σ, for all αh,σ corresponding to the binomial identities {Zh,σ}. Lemma 4.11. Suppose A is strongly verbally prime with presentation (H, [c], g), g = ((g1, . . . , g1), (g2, . . . , g2), . . . , (gk, . . . , gk)) ∈ (Gmblock )k ≃ Gm. Then the class [c] is invariant under the action of G, i.e. 4.1 holds. Proof. First note that since 4.1 holds for g ∈ H (indeed, it is well known that the inner action of H induces a trivial action on H 2(H, F ∗)) it is sufficient to check the invariance of [c] for the action of elements from gset (a full set of H-coset representatives in G). Suppose this is not the case. Note that by using elementary moves on the presentation of A we may assume the tuple g is ordered so that (1) Equal cosets representatives are adjacent. (2) Elements gi which normalize the cohomology class [c] "stand on the left of the tuple" whereas gj's which do not normalize "stand on the right", that is there is 1 ≤ t0 < k such that gj normalizes [c] if 1 ≤ j ≤ t0 and gj does not normalize [c] if t0 < j ≤ k. Note that since e normalizes [c] we may assume g1 = e whereas (by our ordering) gk does not normalize [c]. Now, we know that the set of Binomial Identities of F γH determines the co- homology class γ (indeed, the Binomial identities generate the T -ideal of graded VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 17 identities and the latter determines γ). Moreover, if α and γ are different coho- mology classes of H 2(H, F ∗) we have IdH (F γH) * IdH (F αH). Let us fix for any such pair (α, γ) a binomial polynomial B(¯α, γ) which is an H-graded identity of F γH but a nonidentity of F αH. Furthermore, for any β ∈ H 2(H, F ∗) we let R(β) = Qγ6=β(B( ¯β, γ))), where the binomial polynomials are taken with disjoint sets of variables implying R(β) is multilinear. Note that since any twisted group algebra is a H-graded division algebra the polynomial R(β) is a nonidentity of F βH but an H-identity of F γH for any γ 6= β. block block block block , Ym2 , Ym2 Now, we proceed as in [AH]. Let p(Xm2 ) denote the central Regev polynomial on 2m2 block variables. Fixing h ∈ H, construct an H-graded polynomial ) by replacing one of ) which is obtained from p(Xm2 ph(Xm2 its X variables, say x1, by a variable x1,h homogeneous of degree h, and all other variables xi, 2 ≤ i ≤ m2 block are replaced by variables of degree e. Finally, we replace all variable of R(β) by Regev central polynomials. More precisely, we replace any variable in R(β) of degree h by a multilinear poly- nomial ph(Xm2 ) (as usual, different variables of R(β) are substituted by multilinear polynomial with disjoint sets of variables). We obtain a multilinear polynomial which we denote by R(β, mblock). block and yj, 1 ≤ j ≤ m2 , Ym2 , Ym2 block block block block For i = 1, . . . , k, consider the monomial of e-variables Zi = y(i) 0 x(i) 1 y(i) 1 · · · x(i) m2 block y(i) m2 block and let Z = Z1w1Z2 · · · wk−1Zk, where wi is a g−1 i higi+1−graded variable and hi ∈ H to be chosen (in fact any ele- ment of H will do). For i = 1, . . . , k, we insert in Z the polynomial R(gi([c]), mblock) on the right of Zi. We let Z = Z1R(g1([c]), mblock)w1Z2R(g2([c]), mblock) · · · wk−1ZkR(gk([c]), mblock). Finally, we let Θ be the multilinear polynomial obtained by alternating the set of e-variables X = {x(i) j } in Z. We claim (1) Θ is a G-graded nonidentity of A. (2) All evaluations of the G-graded polynomial Θ on A yield elements in R = 1 gi and span{F [c]H ⊗ e(i,j) g−1 k gj normalize the cohomology class [c]. Note that this is equivalent to r,s } where (i, j) satisfies the following condition: g−1 R(gi([c]), mblock) = R(g1([c]), mblock) and R(gj([c]), mblock) = R(gk([c]), mblock). (3) R2 = 0. Note that the lemma follows at once from the claim. Indeed, if we duplicate the polynomial Θ with different variables and denote them by Θ1 and Θ2, we obtain two homogeneous G-graded nonidentities with different variables whereas their product is an identity. To see the first part of the claim consider the evaluation of the monomials Zi, i = 1, . . . , k on the ith e-block of A. We then evaluate the polynomials R(gi([c]), mblock), i = 1, . . . , k, on the same block of A (the ith block). Finally, the variables wi, i = 1, . . . , k − 1 are evaluated at elements that bridge the ith and ith+1 diagonal VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 18 blocks. By construction the value of Z is nonzero. The polynomial Θ is obtained from Z by alternating the variables of X. Since any nontrivial permutation of these variables yields a zero value (the values of {yi j} do not match) we get a nonzero evaluation of Θ on A as desired. j} and {xi For the second part of the claim note that by the alternation the elements of X must be evaluated precisely on all e-elements of A as long as the value is nonzero. Moreover, since the variables yi j are also e-variables, the elements of Zi (and in particular the x's variables of Zi) must be evaluated on the same e-block of A, again as long as the evaluation is nonzero. But the presence of the polynomials R(gj([c]), mblock) in Θ implies the evaluation of Θ on A vanishes unless the mono- mial Zj, any j, is evaluated on a e-block whose index is j for which gj([c]) = gj([c]). In particular the monomials Z1 and Zk must be evaluated on e-blocks indexed by 1th and kth respectively. This proves part 2 of the claim. The 3rd part of the claim follows from the fact that 1 < k. This completes the proof of the claim and hence of the lemma. (cid:3) In order to complete the proof of Theorem 1.8 we need to show that if A is a finite dimensional G−simple algebra with presentation (H, [c], g), where (1) H is normal, (2) g = ((g1, . . . , g1), (g2, . . . , g2), . . . , (gk, . . . , gk)) ∈ (Gmblock )k ≃ Gm (3) [c] ∈ H 2(H, F ∗) is G invariant then A is strongly verbally prime. For the proof we shall replace the 3rd condition with an apparently stronger condition 3′ which we call the path property. After introducing that property, we will show firstly that 1 + 2 + 3′ is sufficient for strongly verbally prime and secondly that conditions 1 + 2 + 3 and 1 + 2 + 3′ are equivalent. For future reference let us state the following. Theorem 4.12. Let A be a finite dimensional G-simple algebra over F with pre- sentation PA = (H, α, g = (g1, . . . , gk)). Then condition 1 + 2 + 3 (Theorem 1.8) is equivalent to 1 + 2 + 3′ below. (1) The group H is normal in G. (2) The different cosets of H in G are represented exactly the same number of times in the k-tuple g = (g1, . . . , gk). In particular the integer k is a multiple of [G : H]. (3') The path property. Let us introduce the notation we need. Definition 4.13. (Good permutations and pure polynomials) For g ∈ G denote by g its image in G/H. We say the G−graded multilinear monomial Zσ = xσ(1),tσ(1) · · · xσ(n),tσ(n) is a good permutation of Z = x1,t1 · · · xn,tn if (1) (degZ =)t1 · · · tn = tσ(1) · · · tσ(n)(= degZσ). (2) For every 1 ≤ i ≤ n, t1 · · · ti = tσ(1) · · · tσ(σ−1(i))=i. A G-graded multilinear polynomial is said to be pure if all its monomials are good permutations of each other. Note 4.14. (1) Good permutation on monomials is an equivalence relation. VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 19 (2) If all variables degrees are in H, then the second condition says nothing. In that case good permutation reduces to Z, Zσ having the same G-degree. Our first step is to show that it is sufficient to consider pure polynomials when analyzing the T -ideal of G-graded identities of A. We assume the algebra A is G−simple with presentation (H, [c], g), where H is normal and g = ((g1, . . . , g1), (g2, . . . , g2), . . . , (gk, . . . , gk)) ∈ (Gmblock )k ≃ Gm. Lemma 4.15. Let p = Pσ∈Sn ασZσ be a multilinear G-graded polynomial. Let p = p1 + . . . + pq be the decomposition of p into its pure components. Then p is a G-graded identity of A if (and only if) pi is a G-graded identity of A for any i = 1, . . . , q. Proof. Since G-homogeneous components are linearly independent subspaces of A we may restrict our attention to monomials which have the same homogeneous degree so the first condition in the definition of good permutation is satisfied. We therefore let all monomials of p be homogeneous of degree g. Since the polynomial p is multilinear we can restrict evaluations to a spanning set of A and in particular to elements of the form bh,{i,j},E = uh ⊗ ei,j ⊗ E, where h ∈ H, i, j ∈ {1, . . . , [G : H]}, E ∈ Mr(F ). Note that the homogeneous degree of bh,{i,j},E is determined by uh ⊗ ei,j, namely g−1 i hgj, as the degree of E is trivial. Let xg be a variable of degree g. By our assumption, its admissible evaluations are elements bh,{i,j},E where g = g−1 i hgj. The following observations are important. (1) For any i ∈ {1, . . . , [G : H]} there exist h and j such that g = g−1 (2) h = h(i) and j = j(i) are uniquely determined. i hgj. This follows easily from the fact that {gj} is a full set of H-cosets representatives and gig ∈ ∪j Hgj. Let Z = xt1 xt2 · · · xtn . Following the above observations we choose any index i ∈ {1, . . . , [G : H]}. This determines h = h(i) and j = j(i) in any possible value of xt1 , that is xt1 is evaluated at bh(i),{i,j(i)},E, any E ∈ Mr(F ), where g−1 i h(i)gj(i) = t1 (i.e. the degree of bh(i),{i,j(i)},E is t1). It follows that if we insist on nonzero evaluations of the monomial Z, the evaluation of xt2 must be of the form bh′,{j(i),j ′},E ′ and so on. We see that the choice of i = i1 (for the evaluation of xt1 ) determines uniquely the triples (i1, j1, h1), . . . , (in, jn, hn). Note on the other hand that a monomial Z as above indeed admits nonzero evaluations with elements b1, . . . , bn where bν = bhν ,{iν ,jν },Eν for any choice i1 ∈ {1, . . . , [G : H]} (for instance any evaluation of the form where Et is invertible will do). Claim: Let Z = x1,t1 x2,t2 · · · xn,tn be a G-graded monomial as above and let (i1, j1, h1), . . . , (in, jn, hn) be n-triples such that the evaluation of Z with xtν ← bν = bhν ,{iν ,jν },Eν , ν = 1, . . . , n, is nonzero. Let Zσ = xσ(1),tσ (1)xσ(2),tσ (2) · · · xσ(n),tσ (n) be a monomial obtained by permuting the variables of Z with σ ∈ Sn. Suppose the total G- degrees of Z and Zσ coincide. Suppose also the evaluation above satisfies the following conditions (1) The evaluation does not annihilates Zσ (2) iσ(1) = i1 Then Z and Zσ are good permutations of each other. Consequently, jσ(n) = jn and eiσ(1),jσ(1) · · · eiσ(n),jσ(n) = ei1,j1 · · · ein,jn . VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 20 Let us complete the proof of the lemma using the claim. Suppose p1(xt1 , xt2 · · · xtn ) is a nonidentity. We need to show p(xt1 , xt2 · · · xtn ) is a nonindentity. Let xtν ← bν = bhν ,{iν ,jν },Eν , ν = 1, . . . , n be a nonzero evaluation of p1. The values of p1 are contained in one block, say block (i0, j(i0)) of the block permutation matrix which corresponds to g ∈ G. On the other hand, by the claim, the evaluations on ps, s > 1 are contained in blocks (i, j(i)), with i 6= io. This shows the evaluation of p is nonzero and we are done. Proof. (claim) Our setup implies the following: (1) j1 = i2, j2 = i3, . . . , jn−1 = in (2) jσ(1) = iσ(2), jσ(2) = iσ(3), . . . , jσ(n−1) = iσ(n) (3) i1 = iσ(1), jn = jσ(n) (4) t1 = g−1 Since we are assuming the monomials Z and Zσ have the same homogeneous degree in G, in order to prove the good permutation property we need to show the following condition holds. i2 hi2 gj2, . . . , tn = g−1 i1 hi1 gj1, t2 = g−1 hin gjn in If σ(l) = k then the values of the products of elements in G and i1 hi1 gj1 · g−1 g−1 i2 hi2 gj2 · · · g−1 ik−1 hik−1 gjk−1 g−1 iσ(1) hiσ(1) gjσ(1) · g−1 iσ(2) hiσ(2) gjσ(2) · · · g−1 iσ(l−1) hiσ(l−1) gjσ(l−1) coincide in G/H. Indeed, ignoring the elements of H and invoking the 1st and 2nd sets of equalities it is sufficient to show g−1 i1 gjk−1 = g−1 iσ(1) gjσ(l−1) . But g−1 i1 = g−1 iσ(1) by (3) and so it remains to show gjk−1 = gjσ(l−1) . By σ(l) = k, (1) and (2) above we have gjk−1 = gik = giσ(l) = gjσ(l−1) and we are done. This proves the claim and completes the proof of the lemma. (cid:3) Now we can introduce the path property. As usual we let A be a G-simple algebra with presentation (H, [c], g), where H is normal and g = ((g1, . . . , g1), (g2, . . . , g2), . . . , (gk, . . . , gk)) ∈ (Gmblock )k ≃ Gm. Let p(xt1 , . . . , xtn ) be a G-graded pure polynomial. Write (cid:3) p(xt1 , . . . , xtn ) = Z + Xe6=σ∈Λ(Z) ασZσ where Z = xt1 · · · xtn and Λ(Z) = {σ ∈ Sn : σ good permutation of Z}. Definition 4.16. (Path property). Notation as in lemma 4.15. (1) We say the polynomial p(xt1 , . . . , xtn ) satisfies the path property if the fol- lowing condition holds: If p vanishes whenever the evaluation of xt1 has the form uh(i1) ⊗ ei1,j(i1) ⊗ E for some index i1 ∈ {1, . . . , [G : H]} and E ∈ Mr(F ), then p is a G-graded identity of A. VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 21 (2) We say the G-simple algebra A satisfies the path property if any pure poly- nomial satisfies the path property. Roughly speaking, the condition says that if p is annihilated by choosing an "evaluation path", then it vanishes for all [G : H] paths and hence it is a G-graded identity. Proposition 4.17. Let A be a G-simple algebra with presentation (H, [c], g) as above (i.e. H is normal and g = ((g1, . . . , g1), (g2, . . . , g2), . . . , (gk, . . . , gk)) ∈ (Gmblock )k ≃ Gm.) Then A is strongly verbally prime if and only if satisfies the path property. Proof. Suppose the path property does not hold. Then there exists a g-homogeneous pure polynomial p which vanishes on all evaluations arising from one path, say i1 ∈ {1, . . . , [G : H]} but is a nonidentity of A. For any j ∈ {1, . . . , [G : H]} there exists a suitable pure polynomial pj obtained by changing the scalars coefficients of p (depending on the evaluation path j) such that pj is clearly a nonidentitity and vanishes on evaluations corresponding to the jth path (see remark below). Taking disjoint variables on different pj's we see that the product p1 · · · p[G:H] vanishes on all paths and hence is an identity whereas pj, j = 1, . . . , [G : H], is a nonidentity. This shows A is not strongly verbally prime. Remark 4.18. Since we don't really need the above direction details are omitted. For the converse suppose A satisfies the path property. We let p and q be mul- tilinear G-graded homogeneous polynomial nonidentities of A with disjoint sets of variables. We need to show p · q is a nonidentity. Claim 4.19. We may assume p and q are pure polynomials Proof. To see this, let p = p1 + · · ·+ pr and q = q1 + · · ·+ qs be the decomposition of p and q into its pure components. Observe that since p and q are defined on disjoint sets of variables, the decomposition pq =Pi,j pi · qj is precisely the decomposition of pq into its pure components. Now suppose the sufficiency in the proposition holds for pure polynomials and let p and q be multilinear homogeneous nonidentities. We show pq is a nonidentity of A. But by Lemma 4.15 this reduces to pure polynomials and the claim is proved. (cid:3) ασZσ and q(y1, . . . , ym) =Pτ ∈∆q So let p and q be multilinear, nonidentities pure polynomials where p(x1, . . . , xn) = βτ Wτ . Choose i ∈ {1, . . . , [G : H]} and consider evaluations of p of the form uh ⊗ ek,s ⊗ E corresponding to the path deter- mined by i. Since the monomials of p are good permutations of each other, for any σ ∈ ∆p there is a scalar γσ ∈ F ∗ such that all evaluations corresponding to the ith γσασZσ is a polynomial identity of Mr(F ). Now, we are assuming the algebra A satisfies the path property and hence, since p is a nonidentity, for any path, say the path deter- mined by i ∈ {1, . . . , [G : H]}, there exists an evaluations of the form uh ⊗ ek,s ⊗ E Pσ∈∆p path annihilate p if and only if the ungraded polynomial pi =Pσ∈∆p which does not annihilate p =Pσ ασZσ and hence pi is a nonidentity of Mr(F ). In order to show pq is a nonidentity we choose an evaluation of q which corresponds to the path j = j(i) determined by the chosen path for p and let qj be the corre- sponding polynomial. We obtain the product pq is a graded identity if and only if piqj is an ungraded identity of Mr(F ). Invoking the path property of A, we have VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 22 the polynomial qj is an ungraded nonidentity of Mr(F ) and so, being both pi and qj nonidentities and Mr(F ) verbally prime, the product piqj is a nonidentity and we are done. (cid:3) In order to complete the proof the of Theorem 1.8 it remains to show that the conditions 1 + 2 + 3 and 1 + 2 + 3′ (see paragraph before Definition 4.13) are equivalent. In fact, since we have seen already that a finite dimensional G-simple algebra A which satisfies the condition 1 + 2 + 3′ is strongly verbally prime, it remains to show 1 + 2 + 3 implies 1 + 2 + 3′. At first, we will consider a simpler case, namely we will assume A = F cH ⊗ M[G/H](F ), where H is normal in G, β is a G invariant cocycle and [G/H] stands for a transversal of H in G containing e (i.e. each element of [G/H] appears exactly once in g, the tuple which provides the elementary grading on A). We need to show condition 3′ holds. Claim: It is sufficient to show the following Proposition 4.20. Notation as above. For every Z = xg1 · · · xgn and every good permutation σ ∈ Sn, there is a scalar s ∈ F × such that Z − sZσ ∈ IdG(A) (Zσ = xgσ(1) · · · xgσ(n) ). Acknowledgment 4.21. We are thankful to Darrell Haile for his contribution to the proof of this important proposition. Let us prove condition 3′ assuming the proposition. Let p(xg1 , . . . , xgn ) = PσΛ βσZσ be a pure polynomial. Note that βσ may be zero. We need to show that if p vanishes on one path, it vanishes on every path and hence it is a G-graded iden- tity. Clearly, we may assume βe = 1. We proceed by induction on the number k0 of nonzero coefficients βσ in p and so by way of contradiction we assume p is a minimal counter example. Note that k0 > 1 since any multilinear monomial does not vanish βσ1 , βσ2 6= 0. Let s = sσ1 be such that Z − sZσ is a G-graded identity. It follows on any path. Suppose k0 ≥ 3 and let p = Z+βσ1Zσ1 +βσ2 Zσ2 +Pτ ∈Λ\{e,σ1,σ2} βτ Zτ , that (βσ1 − s)Zσ1 +Pτ ∈Λ\{e,σ1,σ2} βτ Zτ doesn't satisfy the path property. Contra- diction to the minimality of p. So we need to show the path property is satisfied by pure polynomials of the form p = Z + βσZσ where βσ 6= 0. But again, if βσ 6= s, p does not vanish on any evaluation path and the claim follows. Proof. (of Proposition) Write g(i) for [g1 · · · gi] and g(0) = e. Here [g] ∈ [G/H] is the corresponding element to g ∈ G. Let Z = xg1 · · · xgn and Z = xgσ(1) · · · xgσ(n) be good permutations of each other. Then gσ(1) · · · gσ(n) = g1 · · · gn and (4.2) for i = 1, . . . , n. By setting σ(0) = 0 we get equivalently (4.3) for i = 1, . . . , n. Fix t ∈ [G/H]. For i = 1, . . . , n we evaluate xgi by u[tg(i−1)]gi[tg(i)]−1⊗e[tg(i−1)],[tg(i)] and obtain that Z, under this substitution, is equal to g(σ(i)) =cgσ(i) := [gσ(1) · · · gσ(i)] g(σ(i) − 1) =cgσ(i − 1) u[tg(i−1)]gi[tg(i)]−1! ⊗ et,[tg(n)]. nYi=1 VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 23 Next, let αi,t ∈ H (i = 0, . . . , n) be such that [tg(i)] = αi,tt[g(i)]. So (4.4) hi,t := [tg(i − 1)]gi[tg(i)]−1 = = αi−1,t · t ·(cid:0)[g(i − 1)]gi[g(i)]−1(cid:1) } {z fi∈H · t−1 · α−1 i,t = αi−1,tf t i α−1 i,t , where α0,t = e and ασ(n),t = [tg(σ(n)][g(σ(n)]−1t−1 = [tg(n)][g(n)]−1t−1 = αn,t. Lemma 4.22. Every fi is independent of t and we have the equality f t 1 · · · f t n = f t σ(1) · · · f t σ(n). Proof. By 4.2 and 4.3, for i = 1, . . . , n. Hence, σ(1) · · · f t f t g(σ(i − 1)) =cgσ(i − 1) = g(σ(i) − 1) [g(σ(i) − 1)]gσ(i)[g(σ(i))]−1!t [g(σ(i − 1))]gσ(i)[g(σ(i))]−1!t σ(n) = nYi=1 = nYi=1 = (g1 · · · g−1 n · [g(n)−1])t = f t 1 · · · f t n. =(cid:0)gσ(1) · · · gσ(n) · [g(n)−1](cid:1)t Lemma 4.23. For i = 1, . . . , n (cid:3) (4.5) As a result, (4.6) ασ(i)−1,t = ασ(i−1),t hσ(i),t = ασ(i−1),tf t σ(i)α−1 σ(i),t Proof. We saw in the previous proof that g(σ(i − 1)) = g(σ(i) − 1) for i = 1, . . . , n. Thus, ασ(i−1),t = [tg(σ(i−1))][g(σ(i−1))]−1t−1 = [tg(σ(i)−1)][g(σ(i)−1)]−1t−1 = ασ(i)−1,t. Thus, hσ(i),t = ασ(i)−1,tf t σ(i)α−1 σ(i),t = ασ(i−1),tf t σ(i)α−1 σ(i),t. Next, for i = 1, . . . , n uhi,t = uαi−1,tf t i α−1 i,t = 1 c(αi−1,t, f t i )c(αi−1,tf t i , α−1 i,t ) (cid:3) · uαi−1,t · uf t i · uα−1 i,t . As a result, uh1,t · · · uhn,t = nYi=1 Using 4.6 and 4.4 we compute 1 c(αi−1,t, f t i )c(αi−1,tf t i , α−1 i,t )! nYi=1 c(αi,t, α−1 i,t )!·uf t 1 · · · uf t n·uα−1 n,t . VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 24 uσ(h1,t) · · · uσ(hn,t) = nYi=1 1 c(ασ(i−1),t, f t σ(i))c(ασ(i−1),tf t σ(i), α−1 σ(i),t)! nYi=1 c(ασ(i),t, α−1 σ(i),t)!·uf t · · · uf t σ(n) ·uα−1 n,t . σ(1) Hence, for every t ∈ [G/H], we have where s(f t 1, . . . , f t uh1,t · · · uhn,t = s(f t n) ∈ F × satisfies 1, . . . , f t n) · uσ(h1,t) · · · uσ(hn,t), uf t 1 · · · uf t n = s(f t 1, . . . , f t n) · uf t σ(1) · · · uf t ′ σ(n) . However, since we assumed that [c] is invariant under G, we must have that s(f t 1, . . . , f t n) = s(f1, . . . , fn). This completes the proof of the proposition and hence the implication 1+2+3 ⇒ (cid:3) 1 + 2 + 3′ in case r = 1. 5. G−graded division algebras In this section we prove 1) Theorem 1.12. 2) 1 + 2 + 3 ⇒ 1 + 2 + 3′ where r is arbitrary (Theorem 4.12). 3) Theorem 1.14. Proof. (of 1.12) One direction is easy. Suppose such B exists. Since A and B have the same G-graded identities it is sufficient to show that products of multilinear nonidentities of B with disjoint sets of variables is a nonidentity of B. But this is clear since p and q have nonzero (invertible) evaluations on B and hence also their product pq. We proceed now to show that such a B exists provided the algebra A is G-graded strongly verbally prime. We will show that the corresponding generic G-simple algebra is a G-graded division algebra. We consider an affine relatively free G-graded algebra UG = F hXGi/IdG(A) corresponding to A with IdG(UG) = IdG(A) (it is known that such algebra exists (see subsection 7.1, [1])). Here XG is a finite set of G-graded variables. We claim UG is semisimple, that is the Jacobson radical J = J(UG) is zero. Indeed, we know by Braun-Kemer-Razmyslov theorem J is nilpotent. Moreover, the Jacobson radical is G-graded (see [9]) and hence this would contradict the strongly verbally prime condition on A unless J = 0. Let Z(U ) denote the center of U and Z(U )e the central e-homogeneous elements. Note: the center Z(U ) is not graded in general. Lemma 5.1. 1) There exist e-homogeneous central polynomials, that is Z(U )e 6= 0. 2) Z(U )e has no nontrivial zero divisors as elements of U . Proof. Both statements were proved in [11] (see Theorem 3.12, Lemma 5.4). Nev- ertheless, we recall the proof of the second statement since a similar argument will be used later. Let p be a central e-homogeneous nonidentity and q an arbitrary homogeneous nonidentity. Note that we are not assuming further conditions on p and q, and in particular no assumption was made on the sets of variables of p and q. We claim, we may assume that p and q are multihomogeneous (each variable VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 25 appears in any monomial with the same multiplicity). To see this put an ordering on the variables which appear either in p or q. Counting variables multiplicities we order lexicographically the monomials in p and q respectively. Let p = p1 + . . . + pr and q = q1 + · · · + qs be the decomposition of p and q into its multihomogeneous constituents where p1 < . . . < pr and q1 < . . . < qs. Suppose pq is a G-graded identity. It follows that its homogeneous constituent are G-graded identities and in particular p1q1 is a G-graded identity. This proves the claim. Let Vp and Vq denote the set of variables appearing in p or q respectively. Let V = Vp ∪ Vq and let n = card(V). An evaluation of p (or q) is a choice of an element in An = F d, where d = dimF (A) × n. Let Ap = {z ∈ An : p(z) 6= 0} and Bq = {z ∈ An : q(z) = 0}. Note that Ap is an open nonempty (and hence dense) subset of An in the Zariski topology whereas Bq is a closed set 6= An. Since p take values in Z(A)e = F , pq being an identity is equivalent to Ap ⊆ Bq which is impossible. This proves the second part of the lemma. (cid:3) Consider the central localization AG = (Z(U )e − {0})−1UG. We obtain that Z(AG)e = F rac(Z(U )e) is a field and we denote it by K. Invoking [11], Corollary 4.7 (Posner's theorem for G-graded algebras), we obtain a finite dimensional algebra G-simple over K. We need to show the e-component (AG)e is an (ordinary) division algebra. Since the e-component is finite dimensional over K we need to show there are no nontrivial zero divisors in (AG)e. Suppose this is not the case and let p and q be e−polynomials, nonidentities, whose product is zero (obtained by clearing denominators). Lemma 5.2. We may assume the polynomials p and q are multihomogeneous. Proof. Same as above. (cid:3) Recall that {ue ⊗ ei,i ⊗ E}i∈{1,...,[G:H]},E∈Mr(F ) is a spanning set of the e- homogeneous component of A. We refer to Ae,i = spanF {ue ⊗ ei,i ⊗ E} as the ith component of Ae, i = 1, . . . , [G : H]. Claim: Evaluations of any nonidentity e-polynomial on the algebra A yield nonzero values on every component of Ae. More precisely, if we denote by Pi the projection Ae → Ae,i, then for any i the evaluation set of Pip on A is nonzero. Let us complete the proof of the Theorem using the claim. We let Ap,i = {z ∈ An : Pip(z) 6= 0} and Bq,i = {z ∈ An : Piq(z) = 0}. As Ap,i is nonempty and open, Bq,i 6= An and closed, we have Ap,i * Bq,i. This shows Pipq = Pip · Piq : An → Mr(F ) is a nonzero polynomial function and we are done. We turn now to the proof of the claim. We'll see that basically the claim follows from the path property which is known to hold for A by Proposition 4.17. Suppose first p is e-homogeneous and pure. We know that if p does not vanish on a certain path, say the i-th path, it does not vanish on any path j ∈ {1, . . . , [G : H]}. Furthermore, we saw that different paths yields values on different diagonal blocks and so the claim is clear in this case. Suppose now p is multilinear and let p = p1 + . . . + pq be the decomposition of p into its pure components. Let Z be a monomial of p1 say and suppose it does not vanish on a certain path evaluation. Let Zσ be a monomial in p which obtained from Z by the permutation σ ∈ Sn. If Zσ is a good permutation of Z then they are constituents of the same pure polynomial, the case we considered above. Otherwise, applying the claim in the proof of Lemma 4.15 we know Z and Zσ get values on different blocks (this includes the case the evaluation annihilates Zσ). This establishes the claim in case p is multilinear. VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 26 Finally, we suppose p is multihomogeneous and proceed by induction on its mul- tihomogeneous degree. Suppose p(x1, x2 . . . , xn) is multihomogeneous where vari- ables x1, . . . , xn appear in degree k1, . . . , kn respectively. Without loss of generality we may assume k1 ≥ k2 ≥ · · · ≥ kn. Clearly we may view the tuple (k1, . . . , kn) as a partition of m =Ps ks. Put x1 = t1 + · · · + tk1 and let ¯p(t1, . . . , tk1 , x2, . . . , xn) = p((t1 + . . . + tk1 ), x2, . . . , xn). Since Pip(x1, x2, . . . , xn) = 0, we have that Pi ¯p(t1, . . . , tk, x2, . . . , xn) = 0 and hence also Pi ¯p(tj , x2, . . . , xn) = 0, for j = 1, . . . , k1. It follows that Pi(¯p(t1, . . . , tk1 , x2, . . . , xn) − p(tj, x2, . . . , xn)) = 0 k1Xj=1 where ¯p(t1, . . . , tk, x2, . . . , xn) −Pj p(tj, x2, . . . , xn)) is a sum of multihomogeneous polynomials of degree m whose multihomogeneous degrees are strictly smaller than (k1, . . . , kn). The proof is completed by induction. Thus, we have proved the algebra AG = (Z(U )e − {0})−1UG is a finite dimen- sional G-graded division algebra over the field K = Z(AG)e. It remains to show the algebra AG is a twisted form of A. But this is clear since by construction IdG(AG) = IdG(A) = Γ and finite dimensional G-graded simple algebras over an algebraically closed field are determined up to a G-graded isomorphism by the T -ideal of G-graded identities. (cid:3) We still owe the reader the proof of the implication 1 + 2 + 3 ⇒ 1 + 2 + 3′ in the general case, namely in case A = F cH ⊗ M[G/H](F ) ⊗ Mr(F ), r ≥ 1. Interestingly, we complete the proof of that implication (2 → 3 below) applying Theorem 1.12. For convenience, we summarize our main results in the following Theorem. Theorem 5.3. Let Γ ⊂ F hXGi be a G-graded T -ideal which contains a Capelli polynomial. The following conditions are equivalent: (1) Γ is strongly verbally prime. (2) There exists a finite dimensional algebra G-simple algebra A = F cH ⊗ M[G/H](F ) ⊗ Mr(F ) which satisfies conditions 1 + 2 + 3 of Theorem 1.8 such that IdG(A) = Γ. (3) There exists a finite dimensional algebra G-simple algebra A = F cH ⊗ M[G/H](F ) ⊗ Mr(F ) which satisfies conditions 1 + 2 + 3′ of Theorem 4.12 such that IdG(A) = Γ. (4) There exists a field K ⊇ F and a finite dimensional G-graded division algebra B over K with IdG(B) = Γ. Furthermore (1) The G-simple algebra A in (2) and (3) is uniquely determined. (2) The finite dimensional G-graded division algebra B (in 3) is uniquely de- termined in the following sense: Any two such algebras are twisted forms of each other, that is, if B′ is a finite dimensional G-graded division algebra over K ′ with IdG(B′) = Γ, then there exists a field extension E of K and K ′ such that B ⊗K E ∼= B′ ⊗K ′ E as G-graded algebras. Proof. Note that we have shown that 1 → 2 in the first part of section 4 (Lemma 4.4, Proposition 4.6 and Lemma 4.11). The equivalence 3 ↔ 1 is stated and proved VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 27 in Proposition 4.17. Above in this section, we showed 1 ↔ 4 and in last part of section 4 (Proposition 4.20) we showed 2 → 3 in case r = 1. Let A = F cH ⊗ M[G/H](F ) ⊗ Mr(F ) and suppose it satisfies conditions 1 + 2 + 3 of Theorem 1.8. Clearly, the proof will be completed if we show that A admits a twisted form which is a G-graded division algebra. Consider the algebra A0 = F cH ⊗ M[G/H](F ). Clearly it satisfies 1 + 2 + 3 of Theorem 1.8 and since here r = 1 it admits a finite dimensional G-graded twisted form B0 over a field K0 which is a G-division algebra. All we need to do now is to find a field K and G-graded division algebra B over some field K which is a twisted form of A. Since B0 is a G-graded division algebra over K0 and since its e-component is commutative, we have that L0 = (B0)e is a finite field extension of K0. Clearly, we may extend scalars to K0(t, s) (the rational function field over K0 on ideterminates t and s) and obtain a G-graded division algebra (B0)K0(t,s) which is also a twisted form of A0. It remains to prove there exists an ungraded division algebra D of index r over K0(t, s) which remains a division algebra after extending scalars to L0(t, s). Since F is algebraically closed of characteristic zero, it contains a primitive rth root of unity µr and so we may consider the symbol algebra (t, s)r = hur = t, vr = s, vu = µruvi over K0(t, s). It is easy to prove that ((t, s)r)L0(t,s) is a division algebra and we are done. Details are left to the reader. Finally, for the uniqueness (second part of the theorem) we invoke once again the fact that any two G-graded simple algebras over an algebraically closed field F of characteristic zero are G-graded isomorphic if and only if they satisfy the same G-graded identities (see [3]). (cid:3) We close the paper with the proof of Theorem 1.14. Proof. Suppose A is a finite dimensional G-graded division algebra over a field K and let p and q be G-homogeneous polynomials such that p and q /∈ IdG(A). If pq ∈ IdG(A) we have that Ap = {z ∈ An : p(z) 6= 0} ⊆ Bq = {z ∈ An : q(z) = 0}. But this is impossible since Ap is nonempty and open whereas Bp 6= An and closed. For the opposite direction note that our condition on polynomials p and q implies A is G-prime and hence by Theorem 1.5 A is G-graded PI equivalent to a finite dimensional G-simple algebra. On the other hand the condition on p and q implies A is strongly G-graded verbally prime. Invoking Theorem 1.8 and Theorem 4.12 the result follows. (cid:3) References [1] E. Aljadeff, A. Kanel-Belov, Representability and Specht problem for G−graded algebras, Adv. Math. 225 (2010), no. 5, 2391–2428. 2, 7, 8, 9, 24 [2] E. Aljadeff and O. David, On group gradings on PI-algebras, Journal of Algebra 428 (2015) 403–424. 11 [3] E. Aljadeff and D. Haile, Simple G-graded algebras and their polynomial identities, Trans. Amer. Math. Soc. 366 (2014), 1749–1771. 10, 15, 27 [4] E. Aljadeff, D. Haile and M. Natapov, Graded identities of matrix algebras and the universal graded algebr, Trans. Amer. Math. Soc. 362 (2010), 3125–3147. 15, 16 [5] S.A. Amitsur, The T-ideals of the free ring. J. London Math. Soc. 30 (1955), 470-475. 1 [6] Y. Bahturin, S. K. Sehgal and M. Zaicev, Finite-dimensional simple graded algebras. (Rus- sian), Mat. Sb., 199(7), (2008), 21–40; translation, Sb. Math., 199(7), (2008), 965–983. 3 VERBALLY PRIME T-IDEALS AND GRADED DIVISION ALGEBRAS 28 [7] A. Berele and J. Bergen, P.I. algebras with Hopf algebra actions, J. Algebra 214 (1999), no. 2, 636–651. 3, 5 [8] O. M. Di Vincenzo, Z2-graded polynomial identities of verbally semiprime algebras. Comm. Algebra 27 (1999), no. 5, 2031–2044. 3 [9] M. Cohen, S. Montgomery, Group-graded rings, smash products, and group actions, Trans. Amer. Math. Soc. 282 (1) (1984) 237–258. 8, 24 [10] A. Giambruno, M. Zaicev, Polynomial Identities and Asymptotic methods, AMS Mathemat- ical Surveys and Monographs 122, Providence, R.I., 2005. 1, 9 [11] Y. Karasik G-graded central polynomials and G-graded Posner's theorem, arXiv:1610.03977 2, 3, 24, 25 [12] A. R. Kemer Varieties and Z2-graded algebras. (Russian) Izv. Akad. Nauk SSSR Ser. Mat. 48 (1984), no. 5, 1042–1059. 2 [13] P. Koshlukov and M. Zaicev, Identities and isomorphisms of graded simple algebras, Linear Algebra Appl. 432 (2010), no. 12, 3141–3148. 10 Department of Mathematics, Technion - Israel Institute of Technology, Haifa 32000, Israel E-mail address: aljadeff 'at' tx.technion.ac.il (E. Aljadeff), E-mail address: yaakov 'at' tx.technion.ac.il (Y. Karasik).
1007.4118
1
1007
2010-07-23T12:57:27
Hom-power associative algebras
[ "math.RA" ]
A generalization of power associative algebra, called Hom-power associative algebra, is studied. The main result says that a multiplicative Hom-algebra is Hom-power associative if and only if it satisfies two identities of degrees three and four. It generalizes Albert's result that power associativity is equivalent to third and fourth power associativity. In particular, multiplicative right Hom-alternative algebras and non-commutative Hom-Jordan algebras are Hom-power associative.
math.RA
math
HOM-POWER ASSOCIATIVE ALGEBRAS DONALD YAU Abstract. A generalization of power associative algebra, called Hom-power associative algebra, is studied. The main result says that a multiplicative Hom-algebra is Hom-power associative if and only if it satisfies two identities of degrees three and four. It generalizes Albert's result that power associativity is equivalent to third and fourth power associativity. In particular, multiplicative right Hom-alternative algebras and non-commutative Hom-Jordan algebras are Hom-power associative. 1. Introduction Power associative algebras were first systematically studied by Albert [1, 2]. These non-associative algebras play an important role in the studies of associative bilinear forms, loops, the Cayley-Dickson algebras, and Banach algebras, among many other subjects [3, 6, 14]. A power associative algebra can be defined conceptually as an algebra in which every element generates an associative sub-algebra. Equivalently, power associative algebras can be algebraically characterized as follows. For an element x in an algebra A, define the right powers for n ≥ 1. Then an algebra A is power associative if and only if x1 = x and xn+1 = xnx xn = xn−ixi (1.0.1) (1.0.2) for all x ∈ A, n ≥ 2, and i ∈ {1, . . . , n − 1}. Therefore, one can also think of (1.0.2) as the defining identities for power associative algebras. If A satisfies (1.0.2) for a particular integer n, then A is called nth power associative. A theorem of Albert [1] says that (in characteristic 0, which is assumed throughout this paper) an algebra is power associative if and only if it is third and fourth power associative, which in turn is equivalent to x2x = xx2 and x4 = x2x2 (1.0.3) for all elements x. Associative algebras are clearly power associative, but the class of power associative algebras in- cludes some important classes of non-associative algebras. For example, alternative algebras and Jordan algebras are all power associative because they satisfy (1.0.3). In fact, right-alternative and non-commutative Jordan algebras are power associative algebras (Corollary 5.7). Therefore, power associative algebras are common generalizations of right-alternative algebras and non-commutative Jordan algebras. Moreover, there exist power associative algebras that are neither alternative nor Date: September 4, 2018. 2000 Mathematics Subject Classification. 17A05, 17A15, 17A20, 17D15. Key words and phrases. Hom-power associative algebra, right Hom-alternative algebra, noncommutative Hom-Jordan algebra, sedenions. 1 2 DONALD YAU non-commutative Jordan. One such power associative algebra is the sedenions, which is the sixteen- dimensional algebra constructed from the octonions via the Cayley-Dickson process with the parameter −1 (Example 2.7). The purpose of this paper is to study a generalization of power associative algebras, called Hom-power associative algebras, in which the defining identities (1.0.2) are relaxed by a certain linear self-map, called the twisting map. Hom-type algebras appeared in [8] in the form of Hom-Lie algebras, in which the Jacobi identity is relaxed by a twisting map, to describe the structures on some deformations of the Witt and the Virasoro algebras. Hom-Lie and Hom-associative algebras are further studied in [11, 12, 15, 16] and the references therein. Hom-type generalizations of other algebraic structures, including quantum groups, the Yang-Baxter equations, Novikov algebras, and Lie and infinitesimal bialgebras, can be found in [17] - [29] and the references therein. One reason for considering Hom-power associative algebras is that the class of Hom-power associative algebras has a certain closure property with respect to twisting by self-morphisms that the class of power associative algebras does not have. Moreover, Hom-power associative algebras retain some important properties of power associative algebras. For example, the main result of this paper says that when the twisting map is multiplicative, Hom-power associativity, which involves infinitely many defining identities, is equivalent to the Hom-versions of the two identities (1.0.3). As a consequence of this result, multiplicative right Hom-alternative algebras and non-commutative Hom-Jordan algebras are Hom-power associative. The rest of this paper is organized as follows. In section 2 we define Hom-type analogues of the right powers and power associativity, called Hom- powers and Hom-power associativity. The closure property mentioned above is discussed in Theorem 2.4. It says that a Hom-power associative algebra gives rise to another one when its structure maps (the multiplication and the twisting map) are both twisted by any self-morphism. If this twisting construction is applied to a power associative algebra, regarded as a Hom-power associative algebra with identity twisting map, the result is a multiplicative Hom-power associative algebra (Corollary 2.6) that is usually not power associative. We illustrate this result in Example 2.7 with the sedenions. Given any Hom-algebra A, one can associate a family of Hom-algebras A(λ) with the same underlying vector space, where λ is any parameter in the ground field, in which the multiplication is an interpolation between those in A and its opposite algebra. We show that when A is Hom-power associative, the Hom-powers in A and A(λ) coincide (Theorem 2.9), and A(λ) is also Hom-power associative (Corollary 2.10). In preparation for the main result in section 5, in sections 3 and 4 we study third and fourth Hom-power associativity, respectively. In Theorem 3.2 several characterizations of third Hom-power associativity are given. One consequence of this result is that up to (n − 1)st Hom-power associativity implies certain commutative identities involving the Hom-powers xn−i and xi (Proposition 3.4). It is also observed that the intersection of the classes of third Hom-power associative algebras and of Hom- Lie admissible algebras is precisely the class of A3-Hom-associative algebras (Theorem 3.9). This last result is not used in later sections. In section 4 it is observed that multiplicative right Hom-alternative and non-commutative Hom- Jordan algebras are third and fourth Hom-power associative (Proposition 4.4). A conceptual difference between power associative algebras and Hom-power associative algebras is discussed (Examples 4.5 and HOM-POWER ASSOCIATIVE ALGEBRAS 3 4.6). Theorem 4.8 provides the linearized form of the identity x4 = α(x2)α(x2), which is part of fourth Hom-power associativity. This result is crucial to the proof of the main result. The main result of this paper (Corollary 5.2) is proved in section 5. It says that for a multiplicative Hom-algebra, Hom-power associativity is equivalent to up to fourth Hom-power associativity, which in turn is equivalent to two identities involving the first few Hom-powers. In particular, for a multiplicative Hom-flexible algebra, Hom-power associativity is equivalent to one identity (Corollary 5.4). Another consequence of the main result is that multiplicative right Hom-alternative and non-commutative Hom- Jordan algebras are Hom-power associative (Corollary 5.6). 2. Basic properties of Hom-power associative algebras In this section we introduce Hom-power associative algebras and provide some basic construction results and examples. 2.1. Notations. Throughout the rest of this paper, we work over a fixed field k of characteristic 0. If V is a k-module and µ : V ⊗2 → V is a bilinear map, then µop : V ⊗2 → V denotes the opposite map, i.e., µop = µτ , where τ : V ⊗2 → V ⊗2 interchanges the two variables. For x and y in V , we sometimes write µ(x, y) as xy. For a linear self-map α : V → V , denote by αn the n-fold composition of n copies of α, with α0 ≡ Id. The symmetric group on n letters is denoted by Sn. A multi-linear map f : V ⊗n → V is said to be totally anti-symmetric if f = (−1)ε(σ)f ◦ σ for all σ ∈ Sn, where ε(σ) is the signature of σ. Let us begin with the basic definitions regarding Hom-algebras. Definition 2.2. (1) By a Hom-algebra we mean a triple (A, µ, α) in which A is a k-module, µ : A⊗2 → A is a bilinear map (the multiplication), and α : A → A is a linear map (the twisting map). Such a Hom-algebra is often abbreviated to A. (2) A Hom-algebra (A, µ, α) is multiplicative if α is multiplicative with respect to µ, i.e., αµ = µα⊗2. (3) A Hom-algebra (A, µ, α) is commutative if its multiplication is commutative, i.e., µ = µop. (4) Let A and B be Hom-algebras. A morphism f : A → B of Hom-algebras is a linear map f : A → B such that f µA = µBf ⊗2 and f αA = αBf . If (A, µ) is any algebra, then we also regard it as a Hom-algebra (A, µ, Id) with identity twisting map. Next we define the Hom-versions of Albert's right powers and power associativity [1, 2]. Definition 2.3. Let (A, µ, α) be a Hom-algebra and x ∈ A. (1) Define the nth Hom-power xn ∈ A inductively by for n ≥ 2. x1 = x, xn = xn−1αn−2(x) (2.3.1) 4 DONALD YAU (2) We say that A is nth Hom-power associative if xn = αn−i−1(xi)αi−1(xn−i) (2.3.2) for all x ∈ A and i ∈ {1, . . . , n − 1}. (3) We say that A is up to nth Hom-power associative if A is kth Hom-power associative for all k ∈ {2, . . . , n}. (4) We say that A is Hom-power associative if A is nth Hom-power associative for all n ≥ 2. Some remarks are in order. First, if α = Id in Definition 2.3, then xn = xn−1x, which coincides with Albert's notion of right power [1, 2]. Moreover, in this case, nth Hom-power associativity reduces to nth power associativity, i.e., xn = xixn−i for 1 ≤ i ≤ n − 1. Therefore, a power associative algebra is equivalent to a Hom-power associative algebra whose twisting map is the identity map. Second, the first few Hom-powers are x2 = xx, x3 = x2α(x) = (xx)α(x), x1 = x, x4 = x3α2(x) = (x2α(x))α2(x) = ((xx)α(x))α2(x), x5 = x4α3(x) = (cid:0)(x2α(x))α2(x)(cid:1) α3(x) = (cid:0)((xx)α(x))α2(x)(cid:1) α3(x). Note that the i = n − 1 case of nth Hom-power associativity (2.3.2) is automatically true because it says xn = xn−1αn−2(x), which holds by definition. It is included in the definition for symmetry. Moreover, every Hom-algebra is automatically second Hom-power associative, since with n = 2 the condition (2.3.2) says x2 = xx, which holds by definition. Therefore, the first nontrivial case is third Hom-power associativity, which will be studied in the next section. Third, by definition nth Hom-power associativity (2.3.2) requires n − 1 identities. Under certain commutative conditions, the number of identities that need to be satisfied for nth Hom-power associa- tivity can be reduced by half. In fact, the two factors αn−i−1(xi) and αi−1(xn−i) on the right-hand side of (2.3.2) are related by an interchange of i and n − i. Therefore, if these two elements commute for all i ∈ {1, . . . , n − 1}, then nth Hom-power associativity reduces to n/2 or (n − 1)/2 identities, according to whether n is even or odd. These commutative conditions will appear in Proposition 3.4, which will be used in the proof of Theorem 5.1. Our first result says that the category of (nth) Hom-power associative algebras is closed under twisting by self-morphisms. Theorem 2.4. Let (A, µ, α) be a Hom-algebra and β : A → A be a morphism. Define the Hom-algebra Aβ = (A, µβ = βµ, βα). (2.4.1) Then the following statements hold. (1) If A is multiplicative, then so is Aβ. (2) We have (2.4.2) for all x ∈ A and n ≥ 1, where xn and (xn)′ are the nth Hom-powers in A and Aβ, respectively. (3) If A is nth Hom-power associative, then so is Aβ. Therefore, if A is Hom-power associative, (xn)′ = βn−1(xn) then so is Aβ. HOM-POWER ASSOCIATIVE ALGEBRAS 5 Proof. The first assertion regarding multiplicativity is obvious. The second assertion is proved by induction, with the n = 1 case being trivially true. For the induction step, suppose that (2.4.2) is true. Using the fact that β is a morphism, we have (xn+1)′ = µβ((xn)′, (βα)n−1(x)) = µβ(βn−1(xn), βn−1αn−1(x)) = βnµ(xn, αn−1(x)) = βn(xn+1). This finishes the induction and proves the second assertion. For the last assertion, assume that A is nth Hom-power associative and i ∈ {1, . . . , n − 1}. We must show (2.3.2) for Aβ. Using (2.4.2) and the fact that β is a morphism, we have (xn)′ = βn−1(xn) = βn−1µ(αn−i−1(xi), αi−1(xn−i)) = µβ(βn−2αn−i−1(xi), βn−2αi−1(xn−i)) = µβ (cid:0)(βα)n−i−1(βi−1(xi)), (βα)i−1(βn−i−1(xn−i))(cid:1) = µβ (cid:0)(βα)n−i−1(xi)′, (βα)i−1(xn−i)′(cid:1) . This shows that Aβ is nth Hom-power associative. (cid:3) Now we discuss some consequences of Theorem 2.4. The result below says that every multiplicative Hom-power associative algebra induces a derived sequence of multiplicative Hom-power associative algebras with twisted structure maps. Corollary 2.5. Let (A, µ, α) be a multiplicative Hom-power associative algebra. Then is a multiplicative Hom-power associative algebra for each n ≥ 1. An = (A, µ(n) = α2n −1µ, α2n ) Proof. That A1 is a multiplicative Hom-power associative algebra follows from the β = α case of Theorem 2.4. Then we use induction and the fact An+1 = (An)1 to finish the proof. (cid:3) The next result says that multiplicative Hom-power associative algebras can be constructed from power associative algebras and their self-morphisms. A result of this form first appeared in [16]. Corollary 2.6. Let A be a power associative algebra and β : A → A be an algebra morphism. Then is a multiplicative Hom-power associative algebra. Aβ = (A, µβ = βµ, β) Proof. This is the α = Id case of Theorem 2.4. (cid:3) Example 2.7 (Hom-Sedenions). In this example, let k be the field of real numbers. Let S be the 16-dimensional algebra constructed from k (whose involution is taken to be the identity map) by applying the Cayley-Dickson process four times with the parameter −1 in each step [13]. Elements in the non-commutative algebra S are called sedenions. Here we show how Corollary 2.6 can be applied to S to create Hom-power associative algebras. 6 DONALD YAU Let us first recall some basic properties of S [5, 9]. Unlike the 8-dimensional Cayley octonions, S is not an alternative algebra, but it is power associative. Let us provide proofs of these facts. From the Cayley-Dickson process itself, the algebra S has a standard basis {ei : 0 ≤ i ≤ 15}, with e0 = 1 a two-sided multiplicative identity. Moreover, for i 6= j in {1, . . . , 15}, we have The multiplication table for S using this basis is given below. e2 i = −1 and eiej = −ejei. 1 1 e1 e2 e3 e4 e5 e6 e7 e8 e9 1 e1 e2 e3 e4 e5 e6 e7 e8 e9 e1 e1 −1 −e3 e2 e2 e3 −1 e2 −e1 e3 e3 −e2 e1 −1 −e5 −e6 −e7 e4 e4 e5 e6 e7 −1 e4 e7 −e6 e4 e5 −e7 e6 −e1 −e5 −e2 e5 e5 e6 e6 −e4 −e7 e7 e7 e6 e7 −e4 −e5 −e6 e1 −1 e3 e5 e2 −e3 −1 −e4 e3 e2 −e1 −1 e4 −e3 −e2 e1 e8 e8 e9 e10 e11 e12 e13 e14 e15 −1 −e9 −e10 −e11 −e12 −e13 −e14 −e15 e8 −e11 e10 −e13 e12 −e14 −e1 e15 e12 −e9 −e14 −e15 −e15 e14 −e13 e13 e12 −e2 e3 −e3 −e2 −e6 −e7 e9 e9 e10 e10 −e8 −e11 e11 e11 e10 e12 e12 −e13 e13 e13 e12 e11 −e8 −e9 −e14 −e15 e14 e14 e15 e12 −e8 −e15 e14 −e13 e15 −e8 −e9 −e10 −e11 e15 e15 −e14 e13 e12 e7 −e6 e5 e4 −e2 e1 −1 −e8 e11 −e10 −e11 −e8 e9 e10 −e9 −e8 e5 e4 −e1 −1 −e3 e6 e7 e4 e3 −1 e6 −e5 −e2 −e3 e9 e10 e11 e4 −e5 −e7 −1 e1 e2 e3 −e10 e13 −e12 e9 e14 e15 −e14 −e15 −e12 e13 e14 −e13 −e12 e1 −1 e2 −e3 −1 e1 e6 e7 e3 e2 −e1 −1 e7 −e6 e10 e10 e11 e11 e11 −e10 e12 e12 e13 e13 e13 −e12 e8 e9 e14 e15 e8 e15 −e14 e14 e14 −e15 −e12 e13 e15 e15 e14 −e13 −e12 −e11 e8 e10 −e9 e9 e8 −e6 −e7 −e4 e5 −e7 e6 −e5 −e4 e2 −e1 −e9 −e10 −e11 −e4 e5 e8 e11 −e10 −e5 −e4 e8 e9 e10 e11 To see that S is not an alternative algebra, recall that an algebra is said to be left alternative if it satisfies (xx)y = x(xy) for all elements x and y. If x = e1 + e8 and y = e3 + e9 in S, then we have (xx)y = −2(e3 + e9), x(xy) = −e3 + e5 − 2e9 − e10 − e12. Therefore, S is not left alternative. To see that S is power associative, let x = P15 Then we have i=0 λiei be an arbitrary sedenion with each λi ∈ k. It follows that and x2 = a + bx with a = − 15 X i=0 λ2 i , b = 2λ0. x2x = ab + (a + b2)x = xx2 (x2x)x = (a2 + ab2) + (2ab + b3)x = x2x2. Therefore, by [1] (Theorem 2) (or, equivalently, Corollary 5.3 below), S is power associative. In order to apply Corollary 2.6 to the power associative algebra S, consider, for example, the algebra (iso)morphism α : S → S with α(1) = 1, α(e1) = e5, α(e2) = e7, α(e4) = e6, α(e8) = e15. The action of α on the other basis elements are then uniquely determined by the multiplication table above: α(e3) = e2, α(e5) = −e3, α(e6) = e1, α(e7) = −e4, α(e9) = −e10, α(e10) = −e8, α(e11) = e13, α(e12) = e9, α(e13) = −e12, α(e14) = −e14, α(e15) = e11. By Corollary 2.6 there is a multiplicative Hom-power associative algebra Sα = (S, µα = αµ, α), HOM-POWER ASSOCIATIVE ALGEBRAS 7 where µ is the multiplication in S. Observe that (S, µα) is not a power associative algebra. Indeed, with x = 1 + e1, we have µα(µα(x, x), x) = 2(−e3 + e6), µα(x, µα(x, x)) = 2(−e3 − e6). Therefore, (S, µα) is not third power associative, and hence not power associative. Other algebra isomorphisms on S can be constructed following the same pattern as in the previous paragraph. In more details, let us extend the terminology in [4] for the Cayley octonions and define a basic quadruple in S to be a quadruple (ei1 , ei2 , ei3, ei4 ) of distinct basis elements, none of which is 1, such that ei3 6= ±ei1ei2 and ei4 6∈ ±{ei1ei2 , ei1 ei3, ei2 ei3 , (ei1 ei2)ei3 }. The assumptions on a basic quadruple guarantee that it generates S as an algebra and that the other eleven non-identity basis elements can be written uniquely in terms of the given four. Given another basic quadruple (ej1 , ej2 , ej3, ej4 ), there is a unique algebra isomorphism β : S → S determined by β(eil ) = ejl for 1 ≤ l ≤ 4. Corollary 2.6 can then be applied to β, which yields a multiplicative Hom-power associative algebra Sβ = (S, µβ = βµ, β). In this context, the map α in the previous paragraph is the unique map that sends the basic quadruple (e1, e2, e4, e8) to the basic quadruple (e5, e7, e6, e15). (cid:3) In Corollary 2.5 it was shown that every multiplicative Hom-power associative algebra gives rise to a sequence of multiplicative Hom-power associative algebras whose structure maps are twisted by its own twisting map. In the rest of this section, we provide another construction of Hom-power associative algebras from a given one. Definition 2.8. Let (A, µ, α) be a Hom-algebra. Define the Hom-algebra A(λ) = (A, µλ = λµ + (1 − λ)µop, α), in which λ ∈ k is an arbitrary scalar. The multiplication µλ is an interpolation between µ and its opposite multiplication µop. In particular, we have A(1) = A and A(0) = (A, µop, α). Moreover, with λ = 1/2 we have A(1/2) = A+ = (A, ∗ = (µ + µop)/2, α), which is commutative. Also note that A is multiplicative if and only if A(λ) is multiplicative for all λ. The following result is the Hom-type analogue of [2] (Theorem 1, p.581). Theorem 2.9. Let (A, µ, α) be a Hom-algebra, and let k ≥ 2 be an integer. Then the following statements hold. (1) A is up to kth Hom-power associative if and only if A(λ) is up to kth Hom-power associative for all λ ∈ k. (2) If A is up to kth Hom-power associative, then the lth Hom-powers in A and A(λ) coincide for l ∈ {1, . . . , k}. Proof. The "if" part of the first assertion is obvious because A(1) = A. To prove the other direction, suppose A is up to kth Hom-power associative. Pick any λ ∈ k. Let us write xl and (xl)′ for the lth Hom-powers in A and A(λ), respectively. First we prove the second assertion, i.e., xl = (xl)′ (2.9.1) 8 DONALD YAU for l ∈ {1, . . . , k}. This is clearly true when l = 1. For the induction step, suppose 1 ≤ l < k. Then (xl+1)′ = µλ((xl)′, αl−1(x)) = µλ(xl, αl−1(x)) = λµ(xl, αl−1(x)) + (1 − λ)µ(αl−1(x), xl) (by induction hypothesis) = (λ + 1 − λ)xl+1 (by the (l + 1)st Hom-power associativity of A) = xl+1. This finishes the induction and proves (2.9.1). Now suppose 2 ≤ l ≤ k and 1 ≤ i ≤ l − 1. To prove that A(λ) is lth Hom-power associative, we compute as follows: µλ (cid:0)αl−i−1((xi)′), αi−1((xl−i)′)(cid:1) = λµ(cid:0)αl−i−1(xi), αi−1(xl−i)(cid:1) + (1 − λ)µ(cid:0)αi−1(xl−i), αl−i−1(xi)(cid:1) = (λ + 1 − λ)xl (lth Hom-power associativity of A) (by (2.9.1)) = xl = (xl)′ (by (2.9.1)). This shows that A(λ) is up to kth Hom-power associative, as desired. (cid:3) The following result is an immediate consequence of Theorem 2.9. Corollary 2.10. Let (A, µ, α) be a Hom-algebra. Then A is Hom-power associative if and only if A(λ) is Hom-power associative for all λ ∈ k. The next result is the special case of Corollary 2.10 with λ = 1/2. Corollary 2.11. Let A be a Hom-power associative algebra. Then A+ = (A, ∗ = (µ + µop)/2, α) is a commutative Hom-power associative algebra. 3. Third Hom-power associativity In this section we give several characterizations of third Hom-power associativity. Then we discuss some of their consequences, including the relationships between third Hom-power associative algebras and Hom-Lie admissible algebras. Let us first recall the Hom-type analogue of the associator and some classes of Hom-algebras from [11]. Definition 3.1. Let (A, µ, α) be a Hom-algebra. (1) Define the Hom-associator asA : A⊗3 → A by (2) Define the cyclic Hom-associator SA : A⊗3 → A by asA = µ ◦ (µ ⊗ α − α ⊗ µ). SA = asA ◦ (Id + π + π2), where π is the cyclic permutation (1 2 3). (3) A is called a Hom-associative algebra if asA = 0. HOM-POWER ASSOCIATIVE ALGEBRAS 9 (4) A is called a Hom-alternative algebra if asA is totally anti-symmetric [10]. (5) A is called a Hom-flexible algebra if asA(x, y, x) = 0 for all x, y ∈ A. In terms of elements x, y, z ∈ A, we have asA(x, y, z) = (xy)α(z) − α(x)(yz) (3.1.1) and SA(x, y, z) = asA(x, y, z) + asA(z, x, y) + asA(y, z, x). When there is no danger of confusion, we will omit the subscript A in the (cyclic) Hom-associator. It is immediate from the definitions that every Hom-associative algebra is a Hom-alternative algebra, and every Hom-alternative algebra is a Hom-flexible algebra. Also note that every commutative Hom- algebra is Hom-flexible. The following result provides several characterizations of third Hom-power associativity and is the Hom-type analogue of [1] (Lemma 1). One consequence of this result (Proposition 3.4) is crucial to the proof of the main result in section 5. We use the notation x • y = xy + yx (3.1.2) for elements x and y in a Hom-algebra A. Theorem 3.2. Let (A, µ, α) be a Hom-algebra. Then the following statements are equivalent. (1) A is third Hom-power associative. (2) The condition holds for all x ∈ A. (3) The condition holds. (4) The condition asA(x, x, x) = 0 asA ◦ σ = 0 X σ∈S3 (3.2.1) (3.2.2) [x • y, α(z)] + [z • x, α(y)] + [y • z, α(x)] = 0 (3.2.3) holds for all x, y, z ∈ A, where [, ] = µ − µop is the commutator. (5) The cyclic Hom-associator SA is totally anti-symmetric. Proof. Third Hom-power associativity (2.3.2) says x3 = x2α(x) = α(x)x2 for all x ∈ A. Since the first equality holds by the definition of x3, third Hom-power associativity is equivalent to 0 = (xx)α(x) − α(x)(xx) = as(x, x, x), which is the condition (3.2.1). To show tat (3.2.1) and (3.2.2) are equivalent, first observe that as(x, x, x) = 1 6 X σ∈S3 as ◦ σ(x, x, x), 10 DONALD YAU so (3.2.2) implies (3.2.1). For the converse, we linearize (3.2.1) by replacing x with x + λw for λ ∈ k and w ∈ A. Collecting the coefficients of the powers of λ, we obtain: 0 = as(x + λw, x + λw, x + λw) = as(x, x, x) + λA(x, w) + λ2A(w, x) + λ3as(w, w, w) = λA(x, w) + λ2A(w, x), where Setting λ = ±1 and subtracting the results, we infer that (3.2.1) implies A(x, w) = as(x, x, w) + as(x, w, x) + as(w, x, x). for all x, w ∈ A. Next we replace x with x+ γz for γ ∈ k and z ∈ A in (3.2.4). Collecting the coefficients of the powers of γ, we obtain: A(x, w) = 0 (3.2.4) 0 = A(x + γz, w) = as(x + γz, x + γz, w) + as(x + γz, w, x + γz) + as(w, x + γz, x + γz) = A(x, w) + γB(w, x, z) + γ2A(z, w) = γB(w, x, z), where B(x1, x2, x3) = X σ∈S3 as ◦ σ(x1, x2, x3). Setting γ = 1, we infer that (3.2.1) implies B = 0, which is the condition (3.2.2). To see that (3.2.2) and (3.2.3) are equivalent, apply (3.2.2) to a generic tensor x ⊗ y ⊗ z ∈ A⊗3. Expanding the left-hand side of (3.2.2) using (3.1.1), we obtain twelve terms. If we expand the left-hand side of (3.2.3) using [, ] = µ − µop, we obtain the same twelve terms. Therefore, (3.2.2) and (3.2.3) are equivalent. Finally, observe that we have as ◦ σ = S ◦ (Id + (1 2)) = S ◦ (Id + (2 3)) = S ◦ (Id + (1 3)). X σ∈S3 So (3.2.2) implies that S is anti-symmetric in any two of its three variables. Since S = S ◦ π = S ◦ π2, where π is the cyclic permutation (1 2 3), we infer that (3.2.2) implies that S is totally anti-symmetric. On the other hand, if S is totally anti-symmetric, then 0 = S(x, x, x) = 3as(x, x, x), so as(x, x, x) = 0, which is the condition (3.2.1). Since (3.2.1) is equivalent to (3.2.2), the proof is complete. (cid:3) We now discuss some consequences of Theorem 3.2. First we observe that the Hom-algebras in Definition 3.1 are all third Hom-power associative. Corollary 3.3. Every Hom-flexible algebra is third Hom-power associative. Proof. A Hom-flexible algebra A satisfies as(x, y, x) = 0 for all x and y in A, which in particular implies as(x, x, x) = 0. So A is third Hom-power associative by Theorem 3.2. (cid:3) HOM-POWER ASSOCIATIVE ALGEBRAS 11 The next result is the Hom-version of [1] (Lemma 2). It says that up to (n − 1)st Hom-power associativity implies part of nth Hom-power associativity. It is a prelude to Theorem 5.1 and will play a crucial role in the proof of that result. Proposition 3.4. Let (A, µ, α) be a multiplicative up to (n − 1)st Hom-power associative algebra for some n ≥ 4. Then [αλ−1(xn−λ), αn−λ−1(xλ)] = 0 (3.4.1) for all x ∈ A and λ ∈ {1, . . . , n − 1}, where [, ] = µ − µop is the commutator. Proof. Pick x ∈ A and define We must show that x(λ) = 0 for λ ∈ {1, . . . , n − 1}. First we claim that x(λ) = [αλ−1(xn−λ), αn−λ−1(xλ)]. for λ ∈ {1, . . . , n − 2}. To prove (3.4.2), note that, with the notation in (3.1.2), the up to (n − 1)st Hom-power associativity of A implies: x(λ + 1) = x(λ) + x(1) (3.4.2) 2xλ+1 = xλ • αλ−1(x), 2xn−λ = xn−λ−1 • αn−λ−2(x), 2xn−1 = αn−λ−2(xλ) • αλ−1(xn−λ−1). (3.4.3) Applying αn−λ−2 and αλ−1 to the first and the second equalities in (3.4.3), respectively, and using multiplicativity, we obtain: 2αn−λ−2(xλ+1) = αn−λ−2(xλ) • αn−3(x), 2αλ−1(xn−λ) = αλ−1(xn−λ−1) • αn−3(x). (3.4.4) In the condition (3.2.3) in Theorem 3.2, replace (x, y, z) by (cid:0)αn−λ−2(xλ), αn−3(x), αλ−1(xn−λ−1)(cid:1) and use (3.4.4) and the last equality in (3.4.3). The result is: 0 = [2αn−λ−2(xλ+1), αλ(xn−λ−1)] + [2xn−1, αn−2(x)] + [2αλ−1(xn−λ), αn−λ−1(xλ)] = −2x(λ + 1) + 2x(1) + 2x(λ), from which we obtain the desired condition (3.4.2). From (3.4.2) it follows that for λ ∈ {1, . . . , n − 1}. Indeed, (3.4.5) is trivially true when λ = 1. Then we obtain (3.4.5) by a finite induction, using (3.4.2) in the inductive step. x(λ) = λx(1) (3.4.5) Since the commutator is anti-symmetric, we have x(n − λ) = −x(λ). Combining the previous line with the λ = n − 1 case of (3.4.5), we have which implies −x(1) = x(n − 1) = (n − 1)x(1), x(1) = 0. Putting this back into (3.4.5) completes the proof of the Proposition. (cid:3) 12 DONALD YAU In the rest of this section, we discuss the relationships between third Hom-power associative algebras and Hom-Lie admissible algebras. These results are not used in later sections. Let us first recall the Hom-type analogues of Lie (admissible) algebras from [11]. Definition 3.5. Let (A, µ, α) be a Hom-algebra. (1) Define its Hom-Jacobian JA : A⊗3 → A as JA = µ ◦ (µ ⊗ α) ◦ (Id + π + π2), where π is the cyclic permutation (1 2 3). (2) A is called a Hom-Lie algebra if µ is anti-symmetric and if JA = 0 (Hom-Jacobi identity). (3) Define the commutator Hom-algebra as A− = (A, [, ], α), where [, ] = µ − µop is the com- mutator. (4) A is called a Hom-Lie admissible algebra if A− is a Hom-Lie algebra, i.e., JA− = 0. One way to understand Hom-Lie admissible algebras is through the classes of G-Hom-associative algebras, which we now recall from [11]. The classes of G-associative algebras were first defined in [7]. Definition 3.6. Let (A, µ, α) be a Hom-algebra and G be a subgroup of the symmetric group S3. Then A is called a G-Hom-associative algebra if it satisfies (−1)ε(σ)asA ◦ σ = 0, X σ∈G (3.6.1) where asA is the Hom-associator (Definition 3.1). Clearly Hom-associative algebras are exactly the {Id}-Hom-associative algebras. Let A3 be the subgroup {Id, π, π2} of S3 generated by the cyclic permutation π = (1 2 3). Then Hom-Lie algebras are exactly the A3-Hom-associative algebras whose multiplications are anti-symmetric. Moreover, as shown in [11], every G-Hom-associative algebra is a Hom-Lie admissible algebra. Conversely, a Hom-Lie admissible algebra is an S3-Hom-associative algebra. Examples of and construction results along the lines of Corollary 2.6 for G-Hom-associative algebras can be found in [16]. It follows from Corollary 3.3 that Hom-associative algebras are all third Hom-power associative. So some Hom-Lie admissible algebras are third Hom-power associative. This raises the question: Exactly which Hom-Lie admissible algebras are third Hom-power associative? We answer this question in Theorem 3.9. The answer turns out to be the class of A3-Hom-associative algebras. The following two preliminary results are used in the proof of Theorem 3.9. The next result describes A3-Hom-associative algebras in terms of its cyclic Hom-associator. Lemma 3.7. Let (A, µ, α) be a Hom-algebra. Then A is an A3-Hom-associative algebra if and only if SA = 0, where SA is the cyclic Hom-associator. Proof. Every element in the subgroup A3 = {Id, π, π2} of S3 is even. So we have (−1)ε(σ)asA ◦ σ = asA ◦ (Id + π + π2) = SA, X σ∈A3 which proves the Lemma. (cid:3) HOM-POWER ASSOCIATIVE ALGEBRAS 13 The next result describes the Hom-Jacobian of the commutator Hom-algebra in terms of the cyclic Hom-associator. Lemma 3.8. Let (A, µ, α) be a Hom-algebra and A− = (A, [, ], α) be its commutator Hom-algebra. Then where JA− is the Hom-Jacobian of A−. JA− = SA ◦ (Id − (2 3)), Proof. Expanding in terms of µ, a simple calculation shows that the twelve terms in JA− are exactly the same as the twelve terms in SA ◦ (Id − (2 3)). (cid:3) The following result says that, within the class of Hom-algebras, the intersection of the classes of third Hom-power associative algebras and of Hom-Lie admissible algebras is equal to the class of A3- Hom-associative algebras. Theorem 3.9. Let (A, µ, α) be a Hom-algebra. Then A is an A3-Hom-associative algebra if and only if it is both a third Hom-power associative algebra and a Hom-Lie admissible algebra. Proof. First assume that A is an A3-Hom-associative algebra. Then it is Hom-Lie admissible [11]. Moreover, by Lemma 3.7 we have SA = 0. In particular, SA is totally anti-symmetric, so Theorem 3.2 implies that A is third Hom-power associative. Conversely, assume that A is both a third Hom-power associative algebra and a Hom-Lie admissible algebra. Since A is third Hom-power associative, by Theorem 3.2, SA is totally anti-symmetric, which implies The previous line and Lemma 3.8 imply 1 2 SA = (SA − SA ◦ (2 3)) = 1 2 JA−. SA = −SA ◦ (2 3). Since A is Hom-Lie admissible, we have JA− = 0, and hence SA = 0. Lemma 3.7 now says that A is A3-Hom-associative. (cid:3) 4. Fourth Hom-power associativity The purpose of this section is to study fourth Hom-power associativity. Using certain Hom-alternative and Hom-Jordan algebras, we also demonstrate that in a Hom-power associative algebra, it is not necessarily the case that every element generates a Hom-associative sub-Hom-algebra. Let us first record some consequences of third Hom-power associativity regarding fourth Hom-power associativity. The following result is the special case of Proposition 3.4 with n = 4 and λ = 1. It says that up to third Hom-power associativity implies part of fourth Hom-power associativity. Corollary 4.1. Let (A, µ, α) be a multiplicative third Hom-power associative algebra. Then x4 = x3α2(x) = α2(x)x3 (4.1.1) for all x ∈ A. The following consequence of Corollary 4.1 provides a characterization of up to fourth Hom-power associativity in terms of two identities. 14 DONALD YAU Corollary 4.2. Let (A, µ, α) be a multiplicative Hom-algebra. Then the following statements are equiv- alent. (1) A satisfies for all x ∈ A. (2) A satisfies for all x ∈ A. x2α(x) = α(x)x2 and x4 = α(x2)α(x2) as(x, x, x) = 0 = as(x2, α(x), α(x)) (4.2.1) (4.2.2) (3) A is up to fourth Hom-power associative. Proof. The identity as(x, x, x) = 0 is equivalent to the first identity in (4.2.1) by the definition of the Hom-associator. Moreover, since A is multiplicative, the identity as(x2, α(x), α(x)) = 0 is equivalent to: 0 = as(x2, α(x), α(x)) = (x2α(x))α2(x) − α(x2)(α(x)α(x)) = x4 − α(x2)α(x2). Therefore, (4.2.1) and (4.2.2) are equivalent. Next we show the equivalence between the first and the last statements. The first equality in (4.2.1) is third Hom-power associativity, and the second equality is part of fourth Hom-power associativity. Conversely, suppose (4.2.1) is true. Then A is multiplicative third Hom-power associative. By Corollary 4.1 we have x4 = x3α2(x) = α(x2)α(x2) = α2(x)x3, which means that A is fourth Hom-power associative. (cid:3) In Corollary 5.2 below, we will see that the Hom-algebras in Corollary 4.2 are, in fact, Hom-power associative. Next we discuss some classes of fourth Hom-power associative algebras. Definition 4.3. Let (A, µ, α) be a Hom-algebra. (1) A is called a right Hom-alternative algebra [10] if it satisfies for all x, y ∈ A. (2) A is called a non-commutative Hom-Jordan algebra if A is Hom-flexible, i.e., as(x, y, x) = asA(y, x, x) = 0 (4.3.1) 0, and if for all x, y ∈ A. asA(x2, α(y), α(x)) = 0 (4.3.2) (3) A is called a Hom-Jordan algebra [19] if A is commutative and satisfies (4.3.2) for all x, y ∈ A. Construction results for these Hom-algebras along the lines of Theorem 2.4 and Corollaries 2.5 and 2.6 can be easily formulated and proved. Right-alternative and (non-commutative) Jordan algebras are equivalent to right Hom-alternative and (non-commutative) Hom-Jordan algebras with identity twisting maps. The conditions (4.3.1) and (4.3.2) are called the right Hom-alternative identity HOM-POWER ASSOCIATIVE ALGEBRAS 15 and the Hom-Jordan identity, respectively. They are the Hom-type generalizations of the usual right-alternative identity and the Jordan identity. Every Hom-alternative algebra is a right Hom-alternative algebra. Every Hom-Jordan algebra is a non-commutative Hom-Jordan algebra, since commutativity implies Hom-flexibility. Analogous to the classical case, it is proved in [19] that multiplicative Hom-alternative algebras are both Hom-Jordan admissible and Hom-Maltsev admissible. We should point out that the Hom-Jordan identity above is different from the one defined in [10]. Proposition 4.4. Let (A, µ, α) be a multiplicative Hom-algebra that is either a right Hom-alternative algebra or a non-commutative Hom-Jordan algebra. Then A is up to fourth Hom-power associative. Proof. By Corollary 4.2 we only need to show that A satisfies the two identities in (4.2.2). The identity as(x, x, x) = 0 is satisfied in both cases because of either right Hom-alternativity (4.3.1) or Hom- flexibility. The other identity in (4.2.2), as(x2, α(x), α(x)) = 0, can be obtained from either (i) the right Hom-alternative identity (4.3.1) by replacing (x, y) by (α(x), x2), or from (ii) the Hom-Jordan identity (4.3.2) by setting y = x. (cid:3) In Corollary 5.6 below, we will see that the Hom-algebras in Proposition 4.4 are, in fact, Hom-power associative. Using Hom-alternative and Hom-Jordan algebras, let us point out a major conceptual difference between power associative algebras and Hom-power associative algebras. Recall from the introduction that a power associative algebra can be equivalently defined as an algebra in which every element generates an associative sub-algebra. In contrast, in a general Hom-power associative algebra, it is not true that every element generates a Hom-associative sub-Hom-algebra. This latter condition is too restrictive, and it excludes some Hom-alternative and Hom-Jordan algebras, all of which are Hom-power associative by Corollary 5.6. In fact, in a Hom-algebra (A, µ, α), the sub- Hom-algebra generated by an element x includes αk(x) for all k ≥ 1. However, the Hom-associator (Definition 3.1) asA(x, α(x), α2(x)) = (xα(x))α3(x) − α(x)(α(x)α2(x)) (4.4.1) does not need to be equal to 0 in a Hom-alternative algebra or a Hom-Jordan algebra. When this par- ticular Hom-associator is not equal to 0, the sub-Hom-algebra generated by x is not a Hom-associative algebra. We illustrate this in the following two examples. Example 4.5. In this example, we exhibit a multiplicative Hom-alternative algebra (hence a Hom- power associative algebra by Corollary 5.6) in which the Hom-associator in (4.4.1) is not equal to 0 for some element x. The octonions O [4] is constructed from the field k of real numbers using the Cayley-Dickson pro- cess three times with the parameter −1 in each step. More concretely, the octonions O is an eight- dimensional alternative (but not associative) algebra with a basis {e0, . . . , e7} and the following multi- plication table, where µ denotes the multiplication in O. 16 DONALD YAU e6 e6 e4 e3 e2 e1 µ e0 e3 e4 e2 e0 e0 e1 e7 −e2 e4 e1 −e0 e1 e2 −e4 −e0 e2 e5 e3 −e7 −e5 −e0 e3 e4 e4 e5 e5 −e6 e6 e6 e7 e7 e7 e5 e5 e7 e6 −e5 −e3 e7 −e6 e1 e3 −e5 e1 e4 e2 e4 −e3 −e1 −e0 e5 −e4 −e2 −e0 e1 −e3 e6 e2 −e1 −e6 −e0 e2 −e4 e7 e3 −e2 −e7 −e0 e5 −e7 e3 e6 −e1 There is an algebra automorphism α : O → O given by α(e0) = e0, α(e1) = e5, α(e2) = e6, α(e3) = e7, α(e4) = e1, α(e5) = e2, α(e6) = e3, α(e7) = e4. (4.5.1) Using [10] (Theorem 3.1), which is the analogue of Corollary 2.6 for Hom-alternative algebras, we obtain a multiplicative Hom-alternative algebra with the following multiplication table. Oα = (O, µα = αµ, α) µα e0 e1 e2 e3 e4 e5 e6 e7 e6 e3 e4 e3 e2 e1 e0 e7 e1 e6 e0 e5 e4 −e6 e1 e5 −e0 e6 −e1 −e0 e2 e7 −e4 −e2 −e0 e1 e2 −e3 e3 e4 e7 e5 e2 e4 e3 −e2 −e7 e4 −e3 e5 e7 −e2 e5 e1 e6 e1 −e7 −e5 −e0 e2 −e1 −e6 −e0 e5 −e7 e3 e6 −e5 −e3 −e0 e6 −e1 e4 e7 −e6 −e4 −e0 e2 −e4 e7 e3 −e5 By Corollary 5.6 below, Oα is a Hom-power associative algebra. On the other hand, one can check that asOα(e1, α(e1), α2(e1)) = −2e1 6= 0. Therefore, the sub-Hom-algebra in the Hom-power associative algebra Oα generated by e1 is not Hom- associative. (cid:3) Example 4.6. In this example, we exhibit a multiplicative Hom-Jordan algebra (hence a Hom-power associative algebra by Corollary 5.6) in which the Hom-associator in (4.4.1) is not equal to 0 for some element x. Consider the 27-dimensional exceptional simple Jordan algebra M 8 3 [13]. The elements of M 8 3 are 3 × 3 Hermitian octonionic matrices, i.e., matrices of the form    a1 x  y y z a3 x a2 z X = with each ai ∈ k and x, y, z ∈ O (see Example 4.5). Here we are using the convention ai = aie0 for the diagonal elements. For an octonion x = P7 i=0 biei with each bi ∈ k, its conjugate is defined as the HOM-POWER ASSOCIATIVE ALGEBRAS 17 octonion x = b0e0 − 7 X i=1 biei. This k-module M 8 3 becomes a Jordan algebra with the multiplication where XY and Y X are the usual matrix multiplication. X ∗ Y = 1 2 (XY + Y X), Let α : O → O be the algebra automorphism in (4.5.1), which is both unit-preserving and conjugate- preserving, i.e., α(e0) = e0 and α(x) = α(x) for all x ∈ O. It extends entrywise to a linear automorphism α : M 8 3 . This extended map α respects matrix multiplication and the Jordan product ∗, i.e., α is an algebra automorphism on (M 8 3 , ∗). Using the Hom-Jordan analogue of Corollary 2.6 (= Theorem 5.8 in [19]), we obtain a multiplicative Hom-Jordan algebra 3 → M 8 (M 8 3 )α = (M 8 3 , ∗α = α ◦ ∗, α). By Corollary 5.6 below, (M 8 that 3 )α is a Hom-power associative algebra. On the other hand, one can check for the element as(M 8 3 )α(X, α(X), α2(X)) 6= 0 X = 1  −e2  −e3 e2 0 0 e3 0 0  .  Therefore, the sub-Hom-algebra in the Hom-power associative algebra (M 8 Hom-associative. 3 )α generated by X is not (cid:3) The rest of this section is devoted to studying the identity x4 = α(x2)α(x2), which is part of fourth Hom-power associativity. To state the result below, we introduce the following notations to represent the linearized forms of x4 = ((xx)α(x))α2(x) and α(x2)α(x2) = α(xx)α(xx). Definition 4.7. Let (A, µ, α) be a Hom-algebra, and let x, y, z, and w be elements in A. Regard the permutations in S4 as permutations of the letters (x, y, z, w). Consider the subsets IL = {(1 2 3)i(1 2 3 4)j : 0 ≤ i ≤ 2, 0 ≤ j ≤ 3}, IR = {Id, (1 3), (2 3), (1 4), (2 4), (1 3)(2 4)} of S4. Let PL and PR denote the sums indexed by the sets IL and IR, respectively. Define the elements FL(x, y, z, w) = X L FR(x, y, z, w) = X R ((x • y)α(z)) α2(w), α(x • y)α(z • w), F (x, y, z, w) = FL(x, y, z, w) − FR(x, y, z, w) in A, where x • y = xy + yx as in (3.1.2). Note that x • y = y • x and that there are twelve terms in PL and six terms in PR. The twelve terms in PL are the twelve permutations of the four variables in the expression ((x • y)α(z)) α2(w). Likewise, the six terms in PR are the six permutations of the four variables in the expression α(x • y)α(z • w). 18 DONALD YAU The following result is the Hom-version of [1] (Lemma 3). It gives a linearized form of the identity x4 = α(x2)α(x2). It is also a crucial ingredient in the proof of Theorem 5.1. Theorem 4.8. Let (A, µ, α) be a Hom-algebra. Then A satisfies x4 = α(x2)α(x2) for all x ∈ A if and only if for all x, y, z, w ∈ A. Proof. For x ∈ A, let F (x, y, z, w) = 0 (4.8.1) B(x) = (x2α(x))α2(x) − α(x2)α(x2). The "if" part follows from the identity and the definition x4 = (x2α(x))α2(x). F (x, x, x, x) = 24B(x) For the "only if" part, assume that B(x) = 0 for all x ∈ A. For λ ∈ k and y ∈ A, we have 0 = B(x + λy) = B(x) + λC(x, y) + λ2D(x, y) + λ3C(y, x) + λ4B(y) = λC(x, y) + λ2D(x, y) + λ3C(y, x). (4.8.2) Here C(x, y) is some expression involving x, y, and α, and D(x, y) is D(x, y) = (y2α(x))α2(x) + (x2α(y))α2(y) + ((x • y)α(x)) α2(y) + ((x • y)α(y)) α2(x) − α(x • y)α(x • y) − α(x2) • α(y2). Substituting λ = ±1 in (4.8.2) and adding the results, one infers that D(x, y) = 0 for all x, y ∈ A. Next, for η ∈ k and z ∈ A, we have 0 = D(x + ηz, y) = D(x, y) + ηE(x, y, z) + η2D(z, y) = ηE(x, y, z). Setting η = 1, this implies E(x, y, z) = 0 for all x, y, z ∈ A. A simple calculation shows that E(x, y, z) = (cid:0)y2α(x)(cid:1) α2(z) + (cid:0)y2α(z)(cid:1) α2(x) + ((x • z)α(y)) α2(y) + ((x • y)α(z)) α2(y) + ((z • y)α(x)) α2(y) + ((x • y)α(y)) α2(z) + ((z • y)α(y)) α2(x) − α(x • y) • α(z • y) − α(x • z) • α(y2). Finally, for ν ∈ k and w ∈ A, we have 0 = E(x, y + νw, z) = E(x, y, z) + νF (x, y, z, w) + ν2E(x, w, z) = νF (x, y, z, w), where F (x, y, z, w) is as defined in Definition 4.7. Setting ν = 1, this implies F (x, y, z, w) = 0 for all x, y, z, w ∈ A, as desired. (cid:3) HOM-POWER ASSOCIATIVE ALGEBRAS 19 5. Hom-power associativity The purpose of this section is to show that, in the presence of multiplicativity, up to fourth Hom- power associativity implies Hom-power associativity, generalizing a well-known result of Albert [1] about power associative algebras. The desired result is a consequence of the following result, which is the Hom-version of [1] (Lemma 4). Theorem 5.1. Let (A, µ, α) be a multiplicative up to (n − 1)st Hom-power associative algebra for some n ≥ 5. Then A is up to nth Hom-power associative. Before we give the proof of Theorem 5.1, let us record some of its consequences. Corollary 5.2. Let (A, µ, α) be a multiplicative Hom-algebra. Then the following statements are equiv- alent. (1) A satisfies for all x ∈ A. (2) A satisfies for all x ∈ A. x2α(x) = α(x)x2 and x4 = α(x2)α(x2) as(x, x, x) = 0 = as(x2, α(x), α(x)) (3) A is up to fourth Hom-power associative. (4) A is Hom-power associative. Proof. The equivalence of the first three statements is Corollary 4.2. On the other hand, if A is multiplicative up to fourth Hom-power associative, then we apply Theorem 5.1 repeatedly to conclude that A is up to nth Hom-power associative for all n ≥ 5, i.e., that A is Hom-power associative. (cid:3) Setting α = Id in Corollary 5.2, we recover the following result of Albert [1] (Theorem 2). Corollary 5.3. An algebra A is power associative if and only if it satisfies x2x = xx2 and (x2x)x = x2x2 for all x ∈ A. In the presence of Hom-flexibility (e.g., when the multiplication is commutative), Hom-power asso- ciativity requires only one identity. Corollary 5.4. Let (A, µ, α) be a multiplicative Hom-flexible algebra. Then A is Hom-power associative if and only if it satisfies x4 = α(x2)α(x2) for all x ∈ A. Proof. This is an immediate consequence of Corollaries 3.3 and 5.2. (cid:3) Setting α = Id in Corollary 5.4, we recover the following result of Albert [1] (Theorem 1). 20 DONALD YAU Corollary 5.5. Suppose A is a flexible (e.g., commutative) algebra. Then A is power associative if and only if it satisfies (x2x)x = x2x2 for all x ∈ A. Recall the two types of Hom-algebras defined in Definition 4.3. Corollary 5.6. Multiplicative right Hom-alternative and multiplicative non-commutative Hom-Jordan algebras are Hom-power associative. Proof. This is an immediate consequence of Proposition 4.4 and Corollary 5.2. (cid:3) Setting the twisting map to be the identity map in Corollary 5.6, we obtain the following well-known result for ordinary algebras [13]. Corollary 5.7. Right-alternative algebras and non-commutative Jordan algebras are power associative. The rest of this section is devoted to the proof of Theorem 5.1, which involves a series of Lemmas. To simplify the presentation, we use the notation xi,j = αj−1(xi)αi−1(xj ) (5.7.1) for an element x in a Hom-algebra (A, µ, α) and positive integers i and j, where xi and xj are the ith and the jth Hom-powers (2.3.1). With this notation, nth Hom-power associativity (2.3.2) can be stated as xn = xn−i,i (5.7.2) for all elements x and 1 ≤ i ≤ n − 1. The equality (5.7.2) is exactly what we need to prove for Theorem 5.1. Several equalities are used repeatedly below. In particular, in Theorem 5.1 the assumption of up to (n − 1)st Hom-power associativity of A means xm = xm−i,i for all x ∈ A, 2 ≤ m < n, and 1 ≤ i ≤ m − 1. Also, by the definition of the Hom-powers we have for all k ≥ 2. Moreover, the conclusion of Proposition 3.4 can be stated as xk = xk−1αk−2(x) = xk−1,1 xn−i,i = xi,n−i for all x ∈ A and 1 ≤ i ≤ n − 1. In the following Lemmas, we derive identities involving xn and xn−i,i for 2 ≤ i ≤ 5. Then we play these identities against each other to obtain the nth Hom-power associativity of A. Our first objective is to prove the special case of Theorem 5.1 when n = 5, which requires the following result. Lemma 5.8. Let (A, µ, α) be a multiplicative up to (n − 1)st Hom-power associative algebra for some n ≥ 5. Then xn−3,3 = 4xn−2,2 − 3xn (5.8.1) for all x ∈ A. HOM-POWER ASSOCIATIVE ALGEBRAS 21 Proof. Pick x ∈ A. The desired identity (5.8.1) is equivalent to the following special case of (4.8.1): F (cid:0)αn−4(x), αn−4(x), αn−4(x), xn−3(cid:1) = 0. (5.8.2) Indeed, using the assumptions on A, the definition (2.3.1) of the Hom-powers, the notations above and those in Definition 4.7, and the fact that three of the four arguments in F in (5.8.2) are the same, we have: FL (cid:0)αn−4(x), αn−4(x), αn−4(x), xn−3(cid:1) = 3(cid:0)(2αn−4(x)αn−4(x))αn−3(x)(cid:1) α2(xn−3) + 3(cid:0)(2αn−4(x)αn−4(x))α(xn−3)(cid:1) αn−2(x) + 3(cid:0)2(xn−3 • αn−4(x))αn−3(x)(cid:1) αn−2(x) = 6x3,n−3 + 6(cid:0)x2,n−3 + 2xn−2,1(cid:1) αn−2(x) = 6xn−3,3 + 6(3xn−1)αn−2(x) = 6xn−3,3 + 18xn. A similar calculation yields: FR (cid:0)αn−4(x), αn−4(x), αn−4(x), xn−3(cid:1) = 3α(cid:0)2αn−4(x)αn−4(x)(cid:1) α(cid:0)αn−4(x) • xn−3(cid:1) + 3α(cid:0)αn−4(x) • xn−3(cid:1) α(cid:0)2αn−4(x)αn−4(x)(cid:1) = 12x2,n−2 + 12xn−2,2 = 24xn−2,2. Therefore, (5.8.2) is equivalent to 6xn−3,3 + 18xn = 24xn−2,2, which in turn is equivalent to the desired equality (5.8.1). (cid:3) Using Lemma 5.8 we now prove the special case of Theorem 5.1 when n = 5. Lemma 5.9. Let A be a multiplicative up to fourth Hom-power associative algebra. Then A is up to fifth Hom-power associative. Proof. To show that A is fifth Hom-power associative, pick x ∈ A. By the n = 5 case of (3.4.1) we have The n = 5 case of Lemma 5.8 says that x5 = x4,1 = x1,4 and x3,2 = x2,3. This implies that and hence We conclude that x2,3 = 4x3,2 − 3x5. 3x5 = 4x3,2 − x2,3 = 3x3,2, x5 = x3,2 = x2,3. x5 = xi,5−i for 1 ≤ i ≤ 4, so A is fifth Hom-power associative, as desired. (cid:3) The following result relates xn−4,4 to xn−2,2 and xn. 22 DONALD YAU Lemma 5.10. Let (A, µ, α) be a multiplicative up to (n − 1)st Hom-power associative algebra for some n ≥ 5. Then xn−4,4 = 11xn−2,2 − 10xn (5.10.1) for all x ∈ A. Proof. A calculation similar to the proof of Lemma 5.8, applied to the special case of (4.8.1), yields F (cid:0)αn−5(x2), αn−4(x), αn−4(x), α(xn−4)(cid:1) = 0 6xn−4,4 + 6xn−2,2 + 12xn = 16xn−3,3 + 8xn−2,2. (5.10.2) (5.10.3) Indeed, the left and the right sides of (5.10.3) are, respectively, FL and FR applied to the same variables as in (5.10.2). Continuing (5.10.3) we have: 3xn−4,4 = 8xn−3,3 + xn−2,2 − 6xn = 8(cid:0)4xn−2,2 − 3xn(cid:1) + xn−2,2 − 6xn = 33xn−2,2 − 30xn. (by (5.8.1)) Dividing by three, we obtain the desired equality (5.10.1). (cid:3) In the next two Lemmas, we assume that n ≥ 6, which is sufficient in view of Lemma 5.9. In the following result, part of the nth Hom-power associativity of A is established. Lemma 5.11. Let (A, µ, α) be a multiplicative up to (n − 1)st Hom-power associative algebra for some n ≥ 6. Then xn = xn−2,2 (5.11.1) for all x ∈ A. Proof. Pick x ∈ A. A calculation similar to the proof of Lemma 5.8, applied to the special case of (4.8.1), yields Likewise, the special case of (4.8.1) yields F (cid:0)αn−5(x2), αn−5(x2), αn−4(x), α2(xn−5)(cid:1) = 0 3xn = −6xn−2,2 + 8xn−3,3 + 4xn−4,4 − 3xn−5,5. (5.11.2) F (cid:0)αn−6(x3), αn−4(x), αn−4(x), α2(xn−5)(cid:1) = 0 Subtracting (5.11.2) from (5.11.3) and using (5.8.1) and (5.10.1), we obtain: 6xn = 4xn−2,2 − 3xn−3,3 + 8xn−4,4 − 3xn−5,5. (5.11.3) 3xn = 10xn−2,2 − 11xn−3,3 + 4xn−4,4 = 10xn−2,2 − 11(cid:0)4xn−2,2 − 3xn(cid:1) + 4(cid:0)11xn−2,2 − 10xn(cid:1) = 10xn−2,2 − 7xn. This is equivalent to 10xn = 10xn−2,2, which yields the desired equality (5.11.1). (cid:3) The following result will be used in the induction step of the proof of Theorem 5.1. HOM-POWER ASSOCIATIVE ALGEBRAS 23 Lemma 5.12. Let (A, µ, α) be a multiplicative up to (n − 1)st Hom-power associative algebra for some n ≥ 6. Suppose k is an integer in the range 1 ≤ k ≤ n/2 − 2. Then 3xn−(k+2),k+2 = −2xn + 8xn−(k+1),k+1 − 3xn−k,k (5.12.1) for all x ∈ A. Proof. Pick x ∈ A. A calculation similar to the proof of Lemma 5.8, applied to the special case of (4.8.1), yields F (cid:0)αn−k−3(xk), αn−4(x), αn−4(x), αk−1(xn−k−2)(cid:1) = 0 3xn−(k+2),k+2 = −6xn + 8xn−(k+1),k+1 − 3xn−k,k + 4xn−2,2. To finish the proof, one applies Lemma 5.11 to replace xn−2,2 by xn in the previous line. (cid:3) We can now finish the proof of Theorem 5.1 Proof of Theorem 5.1. The n = 5 case of Theorem 5.1 was established in Lemma 5.9. So we may assume, without lost of generality, that n ≥ 6. Pick x ∈ A. We must prove the nth Hom-power associativity condition xn = xn−i,i (5.12.2) for 1 ≤ i ≤ n − 1. In view of Proposition 3.4, we only need to prove (5.12.2) when 1 ≤ i ≤ n/2. We prove this by a finite induction. The i = 1 case of (5.12.2) is true by the definition of the Hom-power xn. The i = 2 case of (5.12.2) is true by Lemma 5.11. For the induction step, suppose 1 ≤ k ≤ n/2 − 2 and that (5.12.2) is true for 1 ≤ i ≤ k + 1. We want to prove (5.12.2) when i = k + 2. By Lemma 5.12 and the induction hypothesis, we have: 3xn−(k+2),k+2 = −2xn + 8xn−(k+1),k+1 − 3xn−k,k = −2xn + 8xn − 3xn = 3xn. Dividing by three in the above calculation yields (5.12.2) when i = k + 2, finishing the induction and the proof of Theorem 5.1. (cid:3) References [1] A.A. Albert, On the power-associativity of rings, Summa Brasil. Math. 2 (1948) 21-32. [2] A.A. Albert, Power-associative rings, Trans. Amer. Math. Soc. 64 (1948) 552-593. [3] M. Arenas, An algorithm for associative bilinear forms, Linear Alg. Appl. 430 (2009) 286-295. [4] J.C. Baez, The octonions, Bull. Amer. Math. Soc. 39 (2002) 145-205. [5] K. Carmody, Circular and hyperbolic quaternions, octonions, and sedenions, Appl. Math. Comp. 28 (1988) 47-72. [6] R.E. Cawagas, Loops embedded in generalized Cayley algebras of dimension 2r , r ≥ 2, Int. J. Math. Math. Sci. 28 (2001) 181-187. [7] M. Goze and E. Remm, Lie-admissible algebras and operads, J. Algebra 273 (2004) 129-152. [8] J.T. Hartwig, D. Larsson, and S.D. Silvestrov, Deformations of Lie algebras using σ-derivations, J. Algebra 295 (2006) 314-361. [9] K. Imaeda and M. Imaeda, Sedenions: algebra and analysis, Appl. Math. Comp. 115 (2000) 77-88. [10] A. Makhlouf, Hom-alternative algebras and Hom-Jordan algebras, Int. Elect. J. Alg. 8 (2010) 177-190. [11] A. Makhlouf and S. Silvestrov, Hom-algebra structures, J. Gen. Lie Theory Appl. 2 (2008) 51-64. [12] A. Makhlouf and S. Silvestrov, Hom-algebras and Hom-coalgebras, arXiv:0811.0400. [13] R.D. Schafer, An introduction to nonassociative algebras, Dover Pub., New York, 1995. 24 DONALD YAU [14] M.V. Velasco, Spectral theory for non-associative complete normed algebras and automatic continuity, J. Math. Anal. Appl. 351 (2009) 97-106. [15] D. Yau, Enveloping algebras of Hom-Lie algebras, J. Gen. Lie Theory Appl. 2 (2008) 95-108. [16] D. Yau, Hom-algebras and homology, J. Lie Theory 19 (2009) 409-421. [17] D. Yau, The Hom-Yang-Baxter equation, Hom-Lie algebras, and quasi-triangular bialgebras, J. Phys. A 42 (2009) 165202 (12pp). [18] D. Yau, Hom-bialgebras and comodule Hom-algebras, Int. Elect. J. Alg. 8 (2010) 45-64. [19] D. Yau, Hom-Maltsev, Hom-alternative, and Hom-Jordan algebras, arXiv:1002.3944. [20] D. Yau, Hom-Novikov algebras, arXiv:0909.0726. [21] D. Yau, The Hom-Yang-Baxter equation and Hom-Lie algebras, arXiv:0905.1887. [22] D. Yau, The classical Hom-Yang-Baxter equation and Hom-Lie bialgebras, arXiv:0905.1890. [23] D. Yau, Infinitesimal Hom-bialgebras and Hom-Lie bialgebras, arXiv:1001.5000. [24] D. Yau, Hom-quantum groups I: quasi-triangular Hom-bialgebras, arXiv:0906.4128. [25] D. Yau, Hom-quantum groups II: cobraided Hom-bialgebras and Hom-quantum geometry, arXiv:0907.1880. [26] D. Yau, Hom-quantum groups III: representations and module Hom-algebras, arXiv:0911.5402. [27] D. Yau, On n-ary Hom-Nambu and Hom-Nambu-Lie algebras, arXiv:1004.2080. [28] D. Yau, On n-ary Hom-Nambu and Hom-Maltsev algebras, arXiv:1004.4795. [29] D. Yau, A Hom-associative analogue of n-ary Hom-Nambu algebras, arXiv:1005.2373. Department of Mathematics, The Ohio State University at Newark, 1179 University Drive, Newark, OH 43055, USA E-mail address: [email protected]
1610.07178
1
1610
2016-10-23T14:43:39
Zero product determined Lie algebras
[ "math.RA", "math.QA" ]
A Lie algebra $L$ over a field $\mathbb{F}$ is said to be zero product determined (zpd) if every bilinear map $f:L\times L\to \mathbb{F}$ with the property that $f(x,y)=0$ whenever $x$ and $y$ commute is a coboundary. The main goal of the paper is to determine whether or not some important Lie algebras are zpd. We show that the Galilei Lie algebra $\mathfrak{sl}_2\ltimes V$, where $V$ is a simple $\mathfrak{sl}_2$-module, is zpd if and only if $\dim V =2$ or $\dim V$ is odd. The class of zpd Lie algebras also includes the quantum torus Lie algebras $\mathcal{L}_q$ and $\mathcal{L}^+_q$, the untwisted affine Lie algebras, the Heisenberg Lie algebras, and all Lie algebras of dimension at most $3$, while the class of non-zpd Lie algebras includes the ($4$-dimensional) aging Lie algebra $\mathfrak {age}(1)$ and all Lie algebras of dimension more than $3$ in which only linearly dependent elements commute. We also give some evidence of the usefulness of the concept of a zpd Lie algebra by using it in the study of commutativity preserving linear maps.
math.RA
math
ZERO PRODUCT DETERMINED LIE ALGEBRAS MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO Abstract. A Lie algebra L over a field F is said to be zero product determined (zpd) if every bilinear map f : L × L → F with the property that f (x, y) = 0 whenever x and y commute is a coboundary. The main goal of the paper is to determine whether or not some important Lie algebras are zpd. We show that the Galilei Lie algebra sl2 ⋉ V , where V is a simple sl2-module, is zpd if and only if dim V = 2 or dim V is odd. The class of zpd Lie algebras also includes the quantum torus Lie algebras Lq and L+ q , the untwisted affine Lie algebras, the Heisenberg Lie algebras, and all Lie algebras of dimension at most 3, while the class of non-zpd Lie algebras includes the (4-dimensional) aging Lie algebra age(1) and all Lie algebras of dimension more than 3 in which only linearly dependent elements commute. We also give some evidence of the usefulness of the concept of a zpd Lie algebra by using it in the study of commutativity preserving linear maps. We say that a Lie algebra L over a field F is zero product determined (zpd for short) if for 1. Introduction every bilinear map f : L × L → F with the property (1.1) there exists a linear map Φ : [L, L] → F such that (1.2) [x, y] = 0 =⇒ f (x, y) = 0, ∀ x, y ∈ L, f (x, y) = Φ(cid:0)[x, y](cid:1), ∀ x, y ∈ L. Thus, borrowing the Lie algebra cohomology terminology, L is zpd if (1.1) implies that f is a coboundary. The question whether (1.1) implies (1.2) was first studied in [8], for the case where L is the Lie algebra of all n × n matrices. The answer, which is easily seen to be positive, was used as a crucial tool in describing commutativity preserving linear maps on matrix algebras. The concept of a zpd algebra was introduced slightly later, in [7], not only for Lie algebras but for general, not necessarily associative algebras (in the definition, one just replaces [· , · ] in (1.1) and (1.2) by the product in the algebra in question). So far, however, the focus was primarily on associative algebras -- not only in pure algebra where the concept is quite well understood, especially in finite dimensions [5], but also, and in fact more extensively, in functional analysis where one additionally assumes that the maps in question are continuous (see [1] and the subsequent series of papers on the so-called Banach algebras with property B). Not much has been known, so far, about which Lie algebras are zpd. This question was studied sporadically in some papers, including the seminal work [7], and more systematically in [11] and [20] (and [2] in the analytic context). In [20] it was shown that parabolic subalgebras of complex finite Key words and phrases. Zero product determined Lie algebra, zero product determined module, Galilei Lie algebra, quantum torus Lie algebra, Heisenberg Lie algebra, affine Lie algebra, commutativity preserving map. Mathematics Subject Classification. 17B05, 17B40, 17B65, 17B99. 1 2 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO dimensional simple Lie algebras are zpd. This readily implies that complex finite dimensional semisimple Lie algebras are zpd, to point out one basic example. For infinite dimensional Lie algebras, as well as for other finite dimensional Lie algebras, the question is largely open. The aim of this paper is to remedy this situation. We will prove that various different Lie algebras are zpd, but also various different are not. Given a Lie algebra, it is usually not easy to guess whether it is zpd or not. This makes the problem challenging and, in our opinion, interesting in its own right. Another motivation for us for studying it is the striking similarity between the notion of a zpd Lie algebra and the notion of a group with trivial Bogomolov multiplier (see, e.g., [17]). Finally, as we will see at the end of the paper, knowing that a Lie algebra is zpd can be used for describing commutativity preserving linear maps. Hopefully other applications will be found later, just as they were found for zpd associative algebras (cf. [1, 5]). The paper is organized as follows. In Section 2 we survey some general facts on zpd Lie algebras, and also introduce and study zero product determined modules which play an important role in some of the subsequent sections. Sections 3-5 are rather easy; in Section 3 we show that every Lie algebra of dimension at most 3 is zpd, in Section 4 we show that a Lie algebra in which only linearly dependent commute is not zpd if its dimension is greater than 3, and in Section 5 we show that the Heisenberg Lie algebras are zpd. The next sections contain deeper results. In Section 6 we show that the Galilei Lie algebra sl2 ⋉ V , where V is a simple sl2-module, is zpd if and only if dim V = 2 or dim V is odd. We also find a 4-dimensional algebra, namely the aging algebra age(1), that is not zpd. In Section 7 we show that the quantum torus Lie algebras Lq and L+ q are zpd, and in Section 8 we show that the untwisted affine Lie algebras are zpd. The final section, Section 9, is devoted to applications of the zpd property to commutativity preserving linear maps. 2. General remarks on zpd Lie algebras In this section we gather together several elementary observations on zpd Lie algebras, some new and some already known. First a word on notation: throughout, F denotes a field, and all algebras, modules and vector spaces are assumed to be over F. Sometimes we will assume that F = C; if this is not assumed, then F is just an arbitrary field. By N and Z+ we denote the set of all positive integers and all nonnegative integers. We begin by giving some equivalent definitions of zpd Lie algebras (they are actually valid in greater generality, but we will formulate them for Lie algebras for convenience). First of all, note that the existence of a linear map Φ : [L, L] → F satisfying (1.2) is equivalent to the condition (2.1) Xi [xi, yi] = 0 =⇒ Xi f (xi, yi) = 0, ∀ xi, yi ∈ L. Indeed, if (2.1) holds, then the map Φ : [L, L] → X given by f (xi, yi) Φ(cid:16)Xi [xi, yi](cid:17) = Xi is well-defined and satisfies (1.2), and the converse is obvious. In the next lemma we show that bilinear maps from the definition may have their ranges in arbitrary vector spaces, not ZERO PRODUCT DETERMINED LIE ALGEBRAS 3 necessarily in the field of scalars (this is actually taken as the definition in the seminal paper [7]). The proof is very easy, but the fact itself is important for applications. Lemma 2.1. Let L be a zpd Lie algebra. If X is an arbitrary vector space and f : L× L → X is a bilinear map satisfying then there exists a linear map Φ : [L, L] → X such that [x, y] = 0 =⇒ f (x, y) = 0, ∀ x, y ∈ L, f (x, y) = Φ(cid:0)[x, y](cid:1), ∀ x, y ∈ L. Proof. Take a linear functional ξ on X. The map fξ := ξ◦f : L× L → F satisfies the condition that [x, y] = 0 implies fξ(x, y) = 0. Consequently, there exists a linear functional Φξ on [L, L] such that fξ(x, y) = Φξ([x, y]) for all x, y ∈ L. Thus, for all xi, yi ∈ L, Pi[xi, yi] = 0 implies Pi fξ(xi, yi) = 0, i.e., ξ(cid:0)Pi f (xi, yi)(cid:1) = 0. Since ξ is an arbitrary linear functional on X, this Given a Lie algebra L, denote by ML the kernel of the linear map L ⊗ L → L defined by actually shows that f satisfies (2.1). (cid:3) x ⊗ y 7→ [x, y], i.e., ML = nXi xi ⊗ yi ∈ L ⊗ L xi, yi ∈ L, Xi [xi, yi] = 0o. If L is finite dimensional, we see that dimML = (dim L)2 − dim[L, L]. Further, let us write KL = {x ⊗ y ∈ L ⊗ L x, y ∈ L, [x, y] = 0}. Obviously, we have We also remark that spanKL ⊆ ML. (2.2) x ⊗ y + y ⊗ x = (x + y) ⊗ (x + y) − x ⊗ x − y ⊗ y ∈ span KL, ∀ x, y ∈ L. The next lemma is essentially [9, Theorem 2.3]. Nevertheless, we give the proof for the sake of completness. Lemma 2.2. A Lie algebra L is zpd if and only if spanKL = ML. Proof. Suppose that span KL 6= ML. Then there exists a linear functional ξ on L⊗L such that ξ(KL) = {0} and ξ(ML) 6= {0}. The bilinear map f : L × L → F given by f (x, y) = ξ(x ⊗ y), therefore satisfies (1.1) but not (2.1). To prove the converse, assume that L is not zpd. Then there exists a bilinear map f : L × L → F that satisfies (1.1) but not (2.1). The linear functional ξ : L ⊗ L → F, ξ(x ⊗ y) = f (x, y), therefore vanishes on KL but not on ML. Accordingly, span KL 6= ML. (cid:3) It is even more convenient to consider the wedge product L ∧ L and define L = nXi M′ xi ∧ yi ∈ L ∧ L xi, yi ∈ L, Xi [xi, yi] = 0o, The following results are obvious. K′ L = {x ∧ y ∈ L ∧ L x, y ∈ L, [x, y] = 0}. Lemma 2.3. Let L be a Lie algebra. 4 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO (a) L is zpd if and only if spanK′ (b) If the linear map L ∧ L → [L, L], x ∧ y 7→ [x, y] is a linear isomorphism, then L is zpd. (c) If dim L ∧ L = dim [L, L] < ∞, then L is zpd. (d) If dim (L ∧ L)/span {x ∧ yx, y ∈ L, [x, y] = 0} = dim [L, L] < ∞, then L is zpd. L = M′ L. Remark 2.4. The notion of a zpd Lie algebra may remind one on the notion of a centrally closed Lie algebra, i.e., a Lie algebra on which every 2-cocycle is a coboundary (equivalently, the second cohomology group H 2(L, F) is trivial). Let us therefore make some comment on this. Recall that a 2-cocycle on a Lie algebra L is a skew-symmetric bilinear map f : L×L → F satisfying f ([x, y], z) + f ([z, x], y) + f ([y, z], x) = 0, ∀ x, y, z ∈ L, and that a coboundary is a bilinear map f : L × L → F of the form (1.2) for some linear map Φ : [L, L] → F. A coboundary is obviously a 2-cocycle, while the converse is not always true. Setting CL = {x ⊗ y + y ⊗ x, [x, y] ⊗ z + [z, x] ⊗ y + [y, z] ⊗ x x, y, z ∈ L} one can show, just by following the proof of Lemma 2.2, that L is centrally closed ⇐⇒ spanCL = ML. The spaces spanCL and spanKL do not seem to be connected in some simple way, and the problem of showing that L is zpd is, in general, independent of the problem of showing that L is centrally closed. Given any Lie algebra L, it may be of interest to describe and compare the spaces spanCL, span KL, and ML. However, in this paper we will not touch upon this problem. The next lemma provides two conditions under which a homomorphic image of a zpd Lie algebra is again zpd. The first condition, (a), is known [9, Corollary 5.3], but we give the proof anyway. Lemma 2.5. Let L be a zpd Lie algebra. If an ideal I of L satisfies at least one of the following two conditions: (a) [L, I] = [L, L] ∩ I, (b) the Lie algebra L/I is centrally closed, then L/I is also a zpd Lie algebra. Proof. Let f : L/I × L/I → F be a bilinear map such that f (r, s) = 0 whenever r, s ∈ L/I commute. Then ¯f : L×L → F , ¯f (x, y) = f (x+I, y +I) satisfies ¯f (x, y) = 0 whenever x, y ∈ L commute. Since L is zpd it follows that (2.3) for some linear map ¯Φ : [L, L] → F . ¯f (x, y) = ¯Φ([x, y]) Suppose that (a) holds. We claim that the map Φ : [L/I, L/I] → F given by Φ(cid:16)Xi [xi + I, yi + I](cid:17) = Xi ¯Φ(cid:0)[xi, yi](cid:1) ZERO PRODUCT DETERMINED LIE ALGEBRAS 5 is well-defined. Indeed, suppose that Pi[xi, yi] ∈ I. Since this element belongs also to [L, L], (a) implies that Xi [xi, yi] = Xj [zj, uj] for some zj ∈ L and uj ∈ I. From ¯Φ([zj , uj]) = ¯f (zj, uj) = f (zj + I, uj + I) = f (zj + I, 0) = 0 we infer that Xi ¯Φ(cid:0)[xi, yi](cid:1) = ¯Φ(cid:16)Xi [xi, yi](cid:17) = ¯Φ(cid:16)Xj [zj, uj](cid:17) = Xj ¯Φ(cid:0)[zj, uj](cid:1) = 0, as desired. We therefore have f (x + I, y + I) = ¯f (x, y) = ¯Φ([x, y]) = Φ([x + I, y + I]), ∀ x, y ∈ L, proving that L/I is zpd. Assume now that (b) holds. Using (2.3) it follows immediately that that is, ¯f ([x, y], z) + ¯f ([z, x], y) + ¯f ([y, z], x) = 0, ∀ x, y, z ∈ L, Since (b) holds, the desired conclusion that f is a coboundary follows. f ([r, s], t) + f ([t, r], s) + f ([s, t], r) = 0, ∀ r, s, t ∈ L/I. (cid:3) We now extend the notion of a zpd Lie algebra to modules as follows. We will say that a module V over a Lie algebra L is zero action determined (zad for short) if for every bilinear map f : L × V → F with the property that (2.4) there exists a linear map Φ : LV → F such that (2.5) xv = 0 =⇒ f (x, v) = 0, ∀ x ∈ L, v ∈ V, f (x, v) = Φ(xv), ∀ x ∈ L, v ∈ V. Note that L is a zpd Lie algebra if and only if its adjoint module is zad. The notion of a zad module is perhaps interesting in its own right. In this paper, however, we will use it only as a tool for answering the question whether certain Lie algebras are zpd. Until the rest of this section we will consider some basic properties of zad modules. First we record the obvious analogue of Lemma 2.2. Setting MV = nXi xi ⊗ vi xi ∈ L, vi ∈ V, Xi xivi = 0o and KV = {x ⊗ v x ∈ L, v ∈ V, xv = 0}, we have Lemma 2.6. A module V over a Lie algebra L is zad if and only if span KV = MV . Let us only mention that Lemmas 2.1 and 2.5 (a) can also be easily extended to zad modules, but we do not need these results in this paper. The following elementary lemma, however, is needed. We leave the proof to the reader (cf. [9, Theorem 3.1] which states that the direct sum of Lie algebras is zpd if and only if every summand is zpd). 6 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO Lemma 2.7. Let L be a Lie algebra and let {Vi i ∈ I} be a family of L-modules. Then their direct sum ⊕i∈I Vi is zad if and only if each Vi, i ∈ I, is zad. As an application of this lemma, we will now show that the zpd property is stable under tensoring with commutative associative unital algebras. Lemma 2.8. Let L be a zpd Lie algebra and let A be a commutative associative unital algebra. Then the Lie algebra L ⊗ A is zpd. Proof. From (x ⊗ 1 + y ⊗ a2) ⊗ (x ⊗ a1 + y ⊗ a1a2) ∈ KL⊗A, ∀ x, y ∈ L,∀ a1, a2 ∈ A, it easily follows that Now for every Pi(xi ⊗ ai) ⊗ (yi ⊗ bi) ∈ ML⊗A, we have (x ⊗ a1) ⊗ (y ⊗ a2) ≡ (x ⊗ 1) ⊗ (y ⊗ a1a2) (cid:0)mod span KL⊗A(cid:1). (xi ⊗ ai) ⊗ (yi ⊗ bi) ≡ Xi (xi ⊗ 1) ⊗ (yi ⊗ aibi) (cid:0)mod span KL⊗A(cid:1). Xi Since L is zpd, Lemma 2.7 implies that L ⊗ A is a zad module over L = L ⊗ 1. Consequently, Xi (xi ⊗ 1) ⊗ (yi ⊗ aibi) = Xj (zj ⊗ 1) ⊗ uj for some zj ∈ L, uj ∈ L ⊗ A with We have thus proved that [zj ⊗ 1, uj ] = 0, ∀j. Xi (xi ⊗ ai) ⊗ (yi ⊗ bi) ≡ 0 (cid:0)mod spanKL⊗A(cid:1), showing that L ⊗ A is a zpd Lie algebra. (cid:3) Recall that the semidirect product of a Lie algebra L and an L-module V is the Lie algebra L ⋉ V defined on the space L ⊕ V by [x + u, y + v] = [x, y] + xv − yu, ∀ x, y ∈ L,∀ u, v ∈ V. Lemma 2.9. Let L be a zpd Lie algebra and V be a zad L-module. Then L ⋉ V is a zpd Lie algebra. Proof. Take an element such that Xi (xi + ui) ⊗ (yi + vi) ∈ (L ⋉ V ) ⊗ (L ⋉ V ) [xi + ui, yi + vi] = 0. Xi Our goal is to show that this element lies in spanKL⋉V . We have Xi ([xi, yi] + xivi − yiui) = 0, ZERO PRODUCT DETERMINED LIE ALGEBRAS 7 which yields Xi [xi, yi] = 0 and Xi (xivi − yiui) = 0. Since L is a zpd Lie algebra and V is a zad L-module, we have and Xi xi ⊗ yi ∈ span KL Xi (xi ⊗ vi − yi ⊗ ui) ∈ span KV . Clearly, KL,KV ⊆ KL⋉V . Since, by (2.2), yi ⊗ ui + ui ⊗ yi ∈ span KL⋉V , and trivially ui ⊗ vi ∈ KL⋉V , it follows from Xi (xi + ui)⊗ (yi + vi) = Xi that Pi xi ⊗ yi +Xi (xi + ui) ⊗ (yi + vi) ∈ span KL⋉V . ui ⊗ vi (xi ⊗ vi − yi ⊗ ui) +Xi (yi ⊗ ui + ui ⊗ yi) +Xi (cid:3) The converse of the lemma is not true in general. Example 2.10. Let b be the noncommutative Lie algebra with a basis {h, e} and multiplication given by [h, e] = e. Let A be any commutative associative unital algebra. Then the Lie algebra b⊗ A = (h⊗ A) ⋉ (e⊗ A) is always zpd by Lemma 2.8. However, e⊗ A is a zad h⊗ A-module if and only if A is zpd as an associative algebra. Remark 2.11. The definition of a zad module obviously makes sense for associative algebras, too. If A is a unital associative zpd algebra, then every unital module V over A is automatically zad. Indeed, if f : A × V → F is a bilinear map satisfying (2.4), then for any fixed v ∈ V the map fv : A × A → F, fv(x, y) = f (x, yv), satisfies the condition that xy = 0 implies fv(x, y) = 0. Since A is zpd it follows that fv(x, 1) = fv(1, x) for every x ∈ A. This means that f (x, v) = f (1, xv) for all x ∈ A, v ∈ V , showing that V is zad. Example 2.10 shows that a module over a zpd Lie algebra may not be zad. Let us show that the converse of Lemma 2.9 does hold in the special case where L has the property that elements in L commute only when they are linearly dependent. A simple example is the Lie algebra sl2. Lemma 2.12. Let L be a Lie algebra such that any two commuting elements in L are linearly dependent. If V is an L-module, then the Lie algebra L ⋉ V is zpd if and only if L is zpd and V is zad. Proof. The sufficiency follows from Lemma 2.9. Now suppose L ⋉ V is zpd. From Lemma 2.5 (a) we see that L = (L ⋉ V )/V is zpd. Next we show that V is a zad L-module. Take any bilinear map f : L × V → F with property (2.4). We can extend f to a bilinear map F : (L ⋉ V ) × (L ⋉ V ) → F as follows F (x + u, y + v) = f (x, v) − f (y, u), ∀ x, y ∈ L, u, v ∈ V. First we show that F also satisfies (2.4). 8 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO Take any x, y ∈ L, u, v ∈ V with [x + u, y + v] = 0. If x = 0, then we have [x + u, y + v] = −yu = 0. Consequently, f (y, u) = 0, which implies F (x + u, y + v) = 0 in this case. Now suppose x 6= 0. Then [x + u, y + v] = [x, y] + xv − yu = 0 implies [x, y] = 0 and xv − yu = 0. By the assumption, there exists a ∈ F such that y = ax. Consequently, xv − yu = x(v − au) = 0. Hence F (x + u, y + v) = f (x, v) − f (y, u) = f (x, v − au) = 0 by the assumption on f . Since we have assume that L ⋉ V is zpd, there is a linear map Ψ : L ⋉ V → F such that F (x + u, y + v) = Ψ([x + u, y + v]), ∀ x, y ∈ L, u, v ∈ V. In particular, Let Φ be the restriction of Ψ on LV . Then (2.5) holds and V is a zad L-module. f (x, v) = F (x + 0, 0 + v) = Ψ(xv), ∀ x ∈ L, v ∈ V. (cid:3) 3. Lie algebras of low dimensions In this section we will prove the following Proposition 3.1. All Lie algebras over any field F of dimension ≤ 3 are zpd. Proof. From Lemma 2.3 we see that all one or two dimensional Lie algebras are zpd. Now suppose L is a Lie algebra over any field F of dimension 3. If it is a direct sum of two nonzero ideals which have to be one or two dimensional Lie algebras, it follows that L is zpd. Now we assume that L cannot be a direct sum of two nonzero ideals. Case 1: [L, L] = L. It is easy to see that dim L ∧ L = 3. Then the linear map L ∧ L → [L, L], x ∧ y 7→ [x, y], is a linear isomorphism. From Lemma 2.3 (b) we know that L is zpd in this case. Case 2: dim[L, L] = 2. Let [L, L] = Fx ⊕ Fy and x, y, z form a basis for L. If [x, y] = 0 it follows that dim(cid:16)(L ∧ L)/span {u ∧ vu, v ∈ L, [u, v] = 0}(cid:17) = dim[L, L]. From Lemma 2.3 (d) we see that L is zpd. Next we may assume that [x, y] = y. If [z, Fx + Fy] = Fx, there is a nonzero cx + dy such that [z, cx + dy] = 0. If [z, Fx + Fy] 6= Fx, then [z, ax + by] = y for some a, b ∈ F. For all cases we have [z − b−1x, ax + by] = 0, if b = 0 it follows that [z + ax, y] = 0. If b 6= 0 we know that dim(cid:16)(L ∧ L)/span {u ∧ vu, v ∈ L, [u, v] = 0}(cid:17) = dim[L, L]. From Lemma 2.3 (d) we see that L is zpd. Case 3: dim[L, L] = 1. Let [L, L] = Fw and u, v, w form a basis for L. We may assume that [u, v] = aw, [u, w] = bw, [v, w] = cw, for some a, b, c ∈ F. ZERO PRODUCT DETERMINED LIE ALGEBRAS 9 If b = c = 0 we see that L is the 3-dimensional Heisenberg algebra which is zpd. This can be easily checked; on the other hand, we will prove this in Section 5. Now we assume that b 6= 0 or c 6= 0. By symmetry we may assume that b 6= 0. By re-choosing v we have [u, v] = 0, [u, w] = bw, [v, w] = cw, By re-choosing v again, we have [u, v] = 0, [u, w] = bw, [v, w] = 0. We see that L is a direct sum of two ideals Fv and span{u, w}, which contradicts the assump- tion on L. Thus L is zpd in this case. This completes the proof. (cid:3) From this proposition we know that the lowest dimension of a non-zpd Lie algebra is possibly 4. In Section 6 we will construct such examples. 4. Lie algebras in which only linearly dependent elements commute The purpose of this section is to describe zpd Lie algebras L such that any two commuting elements in L are linearly dependent. We first need a technical lemma: Lemma 4.1. Suppose L is a zpd Lie algebra such that any two commuting elements in L are linearly dependent. Then any subspace of L with dimension > 3 is a subalgebra of L. Proof. Since L is zpd, we see that every element in L ⊗ L of the form [x, y] ⊗ z + [z, x] ⊗ y + [y, z] ⊗ x can be written as a linear combination of elements of the form u ⊗ u, u ∈ L. Since elements of the latter form are fixed points of the linear transformation of L ⊗ L: r ⊗ s 7→ s ⊗ r, the same should be true for elements of the former form. Accordingly, [x, y] ⊗ z + [z, x] ⊗ y + [y, z] ⊗ x = z ⊗ [x, y] + y ⊗ [z, x] + x ⊗ [y, z] for all x, y, z ∈ L. If x, y, z are linearly independent, it follows that [x, y] lies in the linear span of x, y, z (see, e.g., [4, Lemma 4.11]) and hence the space spanned by x, y, z is a subalgebra of L. Now take any subspace L′ ⊆ L with dim L′ > 3. For any x, y ∈ L′ such that [x, y] 6= 0, there exists z ∈ L′ such that x, y, z are linearly independent. By the previous argument, we see that the subspace spanned by x, y, z is a subalgebra of L. Hence [x, y] ∈ span{x, y, z} ⊆ L′, which is a subalgebra of L as desired. (cid:3) Theorem 4.2. Let L be a zpd Lie algebra such that any two commuting elements in L are linearly dependent. Then L is isomorphic to a 3-dimensional simple Lie algebra, or the 2- dimensional noncommutative Lie algebra, or the 1-dimensional Lie algebra. Proof. By the assumption on L, we see that any bilinear map f on L satisfying the property (1.1) is equivalent to a linear map on L ∧ L. Hence L is zpd if and only if the canonical map π : L ∧ L → [L, L], x ∧ y 7→ [x, y], is a vector space isomorphism. If L is finite dimensional, we have dim L ∧ L = dim[L, L], which holds only if dim L 6 3. 10 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO If dim L = 2, since L cannot be commutative, it has to be the noncommutative 2-dimensional Lie algebra. Now suppose dim L = 3. Then dim[L, L] = dim L ∧ L = 3. Suppose L is not simple and let I be a nonzero proper ideal of L. If dimI = 1, there exists x, y ∈ L such that L = I ⊕ Fx ⊕ Fy, which implies [L, L] ⊆ span{[x, y],I} and dim[L, L] 6 2, contradiction. If dimI = 2, there exists x ∈ L such that L = I ⊕ Fx, which implies [L, L] ⊆ I and dim[L, L] 6 dimI, contradiction. So L is a 3-dimensional simple Lie algebra. Next suppose that L is infinite dimensional. By Lemma 4.1, there is a 4-dimensional subalgebra L′ ⊂ L. We will prove that this is impossible. Clearly, any two commutative elements of L′ ⊆ L are also linearly dependent. For any linearly independent elements x, y, u, v ∈ L′, since {x, y, u} spans a 3-dimensional Lie algebra, and the same is true for {x, y, v}, we may assume that [x, y] = a1x + b1y + c1u, [x, y] = a2x + b2y + c2v, for some ai, bi, ci ∈ F. We deduce that c1 = c2 = 0. Thus, any two elements in L span a subalgebra. Since {x, y} can span a 2-dimensional Lie algebra, and {x, u} and {x, v} can also, we may assume that [x, y] = ax + by, [x, u] = a′x + b′u, [x, v] = a′′x + b′′v. Considering the subalgebras spanned by {x, y + u} and {x, u + v}, we deduce that b = b′ = b′′ 6= 0. By rechoosing x, y and u we may assume that [x, y] = y, [x, u] = u. Since x, y, u form a basis of the Lie subalgebra L′′ =span{x, y, u}, we see that the only eigenvalues of ad(x) on L′′ are 0 and 1. From [x, [y, u]] = [[x, y], u] + [y, [x, u]] = 2[y, u], we obtain that [y, u] = 0, or [y, u] ∈ Fx if char(F) = 2, contradicting the assumptions on L. This completes the proof. (cid:3) Corollary 4.3. An infinite dimensional Lie algebra in which any two commuting elements are linearly dependent is not zpd. Let us point out two special cases of the corollary. Corollary 4.4. A free Lie algebra in at least two variables is not zpd. Corollary 4.5. The first Witt algebra W1 is not zpd. Moreover, the same is true for every infinite dimensional subalgebra of W1. The fact that W1 is not zpd was already noticed in [11]. 5. Heisenberg Lie algebras Recall that a Heisenberg algebra h is a Lie algebra with basis {c, xi, x−i i ∈ I} where I is a nonempty finite or infinite set, such that [xi, x−i] = c,∀i ∈ I, and all other brackets of basis elements are 0. See [15]. In this section we will prove the following ZERO PRODUCT DETERMINED LIE ALGEBRAS 11 Proposition 5.1. All Heisenberg algebras over any field F are zpd. Proof. Let us also write L for the above defined Heisenberg algebra h. It is clear that spanK′ M′ L, so it is enough to show that M′ By u ∼= v we mean u − v ∈ span K′ L ⊆ span K′ L. L. We see that L ⊆ c ∧ h ∼= 0, x±i ∧ x±j ∼= 0,∀i 6= j ∈ I, xi ∧ x−i ∼= xj ∧ x−j,∀i, j ∈ I, since [xi + xj, x−i − x−j] = 0. Take an arbitrary Y = Pm j=1 yj ∧ y′ L. We may assume that j ∈ M′ yj = Xi∈P j = Xi∈P y′ ajixi + aj,−ix−i, a′ jixi + a′ j,−ix−i, where P is a finite subset of I, and aj,±i, a′ j,±i ∈ F. Then j,−i − a′ jiaj,−i) = 0. m Xj=1Xi∈P (ajia′ We see that Y = ∼= m Xj=1Xi∈P Xj=1Xi∈P m (ajia′ j,−i − a′ jiaj,−i)xi ∧ x−i (ajia′ j,−i − a′ jiaj,−i)x1 ∧ x−1 = 0. Thus h is zpd in this case. This completes the proof. (cid:3) Let sl2 be the 3-dimensional simple Lie algebra over C, i.e., the Lie algebra consisting of all 6. Galilei Lie algebras traceless 2 × 2 matrices. Let E = (cid:18) 0 1 0 0 (cid:19) , H = (cid:18) 1 0 0 −1 (cid:19) , F = (cid:18) 0 0 1 0 (cid:19) be the standard basis of sl2(C). Denote by ad the adjoint representation of sl2, i.e., (adA)(B) = [A, B] for all A, B ∈ sl2. An element A ∈ sl2 is called ad-nilpotent if adA is nilpotent; similarly, A is called ad-semisimple if sl2 can be decomposed as the sum of engeispaces with respect to the action of adA. For any nonzero A ∈ sl2(C), it is clear that A has eigenvalues ±p− det(A). Thus A is ad-nilpotent if det(A) = 0 and ad-semisimple if det(A) 6= 0. In particular, if A ∈ sl2(C) is ad-semisimple, then there exists P ∈GL2 such that P −1AP = det(A)H; if A ∈ sl2(C) is ad-nilpotent and nonzero, then there exists P ∈GL2 such that P −1AP = E. Lemma 6.1. Let V be a simple sl2-module. If V is zad, then dim V < ∞. 12 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO Proof. It is straightforward to check that 0 6= H ⊗ F v− F ⊗ (H − 2)v ∈ MV . By the definition of zad modules, we see that spanKV = MV 6= 0. Claim 1. There exists a nonzero A ∈ sl2 such that A acts semisimply on V . is ad-semisimple (which is similar to a multiple of H) and acts semisimply on V . Choose any nonzero A ⊗ v ∈ span KV , A ∈ sl2, v ∈ V . Then Av = 0. If det(A) 6= 0, then A If det(A) = 0, then A is ad-nilpotent and thus similar to E. Without lost of generality, we may assume that 0 6= E ⊗ v ∈ spanKV , or equivalently, Ev = 0. Since the Casimir element, (H + 1)2 + 4F E ∈ U (sl2), of sl2 acts as a scalar on V , we see that (H + 1)2v = (cid:0)(H + 1)2 + 4F E(cid:1)v ∈ Cv. Thus, H has an eigenvector in V and hence acts semisimply on V , since V is a simple module. By Claim 1, we may assume that H acts semisimply on V by replacing E, F, H with P EP −1, P F P −1, P HP −1 for some invertible matrix P if necessary, that is, V is a weight module with respect to the Cartan subalgebra CH of sl2. Claim 2. V is finite dimensional. Suppose on the contrary that V is infinite dimensional. By the representation theory of sl2, either E or F acts injectively on V . Without lose of generality, we assume that E acts injectively on V . Take any nonzero A ⊗ v ∈ KV . Then Av = 0. Writing v as a sum of weight vectors and comparing the highest weights that occur in the expressions of v and Av respectively, we can easily see A ∈ CH ⊕ CF . In particular, KV ⊆ (CH + CF ) ⊗ V . On the other hand, we have H ⊗ Ev− E ⊗ (H + 2)v ∈ MV = KV for all nonzero v ∈ V , contradiction. So we must have dim V < ∞. (cid:3) Now we consider finite dimensional simple modules over sl2. Let m ∈ Z+ and V (m) be the simple sl2-module of dimension m + 1. Choose a standard basis {v0,··· , vm} of V (m) such that the actions of E, F, H can be expressed as F vi = vi+1, Evi = i(m + 1 − i)vi−1, Hvi = (m − 2i)vi, ∀ i = 0, 1,··· , m, where we have made the convention that vi = 0 whenever i 6= 0, 1,··· , m. Lemma 6.2. Let V be a simple sl2-module of even dimension. Then V is zad if and only if dim V = 2. Proof. Assume that V = V (m) is zad where m ∈ N is odd. As in the proof of the previous lemma, we know that span KV = MV 6= 0. Choose any nonzero A ∈ sl2 and v ∈ V such that A ⊗ v ∈ KV , that is, Av = 0. Noticing the fact that any ad-semisimple element acts bijectively on V , we have that A is ad-nilpotent and hence det(A) = 0. If A ∈ CE, it is clear that A ⊗ v ∈ C(E ⊗ v0). Now suppose that A 6∈ CE. By replacing A with its nonzero multiple we may assume that A = F + λH − λ2E for some l ∈ C. Assume v = Pm i=0 civi for some ci ∈ C. Then from Av = 0, ZERO PRODUCT DETERMINED LIE ALGEBRAS 13 we compute out that m 0 =(F + lH − l2E) m−1 = = Xi=0 Xi=1 m civi+1 + l ci−1vi + l m civi Xi=0 Xi=0 (m − 2i)civi − l2 Xi=0 (m − 2i)civi − l2 m m Xi=1 Xi=0 m−1 i(m + 1 − i)civi−1 (i + 1)(m − i)ci+1vi, l2mc1 = lmc0, cm−1 = lmcm ci−1 = l2(i + 1)(m − i)ci+1 − l(m − 2i)ci, ∀ i = 1,··· , m − 1. (6.1) which implies and (6.2) As a result, we deduce for all i = 0, 1,··· , m. Combining the previous result, we can obtain that ci = m! i! lm−icm span KV =spannE ⊗ v0, m Xi=0 m! i! lm−i(F + lH − l2E) ⊗ vi : l ∈ Co =spanni(i − 1)F ⊗ vi−2 + iH ⊗ vi−1 − E ⊗ vi : i = 0, 1,··· , m + 2o. In particular, we have dim spanKV = m + 3. On the other hand, we know that dimMV = (dim sl2 ⊗ V )2 − dim(sl2 · V ) = 2(m + 1). If m > 2, then dimMV > dim spanKV and V is not zad. So m = 1, i.e., dim V = 2. If V is of dimension 2, i.e., m = 1, from the above arguments we know that dim spanKV = 4 and dimMV = (dim sl2 ⊗ V )2 − dim(sl2 · V ) = 4. Thus dimMV = dim span KV and hence V is indeed zad. Lemma 6.3. If V is a simple sl2-module of odd dimension, then V is zad. Proof. Suppose V = V (m) where m = 2k > 0 for some k ∈ N. By a similar argument as in the previous lemma, solving Av = 0 for v ∈ V with A = F + lH − l2E for any l ∈ C, we deduce that (cid:3) B1 = (cid:8)i(i − 1)F ⊗ vi−2 + iH ⊗ vi−1 − E ⊗ vi, i = 0, 1,··· , m + 2(cid:9) ⊂ span KV . Recall that we have assumed that vi = 0 whenever i /∈ {0, 1,··· , m}. Taking A = H + 2λF for l ∈ C, and solving Av = 0 for v ∈ V we deduce that k Xi=0 li i! (H + 2lF ) ⊗ vk+i ∈ KV ,∀l ∈ C. 14 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO Thus B2 = (cid:8)H ⊗ vk+i + 2iF ⊗ vk+i−1 i = 0, 1 . . . , k − 1(cid:9) ⊂ spanKV . Note that we did not include the elements for i = k and i = k + 1, since they have already occurred in B1. Similarly for A = H − 2λE, by solving Av = 0 for v ∈ V , we deduce that Xi=0 Thus k (k + i)! i!(k − i)! li(H − 2λE) ⊗ vk−i ∈ KV . B3 = (cid:8)(k − i + 1)(k + i)H ⊗ vk−i − 2iE ⊗ vk−i+1i = 1, . . . k − 1(cid:9) ⊂ span KV . Here we do not include the elements for i = 0, i = k and i = k + 1, since they have already occurred in B1 or B2. Now it is straightforward to check that B1 ∪ B2 ∪ B3 is a linearly independent set and has cardinality 2m + 2. We know that 2m + 2 ≤ dim spanKV ≤ dimMV . Since sl2 · V = V and dim sl2 ⊗ V = 3m + 3, we see that dimMV = 2m + 2. Thus dimMV = dim span KV and hence V is zad. (cid:3) Combining Lemma 2.12 and the above results in this section, we deduce the following Theorem 6.4. Suppose V is a simple module over sl2. Then the Galilei algebra sl2 ⋉ V is zpd if and only if dim V = 2 or dim V is odd. Let b = CE ⊕ CH be the Borel subalgebra of sl2. Next we consider a subalgebra of the Galilei algebra sl2 ⋉ V (m). Let b(m) = b ⋉ V (m) ⊂ sl2 ⋉ V (m). Corollary 6.5. Let m ∈ N. (a) The b-module V (m) is zad if and only if m = 2. (b) The Lie algebra b ⋉ V (m) is zpd if and only if m = 2. Proof. (a) For any m ∈ N, we see that the linear map b ⊗ V (m) → V (m), x ⊗ v 7→ xv,∀x ∈ b, v ∈ V (m), is onto. Then dimMV (m) = m + 1. MV (m), i.e., V (m) is not zad in this case. we see that First we assume that m is odd. It is easy to see that KV (m) = CE ⊗ v0. Thus KV (m) 6= Now we assume that m = 2k is even. From the computations in the proof of Lemma 6.3 B3 = (cid:8)(k − i + 1)(k + i)H ⊗ vk−i − 2iE ⊗ vk−i+1i = 0, 1, . . . k + 1(cid:9) is a basis of KV (m), i.e., dimKV (m) = k + 2. Then V (m) is zad if and only if MV (m) = KV (m), if and only if m + 1 = k + 2, if and only if m = 2. (b) follows from (a) and Lemma 2.12 since only linearly dependent elements in b commute. (cid:3) From this corollary we obtain a 4-dimensional non-zpd Lie algebra b(2) = b ⋉ V (2) where V (2) is the 2 dimensional module with basis {u, v} and action Hu = u, Hv = −v, Ev = u, Eu = 0. ZERO PRODUCT DETERMINED LIE ALGEBRAS 15 This 4-dimensional Lie algebra b(2) is the centerless 1-spacial aging algebra age(1). See [12]. For representations of Galilei algebras, see [16]. 7. Quantum torus Lie algebras Let q ∈ C, not a root of unity. Let Cq[t±1 t±1 1 , t±1 2 subject to the relation 1 , t±1 2 ] be the associative algebra generated by t1t−1 1 = t−1 1 t1 = t2t−1 2 = t−1 2 t2 = 1, t2t1 = qt1t2. See [3, 10]. Let Cq[t1, t2] be the subalgebra of Cq[t±1 (m1, m2) ∈ Z2, denote tm = tm1 1 , t±1 2 . Then it is clear that 1 tm2 2 ] generated by t1, t2. For any m = tmtn = qm2n1 tm+n, tmtn = qm2n1−n2m1 tntm,∀m, n ∈ Z2. Let Lq be the associated Lie algebra of Cq[t±1 1 , t±1 2 ]. The Lie bracket of Lq is given by [tm, tn] = (qm2n1 − qn2m1)tm+n. q be the associated Lie algebra of Cq[t1, t2]. Let L+ To show that Lq and L+ q are zpd Lie algebras, we need the following lemma: + such that n1, n2 are coprime and n1n2 6= 0, there + with (m1, m2) 6= (n1, n2), m1 ≤ n1, m2 ≤ n2 such that {m, n} Lemma 7.1. For any n = (n1, n2) ∈ Z2 exists m = (m1, m2) ∈ Z2 forms a Z-basis of Z2. Proof. Since n1, n2 ∈ N are coprime, there exists u, v ∈ Z such that un1 − vn2 = 1. Take k ∈ Z such that 0 6 v − kn1 < n1 and denote m1 = v − kn1, m2 = u − kn2. We have m2n1 − m1n2 = 1. Since 0 6 m1 < n1, we also have 0 < m2 6 n2. Theorem 7.2. If q ∈ C is not a root of unity, then the Lie algebra Lq is zpd. Proof. Let f : Lq × Lq → C be a bilinear map satisfying that f (x, y) = 0 whenever [x, y] = 0. Define a linear map Φ : [Lq,Lq] → C as follows: (cid:3) Φ(tm1,m2) = f (t(m1−1,m2), t(1,0))/(qm2 − 1), ∀ m2 6= 0; Φ(tm1,0) = f (t(m1,−1), t(0,1))/(1 − qm1), ∀ m1 6= 0. It is easy to check that f (t(1,0), tm) = Φ([t(1,0), tm]), ∀ m ∈ Z2, f (t(0,1), t(m,−1)) = Φ([t(0,1), t(m,−1)]), ∀ m ∈ Z. Define ϕ(x, y) = f (x, y) − Φ([x, y]) for all x, y ∈ Lq and denote T = (cid:8)m ∈ Z2 ϕ(tm, tn) = 0, ∀ n ∈ Z2(cid:9). We have (0, 0), (1, 0) ∈ T . To show that Lq is zpd, we need only to show that T = Z2. Claim 1. If m ∈ T , then jm ∈ T for all j ∈ Z+ and (7.1) ϕ(tn, tjm+kn) = 0, ∀ n ∈ Z2, k, j ∈ Z+. 16 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO For any l ∈ C, k ∈ N and n ∈ Z2, we always have [ltm + tn, (ltm + tn)k] = 0, where k (ltm + tn)k = Xi=0 liai(q)tim+(k−i)n and each ai(q) is a polynomial function in q. By the assumption on f , we have f (ltm + tn, k Xi=0 In particular, liai(q)tim+(k−i)n) = 0 = Φ([ltm + tn, k Xi=0 liai(q)tim+(k−i)n]), ∀ l ∈ C. ϕ(ltm + tn, k Xi=0 liai(q)tim+(k−i)n) = 0, ∀l ∈ C. k Xi=0 liai(q)ϕ(tn, tim+(k−i)n) = 0, ∀l ∈ C, Since tm ∈ T , we see which implies ai(q)ϕ(tn, tim+(k−i)n) = 0, ∀ n ∈ Z2, i = 0, 1,··· , k. Taking i = k, we deduce ϕ(tn, tkm) = 0 forcing km ∈ T since ak(q) = q 6= 0. Taking i = 1, we deduce ϕ(tn, tm+(k−1)n) = 0 for all k ∈ N since a1(q) is a nonzero multiple of (1 + qm,n + ··· + qk−1 m,n) and hence nonzero, where qm,n is defined by tmtn = qm,ntntm. Replacing m with jm for j ∈ Z+ in the above argument, we get the result of this claim. [(ltm + µt−m + tn, (ltm + µt−m + tn)k] = 0. Suppose Now take arbitrary m, n ∈ Z2. For any l, µ ∈ C and k ∈ N, we consider the identity k(k−1)m1 m2 2 (ltm + µt−m + tn)k = k Xi,j=0 liµjaij(q)tim−jm+(k−i−j)n, where aij are some polynomials in q. By a similar argument as before, we can deduce (7.2) ϕ(cid:16)ltm + µt−m + tn, k Xi,j=0 liµjaij(q)t(i−j)m+(k−i−j)n(cid:17) = 0, ∀ l, µ ∈ C. Claim 2. If m ∈ T , then jm ∈ T for all j ∈ Z and ϕ(tn, tjm+kn) = 0, ∀ n ∈ Z2, j ∈ Z, k ∈ Z+. Taking m ∈ T in (7.2), we see k (7.3) Xi,j=0 liµjaij(q)ϕ(µt−m + tn, t(i−j)m+(k−i−j)n) = 0, ∀ l, µ ∈ C. ZERO PRODUCT DETERMINED LIE ALGEBRAS 17 Regarding the left hand side of (7.3) as a polynomial in l, µ and considering the coefficient of lk−1µ, we see that ak−1,1(q)ϕ(tn, t(k−2)m) + ak−1,0(q)ϕ(t−m, t(k−1)m+n) = 0. Taking k = 2 and noticing a1,0(q) = qm2n1 + qn2m1 6= 0, we see that ϕ(t−m, tm+n) = 0 for all n ∈ Z2, that is, −m ∈ T . Now by Claim 1, we get jm ∈ T and ϕ(n, jm + kn) = 0 for all j ∈ Z, k ∈ Z+. Claim 3. If m ∈ T , then ϕ(tn, tjm+kn) = 0, ∀ n ∈ Z2, j ∈ Z, k ∈ Z, k 6= −1. Exchanging m and n in (7.2), we get ϕ(cid:16)ltn + µt−n + tm, k Xi,j=0 liµjaij(q)t(i−j)n+(k−i−j)m(cid:17) = 0, ∀ l, µ ∈ C. Note that aij(q) has been changed since we have exchanged m and n. Since m ∈ T , we have (7.4) k Xi,j=0 liµjaij(q)ϕ(cid:16)ltn + µt−n, t(i−j)n+(k−i−j)m(cid:17) = 0, ∀ l, µ ∈ C. Considering the coefficient of lµk−1, we get a0,k−1(q)ϕ(tn, t(1−k)n+m) + a1,k−2(q)ϕ(t−n, t(3−k)n+m) = 0, ∀ k ∈ N. If k > 3, we already have ϕ(t−n, t(3−k)n+m) = 0 by Claim 2 and hence a0,k−1(q)ϕ(tn, t(1−k)n+m) = 0. m,n + ··· + q1−k It is straightforward to calculate that a0,k−1(q) is a nonzero multiple of 1 + q−1 and hence nonzero. We see that ϕ(tn, t(1−k)n+m) = 0 for k > 3. Replacing m with jm, j ∈ Z in the above arguments, we see ϕ(tn, t−kn+jm) = 0 for all k, j ∈ Z with k > 2. The claim follows from Claim 2. Claim 4. T = Z2. m,n Recalling that (1, 0) ∈ T , we have ϕ(t(0,1), t(j,k)) = 0 for j, k ∈ Z, k 6= −1 by Claim 3. On the other hand, by the definition of Φ, we have f (t(0,1), t(j,−1)) = Φ([t(0,1), t(j,−1)]) for all j ∈ Z and hence ϕ(t(0,1), t(j,−1)) = 0. As a result, (0, 1) ∈ T . By Claim 2, we also have (0, k), (k, 0) ∈ T for all k ∈ Z. Now take any n = (n1, n2) ∈ Z2 such that n1, n2 are coprime. We will prove n ∈ T by induction on n1n2. For n1n2 = 0, the result is true by the previous discussion. Now suppose n1n2 > 1. Without loss of generality we may assume that n ∈ Z2 +. By Lemma 7.1, there exists m = (m1, m2) ∈ Z2 + with (m1, m2) 6= (n1, n2), m1 ≤ n1, m2 ≤ n2, such that {m, n} forms a Z-basis of Z2. Denote m′ = (n1 − m1, n2 − m2) ∈ Z2 +. Then {m′, n} forms a basis of Z2 and (n1 − m1)(n2 − m2) < n1n2. By induction hypothesis, we have m, m′ ∈ T . Then Claim 3 indicates ϕ(tn, tjm+kn) = 0, ϕ(tn, tjm ′+kn) = 0, ∀ j, k ∈ Z, k 6= −1. 18 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO For any n′ ∈ Z2, we can write n′ = j1m + k1n = j2m′ + k2n for some j1, k1, j2, k2 ∈ Z. ) = 0 and n ∈ T . By Noticing that k1 and k2 can not both be equal to −1, we have ϕ(tn, tn Claim 2, we see kn ∈ T for all k ∈ Z. The claim and hence the theorem follows. Using similar methods as in the previous theorem, we can also show that L+ q is a zpd Lie (cid:3) ′ algebra. Theorem 7.3. If q ∈ C is not a root of unity, then the Lie algebra L+ Proof. Note that [L+ satisfying that f (x, y) = 0 whenever [x, y] = 0. Define a linear map Φ : [L+ follows: 1tj 2 : i, j ∈ N}. Let f : L+ q ] =span{ti q × L+ q ,L+ q is zpd. Φ(t(m1,m2)) = f (t(m1−1,m2), t(1,0))/(qm2 − 1), ∀ m1, m2 ∈ N. For convenience, we denote q → C be a bilinear map q ] → C as q ,L+ for all x, y ∈ L+ q . Denote ϕ(x, y) = f (x, y) − Φ([x, y]) q is zpd, we need only to show ϕ(m, n) = 0 for all m, n ∈ Z2 +, or equivalently, + ϕ(tm, tn) = 0, ∀ n ∈ Z2 +(cid:9). T = (cid:8)m ∈ Z2 +. Note that (0, 0), (1, 0) ∈ T . To show that L+ T = Z2 Claim 1. If m ∈ T , then km ∈ T for all k ∈ Z+ and ϕ(tn, tjm+kn) = 0, ∀ n ∈ Z2 (7.5) +, j, k ∈ Z+. For any l ∈ C, k ∈ N and n ∈ Z2 +, we always have [ltm + tn, (ltm + tn)k] = 0, where (ltm + tn)k = k Xi=0 liai(q)tim+(k−i)n and each ai(q) is a function on q. By the assumption on f , we have f (ltm + tn, k Xi=0 In particular, liai(q)tim+(k−i)n) = 0 = Φ([ltm + tn, k Xi=0 liai(q)tim+(k−i)n]), ∀ l ∈ C. ϕ(ltm + tn, k Xi=0 liai(q)tim+(k−i)n) = 0 for all l ∈ C. Since m ∈ T , we see Xi=0 k liai(q)ϕ(tn, tim+(k−i)n) = 0 for all l ∈ C, which implies ai(q)ϕ(tn, tim+(k−i)n) = 0, ∀ i = 0, 1,··· , k. ZERO PRODUCT DETERMINED LIE ALGEBRAS 19 Taking i = k, we deduce ϕ(tn, tkm) = 0 forcing km ∈ T since ak(q) 6= 0. Taking i = 1, we deduce ϕ(tn, tm+(k−1)n) = 0 for all k ∈ N since a1(q) 6= 0. Replacing m with jm for j ∈ Z+ in the above argument, we get the result of this claim. Claim 2. T = Z2 +. By Claim 1, we see (0, 1) ∈ T by the fact that (1, 0) ∈ T . Hence (j, 0), (0, k) ∈ T for all j, k ∈ Z+. Now for any n ∈ Z2 + and l, µ ∈ C, the identity [tn + lt(j,0) + µt(0,k), (tn + lt(j,0) + µt(0,k))2] = 0, ∀ j, k ∈ Z+ implies ϕ(cid:0)tn, l(tnt(j,0) + t(j,0)tn) + µ(tnt(0,k) + t(0,k)tn) + lµ(t(j,0)t(0,k) + t(0,k)t(j,0))(cid:1) = 0, forcing ϕ(tn, t(j,k)) = 0 for all j, k ∈ Z+. The result follows. 8. Affine Lie algebras (cid:3) In this section we assume that F = C. Let g be a finite-dimensional simple Lie algebra with Cartan decomposition g = h ⊕ ⊕α∈∆gα, where ∆ is root system of g with repect to a Cartan subalgebra h and We write (x, y) for the Killing form on g. gα = {x ∈ g[h, x] = α(h)x,∀h ∈ h}. Let ∆∨ = {hαα ∈ ∆} be the coroot system of ∆, and {eαα ∈ ∆} be the Chevalley basis of g (See Chapter 7 in [13]). For any α ∈ ∆ we know that Since the Killing form is invariant, we have h−α = −hα, α(hα) = 2, [eα, e−α] = hα, [hα, e±α] = ±2e±α. (hα, hα) = ([eα, e−α], hα) = (eα, [e−α, hα]) = 2(eα, e−α),∀α ∈ ∆. The (untwisted) affine Lie algebra associated with g is defined as where c is the canonical central element and the Lie algebra structure is given by (see [14]) g = g ⊗ C[t, t−1] ⊕ Cc ⊕ Cd, [x ⊗ tn, y ⊗ tm] = [x, y] ⊗ tn+m + n(x, y)δn+m,0c, [d, x ⊗ tn] = nx ⊗ tn for x, y ∈ g and m, n ∈ Z. We will write x(n) for x ⊗ tn, and g = [g, g] = g ⊗ C[t, t−1] + Cz, h = h ⊗ C[t, t−1] + Cc. We first prove the following crucial formulae. Lemma 8.1. For any α ∈ ∆, h ∈ h and i, j ∈ Z we have (a) h(i) ⊗ eα(j) ≡ h(0) ⊗ eα(i + j) (cid:0)mod spanKg(cid:1); (b) eα(i) ⊗ e−α(−i) ≡ eα(0) ⊗ e−α(0) + 1 (c) eα(i) ⊗ eβ(j) ≡ eα(0) ⊗ eβ(i + j) (cid:0)mod spanKg(cid:1), if (α + β, i + j) 6= (0, 0); (d) d ⊗ eα(i) ≡ i 2 hα(i) ⊗ hα(−i) (cid:0)mod spanKg(cid:1); 2 hα(0) ⊗ eα(i) (cid:0)mod span Kg(cid:1); 20 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO (e) d ⊗ hα(i) ≡ ieα(0) ⊗ e−α(i) (cid:0)mod span Kg(cid:1). Proof. (a) From we see that Hence we obtain (a). (b) From [e−α(0) + eα(i) + [h(i) + eα(i + j), h(0) + eα(j)] = 0 (h(i) + eα(i + j)) ⊗ (h(0) + eα(j)) ∈ Kg. √2 2 (hα(0) − hα(i)), e−α(−i) + eα(0) + √2 2 (hα(−i) − hα(0))] = 0 we see that (e−α(0) + eα(i) + √2 2 (hα(0) − hα(i))) ⊗ (e−α(−i) + eα(0) + √2 2 (hα(−i) − hα(0))) ∈ Kg. Using (a) we get (b). Further, (c) follows from and (d) follows from (eα(i) + eβ(i + j)) ⊗ (eβ(j) + eα(0)) ∈ Kg, (d − i 2 hα(0)) ⊗ eα(i) ∈ Kg. Finally, applying (a),(d) to (d + i 2 hα(0) − ieα(0)) ⊗ (hα(i) − eα(i) + e−α(i)) ∈ Kg we obtain (e). (cid:3) Theorem 8.2. The untwisted affine Lie algebras g and g are zpd. Proof. We will first prove that that g is zpd. Note that c ⊗ g ∈ Kg. Let X ∈ Mg. Using Lemma 8.1 (a)-(c), we see that We may assume that X ≡ X1 + X ′ i ∈ h ⊗ h. From 1 = Ps X ′ i ⊗ v′ i=1 u′ X ∈ (g ⊗ 1) ⊗ g + h ⊗ h + span Kg. 1 mod span(Kg) where X1 = Pr i=1 ui ⊗ vi ∈ (g⊗ 1)⊗ g and r s [ui, vi] + Xi=1 [u′ i, v′ i] = 0, Xi=1 and [g ⊗ 1), g] ∩ [h, h] = 0 we deduce that r s Xi=1 i.e., X1 ∈ ((g ⊗ 1) ⊗ g) ∩ Mg and X ′ [ui, vi] = 0, Xi=1 1 ∈ Mh. Hence [u′ i, v′ i] = 0, Mg = ((g ⊗ 1) ⊗ g + h ⊗ h + span Kg) ∩ Mg = (g ⊗ 1) ⊗ g) ∩ Mg + Mh + span Kg. ZERO PRODUCT DETERMINED LIE ALGEBRAS 21 However, h is zpd and g is a zad g-module. Thus ((g ⊗ 1) ⊗ g) ∩ Mg ⊆ span Kg and Mh = span Kh ⊆ span Kg. Therefore we have Mg = span Kg, as desired. fact c ⊗ g ∈ Kg we see that Next we prove that g is zpd. Let Y ∈ Mg. In view of Lemma 8.1 (d) and (e), using the Y ∈ g ⊗ g + spanKg. Noting that (g ⊗ g) ∩ Mg = Mg, and using the established result that Mg = spanKg we see that Y ∈ (g ⊗ g) ∩ Mg + spanKg = Mg + spanKg ⊂ spanKg + spanKg = spanKg. Thus Mg = spanKg, i.e., g is zpd. (cid:3) 9. Commutativity preserving maps Let ϕ be a linear map from one algebra into another. We say that ϕ preserves commuta- tivity if ϕ(x) and ϕ(y) commute whenever x and y commute. The problem of describing such maps has a long history in the context of associative algebras. It originated in linear algebra and operator theory, and later, in connection with the development of the theory of functional identities, moved to noncommutative ring theory. We refer the reader to [6, pp. 218-219] for historic details and references. One usually assumes that ϕ is bijective or at least surjective. In this case a natural possibility is that ϕ is a linear combination of a homomorphism or an antihomomorphism and a map having the range in the center of the target algebra. Without the surjectivity assumption the problem becomes much more involved as we have another natural possibility, i.e., maps with commutative range. The concept of a zpd Lie algebra actu- ally arose from the problem of describing not necessarily surjective commutativity preserving linear maps on finite dimensional central simple algebras [8]. The solution was based on first showing that Mn(F), viewed as a Lie algebra, is zpd. Although the notion of a commutativity preserving linear map is Lie-theoretic in nature, to the best of our knowledge it was studied by Lie algebra tools only in a few papers [18, 19, 21]. Our aim now is to show how it can be handled in zpd Lie algebras. More precisely, we will assume that the first Lie algebra is zpd and the target Lie algebra satisfies conditions suitable for using the theory of functional identities. Indeed functional identites are a standard tool in treating commutativity preservers, but results of such a type are nevertheless new. In light of examples of zpd Lie algebras that have been found in previous sections, they are now applicable to various concrete situations. Let us begin with a simple example indicating the delicacy of the problem. Example 9.1. Let L be a Lie algebra in which only linearly dependent elements commute. Then every linear map ϕ : L → L preserves commutativity. Indeed such Lie algebras usually are not zpd, but some of them, like sl2(F), are. This shows that one cannot expect that commutativity preserving maps between two zpd Lie algebras can be always nicely described. Some other conditions are needed, too. 22 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO The condition that we will require is that the target Lie algebra is a 3-free subset of an associative unital algebra. To avoid making this section too lengthy, we only refer to the book [6] for the definition and basic properties of such sets, and give the proof of the next lemma without a detailed explanation of the results that are used. Lemma 9.2. Let V be a vector space over a field F with char(F) 6= 2, let A be a unital associative algebra over F, let ϕ : V → A be a linear map and B : V × V → A be a skew- symmetric bilinear map. Suppose that (9.1) [ϕ(x), B(y, z)] + [ϕ(z), B(x, y)] + [ϕ(y), B(z, x)] = 0, ∀ x, y, z ∈ V. If the range of ϕ is a 3-free subset of A, then there exist λ ∈ Z, the center of A, and a skew-symmetric bilinear map ν : V × V → Z such that B(x, y) = λ[ϕ(x), ϕ(y)] + ν(x, y), ∀ x, y ∈ V. Proof. Since the range of ϕ is 3-free it follows from [6, Theorem 4.13] that there exist elements λ, λ′ ∈ Z and maps µ, µ′ : V → Z, ν : V × V → Z such that B(x, y) = λϕ(x)ϕ(y) + λ′ϕ(y)ϕ(x) + µ(x)ϕ(y) + µ′(y)ϕ(x) + ν(x, y), ∀ x, y ∈ V. As B is bilinear, [6, Lemma 4.6, Remark 4.7] imply that µ, µ′ are linear maps and ν is bilinear. Further, since B(x, y) = −B(y, x) holds by assumption, it follows that (λ + λ′)ϕ(x)ϕ(y) + (λ + λ′)ϕ(y)ϕ(x) + (µ + µ′)(x)ϕ(y) + (µ + µ′)(y)ϕ(x) + ν(x, y) + ν(y, x) = 0. Now, [6, Lemma 4.4] implies that λ = −λ′, µ = −µ′, and ν is skew-symmetric. Thus, we have B(x, y) = λ[ϕ(x), ϕ(y)] + µ(x)ϕ(y) − µ(y)ϕ(x) + ν(x, y). Using this form in (9.1) we obtain 2µ(y)[ϕ(x), ϕ(z)] + 2µ(z)[ϕ(y), ϕ(x)] + 2µ(x)[ϕ(z), ϕ(y)] = 0. Since char(F) 6= 2 it follows from [6, Lemma 4.4] that µ = 0. (cid:3) We will now derive two theorems on commutativity preservers from this lemma. To un- derstand their meaning, it is important to mention that Lie ideals of associative algebras are their 3-free subsets under rather mild assumptions [6, Corollary 5.16]. The simplest, but very illustrative example is that sln(F) is a 3-free subset of Mn(F) provided that n ≥ 3. The n = 2 case is an exception and indeed the next theorem does not hold if L = L′ = sl2(F), cf. Example 9.1. Similarly, Lie algebras of skew-symmetric elements in associative algebras with involution are "usually" 3-free subsets [6, Corollary 5.18], and so are their Lie ideals [6, Corollary 5.19]. It seems reasonable to conjecture that there are many other types of Lie algebras that are 3-free subsets of some of their associative envelopes. However, only little is known about this at present. Theorem 9.3. Let L and L′ be a Lie algebras over a field F with char(F) 6= 2. Suppose that L is zpd, L′ is centerless, and L′ is Lie subalgebra of an associative unital algebra A whose center is equal to F1. If L′ is a 3-free subset of A, then every commutativity preserving bijective linear map ϕ : L → L′ is a scalar multiple of an isomorphism. ZERO PRODUCT DETERMINED LIE ALGEBRAS 23 Proof. The condition that ϕ preserves commutativity can be interpreted as that the map f (x, y) = [ϕ(x), ϕ(y)] satisfies the condition from the definition of the zpd property. Thus, since L is zpd it follows (from Lemma 2.1) that there exists a linear map Φ : [L, L] → L′ such that (9.2) [ϕ(x), ϕ(y)] = Φ([x, y]), ∀ x, y ∈ L. Applying the Jacobi identity this yields [ϕ(x), ϕ([y, z])] + [ϕ(z), ϕ([x, y])] + [ϕ(y), ϕ([z, x])] = 0, ∀ x, y, z ∈ L. This makes it possible for us to apply Lemma 9.2. Accordingly, there exist λ ∈ F and a skew-symmetric bilinear map ν : L × L → F1 such that (9.3) However, since the center of L′ is 0 by assumption it follows from (9.3) that ν = 0. Con- sequently, λϕ is a Lie algebra homomorphism. We only have to show that λ 6= 0. Assume, therefore, that λ = 0. Then ϕ([x, y]) = 0 for all x, y ∈ L, yielding that L is Abelian. Since ϕ preserves commutativity this implies that L′ is Abelian, too. However, this is impossible for L′ is a 3-free subset of A. (cid:3) ϕ([x, y]) = λ[ϕ(x), ϕ(y)] + ν(x, y), ∀ x, y ∈ L. The next, and the last theorem is similar. The difference is that we impose another condi- tions on L and less conditions on ϕ, A, and L′ -- in fact, L′ does not even appear since we do not need to assume that the range of ϕ is a Lie subalgebra of A. Theorem 9.4. Let L be a perfect zpd Lie algebra over a field F with char(F) 6= 2, and let A be an associative unital algebra over F whose center Z is a field. If ϕ : L → A is a commutativity preserving linear map whose range is a 3-free subset of A, then ϕ is of the form (9.4) where α ∈ Z, θ is a Lie algebra homomorphism from L into A and β is a linear map from L into Z. ϕ(x) = αθ(x) + β(x) Proof. Just as in the previous proof one derives that (9.2) holds for some linear map Φ : [L, L] → A and (9.3) holds for some λ ∈ Z and a skew-symmetric bilinear map ν : L× L → Z. We remark that the range of ϕ cannot be contained in Z for it is a 3-free subset of A. Since L is perfect, this implies that λ 6= 0. Define θ, β : L → A by θ(x) = λ2Φ(x) and Writing α for λ−1 we see that all that remains to show is that β maps into Z and that θ is a Lie algebra homomorphism. We have β(x) = ϕ(x) − λ−1θ(x). β([x, y]) = ϕ([x, y]) − λ−1θ([x, y]) = λ[ϕ(x), ϕ(y)] + ν(x, y) − λΦ([x, y]) = ν(x, y) ∈ Z. Since L is perfect this proves that β maps into in Z. Consequently, θ([x, y]) = λ2Φ([x, y]) = λ2[ϕ(x), ϕ(y)] = [λϕ(x), λϕ(y)] = [θ(x) + λβ(x), θ(y) + λβ(y)] = [θ(x), θ(y)], proving that θ is a homomorphism. (cid:3) 24 MATEJ BRESAR, XIANGQIAN GUO, GENQIANG LIU, RENCAI L U, KAIMING ZHAO It should be mentioned that we now know quite a few perfect zpd Lie algebras, for example, complex finite-dimensional semisimple Lie algebras, loop algebras, untwisted affine Lie alge- bras, quantum torus Lie algebras in Sect.7, and some Gallilei algebras. Theorem 9.4 therefore generalizes some results from [18, 19, 21]. Acknowledgement. The majority of this paper was conducted during the four authors' visit to Soochow University, China, in the August of 2016. M. Bresar is partially supported by ARRS grant P1 -- 0288; X.Guo is partially supported by NSF of China (Grant 11101380) and the Outstanding Young Talent Research Fund of Zhengzhou University (Grant 1421315071); G. Liu is partially supported by NSF of China (Grant 11301143) and the school fund of Henan University (2012YBZR031, yqpy 20140044); R.Lu is partially supported by NSF of China (Grant 11471233, 11371134); K. Zhao is partially supported by NSF of China (Grants 11271109, 11471233) and NSERC. References [1] J. Alaminos, M. Bresar, J. Extremera, A. R. Villena, Maps preserving zero products, Studia Math. 193 (2009), 131 -- 159. [2] J. Alaminos, M. Bresar, J. Extremera, A. R. Villena, Zero Lie product determined Banach algebras, preprint. [3] B. N. Allison, S. Azam, S. Berman, Y. Gao, A. Pianzola, Extended affine Lie algebras and their root systems, Mem. Amer. Math. Soc. 126 (1997), no. 603. [4] M. Bresar, Introduction to noncommutative algebra, Universitext, Springer, 2014. [5] M. Bresar, Finite dimensional zero product determined algebras are generated by idempotents, Expo. Math. 34 (2016), 130 -- 143. [6] M. Bresar, M. A. Chebotar, W. S. Martindale 3rd, Functional identities, Birkhauser Verlag, 2007. [7] M. Bresar, M. Grasic, J. Sanchez, Zero product determined matrix algebras, Linear Algebra Appl. 430 (2009), 1486 -- 1498. [8] M. Bresar, P. Semrl, On bilinear maps on matrices with applications to commutativity preservers, J. Algebra 301 (2006), 803 -- 837. [9] D. Brice, H. Huang, On zero product determined algebras, Linear Multilinear Algebra 63 (2015), 326 -- 342. [10] S. Eswara Rao, K. Zhao, Highest weight irreducible representations of rank 2 quantum tori, Math. Res. Lett. 11 (2004), 615 -- 628. [11] M. Grasic, Zero product determined classical Lie algebras, Linear Multilinear Algebra 58 (2010), 1007 -- 1022. [12] M. Henkel, S. Stoimenov, On non-local representations of the ageing algebra, Nuclear Physics B 847 (2011), 612 -- 627. [13] J. E. Humphreys, Introduction to Lie algebras and representation theory, Graduate Texts in Mathematics, no. 9, Springer-Verlag, New York-Berlin, 1978. [14] V. Kac, Infinite dimensional Lie algebras, 3rd edition, Cambridge Univ. Press, 1990. [15] V. Kac, A. Raina, Bombay lectures on highest weight representations of infinite dimensional Lie algebras, World Sci., Singapore, 1987. [16] R. Lu, V. Mazorchuk, K. Zhao, On simple modules over conformal Galilei algebras, J. Pure Appl. Algebra 218 (2014), 1885 -- 1899. [17] P. Moravec, Unramified Brauer groups of finite and infinite groups, Amer. J. Math. 134 (2012), 1679 -- 1704. [18] D. Wang, Invertible linear maps on Borel subalgebras preserving zero Lie products, J. Algebra 406 (2014), 321 -- 336. [19] D. Wang, Z. Chen, Invertible linear maps on simple Lie algebras preserving commutativity, Proc. Amer. Math. Soc. 139 (2011), 3881 -- 3893. [20] D. Wang, X. Yu, Z. Chen, A class of zero product determined Lie algebras, J. Algebra 331 (2011), 145 -- 151. ZERO PRODUCT DETERMINED LIE ALGEBRAS 25 [21] W. J. Wong, Maps on simple algebras preserving zero products, II: Lie algebras of linear type, Pacific J. Math. 92 (1981), 469 -- 488. M. B.: Faculty of Mathematics and Physics, University of Ljubljana, and Faculty of Natural Sciences and Mathematics, University of Maribor, Slovenia E-mail address: [email protected] X. G.: School of Mathematics and Statistics, Zhengzhou University, Zhengzhou, P. R. China E-mail address: [email protected] G. L.: School of Mathematics and Statistics, Henan University, Kaifeng, P. R. China E-mail address: [email protected] R. L.: Department of Mathematics, Soochow University, Suzhou, P. R. China E-mail address: [email protected] K. Z.: Department of Mathematics, Wilfrid Laurier University, Waterloo, Canada, and Col- lege of Mathematics and Information Science, Hebei Normal University, Shijiazhuang, P. R. China E-mail address: [email protected]
1503.00564
3
1503
2019-05-20T11:56:23
On Scalable Monoids
[ "math.RA" ]
This brief exposition presents some basic properties of scalable monoids and quantity spaces, introduced in arXiv:1408.5024
math.RA
math
ON SCALABLE MONOIDS DAN JONSSON Abstract. This brief exposition presents some basic properties of scalable monoids and quantity spaces, introduced in [Jon14a]. Let X be a non-empty set and R a commutative unital ring. An associative 1. Introduction R-algebra with X as carrier set combines three operations on X: (1) addition of elements of X, a binary operation + : X × X → X, written (x, y) 7→ x + y, such that (X, +) is an abelian group; multiplication of elements of X, a binary operation · : X × X → X, written (x, y) 7→ x · y or (x, y) 7→ xy, such that (X, ·) is a monoid; scalar multiplication of elements of X by elements of R, a monoid action R × X → X, written (α, x) 7→ αx, where the multiplicative monoid of R acts on X, so that 1x = x and α(βx) = (αβ)x. (2) (3) (b) (c) These structures are linked pairwise: (a) addition and multiplication are linked by the distributive laws x(y + z) = xy + xz and (x + y)z = xz + yz; one of these laws suffices when multi- plication in X is commutative; addition and scalar multiplication are linked by the distributive laws α(x + y) = αx + αy and (α + β)x = αx + βx; multiplication and scalar multiplication are linked by the laws α(xy) = (αx)y and α(xy) = x(αy); one of these laws suffices when multiplication in X is commutative. Related algebraic systems can be obtained from associative R-algebras by removing one of the three operations and hence the links between the removed operation and the two others. Two cases are very familiar. A unital ring has only addition and multiplication of elements, linked as described in (a). A module has only addition and scalar multiplication of elements, linked as described in (b). The question arises whether it makes sense to define an "algebra without an additive group", with only multiplication and scalar multiplication, linked as described in (c). Would such a notion be of mathematical interest and useful for applications? Some reasons to give an affirmative answer to that question are found in this article. 2. Basic notions It is tempting to call an "algebra without an additive group" an "alebra", but that may sound somewhat frivolous, and considering the nature of this algebraic struc- ture, "scalable monoid" [Jon14a], abbreviated "scaloid", might be a better name. This structure can be defined more or less broadly. In the definition below, multi- plication in R is assumed to be commutative, but multiplication in X is not. 1 Dan Jonsson 2 Definition 1. A scalable monoid, or scaloid, is an algebraic structure incorporating structures described by (2), (3) and (c) above. More explicitly, a scalable monoid X over a commutative unital ring R is a monoid X such that there is a function called scalar multiplication, such that for any α, β ∈ R and any x, y ∈ X we have σ : R × X → X, (α, x) 7→ αx, (1) 1x = x, (2) α(βx) = (αβ)x, (3) α(xy) = (αx)y = x(αy). For clarity, we may denote the unit element of the monoid X by 1X or 1 and the unit element of the ring R by 1R. (cid:3) An invertible element of a scaloid X is an element x ∈ X which has a (necessarily unique) inverse x−1 ∈ X such that xx−1 = x−1x = 1X . We can define positive powers of x, denoted xk, in the usual way; if x is invertible, negative powers of x . By convention, x0 = 1X . By associativity, can be defined by setting x−k =(cid:0)x−1(cid:1)k xkxℓ = x(k+ℓ). A product of invertible elements is clearly an invertible element. The following two simple facts about scaloids will be used repeatedly: Lemma 1. Let X be a scalable monoid over R. (1) (αx)(βy) = (αβ)(xy) for any x, y ∈ X and α, β ∈ R. (2) α(βx) = β(αx) and (αβ)x = (βα)x for any x ∈ X and α, β ∈ R. Proof. (1). (αx)(βy) = α(x(βy)) = α(β(xy)) = (αβ)(xy). (2). α(βx) = α(β(1x)) = α((β1)x) = (β1)(αx) = β(1(αx)) = β(α(1x)) = β(αx), so (αβ)x = (βα)x. (cid:3) Note that the assumption that R is commutative is not used in the proofs given in Section 3, only the fact that αβ and βα act in the same way on X, as stated in Lemma 1 (2). The assumption that αβ = βα in R was also not used in the proof of Lemma 1 (2). 3. Ideals and additive group operations By removing the additive group of an R-algebra, we remove the three group operations (x, y) 7→ x + y, (x) 7→ −x and () 7→ 0 (addition, taking the inverse and selecting the group identity). It turns out, however, that under natural assumptions the group structure can be partially recovered. Specifically, a scalable monoid over R can be partitioned into equivalence classes in each of which a group structure corresponding to the additive group structure in R can often be defined. 3.1. Commensurability and ideals. Definition 2. Let X be a scalable monoid over R, and let ∼ be a relation on X such that x ∼ y if and only if αx = βy for some α, β ∈ R. Then x and y are said to be commensurable, and the relation ∼ is called commensurability. (cid:3) As a trivial consequence of this definition, x ∼ λx for any x ∈ X and λ ∈ R, since λx = 1(λx). Scalable Monoids 3 Proposition 1. Commensurability is an equivalence relation. Proof. The commensurability relation ∼ is reflexive because 1x = 1x, it is sym- metric because if αx = βy then βy = αx, and it is transitive because if αx = βy and γy = δz then γ(αx) = γ(βy) and β(γy) = β(δz), so (γα)x = (βδ)z since γ(βy) = β(γy). (cid:3) Definition 3. Let X be a scalable monoid. An ideal in X is an equivalence class with respect to commensurability. We denote the ideal containing x ∈ X by [x]. (cid:3) Proposition 2. Let X be a scalable monoid. The commensurability relation ∼ is a congruence relation on X, so the corresponding set of equivalence classes can be made into an algebraic structure X/∼ with a binary operation ([x], [y]) 7→ [x][y] defined by for any x, y ∈ X. X/∼ is a monoid with [1] as unit element. [x][y] = [xy] Proof. If αx = α′x′ and βy = β ′y ′ then (αx)(βy) = (α′x′)(β ′y ′), so (αβ)(xy) = (α′β ′)(x′y ′). Thus, if x ∼ x′ and y ∼ y ′ then xy ∼ x′y ′, so the product in X/∼ given by [x][y] = [xy] is well-defined. Also, for any x ∈ X, 1x = x1 = x, so [1][x] = [x][1] = [x], so [1] is a unit element for X/∼. (cid:3) X/∼ is the image of X under the mapping h : x 7→ [x], and it is clear that h is a homomorphism of monoids. Note that a scaloid is akin to a tensor product of modules. Recall that the tensor product of u ∈ U and v ∈ V is a tensor u ⊗ v belonging to U ⊗ V ; this is a module in general distinct from U and V . Similarly, the product xy of x and y in a scaloid X does not in general belong to the same ideal as x or y; in general [x], [y] 6= [xy]. This suggests an application of scaloids: "quantities" such as 1 N, 2 m or 2 Nm can be regarded as elements of a scaloid, specifically quantities with different "sorts" or "dimensions", corresponding to different equivalence classes of such quantities, namely ideals. Pursuing the analogy with tensor products, certain additional assumptions al- low us to regard each ideal as a module, making it possible to add and subtract quantities as described below. 3.2. Recovering additive group operations. Definition 4. Let X be a scalable monoid over R, and consider an ideal D ⊂ X. A pivot for D is an element p ∈ D such that for every x ∈ D there is a unique λ ∈ R such that x = λp. (cid:3) Proposition 3. If p and p′ are pivots for D, so that x = αp = α′p′ and y = βp = β ′p′ for any x, y ∈ D, then (α + β)p = (α′ + β ′)p′. Proof. As p′ ∈ R, there is a unique λ ∈ R such that p′ = λp. Thus, (α′ + β ′)p′ = (α′ + β ′)(λp) = ((α′ + β ′)λ)p = (α′λ + β ′λ)p. Also, x = αp = α′p′ = α′(λp) implies α = α′λ, and y = βp = β ′p′ = β ′(λp) implies β = β ′λ. (cid:3) Hence, the sum of two elements of a scalable monoid can be defined as follows: Dan Jonsson 4 Definition 5. Let X be a scalable monoid over R, and let p be a pivot for an ideal D. If x = αp and y = βp, we set x + y = (α + β)p. (cid:3) Note that if x = αp and y = βp then βx = β(αp) = α(βp) = αy, so x + y can be defined only if x ∼ y -- one cannot add incommensurable quantities. As a trivial consequence of Definition 5, addition in an ideal is commutative. If p is a pivot for an ideal D and q ∈ D then 0q = 0(λp) = (0λ)p = 0p, so there is a unique element 0D ∈ D such that 0D = 0q for any q ∈ D, defined by 0D = 0p for any pivot p for D. 0D + x = x for any x ∈ D. It follows immediately from Definition 5 that x + 0D = A unital ring R has a unique additive inverse −1 of 1R, and we set −x = (−1)x for all x ∈ X. If D has a pivot, we also set x − y = x + (−y) for any x, y ∈ D, so that x − x = −x + x = 0D for any x ∈ D. 4. Free commutative scalable monoids A commutative scalable monoid X is one where xy = yx for all x, y ∈ X. In this section, only commutative scalable monoids will be considered. Definition 6. Let X be a commutative scalable monoid over R. A (finite) basis for X is a set B = {b1, . . . , bn} of invertible elements of X such that every x ∈ X has a unique (up to order of factors) expansion where µ ∈ R and k1, . . . , kn are integers. (cid:3) x = µ bki i , nYi=1 Any product of invertible quantities is invertible, so any product of basis elements is invertible. As X is commutative, we have µ nYi=1 i ! ν bki nYi=1 i ! = (µν) bℓi nYi=1 b(ki +ℓi) i . 4.1. Quantity spaces. Below, only scaloids over a field K will be considered. Definition 7. A (finite-rank) free commutative scalable monoid over a field K, or a quantity space over K, is a commutative scalable monoid over K which has a (finite) basis. (cid:3) With a view to applications, elements of a quantity space may be called quan- tities, and ideals in a quantity space may be called dimensions. As explained in [Jon14a], a basis for a quantity space can be interpreted as a system of fundamental units of measurement. Lemma 2. Let X be a quantity space over K with a basis {b1, . . . bn}, and consider i . The following conditions are equivalent: x = µQn i and y = νQn i=1 bki (1) x ∼ y. (2) ki = ℓi for i = 1, . . . , n. (3) νx = µy, or equivalently µB(y)x = µB(x)y. i=1 bℓi Scalable Monoids Proof. (1) ⇒ (2). α, β ∈ K. As the expansion of z is unique, ki = ℓi for i = 1, . . . , n. i=1 bki If x ∼ y then (αµ)Qn i = z = (βν)Qn The implications (2) ⇒ (3) and (3) ⇒ (1) are trivial. (cid:3) i=1 bℓi i 5 for some 4.2. The measure of a quantity. Definition 8. Let X be a quantity space over K, and let B = {b1, . . . , bn} be a basis for X. The uniquely determined scalar µ ∈ K in the expansion x = µ bki i nYi=1 is called the measure of x relative to B and will be denoted by µB(x). (cid:3) For example, µB(1) = 1 for any B, because 1 = 1 · 1 = 1Qn Relative to a fixed basis, measures of quantities can be used as proxies for the quantities themselves. For example, the measure of a product of quantities is equal to the product of the measures of these quantities. i for any B. i=1 b0 Proposition 4. Let B = {b1, . . . , bn} be a basis for a quantity space X over K. (1) For any x ∈ X and λ ∈ K, µB(λx) = λµB(x). (2) For any x, y ∈ X, µB(xy) = µB(x)µB(y). i , where µ, ν ∈ K. i , so µB(λx) = λµ = λµB(x). i=1 b(ki +ℓi) i , so µB(xy) = µν =µB(x)µB(y). Proposition 5. A quantity x ∈ X is invertible if and only if µB(x) 6= 0, and for (cid:3) i=1 bki i=1 bℓi i=1 bℓi i=1 bki i=1 bki i=1 bki i (cid:17) = (λµ)Qn i and y = νQn i (cid:17) = (µν)Qn Proof. We have x = µQn (1). λx = λ(cid:16)µQn i (cid:1)(cid:16)νQn (2). (cid:0)µQn any invertible x ∈ X we have µB(cid:0)x−1(cid:1) = 1/µB(x). Proof. If µB(x) 6= 0 and x = µB(x)Qn = µB(x) nYi=1 i=1 b−ki i µB(x) i=1 b−ki i µB(x) Qn i=1 bki then i bki = 1, i !Qn so x is invertible. i=1 b−ki i µB(x) x = xQn If, conversely, x has an inverse x−1 then µB(x)µB(cid:0)x−1(cid:1) = Proposition 6. Let X be a quantity space over K. For every x ∈ [1], µB(x) does not depend on B. µB(cid:0)xx−1(cid:1) = µB(1) = 1, so µB(x) 6= 0 and µB(cid:0)x−1(cid:1) = 1/µB(x). (cid:3) Proof. Let B = {b1, . . . , bn} and bB =nbb1, . . . ,bbmo be bases for X. The quantity 1 i and 1 = 1Qm has the expansions 1 = 1Qn i=1bb0 i(cid:17) = µ bB(x) · 1 = i = µ bB(x)(cid:16)1Qm x = µB(x)Qn i and x = µ bB(x)Qm i=1bb0 i=1bb0 i(cid:1) = µ bB(x)Qn µ bB(x)(cid:0)1Qn It is common to refer to a quantity x ∈ [1] as a "dimensionless quantity", although x is not really "dimensionless" -- it belongs to, or "has", the dimension [1]. The fact that the measure of any x ∈ [1] does not depend on a choice of basis -- that is, a choice of fundamental units of measurement -- is the foundation for dimensional analysis [Bri22, Bar96, Jon14a]. i . In view of Lemma 2, therefore, i , so µB(x) = µ bB(x). (cid:3) i=1 b0 i=1 b0 i=1 b0 i=1 b0 Dan Jonsson 6 4.3. Additive group operations in quantity spaces. Proposition 7. Let X be a quantity space over K. (1) If x, y ∈ X, x ∼ y and x is invertible then y = κx for some κ ∈ K. (2) If x ∈ X is invertible and λx = λ′x for some λ, λ′ ∈ K then λ = λ′. Proof. (1). µB(y)x = µB(x)y by Lemma 2, and µB(x) 6= 0 by Proposition 5, so y = x. µB(y) µB(x) i=1 bki i (2). Let x have the expansion x = µQn i = z = λ′µQn If λx = λ′x then λµQn i=1 bki of z is unique, and µ 6= 0 since x is invertible, so λ = λ′. (cid:3) relative to a basis {b1, . . . , bn} for X. i , so λµ = λ′µ since the expansion i=1 bki Thus, every invertible quantity is a pivot for the dimension to which it belongs. This has an important consequence: Corollary 1. Every dimension in a quantity space has a pivot. Proof. An equivalence class is not empty, so for every dimension D there is some quantity µQn i=1 bki i ∈ D, so there is an invertible element 1Qn In a quantity space, x + y is thus defined if and only if x ∼ y. Addition of i=1 bki i ∈ D. (cid:3) quantities in a dimension relates to addition of measures in the following way: Proposition 8. Let X be a quantity space over K. For any basis B for X and x, y ∈ X such that x ∼ y, we have µB(x) + µB(y) = µB(x + y). i=1 bki Proof. Let x = µB(x)Qn y relative to B = {b1, . . . .bn}. Qn nYi=1 x + y = µB(x) i and y = µB(y)Qn i=1 bki i i=1 bki i be the expansions of x and is invertible, and thus a pivot, so bki i + µB(y) bki i = (µB(x) + µB(y)) bki i , nYi=1 nYi=1 so we have obtained the unique expansion of x + y relative to B, and this expansion shows that µB(x + y) = µB(x) + µB(y). (cid:3) In words, the measure of a sum of quantities is equal to the sum of the measures of these quantities. Also, µB(λx) = λµB(x), so measures represent quantities in a given dimension in the same way that coordinates represent vectors. 4.4. Groups of dimensions; cardinality of bases. If X is commutative then X/∼ is also commutative, and in this section we prove that X/∼ is actually a free abelian group, not only a commutative monoid. Proposition 9. Let X be a quantity space over K. For every dimension [x] ∈ X/∼ there is a unique dimension [x]−1 ∈ X/∼ such that [x][x]−1 = [x]−1[x] = [1]. i=1 bki i be the unique expansion of x relative to the basis . (By Lemma 2, y de- pends on [x], but not on its representative x.) Then [x] = [y] and [y][z] = [z][y] = [zy] = [1], so [x][z] = [z][x] = [1]. Furthermore, if [x]−1[x] = 1 then Proof. Let x = µQn {b1, . . . , bn}, and set y = 1Qn [x]−1 = [x]−1([x][z]) =(cid:16)[x]−1[x](cid:17)[z] = [z]. (cid:3) i and z = 1Qn i=1 b−ki i=1 bki i Scalable Monoids 7 Recall that a (finite) basis for an abelian group G is a set {b1, . . . , bn} of elements i , and that a free (finitely generated) abelian group is an abelian group for which such a basis exists. of G such that every x ∈ G has a unique expansion x =Qn i=1 bki Proposition 10. Let X be a quantity space over K. (1) If B = {b1, . . . , bn} is a basis for X, then B ∗ = {[b1], . . . , [bn]} is a basis with the same cardinality for X/∼. (2) Conversely, if B ∗ = {[b1], . . . , [bn]}, where each bi is invertible, is a basis for X/∼, then B = {b1, . . . , bn} is a basis with the same cardinality for X. i=1 bki i i=1 bki i=1 bki Proof. The unique expansions of bi, bi′ ∈ B relative to B are bi = 1bi and bi′ = 1bi′, respectively, so µB(bi) = µB(bi′ ) = 1. Hence, [bi] = [bi′ ] implies bi = bi′ since implies µB(bi′ )bi = µB(bi)bi′ by Lemma 2, so the surjective mapping bi ∼ bi′ bi 7→ [bi] is injective as well. i=1[bi]ki , so B ∗ generates X/∼. i=1[bi]ℓi, then hQn for i = 1, . . . , n by Lemma 2. (2). Let x be an arbitrary quantity in X. As B ∗ generates X/∼, we have [x] = is invertible, Proposition 7 (1) implies (1). Let [x] be an arbitrary dimension in X/∼. As B generates X, x = µQn i i =hQn for some µ ∈ K and some integers k1, . . . , kn, so [x] =hµQn Qn Also, if [x] =Qn i=1[bi]ki = hQn Qn that there exists some κ ∈ K and integers k1, . . . , kn such that x = κQn i i = hνQn Finally, if x = µQn i i = hQn hQn i=1[bi]ki =Qn i i, and as Qn i = νQn i i, so Qn i=1[bi]ki = Qn i i = i i, so ki = ℓi i=1 bki i=1[bi]ℓi , so ki = ℓi for i = 1, . . . , n, since B ∗ is a basis for X/ ∼. Also, x = µy = νy, where y is invertible, so µ = ν by Proposition 7 (2). (cid:3) then hµQn i i =hQn i=1 bki i . i=1 bℓi i i, so i=1 bki i=1 bℓi i=1 bki i=1 bℓi i i=1 bki i=1 bki i=1 bki i i=1 bℓi Corollary 2. Let X be a quantity space over K. (1) X/∼ is a free abelian group. (2) Any two bases for X/∼ have the same number of elements, any basis for X has the same number of elements as any basis for X/∼, and any two bases for X have the same number of elements. Proof. (1) is immediate. To prove (2), it suffices to note that any two bases for a free abelian group have the same cardinality. (cid:3) 4.5. Concerning algebraic structures acting on monoids of quantities. In theoretical discussions about measurement, the measure of a physical quantity is usually considered to be a real number, so it is natural to let the field associated with a quantity space be the real numbers R. However, some physical quantities, such as a distance or a mass, can only have positive or non-negative measures. This suggests that the field acting on the monoid of quantities should be replaced by a more general structure. In [Jon14a], the concept of a scaloid over a field is replaced by the concept of a scaloid over a so-called scalar system. A scalar system can be conveniently defined as a subset of a field, inheriting addition and multiplication in the field, such that it is closed under addition and its non-zero elements constitute a group under multiplication. The real numbers, the non-negative real numbers, and the positive real numbers are obvious examples of scalar systems. Dan Jonsson 8 There is, however, a way to accommodate constrained sets of measures without modifying the notion of a quantity space: we let functions of the form µB : D → R be partial functions, defined on some subset S of D, so that, for example, µB(x) > 0 for all x ∈ S. This approach is quite flexible; it also works, for example, when we require µB(S) to be a discrete set of numbers. It is an elementary observation that physical quantities are ordered; three grams is more than two grams, and so on. This means that it should be possible to equip a quantity space with some kind of order relation, not considered so far in this article. Such an order relation can be induced by the order on an ordered field acting on the monoid of quantities. Specifically, let X be a quantity space over an ordered field K. To induce an order relation, based on the order on K, on X, we need to to choose an orientation for X. Analogous to how we proceed for vector spaces, we choose an orientation by fixing a basis B = {b1, . . . , bn} for X and stipulating that for any D ∈ X/∼ and x ∈ D we have x ≥ 0D if and only if there are integers k1, . . . , kn and µ ∈ K such i where µ ≥ 0. Moreover, we stipulate that x ≥ y if and only if i=1 bki that x = µQn (x − y) ≥ 0D. In view of this construction, the fact that R is an ordered field gives another reason for considering quantity spaces over R. 5. In conclusion As shown in the Introduction, scalable monoids complement rings and modules from an abstract mathematical point of view. From the point of view of appli- cations, a quantity space is a natural counterpart to a vector space: quantities and vectors are both fundamental notions in physics and quantitative sciences gen- erally. Recall that the transformation of vector space theory into an axiomatic, "coordinate-free" form was completed during the interwar period in Europe, more than three quarters of a century ago, but the corresponding formulation of an axiomatic, "coordinate-free" notion of quantities has not yet been completed, in my opinion, despite important contributions [Dro53, Whi68a, Whi68b]). Indeed, the research reported here started as an attempt to model quantities, not as an attempt to fill a mathematical lacuna. (e.g., A crucial feature of systems of quantities is that two quantities can be added if and only if they are "commensurable", so mathematical models of systems of quantities should reflect this peculiar property, not shared by numbers without sorts. An algebraic structure satisfying this requirement can of course be found if sufficiently complicated algebraic structures are considered. However, it would seem to be desirable that systems of quantities be modeled by a formal mathematical structure defined in a simple, direct manner, similar to the definition of a vector space, and in such a way that the crucial "commensurability" feature is a natural consequence of this formulation. The definitions given here would seem to pass this test. Applications of quantity spaces, considered only informally and superficially here, are discussed at some length in [Jon14a, Jon14b]. Scalable Monoids 9 References [Bar96] Barenblatt G.I. (1996). Scaling, Self-similarity and Intermediate Asymptotics. Cam- bridge University Press. [Bri22] Bridgman P.W. (1922). Dimensional Analysis. Yale University Press. [Dro53] Drobot S. (1953). "On The Foundations of Dimensional Analysis". Studia Mathematica, 14, 84 -- 99. [Jon14a] Jonsson D. (2014). Quantities, Dimensions and Dimensional Analysis. arXiv:1408.5024. [Jon14b] Jonsson D. (2014). Dimensional Analysis: A Centenary Update. arXiv:1411.2798. [Whi68a] Whitney H. (1968). "The Mathematics of Physical Quantities. Part I: Mathematical Models for Measurement", American Mathematical Monthly, 75, 115 -- 138. [Whi68b] Whitney H. (1968). "The Mathematics of Physical Quantities. Part II: Quantity Struc- tures and Dimensional Analysis", American Mathematical Monthly, 75, 227 -- 256 University of Gothenburg, SE-405 30 Gothenburg, Sweden E-mail address: [email protected]
1304.2451
1
1304
2013-04-09T02:41:43
Multihomogeneous Normed Algebras and Polynomial Identities
[ "math.RA" ]
In this paper we consider PI-algebras $A$ over $\R$ or $\C$. It is well known that in general such algebras are not normed algebras. In fact, there is a nilpontent commutative algebra which is not a normed algebra, see [1]. Here we address the question of whether it is possible to find a normed PI-algebra $B$ with the same polynomial identities as $A$, and moreover, whether there is some Banach PI-algebra with this property. Our main theorem provides an affirmative answer for this question and moreover we also show the existence of a Banach Algebra with the same polynomial identities as $A$. As a byproduct we prove that if $A$ is a normed PI-algebra and its completion is nil, then $A$ is nilpotent. By introducing the concept of multihomogeneous norm we obtain as an application of our main results that if $\FX$ is multihomogeneus normed algebra and $A$ is a PI-algebra such that the completion of the quotient space $\FX/Id(A)$ is nil, then $A$ is nilpotent. Both applications are extensions of the study initiated in [4].
math.RA
math
Multihomogeneous Normed Algebras and Polynomial Identities Leandro Cioletti∗ Jos´e Antonio Freitas† Departamento de Matem´atica, Universidade de Bras´ılia, 70910-900 Bras´ılia, DF, Brazil Dimas Jos´e Gon¸calves‡ Departamento de Matem´atica, Universidade Federal de Sao Carlos, 13565-905 Sao Carlos, SP, Brazil May 1, 2018 Abstract In this paper we consider PI-algebras A over R or C. It is well known In fact, there is a that in general such algebras are not normed algebras. nilpontent commutative algebra which is not a normed algebra, see [1]. Here we address the question of whether it is possible to find a normed PI-algebra B with the same polynomial identities as A, and moreover, whether there is some Banach PI-algebra with this property. Our main theorem provides an affirmative answer for this question and moreover we also show the existence of a Banach Algebra with the same polynomial identities as A. As a byprod- uct we prove that if A is a normed PI-algebra and its completion is nil, then A is nilpotent. By introducing the concept of multihomogeneous norm we obtain as an application of our main results that if F hXi is multihomogeneus normed algebra and A is a PI-algebra such that the completion of the quo- tient space F hXi/Id(A) is nil, then A is nilpotent. Both applications are extensions of the study initiated in [4]. Key words: PI-Algebras, Normed Algebras, Banach Algebras. 2010 Mathematics Subject Classification: 16R10, 16R40, 46H10. ∗[email protected][email protected]; Partially supported by grant from CNPq No. 478318/2010-3 ‡[email protected]; Partially supported by grant from CNPq No. 478318/2010-3 1 1 Introduction We begin this article by stating precisely some of our main results and then we proceed to introduce the concept of multihomogeneous norm. In order to be concise and objective, we will skip the precise definition of some of the basic concepts needed here, such as PI-algebra and Normed algebra. These, together with other additional background concepts, will appear in detail in Section 2. The proofs of the results stated here are found in the last section. Let F be the field R or C and F hXi the free non-unitary associative algebra, freely generated over F by the infinite set X = {x1, x2, . . .}. All the algebras considered in this paper will be non-unitary, associative and over the field F . Thus for convenience we will only use the term algebra. A good example to keep in mind is the algebra F hXi. For a normed algebra A we write C(A) to denote its completion. If A is a PI-algebra then we denote by Id(A) the set of all polynomial identities of A. The statement of our first result is: Proposition 1. If A is a normed PI-algebra, then Id(A) = Id(C(A)). In other words this proposition tell us that every normed PI-algebra A has the same polynomial identities that some Banach PI-algebra. Since not all PI-algebras are normed PI-algebras, see for example [1], a natural question to ask is: given a PI-algebra A, is there some Banach PI-algebra B with the same polynomial identities of A ? As we said before we give an affirmative answer for this question and we also show how to construct such algebra B. To explain the construction we introduce some definitions. Let f = f (x1, . . . , xn) ∈ F hXi be a polynomial, which will be written as f = Xd1≥0,...,dn≥0 f (d1,...,dn) , where f (d1,...,dn) = f (d1,...,dn)(x1, . . . , xn) is the multihomogeneous component of f with multidegree (d1, . . . , dn). Definition 2. A norm · in F hXi is called multihomogenous if f (d1,...,dn) ≤ f for all f = f (x1, . . . , xn) ∈ F hXi and all d = (d1, . . . , dn). If F hXi is a normed algebra with respect to a multihomegeneous norm, then we say that F hXi is a MN-algebra. An example of MN-algebras can be obtained as follows. Take f = Pm αmm, where αm ∈ F and m is a monomial, then F hXi with the norm is a MN-algebra. f = Xm αm. 2 In the sequel, we prove that if F hXi is a MN-algebra and if A is a PI-algebra, then Id(A) is a closed ideal of F hXi. Thus the multihomogeneous norm in F hXi induces a norm in the quotient algebra F hXi/Id(A) by f + Id(A) = inf{f + g : g ∈ Id(A)}, where f ∈ F hXi. We remark that the quotient F hXi/Id(A) is a normed algebra with this norm and using this fact we obtain our second main result: Theorem 3. Let F hXi be a MN-algebra. If A is a PI-algebra, then Id(A) = Id(cid:18)C (cid:18) F hXi Id(A)(cid:19)(cid:19) . In particular, a PI-algebra has the same polinomial identities that some Banach PI-algebra. As an application, we obtain similar results as in the Grabiner's paper. In [4] the author proves the following: Theorem 4. Let A be a Banach algebra. If A is nil then A is nilpotent. In the above theorem, the algebra A is required to be a Banach algebra. Here we investigate when the nilpotency of an algebra A can be obtained by hypothesis imposed on C(A). In this direction our first result is Corollary 5. Let A be a normed PI-algebra. If C(A) is nil, then A is nilpotent. Our second result relates the nilpotency of A to the completion of certain quotient space related to the polynomial identities of A. To be more precise we prove the following: Corollary 6. Let F hXi be a MN-algebra and let A be a PI-algebra. If Id(A)(cid:19) C (cid:18) F hXi is nil, then A is nilpotent. 2 Banach and PI-Algebras An algebra A is said to be normed if it satisfies the followings properties: a) A has a norm k · k; b) kabk ≤ kakkbk for all a, b ∈ A. A normed algebra A is called Banach algebra if A is a complete normed space. It's well known that every normed algebra A is contained in some Banach algebra C(A) such that A is dense in C(A). This algebra is the completion of A. Here we recall its construction: we first define the relation ∼ in the set of all Cauchy sequences of A by (an)n ∼ (bn)n ⇐⇒ lim n→∞ kan − bnk = 0. 3 Denote by C(A) the set of all equivalence classes. If (an)n is a Cauchy sequence in A, we denote by [(an)n] its equivalence class. The algebraic operations in C(A) are defined as usual: [(an)n] + [(bn)n] = [(an + bn)n], for any λ ∈ F , we put λ[(an)n] = [(λan)n] and [(an)n][(bn)n] = [(anbn)n]. Endowed with these operations and with the norm k[(an)n]k = lim n→∞ kank we have that C(A) is a Banach algebra. Note that an element a ∈ A is identified with the class [(a)n] ∈ C(A) of the constant sequence equal to a. For more details see [6, 5]. Let F hXi be the free non-unitary associative algebra, freely generated over F by the infinite set X = {x1, x2, . . .}. The elements of F hXi are called polynomials and a polynomial of the kind xi1xi1 . . . xin is called monomial. A polynomial f (x1, . . . , xm) ∈ F hXi is called a polynomial identity for an algebra A if f (a1, . . . , am) = 0, for all a1, . . . , am ∈ A. We denote by Id(A) the set of all polynomial identities of A. If Id(A) 6= {0} then we say that A is a PI-algebra. The set Id(A) is an ideal in F hXi and has the property f (g1, . . . , gm) ∈ Id(A) for all f (x1, . . . , xm) ∈ Id(A) and g1, . . . , gm ∈ F hXi. Thus we say that Id(A) is a T-ideal. For details, see [2, 3]. Let F hXi(d1,...,dm) be the vector subspace of F hXi spanned by all monomials u = xj1 . . . xjt, where the variable xi appears di times in u for all i = 1, . . . , m. If f (x1, . . . , xm) ∈ F hXi(d1 ,...,dm) then we say that f is multihomegenous of mul- tidegree (d1, . . . , dm). Note that if f = f (x1, . . . , xm) ∈ F hXi, we can always write f = Xd1≥0,...,dm≥0 f (d1,...,dm) where f (d1,...,dm) ∈ F hXi(d1 ,...,dm). The polynomials f (d1,...,dm) are called the mul- tihomogenous components of f . Now we recall an important result that will be used in the next section. Theorem 7. If f = f (x1, . . . , xm) is a polynomial identity for an algebra A, then every multihomogeneous component of f is a polynomial identity for A. Proof. See [3], Theorem 1.3.2. We call the reader's attention to the fact that the above result holds for every infinite field F , but it is not always true for finite fields. 3 Proofs of the Main Results In this section we give the proofs of the main results of the paper. Proof. (Proposition 1) Since A ⊆ C(A), it follows that Id(C(A)) ⊆ Id(A). Let f (x1, . . . , xm) ∈ Id(A) and a1, . . . , am ∈ C(A). By the construction of C(A) we have f (a1, . . . , am) = f ([(a1n)n], . . . , [(amn)n]) = [(f (a1n, . . . , amn))n] = [(0)n]. The last identity implies that f ∈ Id(C(A)). Therefore Id(A) ⊆ Id(C(A)). 4 Let g(x1, . . . , xt) a polynomial and let g(d1,...,dt) its multihomogeneous compo- nent of multidegree (d1, . . . , dt). If m < t and dm+1 = dm+2 = . . . = dt = 0, then we write If t < m, then we write g(d1,...,dm,...,dt) = g(d1,...,dm). g(d1,...,dt) = g(d1,...,dt,0,...,0), where the number of zeros is m − t. With this convention we have the following lemma: Lemma 8. Let F hXi be a MN-algebra and let f = f (x1, . . . , xm) be a polynomial. If (fn)n is a sequence in F hXi such that fn → f , then for all multidegree d = (d1, . . . , dm). f (d1,...,dm) n → f (d1,...,dm) Proof. Once k · k is a multihomogeneous norm we have the following inequality kf (d1,...,dm) n − f (d1,...,dm)k ≤ kfn − f k. Since fn → f it follows that f (d1,...,dm) n → f (d1,...,dm). Proposition 9. Let A be a PI-algebra. If F hXi is a MN-algebra, then Id(A) is a closed ideal. Proof. Let (fn)n ∈ Id(A) be a sequence of polynomials such that fn → f . We want to prove that f ∈ Id(A). Write f = f (x1, . . . , xm) = X(d1,...,dm) f (d1,...,dm). By the Lemma 8, we have that f (d1,...,dm) Note that f (d1,...,dm) n → f (d1,...,dm) for all multidegree (d1, . . . , dm). n ∈ F hXi(d1,...,dm) ∩ Id(A) by the Theorem 7. Since F hXi(d1 ,...,dm) is a finite-dimensional vector space follows that F hXi(d1,...,dm) ∩ Id(A) has also finite dimension. Since every finite-dimensional space is closed in the norm topology, we have that F hXi(d1 ,...,dm) ∩ Id(A) is closed. Thus f (d1,...,dm) ∈ F hXi(d1,...,dm) ∩ Id(A) and therefore f ∈ Id(A). If A is a PI-algebra and F hXi is MN-algebra, then by the above proposition we can define a norm in the quotient algebra F hXi/Id(A): kf + Id(A)k = inf{kf + gk : g ∈ Id(A)}, where f ∈ F hXi. With this norm we have that F hXi/Id(A) is a normed alge- bra. So we can see that the Theorem 3 describes the polynomial identities of the completion of this quotient algebra. Now we proceed to its proof. 5 Proof. (Theorem 3) By a classical result in PI-Algebra we have Id(A) = Id(cid:18) F hXi Id(A)(cid:19) , see [3]. So the proof of the theorem follows immediately from Proposition 1. Proof. (Corollary 5) If C(A) is nil, then by Theorem 4, we have that C(A) is nilpotent. Thus x1x2 . . . xn is a polynomial identity of C(A) for some n. Since by Proposition 1 we have Id(A) = Id(C(A)), follows that A is nilpotent. Proof. (Corollary 6) Let B = F hXi/Id(A). If C(B) is nil, then by Theorem 4 we have that C(B) is nilpotent. Thus x1x2 . . . xn is polynomial identity of C(B) for some n. Since by Theorem 3 we have Id(A) = Id(C(B)), follows that A is nilpotent. References [1] H. G. Dales, Norming Nil Algebras, Proc. Amer. Math. Soc., 83, Number 1, 71 -- 74, 1981. [2] V. Drensky, Free algebras and PI-algebras, Graduate Course in Algebra, Springer, Singapore, 1999. [3] A. Giambruno, M. Zaicev, Polynomial identities and asymptotic methods, Math. Surveys Monographs 122, AMS, Providence, RI, 2005. [4] S. Grabine, The nilpotency of Banach nil algebras, Proc. Amer. Math. Soc., 21, 510, 1969. [5] I. Kaplansky, Set Theory and Metric Spaces, Allyn and Bacon Series in Ad- vanced Mathematics, Boston, Mass., 1972. [6] M. A. Naimark, Normed algebra, Wolters-Noordhoff, 3 edition, 1972. 6
1504.04001
1
1504
2015-04-15T19:52:18
Triangulable Leibniz Algebras
[ "math.RA" ]
A converse to Lie's theorem for Leibniz algebras is found and generalized. The result is used to find cases in which the generalized property, called triangulable, is 2-recognizeable; that is, if all 2-generated subalgebras are triangulable, then the algebra is also. Triangulability joins solvability, supersolvability, strong solvability, and nilpotentcy as a 2-recognizeable property for classes of Leibniz algebras.
math.RA
math
TRIANGULABLE LEIBNIZ ALGEBRAS TIFFANY BURCH AND ERNIE STITZINGER ABSTRACT: A converse to Lie's theorem for Leibniz algebras is found and generalized. The result is used to find cases in which the generalized property, called triangulable, is 2-recognizeable; that is, if all 2-generated subalgebras are triangulable, then the algebra is also. Triangulability joins solvability, supersolvability, strong solvability, and nilpotentcy as a 2-recognizeable property for classes of Leibniz algebras. Simultaneous triangulation of a set of linear transformations related to Leibniz algebras will be considered in this work. A necessary condition is that the minimum polynomials of the linear transformations are the products of linear factors. If the matrices commute, then this condition is sufficient. Lie's theorem is a generalization of this result, a result that is field dependent even in the algebraically closed case. Lie's theorem extends to Leibniz algebras. It can also be useful to have a condition on the set which guarantees simultaneous triangulation when extending to the algebraic closure, K, of the field of scalars, F . We will call this property, borrowing from Bowman, Towers and Varea [3], triangulable. Thus a Leibniz algebra A over a field F is triangulable on module M if the induced representation of K N A on K N M admits a basis such that the representing matrices are upper triangular. We find a condition on the Leibniz algebra that is equivalent to being triangulable. The condition is independent of the field and includes Lie's theorem. The condition is on A although triangulable refers to the action in the algebra that is over K. As an application, we consider to what extent an algebra is triangulable if all 2-generated subalgebras have the property. Such a property is called 2-recognizable, a concept investigated in groups, Lie algebras and Leibniz algebras for classes such as solvable, supersolvable, strongly solvable and, trivially, nilpotent and abelian. For an introduction to Leibniz algebras, see [1], [6] and [7]. Let M be a module for the Leibniz algebra A. Let left and right multiplication by x ∈ A be denoted by Tx and Sx, respectively. If Tx is nilpotent, then Sx is also nilpotent and an Engle theorem holds; that is, A acts nilpotently on M [2]. Define A to be nil on M if this property holds. If I is an ideal of a Leibniz algebra A, then I is nil on A if and only if I is nilpotent. We will show that A is triangulable on itself if and only if A2 is nilpotent. When A2 is nilpotent, then A is called strongly solvable, a term introduced in [3]. Lemma 1. Let B be an irreducible submodule of the A-module M such that dim(B) = 1. Then A2 ⊆ CA(B) = {a ∈ AaB = 0 = Ba}. Proof. Let x, y ∈ A, b ∈ B with xb = αxb where αx is a scalar. Then (xy)b = x(yb) − y(xb) = x(αyb) − y(αxb) = αxαyb − αyαxb = 0. Since B is irreducible, it follows that b(xy) = 0 ([1]). Hence A2B = BA2 = 0 and the result holds. (cid:3) Theorem 1. Let A be a Leibniz algebra and M be an A-module. There is a basis for M such that the representing matrices are in upper triangular form if and only if the linear transformations in the representation have minimum polynomials with all linear factors and A2 is nil on M . 1 We then have Corollary 1. Let A be a Leibniz algebra over an algebraically closed field and M be an A-module. There is a basis for M such that the representing matrices are in upper triangular form if and only if A2 is nil on M . Proof of Theorem. The condition on the minimum polynomials is equivalent to being able to tri- angulate all the linear transformations. Suppose also that A2 is nil on M . Then Tx, and hence Sx, is nilpotent for all x ∈ A2 ([2]) and A2 acts nilpotently on M by Engel's theorem. Let B be an irreducible submodule of M . It is enough to show that dim(B) = 1 for then the result will follow by induction. Since the submodule BA2 + A2B is contained in B, BA2 + A2B is 0 or B. If the latter holds, then B = BA2 + A2B = (BA2 + A2B)A2 + A2(BA2 + A2B) = . . . , which is never 0, a contradiction. Hence BA2 + A2B = 0 and BA2 = 0 = A2B. Therefore, 0 = (xy)b = x(yb) − y(xb) for all x, y ∈ A, b ∈ B. Hence x(yb) = y(xb) and TxTy = TyTx. Since B is irreducible, either Sx = 0 for all x ∈ A or Sx = −Tx for all x ∈ A [1]. Then either TxSy = −TxTy = −TyTx = SyTx or TxSy = 0 = SyTx on B and SxSy = TxTy = TyTx = SySx or SxSy = 0 = SySx on B. Hence all Tx, Sy commute on B. Thus these transformations are simultaneously triangularizeable on B. Hence dim(B) = 1 and the result holds in this direction. Suppose that there is a basis for M such that all the transformations are triangularizeable on this basis. Then there is a one dimensional submodule B such that A2B = 0 = BA2 by the lemma. A2 is nil on M/B by induction and hence on M . Since each transformation is triangularizeable, the minimum polynomials have linear factors. (cid:3) We state these results when A is acting on itself. A is called strongly solvable if A2 is nilpotent ([3], [5]). A is supersolvable if there is an increasing chain of ideal of A, each of codimension 1 in the next. Theorem 2. Let A be a Leibniz algebra over an algebraically closed field. Then A is supersolvable if and only if A is strongly solvable. Proof. A is supersolvable if and only if A triangulable on itself. By Corollary 1, this is equivalent to A2 being nil on A which in turn is the same as A2 being nilpotent. The last statement is the definition of strongly solvable. (cid:3) The general case looks like the following. Theorem 3. A is triangulable if and only if A2 is nil on A. Proof. Let A∗ = K N A where K is the algebraic closure of the base field for A. If A2 is nil on A, then A2 is nilpotent as is (A2)∗ = (A∗)2. Hence A∗ is supersolvable by the last result and A is triangulable by definition. The converse holds by reversing the steps. (cid:3) A property is n-recognizeable in a class of algebras if whenever all n generated subalgebras have the property, then the algebra has the property. The concept when n = 2 has been considered in groups, Lie algebras and Leibniz algebras for classes that are solvable, supersolvable, nilpotent and 2 strongly solvable (see [4], [5], [8]). A version of this has also been considered for triangulable in the Lie case in [3]. We considered it as an application of our result. Theorem 4. In the class of solvable Leibniz algebras, triangulable is 2 recognizable. Proof. Let N be a 2-generated subalgebra of A. Since N is triangulable, N 2 is nil on N and, thus, N is strongly solvable. Therefore A is strongly solvable by [5] and A2 is nil on A. Then, using Theorem 3, A is triangulable. (cid:3) The result can be extended from solvable to all algebras in characteristic 0, again using a result in [5]. Corollary 2. For Leibniz algebras, triangulable is 2-recognizeable at characteristic 0. Proof. Let A be a minimal counterexample. Simple Leibniz algebras are Lie algebras. Simple Lie algebras are 2-generated, hence A is triangulable. If I is a proper ideal in A, then all 2-generated subalgebras of I and A/I are strongly solvable by Theorem 3 and I and A/I are strongly solvable by Theorem 3 of [5] and A is solvable. The result holds by Theorem 4. (cid:3) References [1] D. Barnes, Some theorems on Leibniz algebras, Comm. Alg. 39 (2011) 2463-2472 [2] L. Bosko, A. Hedges, J.T. Hird, N. Schwartz, K. Stagg, Jacobson's refinement of Engel's theorem for Leibniz algebras, Involve 4 (2011)293-296 [3] K. Bowman, D. Towers, V. Varea, Two generator subalgebras of Lie algebras, Linear and Multilinear Algebra 55 (2007) 429-438 [4] R. Brandl, Zur Theorie der untergruppenabgeschlossenen Formationen: endliche Varietten, J.Algebra 73 (1981) 1-22 [5] T. Burch, M. Harris, A. McAlister, E. Rogers, E. Stitzinger, S.M. Sullivan, 2-recognizeable classes of Leibniz algebras, J. Algebra. 423 (2015). 506-513 [6] I. Demir, K. Misra, E. Stitzinger, On some structures of Leibniz algebras, AMS Contemporary Math. 623 (2014) 41-54 [7] J.-L. Loday, Une version non commutative des algebres de Lie: les algebres de Leibniz, Enseign Math. (2) (1993) 39 (3-4) 269-293 [8] K. Moneyhun, E. Stitzinger, Some finite varieties of Lie algebras, J. Algebra 143 (1991) 173-17 3
1811.07165
2
1811
2018-12-16T17:17:34
Constructing large self-small modules
[ "math.RA" ]
We give a method for constructing (possible large) self--small modules via some special homomorphisms of rings, called here weak epimorphisms.
math.RA
math
CONSTRUCTING LARGE SELF -- SMALL MODULES GEORGE CIPRIAN MODOI Abstract. We give a method for constructing (possible large) self -- small mod- ules via some special homomorphisms of rings, called here weak epimorphisms. Various kind of smallness appear naturally in the study of situations in which the covariant or contravariant hom functor induces an equivalence, respectively a duality between some categories of modules. For example Morita theory says that if R is an arbitrary ring, P is a progenerator in the category Mod-R of right R-modules and E = EndR(P ) is its endomorphism ring, then the functor HomR(P, −) : Mod-R → Mod-E is an equivalence, with the inverse the tensor product − ⊗E P . In these conditions, P has to be small, that is HomR(P, −) has to commute with arbitrary direct sums. The smallness notion can be generalized in various ways, by imposing some restrictions to the class of direct sums which the covariant hom functor has to commute. In this note we deal with the following generalization: A self -- small R-module is a module M such that HomR(M, M (I)) ∼= Hom(M, M )(I), naturally for every set I. Self -- small abelian groups (that is, Z-modules) were introduced by Arnold an Murley in [2]. The relevance of the study of self -- small abelian groups is justified by many papers (see, for example, [1] and the references therein). In this note we want to construct a module which is self -- small but it is large in some sense. More precisely, we want this self -- small module to be not small. Because finitely generated modules are always small, the modules we are looking for have to be infinitely generated. The method is inspired by the construction of the abelian group of p-adic integers Jp, where p is a prime. In this case, Jp is uncountable, that is its cardinality is also larger than the cardinality of the ring of integers Z. Note that another way of constructing large self -- small modules can be found in [8]. More precisely, from [8, Example 2.7] we learn that the direct product Qp Z/p is self -- small, but the direct sum Lp Z/p is not, where p runs over all primes and Z/n = Z/nZ for every n ∈ N. More generally, for a ring R let denote by SR a representative set of simple modules. Then in [8, Theorem 2.5 and Corollary 1.3] we find some sufficient conditions for the direct product QS∈SR S to be, respectively to be not self -- small. In what follows we consider two rings with one R and J, and we denote by Mod-R and Mod-J the respective categories of modules (which by default are left modules). Let ϕ : R → J a unitary ring homomorphism. Thus J has a natural structure of R−R-bimodule and ϕ induces a pair of adjoint functors (the restriction Date: December 18, 2018. 1991 Mathematics Subject Classification. 16D99, 20K40. Key words and phrases. self -- small module, weak epimorphism of rings. 1 2 GEORGE CIPRIAN MODOI and the induction of the scalars): ϕ∗ = HomJ (J, −) : Mod-J ⇄ Mod-R : (− ⊗R J) = ϕ∗. The restriction functor ϕ∗ acts as follows: ϕ∗(M ) = M and ax = ϕ(a)x for all J-modules M and all x ∈ M and a ∈ R. Henceforth it is obviously faithful, since it sends a J-linear map in itself, but seen as R-linear. Recall that ϕ is called an epimorphism of rings, if for every two parallel homo- morphisms of rings ψ, ζ : J → J ′ we have ψ · ϕ = ζ · ϕ ⇒ ψ = ζ. This is the case, exactly if ϕ∗ is full too, by [7, Ch. XI, Proposition 1.2], therefore if we have HomR(M, N ) ∼= HomJ (M, N ) for all M, N ∈ Mod-J. Inspired by this, we call ϕ weak epimorphism if HomR(J, J) ∼= HomJ (J, J), that is HomR(J, J) ∼= J. Proposition 1. If ϕ : R → J is a weak epimorphism of rings, then J is self -- small as R-module. Proof. Let I be a set and denote by πi : J (I) → J the projection of the coproduct of copies of J into its i-th component (i ∈ I). If f : J → J (I) is an arbitrary R-linear map, then πif : J → J is R-linear for all i ∈ I. According to our hypothesis it is J-linear too, therefore it is determined by πif (1) ∈ J. Because πif (1) 6= 0 only for a finite number of i's, we conclude that πI f = 0 for almost all i ∈ I, hence f factors through a finite subcoprodct of J (I), what is the same as saying that HomR (cid:0)J, J (I)(cid:1) ∼= Hom(J, J)(I). (cid:3) Since epimorphisms of rings are obviously weak epimorphisms too we obtain: Corollary 2. If ϕ : R → J is an epimorphism of rings, then the R-module J is self -- small. Example 3. The inclusion Z → Q is known to be an epimorphism of rings, namely one which is not surjective. Therefore Corollary 2 above gives us a new proof that the abelian group Q is self -- small. In the sequel we assume that the ring R is commutative. Thus Mod-R coincide to the category of right R-modules, and HomR(M, N ) is an R-module for all M, N ∈ Mod-R. In Mod-R consider an ascending chain of submodules of the module (DS) Z1 µ1→ Z2 µ2→ Z3 → . . . , Z∞ = lim → Zn = lim → (Z1 µ1→ Z2 µ2→ Z3 → . . .) = [ Zn, the morphisms µn being inclusions. Relative to the above chain consider the fol- lowing conditions: (1) All modules Zm are finitely presented. (2) HomR(Zm, Zn) ∼= Zm naturally, for all 1 ≤ m ≤ n. (3) The R-module Z∞ is injective relative to all exact sequences 0 → Zm µn→ Zm+1 → Zm+1/Zm → 0, with m ≥ 1. CONSTRUCTING LARGE SELF -- SMALL MODULES 3 (4) Z1 is simple, and denote by U the annihilator of Z1 in R, that is U is a maximal ideal in R and there is a short exact sequence 0 → U → R → Z1 → 0. Moreover assume that Zm+1U = Zn, for all m ∈ N∗. (5) Zm ⊗ Z1 ∼= Z1 naturally, for all m ∈ N∗. Note that the condition (3) is automatically satisfied, if we know that the R- module Z∞ is injective. On the other hand we can replace (3) with a condition relative to the direct system (DS), rather than relative to its direct limit Z∞, as in the the following: (3') The R-module Zn is injective relative to all exact sequences 0 → Zm µn→ Zm+1 → Zm+1/Zm → 0, with 1 ≤ m < n. Lemma 4. If (1) and (3') are satisfied then (3) holds too. Proof. The condition (3') implies that the induced homomorphism HomR(Zm+1, Zn) → HomR(Zm, Zn) is surjective for all 1 ≤ m < n. The condition (1) says that all Zi, i ≥ 1 are finitely generated, and this means the functors HomR(Zi, −) commute with direct limits as we can see from [7, Ch. V, Proposition 3.4]. We deduce that the induced homomorphism HomR(Zm+1, Z∞) ∼= lim → HomR(Zm+1, Zn) HomR(Zm, Zn) ∼= HomR(Zm, Z∞) → lim → is also surjective, therefore (3) holds. (cid:3) Lemma 5. If (1) and (2) hold, we have for all m ≥ 1 a natural isomorphism: HomR(Zm, Z∞) ∼= Zm. Proof. Using again the property that HomR(Zi, −) commutes with direct limits, for all i ≥ 1, we get: HomR(Zm, Z∞) = HomR(Zm, lim → Zn) ∼= lim → HomR(Zm, Zn) ∼= Zm, where the last isomorphisms follows from the fact that (2) implies that the direct system {HomR(Zm, Zn)}n≥1 looks like HomR(Z1, Zm) → . . . → HomR(Zm−1, Zm) → Zm =→ Zm =→ Zm =→ . . . , that is it has a cofinal constant subsystem. (cid:3) Assume that (1) and (2) hold. For all n ≥ 1, we denote δn the composed homomorphism Zn+1 ∼=→ HomR(Zn+1, Z∞) (µn)∗→ HomR(Zn, Z∞) ∼=→ Zn, where the isomorphisms are coming from Lemma 5. We obtain an inverse system of R-modules (IS) Z1 δ1← Z2 δ2← Z3 ← . . . Let now denote J = EndR(Z∞). Thus J is naturally an R-algebra, and let ϕ : R → J denote the structure homomorphism of this algebra. 4 GEORGE CIPRIAN MODOI Lemma 6. If (1) and (2) hold, we have a natural isomorphism in Mod-R: J ∼= lim ← Zn = lim ← (Z1 δ1← Z2 δ2← Z3 ← . . .). Proof. The chain of isomorphisms (the last one coming from Lemma 5) J = HomR(Z∞, Z∞) ∼= HomR(lim → Zn, Z∞) ∼= lim ← HomR(Zn, Z∞) ∼= lim ← Zn. proves our lemma. (cid:3) For the inverse system (IS) we denote δjj = 1Zj and δji = δj . . . δi, for all 1 ≤ j ≤ i. With these notations, the inverse system is called Mittag -- Leffler if for each k ≥ 1 there is j > k such that Im(δki) = Im(δkj ) for all j ≤ i. In particular this is always true, provided that the homomorphisms δi are surjective, for all i ≥ 1. Lemma 7. If (1), (2) and (3) hold, then the inverse system (IS) is Mittag -- Leffler. Proof. The homomorphism (µn)∗ is surjective by (3), so the same property is true for δn, and the conclusion follows. (cid:3) From now on, we assume that all conditions (1)-(5) hold. Lemma 8. We have Zn+m/Zm ∼= Zn for all n, m ∈ N∗. Proof. First we will show that Zn+1/Zn ∼= Z1 for all n ∈ N∗. Indeed, applying the functor Zn+1 ⊗R − to the short exact sequence 0 → U → R → Z1 → 0, keeping in the mind that Zn = Zn+1U is the image of the map Zn+1 ⊗R U → Zn+1 ⊗R R and using condition (5) for the isomorphism in the last vertical arrow, we get a commutative diagram with exact rows Zn+1 ⊗R U Zn+1 ⊗R R Zn+1 ⊗R Z1 0 / Zn which proves our claim. ∼= / Zn+1 ∼= / Z1 0 / 0 Fix n ∈ N∗ and proceed by induction on m. For m = 1, we apply the functor HomR(−, Z∞) to the exact sequence from the second row of the last diagram. According to (3), we get an exact sequence too, which by Lemma 5 looks like: 0 → Z1 → Zn+1 → Zn → 0, proving our desired isomorphism Zn+1/Z1 ∼= Zn. Suppose now that Zn+m/Zn ∼= Zm. Then construct the diagram having exact rows and columns (the exactness of the rows is shown in the first part of this proof, the induction hypothesis gives exactness of the first column, and for the second / /   / /   / /   / / / / CONSTRUCTING LARGE SELF -- SMALL MODULES 5 column it is obvious): 0 0 / Zm / Zm+1 / Zn+m / Zn+m+1 0 0 / Z1 / Z1 / 0 / 0 Zn 0 Zn+m+1/Zm+1 0 Now the Ker-Coker lemma gives us the isomorphism Zn+m+1/Zm+1 ∼= Zn. Remark 9. Puttig together above lemmas, we deduce that for all n, m ∈ N∗ we have the short exact sequences (cid:3) 0 → Zn → Zn+m → Zm → 0 and 0 → Zn → Zn+m → Zm → 0 and the functor HomR(−, Z∞) sends them to each other. Lemma 10. There is a short exact sequence 0 → J u→ J → Z1 → 0 such that Im u = U J. Proof. Consider the diagram with exact columns: 0 0 Z1 0 Z1 Z2 0 Z2 Z3 =o Z1 =o Z1 Z1 0 0 0 · · · · · · · · · Note that the involved inverse systems are Mittag Leffler by Lemma 7, therefore the their inverse limits are exact by [4, Theorem 5]. Therefore the inverse limit gives us the desired short exact sequence. By its construction the homomorphism u acts as follows: for all (x1, x2, x3, . . .) ∈ J (that is (x1, x2, x3, . . .) ∈ Qn≥1 Zn such that δn(xn+1) = xn, for all n) we have u(x1, x2, x3, . . .) = (0, x1, x2, . . .), so U Zn+1 = Zn, for all n ≥ 1 implies U J = Im u. (cid:3)     /   /   / / /   /   / /             o o   o o   o o   o o   o o   o o   o   o   o o 6 GEORGE CIPRIAN MODOI Lemma 11. The following sentences hold: (a) For all n ≥ 1 we have Zn ⊗R J ∼= Zn as (left) J-modules. (b) For all n ≥ 1 we have HomR(J, Zn) ∼= Zn as R-modules. Proof. Note first that Zn ∼= HomR(Zn, Z∞) is a left J = EndR(Z∞)-module. (a). We proceed by induction on n. For n = 1 we apply the functor Z1 ⊗R − to the short exact sequence 0 → U J → J → Z1 → 0 coming from Lemma 10. Since U is the annihilator of Z1 we deduce Z1 ⊗R U J = 0, so we get an isomorphism Z1 ⊗R J ∼=→ Z1 ⊗R Z1, so Z1 ⊗R J ∼= Z1. Now suppose Zn ⊗R J ∼= Zn. Starting from the short exact sequence 0 → Zn → Zn+1 → Z1 → 0 given by Lemma 8) we construct the commutative diagram with exact rows: Zn ⊗R J Zn+1 ⊗R J Z1 ⊗R J ∼= / Zn 0 / Zn+1 ∼= / Z1 0 / 0 whose vertical maps are obtained from the natural homomorphism − ⊗R J ∼= HomJ (J, −) ⊗R J = ϕ∗ · ϕ∗ → 1Mod-J , the last arrow coming from the adjunction. Then the middle vertical arrow is an isomorphism too, proving the conclusion. (b). Using first the (proof of the) point (a), and second the adjunction isomor- phism we obtain an isomorphism of R-modules HomJ (Zn, Zn) ∼= HomJ ((ϕ∗ · ϕ∗)(Zn), Zn) ∼= HomR(ϕ∗(Zn), ϕ∗(Zn)) = HomR(Zn, Zn) ∼= Zn. Combining it with the adjunction isomorphism between the functors HomJ (Zn, −) : Mod- ⇄ Mod-R : Zn ⊗R − and the isomorphism of part (a) we get the isomorphisms of R-modules: HomR(J, Zn) ∼= HomR(J, HomJ (Zn, Zn)) ∼= HomJ (Zn ⊗R J, Zn) ∼= HomJ (Zn, Zn) ∼= Zn concluding the proof. (cid:3) Theorem 12. With the notations above, if all conditions (1)-(5) are true, then ϕ : R → J is a weak epimorphism of rings. Consequently J is a self -- small R- module. Proof. Using the isomorphism from the point (b) of Lemma 11 we get HomR(J, J) = HomR(J, lim ← Zn) ∼= lim ← HomR(J, Zn) ∼= lim ← Zn ∼= J, therefore the ring homomorphism ϕ : R → J is a weak epimorphism. Then J is self -- small as R-module, by Proposition 1. (cid:3) Example 13. Let R = Z and let p be a prime. The direct system Z/p1 → Z/p2 → Z/p3 → . . . , / /   / /   / /   / / / / CONSTRUCTING LARGE SELF -- SMALL MODULES 7 whose direct limit is the cocyclic abelian group Z/p∞, satisfies the conditions (1)-(5). Thus Theorem 12 gives a proof that the group of p-adic integers Jp = HomZ(Z/p∞, Z/p∞) is self -- small (for details, see also [5]). Example 14. Let R be a Dedekind ring, and let m be a maximal ideal. Put Zi = R/mi, for all i ≥ 1. Then S = Z1 is a simple R-module, and modules Zi are indecomposable, uniserial, with the composition series of the form 0 ⊆ Z1 ⊆ . . . ⊆ Zi−1 ⊆ Zi whose factors are all isomorphic to S. Moreover for every i ≥ 1 there is an exact sequence 0 → S → Zi+1 → Zi → 0. For more details concerning these modules we refer to [6, 1.4]. Then we obtain a direct system (DS) satisfying the conditions (1)-(5), so its inverse limit, the so called m-adic module, J = lim ← i is self -- small as R-module. R/m Acknowledgements. The author would like to thank Simion Breaz and Jan Zemlicka for a (quite old) discussion, in which they made him aware of the im- portance of constructing large self -- small modules, as a counterpart of their work [3], and to the first named of them for some (more recent) valuable comments and suggestions. Last but not least, the author is very indepted to Jan Stov´ıcek for pointing him out a very serious error made in a previous version of this paper. References [1] Albrecht U., Breaz S., Wickless W., Self -- small abelian groups, Bull. Aust. Math. Soc., 80 (2009), 205 -- 216. [2] Arnold, D. M., Murley, C. E., Abelian groups, A, such that Hom(A,-) preserves direct sums of copies of A, Pacific J. Math., 56, (1975), 7 -- 21. [3] Breaz S., Zemlicka J., When every self -- small module is finitely generated, J. Algebra 315 (2007), 885 -- 893. [4] Emmanouil I., Mittag -- Leffler condition and the vanishing of lim 1, Topology, 35(1996), 267 -- ← 271. [5] Fuchs L., Infinite Abelian Groups, vol I, Academic Press, 1970. [6] Ringel C. M., Algebraically Compact Modules Arising from Tubular Families. A Survey, Algebra Colloq., 11 (2004), 155 -- 172. [7] Stenstrom B., Rings of Quotients, Springer Verlag, Berlin, Heidelberg, New York, 1975. [8] Zemlicka J., When products of self -- small modules are self -- small, Comm. Alg. 36 (2008), 2570 -- 2576. Babes¸ -- Bolyai University, Faculty of Mathematics and Computer Science, 1, Mihail Kogalniceanu, 400084 Cluj -- Napoca, Romania E-mail address: [email protected]
1808.01407
1
1808
2018-08-04T01:57:36
Some notes on the ternary modular commutator
[ "math.RA" ]
We define a relation that describes the ternary commutator for congruence modular varieties. Properties of this relation are used to investigate the theory of the higher commutator for congruence modular varieties.
math.RA
math
SOME NOTES ON THE TERNARY MODULAR COMMUTATOR ANDREW MOORHEAD Abstract. We define a relation that describes the ternary commutator for congruence modular varieties. Properties of this relation are used to investigate the theory of the higher commutator for congruence modular varieties. 1. Introduction The topic of these notes is commutator theory. Specifically, we study higher com- mutators which are a higher arity generalization of the classical binary commutator for Mal'cev varieties that was discovered by Smith in [12]. Smith's commutator was extended to modular varieties by Hagemann and Hermann in [6]. The theory of the modular commutator is developed in detail by Freese and McKenzie in [4] and Gumm in [5]. Commutator theory has been investigated for varieties that are not modular, notably by Kearnes and Szendrei in [8] and Kearnes and Kiss in [7]. The definition of the binary commutator was generalized by Bulatov in [2] to a definition of a commutator of higher arity. The basic properties of this higher commutator were developed for congruence permutable varieties by Aichinger and Mudrinski in [1]. The author of [9] showed many of the basic properties true of the higher commutator in permutable varieties hold also for modular varieties. In [13], Wires develops several properties of higher commutators outside of the context of modularity. Our main objective here is to show that the development of the binary commuta- tor for congruence modular varieties is a special case of a more general development of a commutator of arity ≥ 2 for congruence modular varieties, although we present here only the ternary case. Specifically, the binary modular commutator is shown in [4] to be equivalently defined in three ways: (1) as the least congruence satisfying the term condition, (2) as the union of classes related to the diagonal by a special congruence called ∆, or (3) the greatest binary operation on all congruence lattices across a variety satisfying certain conditions. The higher commutator was defined by Bulatov as a higher arity operation obtained by generalizing the term condition. In [11], Oprsal develops the theory of the higher commutator for permutable varieties by finding the right way to define ∆ in the higher arity case. We extend this idea to the theory of the ternary commutator for a modular variety. Date: August 7, 2018. This material is based upon work supported by the National Science Foundation grant no. DMS 1500254. 1 2 ANDREW MOORHEAD The primary value of this treatment of the modular ternary commutator is that it involves a detailed and nontrivial example of a type of relation that we call a 'higher dimensional congruence.' Higher dimensional congruences are used to develop properties of the higher commutator for Taylor varieties in [10]. The structure of the note is as follows: In Sections 2-4 we develop notation, list the properties of modularity that are to be used and briefly review properties of ∆ for the binary case. In Section 5 we introduce the idea of a complex of matrices. In Section 6 these complexes of matrices are used to define a new type of centrality which is shown to be equivalent to the usual term condition centrality in a modular variety. In Section 7 we define ∆ and use it to characterize the ternary commutator. In Section 8 we show that the ternary commutator is related to the binary commutator by the inequality [[θ0, θ1], θ2] ≤ [θ0, θ1, θ2]. In the final section we show that the ternary commutator and 3-dimensional cube terms are related in a manner which is analogous to the relationship between the binary commutator and a Mal'cev operation. 2. Matrices and Centrality In this section we define matrices. Relations that are comprised of such matrices can be used to define the Bulatov or what we call the term condition commuta- tor. Although this note deals with the ternary commutator, the definitions given here are for arbitrary arity. 2.1. Dimension Two. We begin with (2)-dimensional matrices. The binary com- mutator is defined with the so-called term condition. Let A be an algebra and let θ0, θ1, δ ∈ A. We say that θ0 centralizes θ1 modulo δ if for all t ∈ Pol(A), a0 ≡θ0 b0 and a1 ≡θ1 b1, t(a0, a1) ≡δ t(a0, b1) =⇒ t(a0, b1) ≡δ t(b0, b1). This is the standard definition of the term condition, but the term condition can be formulated in terms of matrices, which we shall now define. The set 22 is a natural coordinate system for a square and we say that a relation R ⊆ A22 is (2)-dimensional. We will usually orient our squares like so that when we write (0, 1) (1, 1) , (0, 0) (1, 0) h = c a d b ∈ R for some (2)-dimensional relation R, we mean that h(0,0) = a, h(1,0) = b and so on. Now define the algebra of (θ0, θ1)-matrices to be  x  x y y M (θ0, θ1) := SgA22 : (cid:104)x, y(cid:105) ∈ θ0 3  .  : (cid:104)x, y(cid:105) ∈ θ1 The centrality condition C(θ0, θ1; δ) is equivalent to the assertion where the diagram in parenthesis is a picture representing the implication Similarly, C(θ1, θ0; δ) is equivalent to the assertion (cid:104)a, c(cid:105) ∈ δ =⇒ (cid:104)b, d(cid:105) ∈ δ.  y x  ∪  c δ a  c a y x  , d b  . d b c a ∀ d b ∈ M (θ0, θ1) c a ∀ d b ∈ M (θ0, θ1) Now, set (cid:94) [θ0, θ1] := δ {δ : C(θ0, θ1; δ)}. 2.2. Arbitrary Dimension. For higher arity commutators we prefer at the outset to define term condition centrality and the commutator in terms of matrices. The definition we give is easily seen to be equivalent to the usual one, see [9]. Let A be an algebra and let k ∈ N ≥1. The set of functions 2k is a coordinate system for the (k)-dimensional hypercube, where two functions are connected by an edge if and only if they differ in exactly one coordinate. An A-invariant relation is called a (k)-dimensional invariant relation. Members of such an R are what we call vertex labeled hypercubes, although we usually not be so formal. R ≤ A2k Take an m ∈ A2k . Notation is needed to single out factors of m that are lower dimensional matrices. We specify a partial function g : k → 2 by a pair of tu- ples, D = (d0, . . . , dl−1) and R = (g(d0), . . . , g(dl−1)), where the tuple D lists the elements of the domain of g in order and dom(g) = l. Let the map crsecR D : A2k → A2k\D be the projection onto those factors indexed by functions f ∈ 2k that extend g. Formally, (crsecR D(m))h = mf , where f = g ∪ h. In case D = k − 2 or D = k − 1 we denote the map crsecR D, respectively. When D = 1 the map will be called faceR D. Suppose D = k − 1 and let i ∈ k \ D. When R is not the constant 1 tuple D(m) an (i)-supporting line, and when R is the constant 1 tuple D(m) the (i)-pivot line. Similarly, suppose D = k − 2 and take we call lineR we call lineR D by squareR D or lineR 4 ANDREW MOORHEAD i (cid:54)= j ∈ k \ D. When R is not the constant 1 tuple we call squareR supporting square, and when R is the constant 1 tuple we call squareR (i, j)-supporting square. D(m) an (i, j)- D(m) the A picture of a matrix, pair of squares and a line is given in Figure 1. Notice the orientation of the cube with respect to the coordinates, as this orientation is used throughout this note. i (cubek i (a, b) ∈ A2k The term condition definition of higher centrality can now be formulated in terms i (a, b)) and i (a, b)) are constant matrices with value a and b, respectively. Now let of matrices. Let cubek be the matrix such that face0 face1 T = (θ0, . . . , θk−1) ∈ Con(A)k be a tuple of congruences and set i (cubek M (θ0, . . . , θk−1) = SgA2k ({cubek i (a, b) : i ∈ k and (cid:104)a, b(cid:105) ∈ θi}) We call M (θ0, . . . , θk−1) the algebra of (θ0, . . . , θk−1)-matrices. If no confusion can result, we will refer to M (θ0, . . . , θk−1) as M (T ), and call its elements T - matrices. Now we can define higher centrality, see [9] for the same definition. Definition 2.1. Let A be an algebra, k ≥ 2, T = (θ0, . . . , θk−1) ∈ Con(A)k, and δ ∈ Con(A). For j ∈ k, we say that T = (θ0, . . . , θk−1) is centralized at j modulo δ if the following property holds for all (θ0, . . . , θk−1)-matrices m: (*) If every (j)-supporting line of m is a δ-pair, then the (j)-pivot line of m is a δ-pair. We write C(T ; j; δ) to indicate that T is centralized at j modulo δ. Now, set (cid:94) {δ : C(T ; j; δ)}. [T ]j := 3. Day Terms The following classical results on congruence modular varieties are needed. For proofs see [3], [5] or [4]. Proposition 3.1 (Day Terms). A variety V is congruence modular if and only if there exist term operations me(x, y, z, u) for e ∈ n + 1 satisfying the following identities: (1) me(x, y, y, x) ≈ x for each 0 ≤ e ≤ n, (2) m0(x, y, z, u) ≈ x, (3) mn(x, y, z, u) ≈ u, (4) me(x, x, u, u) ≈ me+1(x, x, u, u) for even e, and (5) me(x, y, y, u) ≈ me+1(x, y, y, u) for odd e Proposition 3.2 (Lemma 2.3 of [4]). Let V be a variety with Day terms me for e ∈ n + 1. Take δ ∈ Con(A) and assume (cid:104)b, d(cid:105) ∈ δ. For a tuple (cid:104)a, c(cid:105) ∈ A2 the following are equivalent: (1) (cid:104)a, c(cid:105) ∈ δ (2) (cid:104)me(a, a, c, c), me(a, b, d, c)(cid:105) ∈ δ for all e ∈ n + 1 5 Figure 1 a=m(0,0,0)b=m(1,0,0)c=m(0,1,0)d=m(1,1,0)e=m(0,0,1)f=m(1,0,1)g=m(0,1,1)h=m(1,1,1)abcdefghface02face12line(1,1)(0,2),the(1)-pivotline 6 ANDREW MOORHEAD 4. Binary Commutator and the ∆ relation The binary commutator of two congruences θ0, θ1 of A can be developed by examining a special congruence called ∆θ0,θ1 , which is a congruence of θ0, considered here to be a subalgebra of A2. The definition of ∆θ0,θ1 is as follows: ∆θ0,θ1 = Cgθ0({(cid:104)(cid:104)x, x(cid:105),(cid:104)y, y(cid:105)(cid:105) : (cid:104)x, y(cid:105) ∈ θ1}) It is informative to use the matrices and coordinates introduced earlier. With this perspective in mind, θ0-pairs become 1-dimensional matrices, which according to our convention are horizontal lines. The pair (cid:104)a, b(cid:105) is ∆θ0,θ1 related to (cid:104)c, d(cid:105) if there is a sequence of matrices as in Figure 2. That is, ∆θ0,θ1 is the transitive closure of M (θ0, θ1), where these matrices are considered to be pairs of θ0-pairs. Of course, one can also define ∆θ1,θ0 = Cgθ1({(cid:104)(cid:104)x, x(cid:105),(cid:104)y, y(cid:105)(cid:105) : (cid:104)x, y(cid:105) ∈ θ0}) now considered to be θ1-pairs. This congruence is the transitive closure of M (θ0, θ1), where these matrices are Both ∆θ0,θ1 and ∆θ1,θ0 are subalgebras of A22 , see Figure 2. In fact, an aspect Figure 2 of the symmetry of the binary commutator is given in the following theorem. Theorem 4.1 (See Chapter 4 of [4]). ∆θ0,θ1 = ∆θ1,θ0 The ∆ relation provides a nice characterization of the binary commutator of θ0, θ1. Theorem 4.2 (Theorem 4.9 of [4]). For x, y ∈ A the following are equivalent: (1) (cid:104)x, y(cid:105) ∈ [x, y] (2) (cid:20) x y (cid:20) x b y y (cid:21) (cid:21) ∈ ∆θ0,θ1 ∈ ∆θ0,θ1 for some b ∈ A (3) y b abcdθ0θ1(θ0,θ1)-matrixabcdabcd∈∆θ0,θ1,∆θ1,θ0≤A22 (cid:21) (cid:20) x y c c (4) ∈ ∆θ0,θ1 for some c ∈ A. 7 The first portion of this note is devoted to extending Theorem 4.2 to the ternary commutator. 5. Complexes of Matrices Let A be an algebra and take (θ0, θ1, θ2) ∈ Con(A)3. We begin this section defining what we call a (θ0, θ1, θ2)-matrix complex. Informally, these are blocks that are built from (θ0, θ1, θ2)-matrices. Formally, take some integers n0, n1, n2 ≥ 2, and set Now take Cn0,n1,n2 = An0×n1×n2 (cid:91) C = Cn0,n1,n2 n0,n1,n2≥2 We call C the set of 3-dimensional complexes of the algebra A, and Cn0,n1,n2 the set of complexes with dimensions (n0, n1, n2). For f = (f0, f1, f2) ∈ n0 × n1 × n2 and g = (g0, g1, g2) ∈ 23 = 2 × 2 × 2 let f + g = (f0 + g0, f1 + g1, f2 + g2). Let f = (f0, f1, f2) ∈ n0 × n1 × n2 be such that for each i ∈ 3 we have fi < ni − 1. Now define Matf : Cn0,n1,n2 → A23 to be the map defined by (Matf (a))g = af +g. The image of such a map is called a component matrix. Now define a (θ0, θ1, θ2)-matrix complex with dimensions (n0, n1, n2) to be a complex a ∈ Cn0,n1,n2 with the property that Matf (a) ∈ M (θ0, θ1, θ2) for each map Matf . The collection of all (θ0, θ1, θ2)-complexes with dimensions (n0, n1, n2) is called Cn0,n1,n2 (θ0, θ1, θ2) and the collection of all (θ0, θ1, θ2)-complexes is called C(θ0, θ1, θ2). We can take cross-sections of complexes in the same way as we do for matrices. Consider c ∈ Cn0,n1,n2. Let D be a tuple that lists some coordinates in order and R be a tuple that specifies a value that is assigned to each corresponding coordinate in D. Set crsecR D(c) to be the lower dimensional complex obtained by projecting c onto those factors indexed by functions that extend the partial function specified by D and R. We use the names line and square in the same way as for complexes. A typical complex, one of its component matrices and a cross-section square are shown in Figure 3. We now define a map that allows us to identify the corners of a complex. For integers n0, n1, n2 ≥ 2 and a function g ∈ 23, let γ(g) ∈ n0 × n1 × n2 be the tuple that is 0 or ni − 1 in the i-th coordinate if g(i) is 0 or 1, respectively. Then set to be the map defined by Cornern0,n1,n2 : C → A23 Cornern0,n1,n2 (a)g = aγ(g) 8 ANDREW MOORHEAD Figure 3 We will often refer to this map as Corner when no confusion over the dimensions of a complex is possible. Finally, we define Cornersn0,n1,n2(θ0, θ1, θ2) = {Corner(a) : a ∈ Cn1,n2,n3(θ0, θ1, θ2)} and we denote the set of all (θ0, θ1, θ2)-corners by Corners(θ0, θ1, θ2). Notice that because M (θ0, θ1, θ2) = C2,2,2(θ0, θ1, θ2) = Corners2,2,2(θ0, θ1, θ2), we have that M (θ0, θ1, θ2) ⊆ Corners(θ0, θ1, θ2). 6. Transitive Term Condition We now define a stronger term condition which we call the transitive term condition. Definition 6.1. We say that (θ0, θ1, θ2) is transitively centralized at j modulo δ if the following property holds for all (θ0, θ1, θ2)-corners c: (*) If every (j)-supporting line of c is a δ-pair, then the (j)-pivot line of c is a δ-pair. We abbreviate this property Ctr(θ0, θ1, θ2; j; δ). Because every element of M (θ0, θ1, θ2) is a corner, we have that Ctr(θ0, θ1, θ2; j; δ) implies C(θ0, θ1, θ2; j; δ). One of the results of [9] is that the ordinary term condition is symmetric, so we may unambiguously write C(θ0, θ1, θ2; δ). As it turns out, the transitive term condition is equivalent to the usual term condition in a modular variety. a0,0,0a0,n1−1,0an0−1,0,0an0−1,n1−1,0a0,0,n2−1a0,n1−1,n2−1an0,0,n2−1an0−1,n1−1,n2−1af0,f1,f2af0+1,f1+1,f2+1θ0θ1θ2a∈Cn0,n1,n2(θ0,θ1,θ2)Matf(a)∈M(θ0,θ1,θ2)a0,0,n2−1a0,n1−1,n2−1an0,0,n2−1an0−1,n1−1,n2−1squaren2−12(a) Lemma 6.2. Let V be a modular variety with Day terms m0, . . . , mn. Take A ∈ V and (θ0, θ1, θ2) ∈ Con(A)3. Choose some coordinates i (cid:54)= j (cid:54)= l ∈ 3. Take z ∈ Cn0,n1,n2 (θ0, θ1, θ2) such that 9 Corners(square0 i ) = Corners(squaremi−1 i ) = (cid:21) (cid:20) c0 (cid:20) cmi−1 a0 d0 b0 ami−1 (cid:21) , and dmi−1 bmi−1 where the matrices above are oriented so that rows are indexed by j and the columns are indexed by l, with the origin at the bottom left. For each Day term me with e ∈ n + 1 there is an Re dimensions mi ≥ ni, mj = max(nj − 1, 2) and ml = nl, such that j,l(z) ∈ C(θ0, θ1, θ2) with (cid:20) me(c0, c0, a0, a0) me(c0, d0, b0, a0) (cid:20) me(cni−1, cni−1, ani−1, ani−1) me(cni−1, dni−1, bni−1, ani−1) (cid:21) Corners(square0 Corners(squaremi−1 i ) = i ) = and c0 (cid:21) c0 cni−1 cni−1 We call Re j,l(z) the eth shift rotation at (j, l) of z. Proof. Without loss, let i = 2, l = 0 and j = 1. Take z ∈ Cn0,n1,n2(θ0, θ1, θ2). Now, z may be decomposed into the sequence of cross-sections squarek 2(z) for k ∈ n2 as shown in Figure 4. Figure 4 For each cross-section squarek 2(z), let Ak, Bk, Ck and Dk be the following (θ0, θ1)- complexes (see Figure 5): (1) Ak takes the value z0,n1−1,k in each factor. (2) Bk is equal to squarek (3) Ck is such that 2(z). 210squarek2cn2−1=z0,n1,n2−1c0=z0,n1−1,0d0=zn0−1,n1−1,0a0=z0,0,0z0,0,kz0,n1−1,kzn0−1,n1−1,kzn0−1,0,kan2−1=z0,0,n2−1bn2−1=zn0,0,n2−1dn2−1=zn0,n1,n2−1b0=zn0−1,0,0 10 ANDREW MOORHEAD (4) Dk is such that • line0 • linek • linek • linen1−1 1 1(squarek (Ck) = line0 1(Ck) = linen1−1 1 1(Ck) = line1 1(squarek 2(z)) and 2(z)) for all other k ∈ n1. 1(Dk) is constantly z0,n1−1,k for k ∈ n1 − 1 and (Dk) is constantly z0,0,k. Figure 5 Let Ek = me(Ak, Bk, Ck, Dk) and let Fk ∈ Cn0,n1−1(θ0, θ1) be the complex such that (Fk)g = (Ek)g+(0,1) for all g ∈ n0× (n1− 1). So, Fk is obtained by deleting the bottom row of Ek. Applying the identity me(x, y, y, x) ≈ x, we get that Corners(Fk) is the (θ0, θ1)-matrix shown in 6. Figure 6 We will be done if we can show that there is a complex y ∈ Cn0,n1,m2 , for some = En2−1. We will demonstrate m2 ≥ n2, such that square0 this by showing that there are α, β, γ, ε ∈ Cn0,n1,m2 such that 2 = E0 and squarem2−1 2 (1) square0 (2) square0 (3) square0 2 α = A0 and squarem2−1 2 β = B0 and squarem2−1 2 γ = C0 and squarem2−1 2 2 2 α = Am2−1 β = Bm2−1 γ = Cm2−1 z0,n1−1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kAkz0,n1−1,kz0,n1−2,kz0,0,kz1,n1−1,kzn0−1,n1−1,kzn0−1,n1−2,kz1,n1−2,kzn0−1,0,kz1,0,kBkz0,1,kzn0−1,1,kz1,1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,0,kzn0−1,0,kz1,0,kCkz0,1,kzn0−1,1,kz1,1,kz0,0,kzn0−1,0,kz1,0,kz0,1,kzn0−1,1,kz1,1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,n1−1,kDkz0,n1−1,kz0,n1−1,kz0,n1−1,kz0,0,kz0,0,kz0,0,kme(z0,n1−1,k,z0,n1−1,k,z0,0,k,z0,0,k)z0,n1−1,kme(z0,n1−1,k,zn0−1,n1−1,k,zn0−1,0,k,z0,0,k)z0,n1−1,k ε = Dm2−1 11 (4) square0 2 ε = D0 and squarem2−1 2 We then set y = me(α, β, γ, δ). So, let α(cid:48), β(cid:48), γ(cid:48) ∈ Cn0,n1,n2 be such that for each k ∈ n2 (1) squarek (2) squarek (3) squarek 2 α(cid:48) = Ak 2 β(cid:48) = Bk 2 γ(cid:48) = Ck. (cid:20) z0,0,k z0,n1−1,k z0,0,k+1 z0,n1−1,k+1 It is easy to see that α, β, γ ∈ Cn0,n1,n2 . This does not work for the Dk, because (cid:21) need not be a (θ2, θ1)-matrix. However, it is an element of ∆θ2,θ1, and there- fore also an element of ∆θ1,θ2 by Theorem 4.1. So, there exists for a tk ∈ N ≥2 some θ1-pairs (cid:104)uk tk−1, vk 0(cid:105) and (cid:104)z0,0,k+1, z0,n1−1,k+1(cid:105) = (cid:104)uk tk−1, vk tk−1(cid:105), with consecutive pairs forming matrices be- longing to M (θ2, θ1). See Figure 7. tk−1(cid:105) such that (cid:104)z0,0,k, z0,n1−1,k(cid:105) = (cid:104)uk 0(cid:105), . . . ,(cid:104)uk 0, vk 0, vk Figure 7 m2 =(cid:80) For each s ∈ tk set U k s and all other rows equal to vk k∈n2−1 tk and let ε ∈ Cn0,n1,m2 be such that squarer s ∈ Cn0,n1 (θ0, θ1) to be a complex with top row equal 1 . Let U be the collection of all such U k to uk s . We order elements of U by the lexicographical order on pairs (k, s). Now, set 2(γ) is the rth element of U, see Figure 8. It is clear that ε is actually an element of Cn0,n1−1,m2 (θ0, θ1, θ2). Now, α(cid:48), β, γ(cid:48) are (θ0, θ1, θ2)-complexes with dimensions (n0, n1, n2). We extend these complexes by m2 − n2 many copies of An2−1, Bn2−1 and Cn2−1, respectively. That is, define α, β, γ ∈ Cn0,n1,n2(θ0, θ1, θ2) so that 2(α(cid:48)) (cid:40) squarek 2(α) = squarek An2−1 if k ∈ n2 otherwise θ2θ1z0,0,kz0,0,k+1z0,n1−1,kz0,n1−1,k+1z0,1,kz0,1,k+1z0,2,kz0,2,k+1z0,n1−3,kz0,n1−3,k+1z0,n1−2,kz0,n1−2,k+1z0,0,kz0,n1−1,kz0,0,k+1z0,n1−1,k+1uk1vk1uk2vk2uktk−2vktk−2 12 ANDREW MOORHEAD Figure 8 (cid:40) (cid:40) 2(β(cid:48)) squarek Bn2−1 2(γ(cid:48)) squarek Cn2−1 if k ∈ n2 otherwise if k ∈ n2 otherwise squarek 2(β) = squarek 2(γ) = Now, set y = me(α, β, γ, ε) ∈ Cn0,n1,m2(θ0, θ1, θ2). Notice that square0 2(y) = E0 1,0(z) ∈ Cn0,n1−1,m2(θ0, θ1, θ2) to be the complex (y) = F0. Set Re and squarem2−1 defined by 2 Re 1,0(z)f = yf +(0,1,0) for f ∈ n0 × (n1 − 1) × m2 So, x is the complex that is obtained by deleting the bottom of face of y. We have that square0 1,0(z)) = Fn2−1, so we are done. (cid:3) 1,0(z)) = F0 and squarem2−1 2(Re (Re 2 We can say more in case the dimensions of a complex are minimal in two coor- dinates. Lemma 6.3. Let V be a modular variety with Day terms m0, . . . , mn. Take A ∈ V and (θ0, θ1, θ2) ∈ Con(A)3. Fix an e ∈ n + 1 and choose some coordinates i (cid:54)= j (cid:54)= l ∈ 3. Take z ∈ Cn0,n1,n2 (θ0, θ1, θ2) such that mj = ml = 2. Suppose that for each k ∈ ni we have (cid:20) ck ak (cid:21) dk bk squarek i (z) = Then Re j,l(z) ∈ Cn0,n1,n2 (θ0, θ1, θ2), i.e. the dimensions do not change. Moreover, (cid:20) me(ck, ck, ak, ak) me(ck, dk, bk, ak) (cid:21) ck ck squarek i (Re j,l(z)) = for each k ∈ ni. 210D0U0sD1Un2−2sDn2−1∈Cn0,n1,m2 Proof. Without loss, assume i = 2, j = 1 and l = 0. The proof is the same as that of Lemma 6.2, except that now z0,0,k z0,n1−1,k z0,0,k+1 z0,n1−1,k+1 ak + 1 ck+1 ∈ M (θ2, θ1) for each k ∈ n2 − 2. So we choose α, β, γ, ε ∈ Cn0,n1,n2 so that (cid:20) ak ck = (cid:21) 13 (cid:20) (1) squarek 2 α(cid:48) = Ak = (2) squarek 2 β(cid:48) = Bk = (3) squarek 2 γ(cid:48) = Ck = (4) squarek 2 ε(cid:48) = Dk = (cid:21) (cid:21) (cid:21) (cid:21) (cid:21) . ck ck dk bk bk bk ak ck ck (cid:20) ck (cid:20) ck (cid:20) ak (cid:20) ak ak ak ck for each k ∈ n2 − 1. me(α, β, γ, ε). Now we see that It is easy to see that α, β, γ, ε ∈ Cn0,n1,n2(θ0, θ1, θ2). As before, set Re j,l(z) = (cid:20) me(ck, ck, ak, ak) me(ck, dk, bk, ak) (cid:21) squarek 2(Re j,l(z)) = as desired. ck ck , (cid:3) Shift rotations have the nice property of preserving supporting lines. Specifically, we mean that Lemma 6.4. Let V be a modular variety with Day terms m0, . . . , mn. Take A ∈ V and (θ0, θ1, θ2) ∈ Con(A)3. Suppose z ∈ C(θ0, θ1, θ2) is such that every (j)- supporting line is a δ-pair, for some j ∈ 3 and δ ∈ Con(A). Then, for each e ∈ n + 1, every (l)-supporting line of Re Proof. This follows from Lemmas 6.2 and 3.2. j,l is a δ-pair. (cid:3) Theorem 6.5. C(θ0, θ1, θ2; δ) implies Ctr(θ0, θ1, θ2; j; δ) for each coordinate j ∈ 3. Proof. Take z ∈ Cn0,n1,n2(θ0, θ1, θ2) such that each (j)-supporting line of z is a δ-pair. We assume that C(θ0, θ1, θ2; δ) holds and will use this assumption to show that the (j)-pivot line of z is also a δ-pair with an induction on the dimensions nj and nl for l (cid:54)= j. The base case is when both of these dimensions are equal to 2. Without loss, assume that j = 1 and l = 0. Then, for each e ∈ n + 1 we have by Lemma 6.4 1,0(z) is a δ-pair. By Lemma 6.3, Re that every (0)-supporting line of Re 1,0(z) ∈ 2(Re C2,2,n2 (θ0, θ1, θ2), that is, squarek 1,0(z)) ∈ M (θ0, θ1) for each k ∈ n2. Moreover, because the (0)-supporting line of each squarek 1,0(z)) is a δ-pair we can use the assumption that C(θ0, θ1, θ2; δ) holds to conclude that the (0)-pivot line of Re 1,0 is a δ-pair. Because this holds for every e ∈ n + 1, we apply Lemma 3.2 to conclude that the (1)-pivot line of z is a δ-pair. This is shown in Figure 9, where δ-pairs are drawn as curved lines and constant pairs are drawn in bold. The result now follows from an induction on Lemma 6.2. 2(Re (cid:3) 14 ANDREW MOORHEAD Figure 9 7. Definition and Properties of ∆ We define ∆(θ0, θ1, θ2) in a manner analogous to the 2-dimensional ∆. We will prove that this definition is equivalent to a transitive closure of a relation that is obtained by looking at the corners of complexes. This perspective is useful for showing properties of ∆(θ0, θ1, θ2) because of the equivalence of the transitive term condition with the term condition. Recall that ∆θi = θi, where we think of θi as being the collection of 1-dimensional θi-matrices. As before, ∆θi,θj = Cg∆θi ({cube2 j (x, y) : (cid:104)x, y(cid:105) ∈ θj}). Let k ∈ 3 such that k (cid:54)= i, j. The algebra (∆θi,θj )2 is the second power of a square, so it is naturally coordinatized by 23. That is, to each (cid:104)a, b(cid:105) ∈ (∆θi,θj )2 we associate a matrix z ∈ A23 k = b. We now set k = a and face1 such that face0 Without loss, we will show that ∆θ0,θ2,θ1 = ∆θ0,θ1,θ2. The result then follows ∆θi,θj ,θk = Cg∆θi,θj ({cube3 from the symmetry of the 2-dimensional ∆. We begin with the following k(x, y) : (cid:104)x, y(cid:105) ∈ θk}) ⊂ A23 Lemma 7.1. Suppose that z0, z1 ∈ ∆θ1,θ2,θ0 are such that square0 2(z0) = , square1 2(z0) = square0 2(z1) = (cid:20) d1 (cid:20) b1 (cid:21) d0 b0 d1 d0 (cid:21) c1 c0 (cid:21) (cid:20) d1 . d0 (cid:21) . c1 c0 square0 2(z1) = (cid:20) d1 d0 Then b1 b0 ∆θ1,θ2,θ0 (cid:21) (cid:20) a1 a1 a0 a0 and Proof. We provide in Figure 10 a picture of the two matrices z0, z1 ∈ ∆θ1,θ2,θ0 . 210z∈C2,2,n2Re1,0(z)∀e∈n+1followsfromC(θ0,θ1,θ2;δ) 15 Figure 10 (cid:21) (cid:21) (cid:21) (cid:21) b1 b0 b1 b0 c1 c0 c1 c0 Set (1) a = (2) b = (3) c = (4) d = d0 (cid:20) d1 (cid:20) a1 (cid:20) d1 (cid:20) a1 a0 d0 a0 Now, we want to show that (cid:104)a, b(cid:105) ∈ ∆θ1,θ2,θ0. By Lemma 3.2 it suffices that (cid:104)me(a, a, c, c), me(a, b, c, d)(cid:105) ∈ ∆θ1,θ2,θ0 for all e ∈ n + 1. This amounts to checking that (cid:20) me(d1, d1, d1, d1) me(b1, b1, c1, c1) (cid:21) me(d0, d0, d0, d0) me(b0, b0, c0, c0) ∆θ1,θ2,θ0 (cid:20) me(d1, a1, a1, d1) me(b1, b1, c1, c1) me(d0, a0, a0, d0) me(b0, b0, c0, c0) (cid:21) , Proof. We provide in Figure 11 a picture of the two matrices z0, z1 ∈ ∆θ1,θ2,θ0 . which follows easily from the identity me(x, y, y, x) ≈ x. Lemma 7.2. Suppose that z0, z1 ∈ ∆θ1,θ2,θ0 are such that square0 2(z0) = , square1 2(z0) = square0 2(z1) = (cid:3) (cid:20) u1 u0 (cid:21) , v1 v0 (cid:20) x1 (cid:20) r1 (cid:21) x0 r0 s1 s0 y1 y0 (cid:21) (cid:21) (cid:20) y1 . y0 (cid:21) s1 s0 Then ∆θ1,θ2,θ0 and square0 2(z1) = r1 r0 x0 (cid:20) x1 (cid:20) x1 (cid:20) u1 (cid:20) y1 u0 x0 y0 Set (1) a = (2) b = (3) c = (cid:21) (cid:21) (cid:21) r1 r0 r1 r0 s1 s0 012a1a1a0a0b1c1b0c0d1d1d0d0a1a1a0a0z0z1 16 ANDREW MOORHEAD (4) d = (1) (2) s1 s0 (cid:21) (cid:21) v0 (cid:20) v1 (cid:20) v1 (cid:20) v1 (cid:18)(cid:20) u1 (cid:18)(cid:20) u1 s1 s0 v1 v0 u0 v0 v0 Figure 11 (cid:21) u0 r1 r0 (cid:20) u1 (cid:20) u1 u1 (cid:20) u1 (cid:21) (cid:20) u1 u1 (cid:21) u0 u0 r1 r0 u0 (cid:21) (cid:21) (cid:20) v1 (cid:20) v1 v0 , , ∆θ1,θ2,θ0 ∆θ1,θ2,θ0 (cid:21) (cid:21) r1 r0 , We want to show that (cid:104)a, b(cid:105) ∈ ∆θ1,θ2,θ0 . By Lemma 3.2 it suffices that (cid:104)me(a, a, c, c), me(a, b, c, d)(cid:105) ∈ ∆θ1,θ2,θ0 for all e ∈ n + 1. An examination of z1 reveals that that Now, because for all e ∈ n + 1 the identity me(x, y, y, x) ≈ x holds, it follows r1 r0 ∆θ1,θ2,θ0 (1) me s1 s0 s1 s0 r1 r0 , , (2) me u0 Therefore, the matrix shown in Figure 12 belongs to ∆θ1,θ2,θ0 for all e ∈ n + 1. u0 u0 u0 v0 v0 v1 v0 , s1 s0 ∆θ1,θ2,θ0 r1 r0 (cid:21) (cid:21) (cid:20) v1 (cid:20) v1 v0 (cid:21)(cid:19) (cid:21)(cid:19) (cid:20) u1 (cid:20) u1 u0 (cid:21) (cid:21) Figure 12 An examination of z0 reveals that (cid:21) (cid:21) (cid:20) x1 u1 (cid:20) y1 x0 u0 v1 v0 y0 (1) (2) ∆θ1,θ2,θ0 ∆θ1,θ2,θ0 (cid:21) (cid:21) (cid:20) x1 u1 (cid:20) y1 x0 u0 v1 v0 y0 012x1y1x0y0u1v1u0v0u1v1u0v0r1s1r0s0z0z1012me(r1,r1,s1,s1)me(r0,r0,s0,s0)me(r1,u1,v1,s1)me(r0,u0,v0,s0)me(u1,u1,v1,v1)me(u0,u0,v0,v0)me(u1,u1,v1,v1)me(u0,u0,v0,v0) We therefore obtain that the matrix depicted in Figure 13 belongs to ∆θ1,θ2,θ0. An application of Lemma 7.1 finishes the proof. 17 Figure 13 (cid:3) We now provide another characterization of ∆θ0,θ1,θ2. For i ∈ 3 set Ri = {(cid:104)square0 i (Corner(z)), square1 i (Corner(z))(cid:105) : z ∈ C2,2,n2(θ0, θ1, θ2) for some n2 ≥ 2} We will often abuse notation and refer to elements of Ri as elements of A23 , . A picture of a complex that corresponds to rather than pairs of elements of A22 the pair (cid:28)(cid:20) c g a e (cid:21)(cid:29) (cid:21) , (cid:20) d h b f ∈ R0 is given in Figure 14. Figure 14 Lemma 7.3. ∆θi,θj ,θl is the transitive closure of Rl. Proof. Without loss, we show that ∆θ1,θ2,θ0 is the transitive closure of R0. Notice that R0 ∈ (∆θ1,θ2)2. It is easy to see that R0 is reflexive, symmetric and compatible. Therefore, (R0)T C ∈ Con(∆θ1,θ2). Notice that M (θ0, θ1, θ2) ⊆ ∆θ1,θ2,θ0, because each generator of M (θ0, θ1, θ2) belongs to ∆θ1,θ2,θ0 . Therefore, R0 ⊆ ∆θ1,θ2,θ0 by Lemma 7.2, so (R0)T C = ∆θ1,θ2,θ0. (cid:3) 012me(x1,x1,y1,y1)me(x0,x0,y0,y0)me(x1,x1,y1,y1)me(x0,x0,y0,y0)me(u1,u1,v1,v1)me(u0,u0,v0,v0)me(u1,u1,v1,v1)me(u0,u0,v0,v0)012abcdefgh 18 ANDREW MOORHEAD A similar argument shows that R2 ∈ ∆θ1,θ2,θ0 . An application of Lemma 7.2 then gives that ∆θ0,θ1,θ2 ⊆ ∆θ1,θ2,θ0 . The argument is clearly symmetric, so we have proved the following Theorem 7.4. ∆θi,θj ,θk = ∆θπ(i),θπ(j),θπ(k) for any permutation of coordinates π. We also have that Theorem 7.5. ∆θi,θj ,θl = ∆∆θi,θj ,∆θi,θl Proof. Without loss, we show that ∆θ1,θ2,θ0 = ∆∆θ1 ,θ2 ,∆θ1,θ0 . Both of these relations can be considered as congruences on ∆θ1,θ2. Each one (cid:3) contains the generators of the other, so they are equal. We now use the ∆ relation to characterize the ternary commutator. Theorem 7.6. The following are equivalent: Proof. That (2) implies (3), (4), (5) is trivial. Suppose that (2) is true for x, y ∈ A. We show that (1) holds. Because ∆θ0,θ1,θ2 = (R2)T C, there is a sequence of complexes z0, . . . , zs−1 ∈ Cn0≥2,2,2(θ0, θ1, θ2) such that This situation is depicted in Figure 15, where [θ0, θ1, θ2]-pairs are connected by a solid curved line. We wish to show that the pair connected by a dashed curved line is also a [θ0, θ1, θ2]-pair. By Lemma 3.2, it suffices to see that (cid:104)me(x, x, x, x), me(x, y, x, x)(cid:105) ∈ [θ0, θ1, θ2] for each e ∈ n + 1. Now, for e ∈ n + 1 we have for each zk the eth shift rotation at (0, 1). By Lemma 6.2, these complexes have the following faces: (cid:21) (cid:20) x x (cid:20) me(x, x, x, x) me(x, y, x, x) x x (cid:21) (1) square0 2(Re 0,1(z0)) = (2) square0 2(Re 0,1(zs−1)) = x (3) square1 2(Re 0,1(zk)) = square0 2(zk+1) = for each k ∈ s − 1. (cid:20) me(ck, ck, ak, ak) me(ck, dk, bk, ak) x (cid:21) ck ck (1) (cid:104)x, y(cid:105) ∈ [θ0, θ1, θ2] (2) x x (cid:21) (cid:28)(cid:20) x x (cid:28)(cid:20) a0 a1 (cid:28)(cid:20) b1 (cid:28)(cid:20) c1 a0 a1 b1 b0 b0 , x x (cid:20) x y (cid:21) (cid:20) a2 (cid:21) (cid:20) b2 (cid:20) c1 (cid:21) y , , (3) (4) (5) , c0 y c2 c0 (cid:21)(cid:29) (cid:21)(cid:29) (cid:21)(cid:29) (cid:21)(cid:29) b2 x x c2 y a2 x (cid:21) (cid:20) x x (cid:20) x y x x x x (cid:21) (1) square0 2(z0) = (2) square0 2(zs−1) = (3) square1 2(zk) = square0 2(zk+1) = ∈ ∆θ0,θ1,θ2 ∈ ∆θ0,θ1,θ2 , for some a0, a1, a2 ∈ A ∈ ∆θ0,θ1,θ2 for some b0, b1, b2 ∈ A ∈ ∆θ0,θ1,θ2 (cid:20) ck ak (cid:21) dk bk for each k ∈ s − 1. 19 Figure 15 Now, C(θ0, θ1, θ2; [θ0, θ1, θ2]) holds, which implies that Ctr(θ0, θ1, θ2; [θ0, θ1, θ2]) holds. So, (cid:104)me(x, x, x, x), me(x, y, x, x)(cid:105) ∈ [θ0, θ1, θ2] by induction. This is shown in Figure, where constant pairs are drawn in bold. Figure 16 A similar argument shows that (3), (4), (5) all imply (1). To finish we show that (1) implies (2). For this it suffices to show that the set of pairs (cid:104)x, y(cid:105) ∈ A2 such that (cid:28)(cid:20) x x (cid:21) x x (cid:21)(cid:29) (cid:20) x y x x , is a congruence of A. Reflexivity and compatibility are obvious. The proof of symmetry is shown in Figure 17. The proof of transitivity is similar to that of symmetry. (cid:3) ∈ ∆θ0,θ1,θ2 xxxxxxxy012c0a0d0b0cs−2as−2ds−2bs−2xx012cs−2c0c0cs−2xxxxme(c0,c0,a0,a0)me(c0,d0,b0,a0)me(cs−2,cs−2,as−2,as−2)me(cs−2,ds−2,bs−2,as−2)me(x,x,x,x)me(x,y,x,x) 20 ANDREW MOORHEAD Figure 17 8. Greatest Ternary Congruence Lattice Operation A beautiful result in the theory of the binary commutator is the following from [4]. Theorem 8.1. Let V be a modular variety, and suppose that for each A ∈ V there is a binary operation C : Con(A)2 → Con(A) such that, for all A ∈ V and θ0, θ1 ∈ Con(A), (1) C(θ0, θ1) ≤ θ0 ∧ θ1 (2) If f is a surjective homomorphism with kernel π, then C(θ0, θ1) ∨ π = f−1C(f (θ0 ∨ π, f (θ0 ∨ π)). Then C(θ0, θ1) ≤ [θ0, θ1] for all A ∈ V and θ0, θ1 ∈ Con(A). Interestingly, an analogous property holds for the ternary commutator. 012xxxxxyxx∈∆θ0,θ1,θ2xxxy∈∆θ1,θ2yyyx∈∆θ1,θ2∈∆θ0,θ1,θ2yyyyyxyxyx∈θ2xxxxyyyy∈∆θ0,θ1,θ2xxxxxyxx∈∆θ0,θ1,θ2(1)(2)(3)yyyyxyxx∈∆θ0,θ1,θ2yyyyyyyx∈∆θ0,θ1,θ2(4)(1)+(2)(5)(4)+(3) Proposition 8.2. Let V be a congruence modular variety. Suppose that C : Con(A)3 → Con(A) is defined for each A ∈ V such that (1) C(θ0, θ1, θ2) ≤ θ0 ∧ θ1 ∧ θ2 (2) C(θ0, θ1, θ2)∨ π = f−1(C(f (θ0 ∨ π), f (θ1 ∨ π), f (θ2 ∨ π))) for f a surjective homomorphism with kernel π. 21 Then C(θ0, θ1, θ2) ≤ [θ0, θ1, θ2]. Proof. Take θ0, θ1, θ2 ∈ Con(A) for some A ∈ V. Consider the following congruences of ∆θ0,θ1: ∆ = ∆θ0,θ1,θ2 (cid:26)(cid:28)(cid:20) u0 (cid:26)(cid:28)(cid:20) u0 (cid:26)(cid:28)(cid:20) u0 x v0 w0 x v0 w0 x v0 w0 [θ0, θ1, θ2]0 = η0 = η0 = (cid:21) (cid:21) (cid:21) , , , (cid:20) u1 (cid:20) u0 (cid:20) u1 y v1 w1 y v0 w1 y v0 w0 (cid:21)(cid:29) (cid:21)(cid:29) (cid:21)(cid:29) : (cid:104)x, y(cid:105) ∈ [θ0, θ1, θ2] (cid:27) (cid:27) : (cid:104)x, y(cid:105) ∈ θ0 : (cid:104)x, y(cid:105) ∈ θ1 (cid:27) Let f : ∆θ0,θ1 → A be the projection of ∆θ0,θ1 onto the top right vertex and let π be the kernel of f . One can check that f ([θ0, θ1, θ2]0) = [θ0, θ1, θ2], f (∆∨ π) = θ2, f (η0 ∨ π) = θ0 and f (η1 ∨ π) = θ1. We compute C(η0, η1, ∆) ≤ η0 ∧ η1 ∧ ∆ ≤ [θ0, θ1, θ2]0 where the first inequality follows from the definition of C, and the second from Theorem 7.6. We then have that C(θ0, θ1, θ2) = C(f (η0 ∨ π), f (η1 ∨ π), f (∆ ∨ π)) = f (C(η0, η1, ∆) ∨ π) ≤ [θ0, θ1, θ2] (cid:3) An immediate consequence of Proposition 8.2 is the following Theorem 8.3. For θ0, θ1, θ2 ∈ Con(A), we have that [[θ0, θ1], θ2] ≤ [θ0, θ1, θ2]. 9. Ternary Commutator and 3-Dimensional Cube Terms In [11], Oprsal defines what is called a strong cube term for a congruence per- mutable variety. These strong cube terms are definable from a Mal'cev operation. We reproduce this definition for the 3-dimensional case. Let h(x(0,0), x(1,0), x(0,1)) be a term operation satisfying the identities (1) h(x, x, y) ≈ y (2) h(x, y, x) ≈ y. 22 ANDREW MOORHEAD Notice that h satisfies the Mal'cev identities up to a permutation of variables. We now define p(x(0,0,0), x(1,0,0), x(0,1,0), x(1,1,0), x(0,0,1), x(1,0,1), x(0,1,1)) := h(cid:0)h(x(0,0,0), x(1,0,0), x(0,1,0)), x(1,1,0), h(x(0,0,1), x(1,0,1), x(0,1,1))(cid:1) The operation p is called a 3-dimensional strong cube term. It satisfies the identities (1) p(w, w, x, x, y, y, z) ≈ z (2) p(w, x, w, x, y, z, y) ≈ z (3) p(w, x, y, z, w, x, y) ≈ z Now, every modular variety has a weakened Mal'cev operation called a difference term. This is a term operation d(x(0,0), x(1,0), x(0,1)) that satisfies (1) d(x, x, y) ≈ y (2) d(x, y, x) ≡[θ,θ] y, where θ = Cg((cid:104)x, y(cid:105)). Notice the permutation of variables. We will later need the following Proposition 9.1 (Special Case of 5.7 in [4]). Let θ ∈ Con(A), and suppose x ≡θ y ≡θ z. Then d(x, y, z) x y ∈ ∆θ,θ (cid:20) z (cid:21) We use the difference term to define a term operation that is analogous to a strong cube term. Set d(cid:0)d(x(0,0,0), x(1,0,0), x(0,1,0)), x(1,1,0), d(x(0,0,1), x(1,0,1), x(0,1,1))(cid:1) q(x(0,0,0), x(1,0,0), x(0,1,0), x(1,1,0), x(0,0,1), x(1,0,1), x(0,1,1)) := We call q a 3-dimensional wobbly cube term. In fact, q satisfies (1) q(x, x, x, x, y, y, y) ≈ y (2) q(x, x, y, y, x, x, y) ≈ y (3) q(x, y, x, y, x, y, x) ≡[θ,θ,θ] y, where θ = Cg((cid:104)x, y(cid:105)), which we shall now demonstrate. Theorem 9.2. Let θ ∈ Con(A). Let m ∈ A23 be such that face0 0(m), face0 1(m), face0 2(m) ∈ ∆θ,θ. Set (∗) = q(m(0,0,0), m(1,0,0), m(0,1,0), m(1,1,0), m(0,0,1), m(1,0,1), m(0,1,1)) = q(a, b, c, d, e, f, g) Take z ∈ A23 such that zf = mf when f (cid:54)= (1, 1, 1), and z(1,1,1) = (∗). Then z ∈ ∆θ0,θ1,θ2 . Proof. See Figure 18 for a picture of what is to be shown. Let A, B, C, D, E, F, G ∈ ∆θ0,θ1,θ2 be the matrices in Figure 19. As shown, q(A, B, C, D, E, F, G) ∈ ∆θ0,θ1,θ2 also. Suppose now that the conditions (1), (2) and (3) that are shown in Figure 20 hold. Using that ∆θ,θ,θ is a congruence that relates any two opposing faces will finish the proof. So, it remains to check that the conditions (1), (2) and (3) hold. We will show (2). The proof of the others is similar. 23 (cid:21) ∈ ∆θ,θ so (cid:20) d(a, b, c) d(a, b, c) (cid:21) c c ∈ ∆∆θ,θ,∆θ,θ , so we use Proposition 9.1 to conclude that . By Theorem 7.5, ∆θ,θ,θ = . (cid:3) Now, an application of Proposition 9.1 gives that ∆θ,θ,θ ∈ ∆θ,θ, because (cid:21) b a (cid:20) c (cid:20) d d(a, b, c) (cid:20) d (cid:20) d d(a, b, c) ∆θ,θ d(a, b, c) (cid:21) (cid:20) d(a, b, c) (cid:21) (cid:21) c c c c c c ∆θ,θ,θ Moreover, ∆θ,θ. Therefore, The result now follows, see Figure 21. Figure 18 d(a, b, c) (cid:21) b . a (cid:20) c (cid:20) c (cid:21) (cid:20) c (cid:20) d(a, b, c) d a b (cid:21) a b d(a, b, c) ∈ ∆θ,θ. Also, (cid:21) (cid:20) q(a, b, c, d, a, b, c) d(a, b, c) ∆θ,θ c (cid:21) c c 012cdabgef∈∆θ,θ,θcageabefcdab∈∆θ,θq(a,b,c,d,e,f,g),, 24 ANDREW MOORHEAD Figure 19 012ccaacaacdabcabaaaaaaaababaabccaageeaaaaeeeababeefabcdegfABCDEFGaecgq(a,b,a,b,a,b,a)q(a,b,c,d,a,b,c)q(a,b,a,b,e,f,e)(∗) 25 Figure 20 Figure 21 012ababaab∈∆θ,θ,θq(a,b,a,b,a,b,a)cdabcabq(a,b,c,d,a,b,c)ababeefq(a,b,a,b,e,f,e),,(1)(2)(3)cdabcaq(a,b,c,d,a,b,c)q(a,b,a,b,a,b,a)(1)+(2)∈∆θ,θ,θ(4)(5)(4)+q(A,B,C,D,E,F,G)∈∆θ,θ.θcdabgeq(a,b,a,b,e,f,e)∈∆θ,θ,θ(∗)(6)(3)+(5)cdabgef∈∆θ,θ,θ(∗)acacbbd(a,b,c)d(a,b,c)ccccd(a,b,c)d(a,b,c)dq(a,b,c,d,a,b,c),∈∆θ,θ,θacacbbdq(a,b,c,d,a,b,c)∈∆θ,θ,θ 26 ANDREW MOORHEAD Proposition 9.3. Let q be a 3-dimensional wobbly cube term for a modular variety V. Then q satisfies (1) q(x, x, x, x, y, y, y) ≈ y (2) q(x, x, y, y, x, x, y) ≈ y (3) q(x, y, x, y, x, y, x) ≡[θ,θ,θ] y, where θ = Cg((cid:104)x, y(cid:105)) Proof. The first two identities follow from the definition of q. Item (3) follows from ((cid:104)x, y(cid:105)). Then Theorems 9.2 and 7.6. Let A ∈ V, and take x, y ∈ A. Let θ = Cg cube3 A 0(x, y) ∈ ∆θ,θ,θ. Therefore, (cid:28)(cid:20) x y (cid:21) , (cid:20) x q(x, y, x, y, x, y, x) (cid:21)(cid:29) x y and the result follows. ∈ ∆θ,θ,θ, (cid:3) x y Figure 22 c0d0a0b0g0e0f0q(a0,b0,c0,d0,e0,f0,g0)cm−1dm−1am−1bm−1gm−1em−1fm−1q(am−1,bm−1,cm−1,dm−1,em−1,fm−1,gm−1),,∈∆θ,θ,θt(c)t(d)t(a)t(b)t(g)t(e)t(f)T(Q)∈∆θ,θ,θt(c)t(d)t(a)t(b)t(g)t(e)t(f)Q(T)∈∆θ,θ,θ(1)(2)(3)(1)+(2)t(g)t(e)t(f)Q(T)∈∆θ,θ,θt(g)t(e)t(f)T(Q) References 27 [1] E. Aichinger and N. Mudrinski, Some applications of higher commutators in Mal'cev algebras, Algebra Universalis 63 (2010), no. 4, 367 -- 403. MR2734303 [2] A. Bulatov, On the number of finite Mal'tsev algebras, in Contributions to general algebra, 13 (Velk´e Karlovice, 1999/Dresden, 2000), 41 -- 54, Heyn, Klagenfurt. MR1854568 [3] A. Day, A characterization of modularity for congruence lattices of algebras, Canad. Math. Bull. 12 (1969), 167 -- 173. MR0248063 [4] R. Freese and R. McKenzie, Commutator theory for congruence modular varieties, London Mathematical Society Lecture Note Series, 125, Cambridge Univ. Press, Cambridge, 1987. MR0909290 [5] H. P. Gumm, Geometrical methods in congruence modular algebras, Mem. Amer. Math. Soc. 45 (1983), no. 286, viii+79 pp. MR0714648 [6] J. Hagemann and C. Herrmann, A concrete ideal multiplication for algebraic systems and its relation to congruence distributivity, Arch. Math. (Basel) 32 (1979), no. 3, 234 -- 245. MR0541622 [7] K. A. Kearnes and E. W. Kiss, The shape of congruence lattices, Mem. Amer. Math. Soc. 222 (2013), no. 1046, viii+169 pp. MR3076179 [8] K. A. Kearnes and Szendrei, The relationship between two commutators, Internat. J. Algebra Comput. 8 (1998), no. 4, 497 -- 531. MR1663558 [9] A. Moorhead, Higher commutator theory for congruence modular Varieties, Journal of Alge- bra, 513 (2018), 133-158. [10] A. Moorhead, Supernilpotent Taylor algebras are nilpotent, manuscript in preparation. [11] J. Oprsal, A relational description of higher commutators in Mal'cev varieties, Algebra Uni- versalis 76 (2016), no. 3, 367 -- 383. MR3556818 [12] J. D. H. Smith, Mal'cev varieties, Lecture Notes in Mathematics, Vol. 554, Springer, Berlin, 1976. MR0432511 [13] A. Wires, On supernilpotent algebras, ArXiv e-prints, arXiv:1701.08949 [math.RA], jan. 2017 (Andrew Moorhead) Department of Mathematics; Vanderbilt University; Nashville, TN; U.S.A. E-mail address, Andrew Moorhead: [email protected]
1905.12328
1
1905
2019-05-29T11:14:44
Derivations and dimensionally nilpotent derivations in Lie triple algebras
[ "math.RA" ]
In this paper, we first study derivations in non nilpotent Lie triple algebras. We determine the structure of derivation algebra according to whether the algebra admits an idempotent or a pseudo-idempotent. We study the multiplicative structure of non nilpotent dimensionally nilpotent Lie triple algebras. We show that when $n=2p+1$ the adapted basis coincides with the canonical basis of the gametic algebra $G(2p+2,2)$ or this one obviously associated to a pseudo-idempotent and if $n=2p$ then the algebra is either one of the precedent case or a conservative Bernstein algebra.
math.RA
math
Derivations and dimensionally nilpotent derivations in Lie triple algebras Abdoulaye Dembega∗ Université Norbert Zongo Amidou Konkobo†and Moussa Ouattara‡ Université Joseph KI-ZERBO BP 376 Koudougou, Burkina Faso 03 BP 7021 Ouagadougou 03, Burkina Faso May 30, 2019 Abstract In this paper, we first study derivations in non nilpotent Lie triple algebras. We determine the structure of derivation algebra according to whether the algebra admits an idempotent or a pseudo-idempotent. We study the multiplicative structure of non nilpotent dimensionally nilpotent Lie triple algebras. We show that when n = 2p + 1 the adapted basis coincides with the canonical basis of the gametic algebra G(2p + 2, 2) or this one obviously associated to a pseudo-idempotent and if n = 2p then the algebra is either one of the precedent case or a conservative Bernstein algebra. Keyword: Dimensionally nilpotent Lie triple algebra, pseudo-idempotent, Jordan algebra, ascending basis, adapted basis. 2010 Mathematics Subject Classification : Primary 17A30, secondary 17D92, 17B40, 17C10 1 Introduction A n + 1 finite dimensional algebra A is dimensionally nilpotent if there is a derivation d : A −→ A such that dn+1 = 0 and dn 6= 0. This notion has been studied by G.F. Leger and P.L. Manley[8] for Lie algebras, J.M. Osborn [12] for Jordan algebras, Micali and Ouattara[9] for genetic algebras. Recently, V. Eberlin [4] has deepened the work of the authors of [8] in his thesis. Regarding Jordan algebras, Osborn shows that every dimensionally nilpotent Jordan K-algebra is either nilpotent or satisfies A/Rad(A) ≃ K. We study the case of non nilpotent dimensionally Lie triple algebras. In an adapted basis we caracterize the multiplicative structure of these algebras relative to the parity of n. More precisely we show that when n = 2p + 1, the adapted basis coincides with canonical basis of the gametic algebra G(2p + 2, 2) or this one obviously associated to a pseudo-idempotent. If n = 2p then this algebra is either one of the precedent case or a train algebra of rank 3 which is a Jordan algebra [13]. Since Jordan algebras are also Lie triple ones the final corollary describes non nilpotent dimensionally nilpotent Jordan algebras. ∗[email protected][email protected][email protected] 1 2 Preliminaries A Lie triple algebra is a commutative algebra satisfying (1) 2x(x(xy)) + yx3 = 3x(yx2) while a Jordan algebra is a commutative algebra satisfying Every Jordan algebra satisfies identity (1). x2(yx) = (x2y)x. Theorem 2.1 ([5]). Let A be a Lie triple algebra and L the ideal generated by the associators (x2, x, x). Then L2 = 0 and A/L is a Jordan algebra. Definition 2.2. A pseudo-idempotent of A is a non-zero element e such that there is t 6= 0 in L satisfying e2 = e + t and et = 1 2 t. Theorem 2.3 ([2]). Every Lie triple non nilalgebra contains either a non-zero idempotent, or a pseudo-idempotent. Definition 2.4. An ideal I of an algebra A is said to be caracteristic if d(I) ⊆ I for every derivation d of A. An ideal I of an algebra A is said to be d-invariant if d(I) ⊆ I for a given derivation d of A. 3 Caracterization of derivations In this paragraph we study the derivations in Lie triple non nilalgebras . We give a caracterization, distinguishing two cases: with an idempotent or with a pseudo-idempotent. 3.1 Lie triple algebras with idempotent Relative to the non-zero idempotent e, A admits the following Peirce decomposition A = Ae(1) ⊕ Ae( 1 2 ) ⊕ Ae(0). Relations between Peirce components and the products of their elements are ruled by the following lemma: Lemma 3.1 ([2], Lemme 2.2). Let A = Ae(1) ⊕ Ae(1/2) ⊕ Ae(0) be the Peirce decomposition of A relative to a non-zero idempotent. Then (i) Ae(1/2)Ae(1/2) ⊆ Ae(1) + Ae(0), Ae(λ)Ae(λ) ⊆ Ae(λ), Ae(λ)Ae(1/2) ⊆ Ae(1/2), Ae(λ)Ae(1 − λ) = 0, (λ = 0, 1) ; (ii) (x1y1)a1/2 = x1(y1a1/2) + y1(x1a1/2), (x0y0)a1/2 = x0(y0a1/2) + y0(x0a1/2) ; (iii) [x1(x1/2a1/2)]1 = [(x1x1/2)a1/2 + (x1a1/2)x1/2]1, [x0(x1/2a1/2)]0 = [(x0x1/2)a1/2 + (x0a1/2)x1/2]0 ; (iv) [(x1x1/2)y1/2]0 = [(x1y1/2)x1/2]0, [(x0x1/2)y1/2]1 = [(x0y1/2)x1/2]1 ; (v) x0(y1a1/2) = y1(x0a1/2) ; (vi) x1/2(x2 1/2)1 = x1/2(x2 1/2 ; 1/2)0 = 1 2 x3 2 (vii) (x1/2y1/2)0z1/2 + (y1/2z1/2)0x1/2 + (z1/2x1/2)0y1/2 = (x1/2y1/2)1z1/2 + (y1/2z1/2)1x1/2 + (z1/2x1/2)1y1/2. Since A is e-stable, i.e. Ae(λ)Ae(1/2) ⊆ Ae(1/2) and [(xλx1/2)y1/2]1−λ = [(xλy1/2)x1/2]1−λ with λ = 0, 1, calculations on derivations give results similar to [1, Corollary 2], precisely. Theorem 3.2. Every derivation d of A is determined and only defined by a quadruplet (d(e), fd, gd, hd) with fd ∈ EndK(Ae(1/2)), gd ∈ DerK(Ae(0)) and hd ∈ DerK (Ae(1)) satisfying the following con- ditions: (i) d(e) ∈ Ae(1/2) ; (ii) d(x1) = hd(x1) + 2d(e)x1 ; (iii) d(x1/2) = fd(x1/2) + 2(d(e)x1/2)0 − 2(d(e)x1/2)1 ; (iv) d(x0) = gd(x0) − 2d(e)x0 ; (v) hd(x1y1) = hd(x1)y1 + x1hd(y1) ; (vi) gd(x0y0) = gd(x0)y0 + x0gd(y0) ; (vii) hd((x1/2y1/2)1) = [fd(x1/2)y1/2 + x1/2fd(y1/2)]1 ; (viii) gd((x1/2y1/2)0) = [fd(x1/2)y1/2 + x1/2fd(y1/2)]0 ; (ix) fd(x1x1/2) = hd(x1)x1/2 + x1fd(x1/2) ; (x) fd(x0x1/2) = gd(x0)x1/2 + x0fd(x1/2). Proposition 3.3. Let A be a Lie triple algebra and A = Ae(1) ⊕ Ae(1/2) ⊕ Ae(0) the Peirce decomposition of A relative to an idempotent e 6= 0. Subspaces Jλ = {xλ ∈ Ae(λ) xλAe(1/2) = 0} (λ = 0, 1) and J = J0 ⊕ J1 are caracteristic ideals of A and the quotient algebra A/J is a Jordan algebra. Proof. Considering Jλ = ker(Sλ), with Sλ : Ae(λ) → EndK (Ae(1/2)), xλ 7→ Sλ(xλ) and Sλ(xλ) : a1/2 7→ xλa1/2. We know by ([10]) that Jλ is an ideal of Ae(λ) (λ = 0, 1) and since Ae(λ)Ae(1/2) ⊆ Ae(1/2), then J = J1 + J0 is an ideal of A such that A/J is a Jordan algebra ([11], Proposition 6.7). Let's consider d ∈ DerK (A), xλ ∈ Jλ(e) and a1/2 ∈ Ae(1/2). We have 0 = d(xλa1/2) = xλd(a1/2) + d(xλ)a1/2. But d(a1/2) = fd(a1/2) + 2(d(e)a1/2)0 − 2(d(e)a1/2)1, therefore we have xλd(a1/2) = 0 because xλ(d(e)a1/2)λ = [(xλd(e))a1/2 + (xλa1/2)d(e)]λ. Hence d(xλ)a1/2 = 0 with λ = 0, 1. But, on the one hand we have d(x1) = hd(x1) − 2d(e)x1, and 0 = d(x1)a1/2 = hd(x1)a1/2 and then hd(x1) ∈ J1, on the other hand we have d(x0) = gd(x0) − 2d(e)x0, with 0 = d(x0)a1/2 = gd(x0)a1/2 and then gd(x0) ∈ J0. Hence d(Jλ) ⊆ Jλ and we conclude that d(J) ⊆ J. ✷ 3.2 Lie triple algebras with pseudo-idempotent Lemma 3.4 ([2], Proposition 4.3). Let L = Le(1)⊕Le(1/2)⊕Le(0) and A = Ae(1)⊕Ae(1/2)⊕Ae(0) be the respective Peirce decomposition of L and A, relative to the pseudo-idempotent e, satisfying e2 = e + t with t ∈ L1/2 fixed. Then (i) Ae(0)Le(1/2) ⊆ Le(1/2), Ae(1)Le(1/2) ⊆ Le(1/2), Ae(1)Le(1) ⊆ Le(1), Ae(0)Le(0) ⊆ Le(0), Ae(0)Le(1) = Ae(1)Le(0) = 0, Ae(1/2)Le(0) = Ae(1/2)Le(1) = Ae(1/2)Le(1/2) = 0 ; (ii) Ae(1)Ae(0) ⊆ Le(1/2), Ae(0)Ae(1/2) ⊆ Ae(1/2), Ae(1)Ae(1/2) ⊆ Ae(1/2), Ae(0)Ae(0) ⊆ Ae(0) + Le(1/2), Ae(1)Ae(1) ⊆ Ae(1) + Le(1/2), Ae(1/2)Ae(1/2) ⊆ Ae(1) + Ae(0) ; (iii) (x0y0)1/2 = 4(x0t)y0 = 4(y0t)x0 ; (x1y1)1/2 = 4(x1t)y1 = 4(y1t)x1 ; (x0y1)1/2 = 4(x0t)y1 = 4(y1t)x0 ; 3 (iv) (x1y1)a1/2 = x1(y1a1/2) + y1(x1a1/2) ; (v) (x0y0)a1/2 = x0(y0a1/2) + y0(x0a1/2) ; (vi) x0(y1a1/2) = y1(x0a1/2) ; (vii) [x0(x1/2a1/2)]0 = [(x0x1/2)a1/2 + (x0a1/2)x1/2]0 ; (viii) [x1(x1/2a1/2)]1 = [(x1x1/2)a1/2 + (x1a1/2)x1/2]1 ; (ix) [(x0x1/2)y1/2]1 = [(x0y1/2)x1/2]1 ; [(x1x1/2)y1/2]0 = [(x1y1/2)x1/2]0 ; (x) (x1/2y1/2)0z1/2 + (y1/2z1/2)0x1/2 + (z1/2x1/2)0y1/2 = (x1/2y1/2)1z1/2 + (y1/2z1/2)1x1/2 + (z1/2x1/2)1y1/2. Lemma 3.5. Let A be a Lie triple algebra and e a pseudo-idempotent of A: e2 = e + t, et = 1 2 t, t2 = 0 with t ∈ L. For every derivation d of A, we have d(t) = 0 and d(e) ∈ Ae(1/2). Proof. Let's consider d ∈ DerK(A). Since e2 = e + t, we have 2ed(e) = d(e) + d(t). Setting d(e) = [d(e)]1 + [d(e)]1/2 + [d(e)]0, we have d(t) = [d(e)]1 − [d(e)]0. Because of 2et = t, we deduce 2ed(t) + 2d(e)t = d(t). We have 2d(e)t = −[d(e)]1 − [d(e)]0. We know that t ∈ Le(1/2) and Le(1/2) is an ideal of A. It follows that [d(e)]1 = [d(e)]0 = 0. ✷ Theorem 3.6. Every derivation d of A is determined and only defined by a quadruplet (d(e), fd, gd, hd) with fd ∈ EndK (Ae(1/2)), gd ∈ EndK(Ae(0)) and hd ∈ EndK(Ae(1)) satisfying the following con- ditions: (i) d(e) ∈ Ae(1/2) ; (ii) d(x1) = hd(x1) + 2d(e)x1 ; (iii) d(x1/2) = fd(x1/2) + 2(d(e)x1/2)0 − 2(d(e)x1/2)1 ; (iv) d(x0) = gd(x0) − 2d(e)x0 ; (v) hd((x1y1)1) = [hd(x1)y1 + x1hd(y1)]1 ; fd((x1y1)1/2) = [hd(x1)y1 + x1hd(y1)]1/2 = 2hd((x1y1)1)t ; (vi) gd((x0y0)0) = [gd(x0)y0 + x0gd(y0)]0 ; fd((x0y0)1/2) = [gd(x0)y0 + x0gd(y0)]1/2 = 2gd((x0y0)0)t ; (vii) hd((x1/2y1/2)1) = [fd(x1/2)y1/2 + x1/2fd(y1/2)]1 ; gd((x1/2y1/2)0) = [fd(x1/2)y1/2 + x1/2fd(y1/2)]0 ; (viii) fd(x1x0) = hd(x1)x0 + x1gd(x0) ; (ix) fd(x1x1/2) = hd(x1)x1/2 + x1fd(x1/2) ; (x) fd(x0x1/2) = gd(x0)x1/2 + x0fd(x1/2). Proof. Let d be a derivation of A and e a pseudo-idempotent of A. Since d(e) ∈ Ae(1/2), we have (i). Let x1 ∈ Ae(1). We have ex1 = x1, and then d(e)x1 + ed(x1) = d(x1). Let's set d(x1) = a1 + a1/2 + a0. Then d(e)x1 + a1 + 1 2 a1/2 = a1 + a1/2 + a0, and we have a1/2 = 2d(e)x1 and a0 = 0. Hence d(x1) = hd(x1) + 2d(e)x1 with hd an endomorphism of Ae(1) and (ii) is prooved. By similar calculations we have (iii) and (iv). with x1, y1 ∈ Ae(1), we have (x1y1)1/2 = 4x1(y1t) = 4y1(x1t) = 2(x1y1)t d(x1y1) = d[(x1y1)1] + d[(x1y1)1/2] = d[(x1y1)1] + 2d((x1y1)t) = hd[(x1y1)1] + 2d(e)(x1y1) + 2d((x1y1))t + 2(x1y1)d(t) = hd[(x1y1)1] + 2hd(x1y1)t + 2d(e)(x1y1), because d((x1y1))t = hd(x1y1)t. 4 We also have, d(x1y1) = d(x1)y1 + x1d(y1) = x1[hd(y1) + 2d(e)y1] + [hd(x1) + 2d(e)x1]y1 = hd(x1)y1 + x1hd(y1) + 2[d(e)y1]x1 + 2[d(e)x1]y1. = hd(x1)y1 + x1hd(y1) + 2d(e)(x1y1). It follows that hd((x1y1)1) = [hd(x1)y1 + x1hd(y1)]1 et fd((x1y1)1/2) = [hd(x1)y1 + x1hd(y1)]1/2 = 2hd(x1y1)t, and we have (v). We show by similar calculations that: gd((x0y0)0) = [gd(x0)y0 + x0gd(y0)]0 et fd((x0y0)1/2) = [gd(x0)y0 + x0gd(y0)]1/2 = 2gd(x0y0)t, and we have (vi). Let x1/2, y1/2 ∈ Ae(1/2). We have d(x1/2y1/2) = d((x1/2y1/2)1) + d((x1/2y1/2)0) = hd((x1/2y1/2)1) + 2d(e)(x1/2y1/2)1 +gd((x1/2y1/2)0) − 2d(e)(x1/2y1/2)0, But d(x1/2y1/2) = d(x1/2)y1/2 + x1/2d(y1/2) = (fd(x1/2) + 2[d(e)x1/2]0 − 2[d(e)x1/2]1)y1/2 +x1/2(fd(y1/2) + 2[d(e)y1/2]0 − 2[d(e)y1/2]1) = fd(x1/2)y1/2 + 2y1/2[d(e)x1/2]0 − 2y1/2[d(e)x1/2]1 +x1/2fd(y1/2) + 2x1/2[d(e)y1/2]0 − 2x1/2[d(e)y1/2]1 = fd(x1/2)y1/2 + x1/2fd(y1/2) + 2d(e)(x1/2y1/2)1 −2d(e)(x1/2y1/2)0 because of identity (x) of Lemma 3.4. It follows that: d(x1/2y1/2) = fd(x1/2)y1/2 + x1/2fd(y1/2) + 2d(e)(x1/2y1/2)1 − 2d(e)(x1/2y1/2)0 and we have We have hd((x1/2y1/2)1) = [fd(x1/2)y1/2 + x1/2fd(y1/2)]1 et gd((x1/2y1/2)0) = [fd(x1/2)y1/2 + x1/2fd(y1/2)]0, and we have (vii). d(x1x0) = fd((x1x0)1/2) = d(x1)x0 + x1d(x0) = [hd(x1) + 2d(e)x1]x0 + x1[gd(x0) − 2d(e)x0] = hd(x1)x0 + x1gd(x0), 5 fd((x1x0)1/2) = hd(x1)x0 + x1gd(x0), and we have (viii). In a similar way d(x1x1/2) = fd(x1x1/2) + 2[d(e)(x1x1/2)]0 − 2[d(e)(x1x1/2)]1 = d(x1)x1/2 + x1d(x1/2) = [hd(x1) + 2d(e)x1]x1/2 + x1[fd(x1/2) + 2[d(e)x1/2]0 − 2[d(e)x1/2]1] = hd(x1)x1/2 + x1fd(x1/2) + 2[d(e)x1]x1/2 + 2x1[d(e)x1/2]0 − 2x1[d(e)x1/2]1, fd(x1x1/2) = hd(x1)x1/2 + x1fd(x1/2), and we have (ix). So we have d(x0x1/2) = fd(x0x1/2) = d(x0)x1/2 + x0d(x1/2) = [gd(x0) − 2d(e)x0]x1/2 + x0[fd(x1/2) + 2[d(e)x1/2]0 − 2[d(e)x1/2]1] = gd(x0)x1/2 + x0fd(x1/2) − 2[d(e)x0]x1/2 + x0[2[d(e)x1/2]0 −2[d(e)x1/2]1], fd(x0x1/2) = gd(x0)x1/2 + x0fd(x1/2), and finally (x). Conversely, once we have identities (i) to (xi), setting x = x1 + x1/2 + x0 and y = y1 + y1/2 + y0, ✷ we show that d(xy) = d(x)y + xd(y). Example 3.7. Let A be the four dimensional Lie triple K-algebra which multiplication table in the basis {e, t, u, r} is given by : e2 = e + t, u2 = u + r, et = 1 2 r, all other product being zero. The Peirce decomposition of A relative to pseudo-idempotent e gives Ae(1) = K(e + 2t), Ae(1/2) = Kt, Ae(0) =< u, r >. Let d be a derivation of A. Since e and u are pseudo-idempotents, we have d(t) = d(r) = 0, d(e) = αt, d(u) = βr. The derivation algebra is two dimensional. 2 t, ur = 1 Example 3.8. Let's consider the four dimensional Lie triple K-algebra A which multiplication table in the basis {e, t1, t2, v} is given by : e2 = e + t1, et1 = 1 2 t2, ev = v and vt1 = t2, all other products being zero. Then we have Ae(1) =< (e + 2t), v >, Ae(1/2) =< t1, t2 >, Ae(0) = 0. Let d be a derivation of A. We have d(t1) = 0. Set d(e) = α1t1 + β1t2. Thus α1t1 + β1t2 = d(e + 2t1) = hd(e + 2t1) + 2d(e)(e + 2t1) = hd(e + 2t1) + α1t1 + β1t2. It follows that hd(e + 2t1) = 0. 2 t1, et2 = 1 Setting d(v) = α2(e + 2t1) + β2v + γ2t1 + η2t2, relation 0 = d(v2) = 2d(v)v gives α2 = γ2 = 0. It follows that hd(v) = β2v. Furthermore, relation fd((vt1)1/2) = hd(t1) + fd(t1) gives fd(t2) = β2t2. We have d(e) = α1t1+β1t2, hd(e+2t1) = 0, hd(v) = β2v, fd(t1) = 0, fd(t2) = β2t2. The derivation algebra is three dimensional. Proposition 3.9. Let's consider a pseudo-idempotent e 6= 0. Subspace Je(1/2) = {x1/2 ∈ Ae(1/2) x1/2Ae(1/2) = 0} is a caracteristic ideal and A/Je(1/2) is a Lie triple algebra with e as idempotent. Proof. Let x1/2 ∈ Je(1/2), a1/2 ∈ Ae(1/2) and yλ ∈ Ae(λ) (λ = 0, 1). We have [(x1/2yλ)a1/2]λ = [(a1/2yλ)x1/2]λ = 0 and [(x1/2yλ)a1/2]1−λ = [(a1/2yλ)x1/2]1−λ = 0, and then (x1/2yλ)a1/2 = 0. Hence Ae(λ)Je(1/2) ⊆ Je(1/2), and it follows that AJe(1/2) ⊆ Je(1/2). Je(1/2) is an ideal of A. Since t ∈ L1/2 ⊆ Je(1/2), e is an idempotent of quotient algebra A/Je(1/2). Let's consider now d ∈ DerK(A), x1/2 ∈ Je(1/2) and a1/2 ∈ Ae(1/2). We have 0 = d(x1/2a1/2) = x1/2d(a1/2) + d(x1/2)a1/2. But d(x1/2) = fd(x1/2) ∈ A1/2 and d(a1/2) = fd(a1/2) + 2(d(e)a1/2)0 − 2(d(e)a1/2)1, it follows that x1/2d(a1/2) = 0 because x1/2(d(e)a1/2)1 = x1/2(d(e)a1/2)0. So d(x1/2)a1/2 = 0, and d(x1/2) ∈ Je(1/2). We conclude that d(Je(1/2)) ⊆ Je(1/2). ✷ 6 4 Dimensionally nilpotent Lie algebras Definition 4.1. Let A be a n + 1 finite dimensional K-algebra . If there is a nilpotent K-derivation d of A such that dn+1 = 0 and dn 6= 0, d is said to be dimensionally nilpotent, and so is the algebra A, though A is not necessarily nilpotent. If so it is, there is a basis {e0, e1, . . . , en} of A such that d(ei) = ei+1 (i = 0, . . . n − 1) and d(en) = 0 and the basis {e0, e1, . . . , en} is said to be adapted to d. Example 4.2. [9, Exemple 2.5] Let K be a commutative field of characteristic 6= 2 and A = G(n + 1, 2) the gametic diploid algebra with n + 1 alleles. Its multiplication table in the natural basis {a0, . . . , an} is given by aiaj = 1 2 aj. We know that the mapping ω : A → K, ai 7→ 1 is a weight function and if we set ei = a0 − ai (i 6= 0) then {e1, . . . , en} is a basis of the ideal N = ker ω and e0 = a0 is an idempotent of A such that {e0, e1, . . . , en} is the canonical basis of A, so e0ei = 1 2 ei (i = l, . . . , n) and if d is a derivation of A, e0d(ei) = 1 2 d(ei) (i = 1, . . . , n), because d(e0) ∈ N and N is a zero algebra. So we just need to define d : A → A by d(ei) = ei+1 (i = 1, . . . , n − 1), d(e0) = e1 and d(en) = 0. It follows that dn+1 = 0 and dn 6= 0, showing the gametic algebra A = G(n + 1, 2) is dimensionally nilpotent. 2 ai + 1 0 = e0 + en, all other product being zero. If d is a derivation of A, e0d(ei) = 1 Example 4.3. Let K be a commutative field of characteristic 6= 2 and A the n + 1 dimensional commutative K-algebra, which multiplication table in the basis {e0, e1, . . . , en} is given by e0ei = 1 2 ei (i = 1, . . . , n), e2 2 d(ei) (i = 1, . . . , n) because d(e0) ∈ N =< e1, . . . , en > and N is a zero algebra. Here, we just need again to define d : A → A by d(ei) = ei+1 (i = 1, . . . , n − 1), d(e0) = e1 and d(en) = 0. We have dn+1 = 0 and dn 6= 0, that shows the algebra A is dimensionally nilpotent. Since Ken is an ideal, the quotient algebra A/Ken is isomorphic to G(n, 2). 4.1 Basic tools Theorem 4.4 ([12]). Let K be a perfect field of characteristic 6= 2 and 3 and A finite dimensional K-Jordan algebra, dimensionally nilpotent. Then either A is nilpotent or dimK (A/rad(A)) = 1. Remark 4.5. Let A be a dimensionally nilpotent Lie triple non nilalgebra. Because of Theorem 2.3 we consider two cases : 1) A has an idempotent e. Since the ideal J is caracteristic, the quotient algebra A = A/J is a dimensionally nilpotent Jordan algebra. Because of Theorem 4.4 we have dimK(A/rad(A) = 1 and since rad(A) ≃ rad(A)/J, the first isomorphism theorem gives A/rad(A) ≃ A/rad(A) and dimK A/rad(A) = 1. Then we can write A = Ke ⊕ N , with N = rad(A). 2) A has a pseudo-idempotent e. Since the ideal Je(1/2) is caracteristic, the quotient algebra A = A/Je(1/2) is a dimensionally Lie triple algebra with e as idempotent. Because of 1) we can write A = Ke ⊕ N with N = rad(A). So we have A = Ke ⊕ N with N = rad(A). Lemma 4.6. Let x, y ∈ N such that x 6= 0 and α ∈ K. If xy = αy then α = 0 or y = 0. Proof. Since N is nilpotent, there is m ∈ N∗ such that Lm operator by x. Then α = 0 or y = 0. x (y) = αmy = 0, Lx being the multiplicative ✷ From now on, throughout the paper, A is a dimensionally nilpotent Lie triple non nilalgebra of dimension n + 1, with {e0, e1, . . . , en} an adapted basis to the derivation d. We can consider e0 7 2 t and t2 = 0 either, as an idempotent, or a pseudo-idempotent. In the last case, e2 implies d(t) = 0 (Lemma 3.5), that means t = αen with α ∈ K. Since t ∈ Ae(1/2), if α 6= 0, then en ∈ Ae(1/2). 0 = e0 + t, e0t = 1 Lemma 4.7. We have: (i) e0en = λnen (ii) eken = 0 with 1 ≤ k ≤ n i=0 λiei. Deriving k times successively, we have eken = Pn−k Proof. Let's write e0en = Pn i=0 λiei+k. With k = n, it follows that e2 n = λ0en and because of Lemma 4.6 we have λ0 = 0. Set k = n − 1, one has en−1en = λ1en. That implies λ1 = 0. And so on, we have λ0 = λ1 = · · · = λn−1 = 0, e0en = λnen. Deriving successively e0en it follows that eken = 0 with 1 ≤ k ≤ n. ✷ Lemma 4.8. We have : (i) e0ek = λkek + Pn (ii) eiek = Pn (iii) λk ∈ {0, 1 2 , 1} with 1 ≤ k ≤ n. i=k+1 ak,iei with 1 ≤ k ≤ n − 1; j=k+1 γikjej with 1 ≤ i ≤ k ≤ n − 1; 2 e1, e2 0 = e0, e0e1 = 1 Proof. Reason by recurrence on n. With n = 1 the multiplication table of the algebra A is given by e2 1 = 0 and the lemma is satisfied. Assume the lemma is true until an order n. Because of Lemma 4.7 the subspace In+1 = Ken+1 is a d-invariant ideal of A. The quotient algebra A/In+1 is dimensionally nilpotent of dimension n + 1. By the hypothesis, we have e0ek = λkek + Pn j=k+1 γikjej, with 1 ≤ i ≤ k ≤ n. Otherwise e0ek = λkek + Pn j=k+1 γikjej + γik,n+1en+1; and results (i) i=k+1 ak,iei + ak,n+1en+1 and eiek = Pn i=k+1 ak,iei and eiek = Pn and (ii) follow. Now we just need to show (iii). Since 2L3 operator by e0, applying it to ek we have 2λ3 e0 − 3L2 k − 3λ2 e0 + Le0 = 0, with Le0 being the multiplicative k + λk = 0, soit λk ∈ {0, 1 ✷ 2 , 1}. 4.2 Example of low dimensions Here we deal with cases 1 ≤ n ≤ 4. Let A be a dimensionally nilpotent Lie triple algebra, of dimension n + 1 and {e0, e1, . . . , en} be a basis adapted to d. We have ker d = Ken. Since e0 is an idempotent or a pseudo-idempotent, e1 = d(e0) ∈ Ae(1/2), i.e e0e1 = 1 2 e1. Deriving this we have e0e2 + e2 2 e2, that means 1 = 1 (2) λ2 + γ112 = 1 2 et a2,k + γ11k = 0 (3 ≤ k ≤ n). k=2 γ11kek+1 = Pn We also have e2 that means 2γ12k = γ11,k−1 (3 ≤ k ≤ n). Let's derive for the second time e0e1 = 1 e0e3 + 3e1e2 = 1 k=2 γ11kek which derivative is 2e1e2 = Pn−1 1 = Pn 2 e3, that means k=3 γ11,k−1ek, 2 e1. We have (3) λ3 + 3γ123 = 1 2 et a3,k + 3γ1,2,k = 0 (4 ≤ k ≤ n). However we have, d(e0e2) = e0e3 + e1e2 = λ2e3 + Pn 4 a2,k−1ek, that implies (4) λ3 + γ123 = λ2 et a3,k + γ12k = a2,k−1 (4 ≤ k ≤ n). 8 So (4) implies γ123 ∈ {−1, − 1 2 , 0, 1 2 , 1}. So it is necessary to take λ3 = 1 2 in (3). Whence λ3 = λ2 = 1 2 and γ123 = γ112 = 0 if 3 ≤ n. Deriving e0e3 + 3e1e2 = 1 2 e3, one has e0e4 + 4e1e3 + 3e2 2 = 1 2 e4, that means (5) λ4 + 4γ134 + 3γ224 = 1 2 However, d(e0e3) = e0e4 + e1e3 = λ3e4 + Pn k=5 a3,k−1ek, which implies (6) λ4 + γ134 = λ3 et a4,k + γ13k = a3,k−1 (5 ≤ k ≤ n) We also have e1e2 = Pn which implies γ223 = 0 and γ134 + γ224 = 0. k=4 γ12kek because γ123 = 0 and d(e1e2) = e1e3 + e2 2 = Pn k=5 γ12,k−1ek, Case dimK A = 2 i.e n = 1. We obviously have e0e1 = 1 2 e1, e2 1 = 0, e2 0 = e0 or e2 0 = e0 + e1 all other product being zero. e0 e0 e1 1 2 e1 0 e0 e1 e0 e0 + e1 e1 1 2 e1 0 e0 e1 Case dimK A = 3 i.e n = 2. Because of (2) we have λ2 + γ112 = 1 ∗ λ2 = 0 ⇒ γ112 = 1 0 = e0, e0e1 = 1 2 , so e2 2 . Let's discuss the possible values of λ2. 2 e1, e2 1 = 1 2 e2 all other product being zero. e0 e0 e1 1 2 e1 2 e2 1 e2 0 0 0 e0 e1 e2 ∗ λ2 = 1 2 ⇒ γ112 = 0, so e2 0 = e0 or e2 0 = e0 + e2, e0e1 = 1 2 e1, e0e2 = 1 2 e2 all other product being zero. e0 e0 e1 1 2 e1 0 e2 1 2 e2 0 0 e0 e1 e2 e0 e0 + e2 e1 1 2 e1 0 e2 1 2 e2 0 0 e0 e1 e2 ∗ λ2 = 1 ⇒ γ112 = − 1 2, so e2 0 = e0, e0e1 = 1 2 e1, e0e2 = e2, e2 1 = − 1 2 e2 all other product being zero. e0 e0 e1 1 2 e1 − 1 2 e2 e2 e2 0 0 e0 e1 e2 9 Case dimK A = 4 i.e n = 3. Because of the preliminary calculations, λ3 = λ2 = λ1 = 1 2 e3 ⇒ e3 ∈ A 1 So e0e3 = 1 and finally e0e2 = 1 e0e3 = 1 2 e3, e2 0 = e0 or e2 and e2 1 = γ113e3. Since A2 1 2 2 2 , γ112 = γ123 = 0 and a2,3 + γ113 = 0. ⊆ A0 + A1 we have γ113 = 0 implying a2,3 = 0 2 e2. So we have the following multiplication table : e0e1 = 1 2 e1, e0e2 = 1 2 e2, 0 = e0 + e3, all other product being zero. e0 e0 e1 1 2 e1 0 e2 1 2 e2 0 0 e3 1 2 e3 0 0 0 e0 e1 e2 e3 e0 e0 + e3 e1 1 2 e1 0 e2 1 2 e2 0 0 e3 1 2 e3 0 0 0 e0 e1 e2 e3 Case dimK A = 5 i.e n = 4. 2 because of (6). Since e1e3 = γ134e4 = 1 ∗ λ4 = 0 ⇒ γ134 = 1 ⊆ A0 + A1, A 1 1 2 2 , A 1 A1 ⊆ A 1 A2 2 = − 1 (4) and finally γ113 = a2,3 = 0. In the same way e2 Ae(1/2)2 ⊆ Ae(0)+Ae(1) and Ae(0)2 ⊆ Ae(0). But e0e2 = 1 because of (2). Whence the following multiplication table . So e0e3 = 1 A0 ⊆ A 1 2 2 2 2 e4 we have e3 ∈ A 1 because 2 e3 and a3,4 = 0 ⇒ γ124 = 0 because of , because 2 e4 ⇒ e2 ∈ Ae(0) or e2 ∈ A 1 2 e2+a2,4e4 ⇒ e2 ∈ A 1 so a2,4 = 0 = γ114 2 2 2 e0 e0 e1 1 2 e1 0 e2 1 2 e2 0 − 1 2 e4 1 e3 1 2 e3 2 e4 0 0 e4 0 0 0 0 0 e0 e1 e2 e3 e4 ∗ λ4 = 1 2 ⇒ γ134 = γ224 = 0 because of (5) and (6). We have e1e2 = γ1,2,4e4 ∈ A 1 ⇒ 2 e2 + a2,3e3) so γ124 = 0 and then 2 e2 ∈ Ae(0) or e2 ∈ Ae(1) this is a contradiction (because e0e2 = 1 a3,4 = γ113 = 0. Whence the following multiplication table: e0 e0 + e4 e1 1 2 e1 0 e2 1 2 e2 0 0 e3 1 2 e3 0 0 0 e4 1 2 e4 0 0 0 0 e0 e0 e1 1 2 e1 0 e2 1 2 e2 0 0 e3 1 2 e3 0 0 0 e4 1 2 e4 0 0 0 0 e0 e1 e2 e3 e4 ∗ λ4 = 1 ⇒ e4 ∈ Ae(1) ⇒ γ134 = − 1 2 e0 e1 e2 e3 e4 10 We have e1e3 = − 1 2 e4 ⇒ e3 ∈ A 1 2 = 1 same way e2 Whence this table 2 e4 ⇒ e2 ∈ A 1 2 ⇒ e0e3 = 1 (because e2 can not be in Ae(1)), e0e2 = 1 2 e3 ⇒ a3,4 = 0. So γ124 = γ113 = a2,3 = 0. In the 2 e2 ⇒ a2,4 = γ114 = 0. 2 e0 e0 e1 1 2 e1 0 e2 1 2 e2 0 1 2 e4 e3 1 2 e3 − 1 0 0 2 e4 e4 e4 0 0 0 0 e0 e1 e2 e3 e4 4.3 Main results in general case Theorem 4.9 (Main theorem). Let A be dimensionally nilpotent Lie triple non nilalgebra. Let {e0, e1, . . . , en} be an adapted basis of A. Then: 1◦) If n = 2p + 1, the multiplication table of A is one of the two following: (i) e2 0 = e0, e0ei = 1 2 ei (1 ≤ i ≤ 2p + 1), all other product being zero. (i′) e2 0 = e0 + e2p+1, e0ei = 1 2 ei (1 ≤ i ≤ 2p + 1), all other product being zero. 2◦) If n = 2p, the multiplication table of A is one of the four following : (i) e2 0 = e0, e0ei = 1 2 ei (1 ≤ i ≤ 2p), all other product being zero. (i′) e2 0 = e0 + e2p, e0ei = 1 2 ei (1 ≤ i ≤ 2p), all other product being zero. (ii) e2 0 = e0, e0ei = 1 product being zero. 2 ei (1 ≤ i ≤ 2p − 1), e0e2p = 0, eie2p−i = 1 2 (−1)i−1e2p, (1 ≤ i ≤ p), all other (iii) e2 0 = e0, e0ei = 1 product being zero. 2 ei (1 ≤ i ≤ 2p − 1), e0e2p = e2p, eie2p−i = 1 2 (−1)ie2p (1 ≤ i ≤ p), all other Proof. Reason by recurrence on n. Subsection 4.2 shows that the theorem is true when n ≤ 4. Assume it is true until an order n > 4 and let's show it remains true for n + 1. Integer n being either even or odd, we consider two cases : 1) n = 2p is even. The multiplication table of A has the following form e0ek = 1 2 ek +ak,2p+1e2p+1 (1 ≤ k ≤ 2p − 1), e0e2p = λ2pe2p + a2p,2p+1e2p+1, e0e2p+1 = λ2p+1e2p+1 and eie2p−i = εie2p + 2 (−1)i (i = 1, . . . , p) according to λ2p = 1 γi,2p−i,2p+1e2p+1, with εi = 0, εi = 1 2 , λ2p = 0 or λ2p = 1, respectively. We have d(eie2p−i) = eie2p+1−i + ei+1e2p−i = εie2p+1, and then the following system 2 (−1)i−1 or εi = 1 (S) e1e2p + e2e2p−1 = ε1e2p+1, · · · · · · , eie2p+1−i + ei+1e2p−i = εie2p+1, · · · · · · , epep+1 + ep+1ep = 2epep+1 = εpe2p+1.   11 We see that epep+1 = 1 2 εp−ie2p+1, e1e2p = 2p−1 2i+1 e1e2p = (λ2p − λ2p+1)e2p+1, and also λ2p − λ2p+1 = 2p−1 2 εpe2p+1, ep−1ep+2 = (εp−1 − 1 2 εp−1e2p+1, ep−iep+1+i = 2 ε1e2p+1. But d(e0e2p) = e0e2p+1 + e1e2p = λ2pe2p+1, that means 2 εp)e2p+1 = 3 2 ε1. If λ2p = 0, we have ε1 = 1 2 and λ2p+1 = − 2p−1 4 6∈ {0, 1 2 , 1}, impossible. If λ2p = 1, we have ε1 = − 1 2 and λ2p+1 = 1 + 2p−1 4 = 2p+3 4 6∈ {0, 1 2 , 1}, impossible. Hence λ2p = 1 2 , ε1 = 0 and λ2p+1 = 1 2 . Since all the λk are equal to 1 2ak,2p+1λ2p+1(λ2p+1 − 1) = 0. If λ2p+1 = 1 all k. Hence eiej = 0, with 1 ≤ i ≤ j ≤ n. 2 (k 6= 2p + 1), applying 2L3 2 , then we have ak,2p+1 = 0, which means e0ek = 1 e0 + Le0 = 0 to ek, it follows that 2 ek for e0 − 3L2 2) n = 2p − 1 is odd. The multiplication table of A has the following form e0ek = 1 2 ek + ak,2pe2p (k = 1, . . . , 2p − 1), e0e2p = λ2pe2p and eie2p−1−i = γi,2p−1−i,2pe2p (i = 1, . . . , p − 1). Deriving this last relation, we have eie2p−i + ei+1e2p−1−i = 0, and the following system (S′ p) e1e2p−1 + e2e2p−2 = 0, e2e2p−2 + e3e2p−3 = 0, · · · · · · , ep−1ep+1 + e2 p = 0.   So e1e2p−1 = −e2e2p−2 = e3e2p−3 = · · · = (−1)i−1eie2p−i = · · · = (−1)p−1e2 (−1)i−1e1e2p−1. However, since d(e0e2p−1) = e0e2p+e1e2p−1 = 1 Because λ2p ∈ {0, 1 2 , 1}, we consider three situations : 2 e2p, we have e1e2p−1 = ( 1 p, that means eie2p−i = 2 −λ2p)e2p. If λ2p = 0, we have e1e2p−1 = 1 2 e2p, eie2p−i = 1 2 (−1)i−1e2p (i = 1, . . . , p) and e2 0 = e0. If λ2p = 1, we have e1e2p−1 = − 1 2 e2p, eie2p−i = 1 2 (−1)ie2p (i = 1, . . . , p) and e2 0 = e0. If λ2p = 1 2 , we have e1e2p−1 = eie2p−i = 0 (i = 1 . . . p) and 2ai,2pλ2p(λ2p − 1) = 0 shows 0 = e0, or 2 ei (i = 1, . . . , p). Furthermore we have, either e2 that ai,2p−i = 0. Hence e0ei = 1 e2 0 = e0 + e2p. For cases λ2p = 0 and λ2p = 1, We just need to show eiej = 0 for i + j < 2p. The following lemma completes the proof of the theorem. And Note 4.12 shows that all algebras defined in this theorem are Lie triple. ✷ Lemma 4.10. e0ei = 1 2 ei for i = 1, . . . , n − 1. Proof. One has eie2k−i = γi,2k−i,nen for i = 1, . . . , k − 1. Deriving this we have eie2k−i+1 + ei+1e2k−i = 0. By varying i we have the following system (Sk) e1e2k + e2e2k−1 = 0, e2e2k−1 + e3e2k−2 = 0, · · · · · · , ek−1ek+2 + ekek+1 = 0, ekek+1 + ek+1ek = 2ekek+1 = 0.   12 Going up the lines of this system we see that eie2k+1−i = 0 for i = 1, . . . , k in particular e1e2k = 0, so e0e2k+1 + e1e2k = 1 2 e2k+1 and e0e2k+1 = 1 2 e2k+1, k = 0, . . . , p − 1. Now we make a recurrence on n. Assume it is true until an order n. We distinguish two cases : • n + 1 = 2p + 1 is odd. We have e0en+1 = 1 2 en+1, which imposes e0en = 1 2 en. • n + 1 = 2p is even. Since n = 2p − 1 is odd, we have e0en = 1 2 en. ✷ Since every commutative Jordan algebra is a Lie triple algebra, we have the following result: Corollary 4.11. Let A be a commutative Jordan non nilalgebra, dimensionally nilpotent. Let {e0, e1, . . . , en} be an adapted basis of A. Then: 1◦) If n = 2p + 1, the multiplication table of A is: 0 = e0, e0ei = 1 e2 2 ei (1 ≤ i ≤ 2p + 1), all other product being zero. 2◦) If n = 2p, the multiplication table of A is one of the following three tables : (i) e2 0 = e0, e0ei = 1 2 ei (1 ≤ i ≤ 2p), all other product being zero. (ii) e2 0 = e0, e0ei = 1 product being zero. 2 ei (1 ≤ i ≤ 2p − 1), e0e2p = 0, eie2p−i = 1 2 (−1)i−1e2p, (1 ≤ i ≤ p), all other (iii) e2 0 = e0, e0ei = 1 product being zero. 2 ei (1 ≤ i ≤ 2p − 1), e0e2p = e2p, eie2p−i = 1 2 (−1)ie2p (1 ≤ i ≤ p), all other Proof. The Corollary follows from Theorem 4.9 knowing that Jordan algebras do not admit pseudo- idempotent. ✷ Note 4.12. 1) Multiplication tables in Theorem 4.9 1) (i) and in Corollary 4.11 1) when n = 2p + 1 is odd are those of gametic algebras G(2p + 2, 2) (Example 4.2). It is the same for those defined in Theorem 4.9 2) (i) and in Corollary 4.11 2) (i) when n = 2p is even. These are gametic algebras G(2p + 1, 2). They are caracterized as elementary train algebras with equation x2 − ω(x)x = 0, in which ω : A → K, e0 7→ 1, ei 7→ 0 is a homomorphism of algebras. 2) Multiplication tables in Theorem 4.9 2) (ii) and in Corollary 4.11 2) (ii), when n = 2p is even, are those of normal Bernstein algebras of type (2p, 1). Normal Bernstein algebras are defined by equation x2y = ω(x)xy. These are Bernstein-Jordan algebras, caracterized by the train equation x3 − ω(x)x2 = 0 [13, 15]. 3) Multiplication tables in Theorem 4.9 2) (iii) and in Corollary 4.11 2) (iii), when n = 2p is even, are those of the other class of train algebras of rank 3 which are Jordan algebras of type (2p, 1). They are defined by equation x3 − 2ω(x)x2 + ω(x)2x = 0 [13, Theorem 2.1]. 4) Multiplication tables in Theorem 4.9 1) (i′) and 2) (i′) are those of train algebras satisfying x3 − 3 2 ω(x)x2 + 1 2 ω(x)2x = 0. These are Lie triple algebras because of [2, Proposition 5.2, (iii)]. REFERENCES [1] J. Bayara, A. Conseibo, A. Micali and M. Ouattara, in power- Discrete Contin. Dyn. Syst., Ser. S, 4 6, 1359 -- 1370 (2011) Derivations associative algebras, https://doi.org/10.3934/dcdss.2011.4.1359 13 [2] J. Bayara, A. Konkobo and M. Ouattara, Algèbres de Lie triple sans idempotent, Afr. Mat., 25(4): 1063 -- 1075, (2014). doi:10.1007/s13370-013-0172-4 [3] J. Bayara, A. Konkobo and M. Ouattara, qui sont des algèbres doi:10.1016/j.indag.2016.10.004 train, Indagationes Mathematicae, 28(2): Equations des algèbres Lie triple (2017). 390 -- 405, [4] V. Eberlin, Algèbres de Lie dimensionnellement nilpotentes, Comm. Algebra, 28(1), 183 -- 191 (2000). doi:10.1080/00927870008826835 [5] I.R. Hentzel and L.A. Peresi, Almost Jordan rings, Proc. Am. Math. Soc. 104(2), 343- -- 348, (1988). doi:10.2307/2046977 [6] P. Holgate, The interpretation of derivations in genetic algebras, Linear Algebra Appl., 85, 75 -- 79 (1987). doi:10.1016/0024-3795(87)90209-6 [7] N. Jacobson, Lie algebras., Dover publications., Dover, 1979. [8] G.F. Leger and P.L. Manley, Dimensionally nilpotent Lie algebras, Journal of Algebra 117: 162 -- 164 (1988). doi:10.1016/0021-8693(88)90247-5 [9] A. Micali and M. Ouattara Algèbres génétiques dimensionnellement nilpotentes Linear Algebra Appl. 266: 271 -- 290 (1997). doi:10.1016/S0024-3795(97)86524-X [10] J.M. Osborn, Commutative algebras satisfying an identity of degree four, Trans. Amer. Math. Soc. 16 (1965), 1114 -- 1120. doi:10.2307/2035628 [11] J.M. Osborn, Varieties of algebras, Adv. Math. 8 (1972), 163 -- 369. doi:10.1016/0001-8708(72)90003-5 [12] J.M. Osborn, Dimensionally nilpotent Jordan algebras, Proc. Amer. Math. Soc., 116, 949 -- 953 (1992). doi:10.2307/2159472 [13] M. Ouattara, Sur les T-algèbres de Jordan, Linear Algebra Appl. 144 (1991), 11 -- 21. doi:10.1016/0024-3795(91)90056-3 [14] R.D. Schafer, An introduction to nonassociative algebras Academic Press, New York, 1966. [15] A. Wörz-Busekros, Algebras in Genetics, Lecture Notes in Biomathematics 36, Springer- Verlag, Berlin-New York, 1980. 14
1707.05083
1
1707
2017-07-17T10:39:00
Eigenvalues and Wiener index of the Zero Divisor graph $\Gamma[\mathbb {Z}_n]$
[ "math.RA", "math.AC", "math.CO" ]
The Zero divisor Graph of a commutative ring $R$, denoted by $\Gamma[R]$, is a graph whose vertices are non-zero zero divisors of $R$ and two vertices are adjacent if their product is zero. In this paper, we consider the zero divisor graph $\Gamma[\mathbb{Z}_n]$ for $n=p^3$ and $n=p^2q$ with $p$ and $q$ primes. We discuss the adjacency matrix and eigenvalues of the zero divisor graph $\Gamma[\mathbb{Z}_n]$. We also calculate the energy of the graph $\Gamma[\mathbb{Z}_n]$.
math.RA
math
Eigenvalues and Wiener index of the Zero Divisor graph Γ[Zn] B.Surendranath Reddy,Rupali.S.Jain and N.Laxmikanth [email protected],[email protected] and [email protected] Abstract The zero divisor graph of a commutative ring R, denoted by Γ[R], is a graph whose vertices are non-zero zero divisors of R and two vertices are adjacent if their product is zero. In this paper, we consider the zero divisor graph Γ[Zn] for n = p3 and n = p2q with p and q primes. We discuss the adjacency matrix and eigenvalues of the zero divisor graph Γ[Zn]. We also calculate the Wiener index of the graph Γ[Zn]. Keywords: zero divisor graph adjacency matrix eigenvalues energy Wiener index. AMS(2010): 13A99,05C12, 05C50. 1 Introduction The concept of the zero divisor graph of a ring R was first introduced by I.Beck [1] in 1988 where he considered the set of zero divisors including zero and introduced the concepts such as diameter, grith and clique number of a zero divisor graph. Then later on Anderson and Livingston in [2], Akbari and Mohammadian in [3] continued the study of zero divisor graph and they considered only the non-zero zero divisors. The concepts of the energy and Wiener index of a zero divisor graph was introduced by Mohammad Reza and Reza Jahani in [4], for the ring Γ[Zn] for n = p2 and n = pq where p and q are prime numbers. Motivated by the work of Mohammad Reza and Reza Jahani, in this article, we are extending the concepts of adjacency matrix, energy and Wiener index of the zero divisor graph to the rings Zn for n = p3 and p2q, where p,q are primes. In this article, section 2, is about the preliminaries and notations related to zero divisor graph of a commutative ring R, in section 3, we derive the 1 standard form of the adjacency matrix of the zero divisor graph Γ[Zn], in section 4 we discuss the eigenvalues of the graph Γ[Zn] and in section 5, we find the Wiener index of Γ[Zn] for n = p3 and p2q. 2 Preliminaries and Notations Definition 2.1. (Zero divisor Graph)[1] Let R be a commutative ring with unity and Z[R] be the set of its zero divi- sors. Then the zero divisor graph of R denoted by Γ[R], is the graph(undirected) with vertex set Z∗[R] = Z[R] − {0}, the non-zero zero divisors of R, such that two vertices v, w ∈ Z∗[R] are adjacent if vw = 0. Definition 2.2. (Adjacency matrix of Γ[R]) The adjacency matrix of the zero divisor graph Γ[R] is the matrix [vij] with rows and columns labeled by the vertices and is given by vij = (cid:26) 1, vi is adjacent to vj; 0, otherwise. Adjacency matrix of Γ[R] is denoted by M(Γ[R]). Clearly for an undirected graph, the adjacency matrix is symmetric. Definition 2.3. (Energy of Γ[R])[6] The energy of the zero divisor graph Γ[R] is defined as the sum of the ab- solute values of all the eigenvalues of its adjacency matrix M(Γ[R]) i.e., if λ1, λ2,· · · , λn are n eigenvalues of M(Γ[R]), then the energy of Γ[R] is E(Γ[R]) = n Pi=1λi. Definition 2.4. (Weiner index of Γ[R])[7] Let Γ[R] be a zero divisor graph with vertex set V . We denote the length of the shortest path between every pair of vertices x, y ∈ V with d(x,y). Then the Wiener index of Γ[R] is the sum of the distances between all pair of vertices of Γ[R], i.e., W (Γ[R]) = Px,y∈V 3 Adjacency Matrix of Γ[Zn] d(x, y). In this section, we derive the standard form of the adjacency matrix of Γ[Zn] for n = p3 and n = p2q, p and q being primes. To start with we con- sider p = 3 and n = 33. Then the set of non-zero zero divisors of Z27 is {3, 6, 9, 12, 15, 18, 21, 24}. Now by considering these non-zero zero divisors in 2 ascending order, we get the adjacency matrix as M(Γ[Z27]) =     0 0 1 0 0 1 0 0 0 0 1 0 0 1 0 0 1 1 1 1 1 1 1 1 0 0 1 0 0 1 0 0 0 0 1 0 0 1 0 0 1 1 1 1 1 1 1 1 0 0 1 0 0 1 0 0 0 0 1 0 0 1 0 0   0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1   Instead of this, if we rearrange the non-zero zero divisors such that all the multiples of 3 appear first and then the multiples of 32, we get the adjacency matrix as M(Γ[Z27]) = =(cid:20) O R Rt S (cid:21) where O is the zero matrix of order 6 and R and S are matrices of ones of size 6 × 2 and 2 respectively. After getting the above interesting form of the adjacency matrix, we tried for several values of n = 8, 125, 343, etc and got the adjacency matrix in similar form and this leads us to derive the standard form for n = p3 in the following theorem. Theorem 3.1. Let n = p3 with p prime. Then the adjacency matrix of the graph Γ[Zn] is M(Γ[Zn]) = (cid:20) O(p2−p) Rt (p−1)×(p2−p) R(p2−p)×(p−1) S(p−1) (cid:21) where O is the zero matrix and R and S are the matrices of ones. Proof. Let n = p3. Then the set of non-zero zero divisors of Zn is Z∗[Zn] = {p, 2p, 3p,· · · , (p2 − 1)p} with cardinality p2 − 1. As explained in the example, we rewrite Z∗[Zn] = A ∪ B, where A = {kpk = 1, 2,· · · , p2 − 1 and p ∤ k} B = {lp2l = 1, 2, 3,· · · , p − 1} and the adjacency matrix is labeled with elements of A first then the elements of B. 3 It is clear that if x, y ∈ A then xy 6= 0. Since A = p2 − p, we get a zero matrix O of size p2 − p in the adjacency matrix. And if x ∈ A, y ∈ B or y ∈ A, x ∈ B then xy = 0. Since A = p2 − p and B = p − 1, we get a matrix R of ones of size (p2 − p) × (p − 1). Also if x, y ∈ B, then xy = 0 and hence we get a matrix S of ones of size p − 1 in the adjacency matrix. Hence the adjacency matrix by considering the elements of A first and then the elements of B, we get M(Γ[Zn]) = (cid:20) O(p2−p) Rt (p−1)×(p2−p) R(p2−p)×(p−1) S(p−1) (cid:21). Now we consider the case for n = p2q with p and q different primes and get the standard form of adjacency matrix in the following theorem. Theorem 3.2. Let n = p2q, where p,q are primes. Then the adjacency matrix of the graph Γ[Zn] is O O R(p−1)(q−1)×(p−1) O O Rt O O St O Tp−1 U t O Sp(p−1)×(q−1) U(p−1)×(q−1) O     M(Γ[Zn]) = where R, S, T and U are matrices of ones. Proof. For n = p2q, the non-zero zero divisors are multiples of p, multiples of q, multiples of p2 and multiples of pq. Hence Z∗[Zn] = A ∪ B ∪ C ∪ D, where A = {k1p k1 = 1, 2,· · · , pq − 1 and k1 ∤ p, q} B = {k2q k2 = 1, 2,· · · , p2 − 1 and k2 ∤ p} C = {k3pq k3 = 1, 2,· · · , p − 1 } D = {k4p2 k4 = 1, 2,· · · , q − 1} Then A = (p − 1)(q − 1), B = p(p − 1), C = p − 1 and D = q − 1. Since no element of A is adjacent with an element of A and B, we get the zero matrix of order (p − 1)(p + q − 1). Similarly we get zero matrices corresponding to A and D; B and C; and D and D. And as every element of A is adjacent with every element of C implies we get a matrix R of ones of order (p − 1)(q − 1) × (p − 1). Similarly we get the matrix S of ones corresponding to B and D; the matrix 4 T of ones corresponding to C and C; and the matrix U of ones corresponding to C and D. Hence we get the adjacency matrix by considering the elements of A first, then B, then C and then D as M(Γ[Zn]) = O O R(p−1)(q−1)×(p−1) O O Rt O O St O Tp−1 U t O Sp(p−1)×(q−1) U(p−1)×(q−1) O     4 Eigenvalues of the zero divisor graph Γ[Zn] In this section we discuss the non zero eigenvalues of the zero divisor graph Γ[Zn] for n = p3 and n = p2q. Theorem 4.1. Let n = p3. Then the only non-zero eigenvalues of the zero divisor graph Γ(Zn) are given by (p−1)(1±√1+4p) . 2 Proof. By theorem 3.1, the adjacency matrix of Γ(Zp3)) is given by M(Γ[Zp3]) = (cid:20) O(p2−p) Rt (p−1)×(p2−p) R(p2−p)×(p−1) S(p−1) (cid:21) where O is the zero matrix and R and S are the matrices of ones. Let λ be a non-zero eigenvalue of M(Γ[Zp3]). 0 · · · −λ 0 0 −λ · · · 0 ... ... . . . 0 · · · −λ 1 1 · · · 1 · · · 1 ... ... ... 1 1 · · · A B ... 0 1 1 ... 1 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1 1 ... 1 1 − λ 1 ... 1 1 1 ... 1 1 · · · · · · ... · · · · · · 1 − λ · · · . . . · · · 1 − λ 1 1 ... 1 1 1 ... ... 1 = 0 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Then M − λI = C D(cid:12)(cid:12)(cid:12)(cid:12) Let M − λI = (cid:12)(cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Then M − λI = AD − CA−1B = 0. Since A is a scalar matrix of order p2 − p, we get A = (−λ)p2−p. p−p2 λ p−p2 λ ... p−p2 λ And CA−1B = p−p2 λ p−p2 λ ... p−p2 λ p−p2 λ p−p2 λ ... p−p2 λ · · · · · · . . . · · · (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 5 So D − CA−1B = (1 − λ) + p−p2 1 + p−p2 λ λ ... 1 + p−p2 λ (1 − λ) + p−p2 λ ... (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) · · · · · · . . . · · · 1 + p−p2 1 + p−p2 λ λ ... (1 − λ) + p−p2 λ (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1 + p−p2 Using the properties of the determinant, we get 1 + p−p2 λ λ D − CA−1B = (−1)p−1 × λp−3[λ2 − (p − 1)λ − (p2 − p)(p − 1)] Therefore, M − λI = λp2−p(−1)p−1× λp−3[λ2−(p−1)λ−(p2− p)(p−1)] = 0 Since λ 6= 0, we have λ2 − (p − 1)λ − (p2 − p)(p − 1) = 0 Hence, λ = = = (p − 1) ±q(p − 12) + 4(p2 − p)(p − 1) (p − 1) ± (p − 1)√1 + 4p (p − 1)(1 ± √1 + 4p) 2 2 2 Theorem 4.2. If p is a prime number then the Energy of the zero divisor graph Γ(Zp3) is E(Γ(Zp3)) = (p − 1)(√1 + 4p). Proof. Let n = p3. Then by theorem 4.1, the non-zero eigenvalues of Γ(Zn)) are given by λ1 = λ2 = (p − 1)(1 + √1 + 4p) (p − 1)(1 − √1 + 4p) 2 2 , Thus the Energy, E(Γ(Zp3)) = λ1 + λ2 (p − 1)(1 − √1 + 4p) 2 (p − 1)(1 + √1 + 4p) 2 (cid:17)(cid:16)p1 + 4p + 1 +p1 + 4p − 1(cid:17) = (cid:12)(cid:12)(cid:12) = (cid:16) p − 1 = (p − 1)(p1 + 4p) +(cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12) 2 (cid:12)(cid:12)(cid:12) Theorem 4.3. Let n = p2q with p and q primes. If λ 6= 0 is a nonzero eigenvalue of the zero divisor graph Γ(Zn), then λ4− (p− 1)λ3 − 2p(q− 1)2(p− 1)λ2 + p(p− 1)2(q− 1)λ + p(p− 1)3(q− 1)2 = 0. 6 Proof. By theorem 3.2, the adjacency matrix is given by O O R(p−1)(q−1)×(p−1) O O Rt O O St O Tp−1 U t O Sp(p−1)×(q−1) U(p−1)×(q−1) O   where R, S, T and U are matrices of ones. Let λ be a nonzero eigenvalue of M(Γ[Zp2q]). M(Γ[Zn]) =   Then M − λI = (cid:12)(cid:12)(cid:12)(cid:12) where A = = 0 A B C D (cid:12)(cid:12)(cid:12)(cid:12)   0 0 · · · −λ 0 0 −λ · · · ... ... . . . · · · −λ 0 ... 0 ; B = C t =     ... ... 1 · · · 1 0 · · · 0 ... ... 1 · · · 1 0 · · · 0 0 · · · 0 1 · · · 1 ... ... 0 · · · 0 1 · · · 1 ... ...   and D = 1 − λ 1 ... 1 1 1 ... 1   1 ... 1 1 1 ... · · · 1 − λ · · · . . . · · · 1 − λ · · · · · · 1 1 ... 1 · · · · · · · · · 1 1 1 1 ... ... 1 · · · 1 0 · · · −λ 0 0 −λ · · · ... ... . . . · · · −λ 0 ... 0 0   (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Clearly A = λpq+p2−p−5 · · · (1−p)(q−1) λ (1−p)(q−1) CA−1B = · · · · · · · · · and hence D − CA−1B = ... λ 0 ... 0 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 0 ... 0 p(1−p) λ ... p(1−p) λ (1−p)(q−1) λ ... (1−p)(q−1) λ 0 ... 0 · · · · · · · · · · · · 0 ... 0 p(1−p) λ ... p(1−p) λ 7 1 − λ + (1−p)(q−1) λ ... · · · (1−p)(q−1) λ ... (1−p)(q−1) λ 1 ... 1 · · · 1 − λ + (1−p)(q−1) · · · λ 1 ... 1 · · · (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1 ... 1 −λ + p(1−p) λ ... p(1−p) λ · · · · · · · · · 1 ... 1 p(1−p) λ ... · · · −λ + p(1−p) λ (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) = λ4 − (p − 1)λ3 − 2p(p − 1)(q − 1)λ2 + p(p − 1)2(q − 1)λ + p(p − 1)3(q − 1)2. Since λ 6= 0, A = λpq+p2−p−5 and AD − CA−1B = 0, we get λ4 − (p− 1)λ3 − 2p(p− 1)(q − 1)λ2 + p(p− 1)2(q − 1)λ + p(p− 1)3(q − 1)2 = 0. 5 Wiener index of the zero divisor graph Γ(Zn) In this section we calculate the Wiener index of Γ(Zn) for n = p3 and n = p2q. Theorem 5.1. The Weiner index of the zero divisor graph Γ(Zp3) is ( p−1 2 )(2p3 − 3p − 2). Proof. Let Γ(Zp3) be a zero divisor graph where p is a prime number. Then the vertex set of Γ(Zp3) is divided into two sets A = {k1p k1 = 1, 2, 3, ..., p2 − 1 and k1 ∤ p} B = {k2p2 k2 = 1, 2, 3, ..., p − 1} where A = p2 − p = n(say) and B = p − 1 = m(say) Let x, y ∈ V (Γ(Zp3)) Then either x, y ∈ A or x, y ∈ B or x ∈ A, y ∈ B Suppose x, y ∈ A . Since no two elements of A are adjacent and every element of A is adjacent with an element of B, we get d(x, y) = 2 Suppose x, y ∈ B . Since any two elements of B are adjacent to each other,we get d(x, y) = 1 Suppose x ∈ A, y ∈ B. Since every element of A is adjacent with an element of B ,we get d(x, y) = 1 Thus n n Xx,y∈A d(x, y) = d(x1, xi) + Xi=2 = 2(n − 1) + 2(n − 2) + ... + 2 = n(n − 1) d(x2, xi) + ... + d(xn−1, xn) Xi=3 8 Similarly Px,y∈A And d(x, y) = (m − 1) + (m − 2) + ... + 1 = m(m−1) 2 d(x, y) = Xx∈A,y∈B m Xi=1 d(x1, yi) + m Xi=1 d(x2, yi) + ... + m Xi=1 d(xn, yi) = m + m + ... + m(n times) = nm Therefore,the Weiner index is W (Γ(Zp3)) = Xx∈A,y∈B d(x, y) + Xx,y∈A d(x, y) + Xx,y∈B d(x, y) 2 (cid:17) = nm + n(n − 1) +(cid:16) m(m − 1) = (p2 − p)(p − 1) + (p2 − p)(p − 2) + = (cid:16) p − 1 2 (cid:17)(2p3 − 3p − 2) (p − 1)(p − 2) 2 Theorem 5.2. The Wiener index of the zero divisor graph Γ(Zp2q) is ( 1 2 )[p2(2p2 − 4p − 1) + p(4p2q + 2pq2 − 8pq − 2q + 5) + 2] Proof. Let Γ(Zp2q) be a zero divisor graph where p ,q are primes. Then the vertex set of Γ(Zp2q) is divided into four sets A = {k1p k1 = 1, 2, 3, ..., pq − 1 and k1 ∤ p, q} B = {k2q k2 = 1, 2, 3, ..., p2 − 1 and k2 ∤ p} C = {k3pq k3 = 1, 2, 3, ..., p − 1 } D = {k4p2 k4 = 1, 2, 3, ..., q − 1} Then α = A = (p − 1)(q − 1), β = B = p(p − 1) , γ = C = (q − 1) and δ = D = (p − 1) For x, y ∈ V (Γ(Zp2q)), we have the following cases: 1. Suppose x, y ∈ A. Since no two elements of A are adjacent and every element of A is adjacent with an element of D, we get d(x, y) = 2 2. If x, y ∈ B, since no two elements of B are adjacent and every element of B is adjacent with an element of C,we get d(x, y) = 2 9 3. If x, y ∈ C, as no two elements of C are adjacent and every element of C is adjacent with an element of either B or D ,we get d(x, y) = 2 4. If x, y ∈ D, being any two elements of D are adjacent, we get d(x, y) = 1 5. Now suppose x ∈ A, y ∈ B, as no element of A is adjacent with an element of B, we get d(x, y) = 2 With similar arguments we get, 6. If x ∈ A, y ∈ C, d(x, y) = 2 7. If x ∈ A, y ∈ D, d(x, y) = 1 8. If x ∈ B, y ∈ C, d(x, y) = 1 9. If x ∈ B, y ∈ D, d(x, y) = 2 10. If x ∈ C, y ∈ D, d(x, y) = 1 Hence the Weiner index is W (Γ(Zp2q) = Xx,y∈{same sets} d(x, y) + Xx,y∈{different sets} d(x, y) d(x1, xi) +Xi=3 d(x1, yi) +Xi=1 d(x2, xi) + ... + d(xn−1, xn) d(x2, yi) + ... +Xi=1 = Xi=2 +Xi=1 = 2[(α − 1) + (α − 2) + ... + 2 + 1] + 2[(β − 1) + (β − 2) + ... + 2 + 1] + 2[(γ − 1) + (γ − 2) + ... + 2 + 1] + 1[(δ − 1) + (δ − 2) + ... + 2 + 1] + 2[αβ] + 2[αγ] + [αδ] + [βγ] + 2[βδ] + [γδ]. δ(δ − 1) d(xn, yi) = α(α − 1) + β(β − 1) + γ(γ − 1) + + 2αβ + 2αγ + αδ + βγ + 2βδ + γδ 2 By substituting the values of α, β, γ, δ in above and on solving, we get W (Γ(Zp2q) = ( 1 2)[p2(2p2 − 4p − 1) + p(4p2q + 2pq2 − 8pq − 2q + 5) + 2]. References [1] I.Beck, Coloring of Commutative rings, J.Algebra, 116(1), 208-226 (1988). 10 [2] D.F.Anderson and P.S.Livingston, The Zero divisor graph of Commuta- tive ring, J.Algebra, 217(2), 434-447 (1999). [3] S.Akbari, A.Mohammadian, On the Zero divisor graph of a commutative rings, J.Algebra, 274, 847-855 (2004). [4] Mohammad Reza Ahmadi and Reza Jahani-Nezhad, Energy and Weiner Index of Zero divisor graphs, Iranian Journal of Mathematical Chemistry, 2(1), 45-51 (2011). [5] I.Gutman, The Energy of a graph, Ber.Math-Stat.Sekt.Forschungszent Graz, 103, 1-22 (1978). [6] I.Gutman, S.Kaivzar, B.Mohar(Eds), Fifty Years of Weiner Index, 1-259, Match Commun.Math.Comput.Chem (1997). [7] I.Gutman, The Energy of a graph:old and new results, Algebraic Combi- natorics and Applications,,196-211, Springer-verlag.Berlin(2001). 11
1004.3650
2
1004
2010-11-02T01:32:51
Lie bialgebra structures on extended Schrodinger-Virasoro Lie algebra
[ "math.RA", "math.QA" ]
In this paper, Lie bialgebra structures on the extended Schrodinger-Virasoro Lie algebra are classified. It is obtained that all the Lie bialgebra structures on L are triangular coboundary. As a by-product, it is derived that the first cohomology group is trivial.
math.RA
math
Lie bialgebra structures on extended Schrodinger-Virasoro Lie algebra1 Lamei Yuan ∗, Yongping Wu †, Ying Xu ∗ ∗Department of Mathematics, University of Science and Technology of China, Hefei 230026, China †School of Mathematics and Computer Science, Longyan College, Fujian 364111, China E-mail: [email protected], wyp [email protected], [email protected] Abstract. In this paper, Lie bialgebra structures on the extended Schrodinger-Virasoro Lie algebra L are classified. It is obtained that all the Lie bialgebra structures on L are triangular coboundary. As a by-product, it is derived that the first cohomology group H 1(L, L ⊗ L) is trivial. Key words: Lie bialgebras, Yang-Baxter equation, Extended Schrodinger-Virasoro Lie algebras. 0 1 0 2 v o N 2 ] . A R h t a m [ 2 v 0 5 6 3 . 4 0 0 1 : v i X r a Mathematics Subject Classification : 17B05, 17B37, 17B62, 17B68. §1. Introduction The Schrodinger-Virasoro Lie algebras [6] were introduced in the context of non-equilibrium statistical physics during the process of investigating the free Schrodinger equations. They are closely related to the Schrodinger algebra and the Virasoro algebra, both of which play important roles in many areas of mathematics and physics (e.g., statistical physics, integrable system) and have been investigated in a series of papers [7 -- 10, 13, 18, 21, 25]. In order to investigate vertex representations of the Schrodinger-Virasoro Lie algebra, J. Unterberger introducted (see Definition 1.5 in [22]) a class of infinite-dimensional Lie algebras called the extended Schrodinger-Virasoro Lie algebra L, which can be viewed as an extension of the Schrodinger-Virasoro Lie algebra by a conformal current of weight 1 and generated by {Ln, Mn, Nn, Yp n ∈ Z, p ∈ Z + 1/2} with the following Lie brackets: [Lm, Ln] = (n − m)Ln+m, [Ln, Yp ] = (p − n/2)Yp+n, [Mn, Yp ] = [Nm, Nn] = 0, [Lm, Nn] = nNm+n, [Nm, Yp ] = Ym+p, [Mm, Mn] = 0, [Lm, Mn ] = nMn+m, [Nm, Mn] = 2Mm+n, [ Yp, Yq ] = (q − p)Mp+q. (1.1) Note that L is centerless and finitely generated with a generating set {L−2, L−1, L1, L2, N1, Y1/2}. Moreover, it is 1 2 Z -graded by L = Ln∈Z Ln/2 = (cid:0) Ln∈Z Ln(cid:1)L(cid:0) Ln∈Z Ln+1/2(cid:1), where Ln = span{Ln, Mn, Nn} and Ln+1/2 = span{Yn+1/2}, for all n ∈ Z. The derivations, central extensions and automorphisms of L have been studied in [5]. To search for the solutions of the Yang-Baxter quantum equation, Drinfel'd [1] introduced the notion of Lie bialgebras in 1983. Since then, a number of people have studied further Lie bialgebra structures (e.g., [3, 11, 12, 14 -- 16). Witt type Lie bialgebras introduced in [20] were classified in [17]. This work has been generalized in [19, 23]. Lie bialgebra structures on generalized Virasoro-like and 1Supported by NSF grants 10825101 of China China ∗Corresponding author: [email protected] 1 Block Lie algebras were investigated in [11, 24]. Drinfel'd [2] posed the problem that whether or not there exists a general way to quantilize all Lie bialgebras. Etingof and Kazhdan [3] gave a positive answer to this problem, but there does not exist an uniform method to realize quantilizations of all Lie bialgebras. Actually, investigating Lie bialgebras and quantilizations is a complicated problem. The authors in [8] prove that not all Lie bialgebra structures on the Schrodinger-Virasoro Lie algebra are triangular coboundary. For the extended Schrodinger-Virasoro Lie algebra L, this is not the case. Namely, we obtain that all Lie bialgebra structures on L are triangular coboundary. In particular, we derive that the first cohomology group H 1(L, L ⊗ L) is trivial. §2. Preliminaries Throughout the paper, F denotes a filed with characteristic zero. All vector spaces and tensor products are over F. Let Z+ (resp. Z>0) be the set of all nonnegative (resp. positive) integers and Z∗ be the set of all nonzero elements of Z. Let L be a vector space, ξ the cyclic map of L ⊗ L ⊗ L, namely, ξ(x1 ⊗ x2 ⊗ x3) = x2 ⊗ x3 ⊗ x1 for x1, x2, x3 ∈ L, and τ the twist map of L ⊗ L, i.e., τ (x ⊗ y) = y ⊗ x for x, y ∈ L. A Lie algebra is a pair (L, δ), where δ : L ⊗ L → L is a bilinear map with the conditions: Ker( Id − τ ) ⊂ Ker δ, δ · ( Id ⊗ δ) · ( Id + ξ + ξ2) = 0 : L ⊗ L ⊗ L → L, where Id is the identity map. Dually, a Lie coalgebra is a pair (L, ∆) with a linear map ∆ : L → L⊗L satisfying: Im ∆ ⊂ Im( Id − τ ), ( Id + ξ + ξ2) · ( Id ⊗ ∆) · ∆ = 0 : L → L ⊗ L ⊗ L. (2.1) A Lie bialgebra is a triple (L, δ, ∆) such that (L, δ) is a Lie algebra, (L, ∆) is a Lie coalgebra, and the following compatible condition holds: ∆δ(x ⊗ y) = x · ∆y − y · ∆x, ∀ x, y ∈ L. (2.2) where "·" means the diagonal adjoint action, i.e., x · (Piai ⊗ bi) = Pi([x, ai] ⊗ bi + ai ⊗ [x, bi]), and in general, δ(x ⊗ y) = [x, y], for all x, y, ai, bi ∈ L. Denote by U the universal enveloping algebra of L and 1 the identity element of U . For any r = Pi ai ⊗ bi ∈ L ⊗ L, define c(r) ∈ U ⊗ U ⊗ U by c(r) = [r12, r13] + [r12, r23] + [r13, r23], where r12 = Pi ai ⊗ bi ⊗ 1, r13 = Pi ai ⊗ 1 ⊗ bi, r23 = Pi 1 ⊗ ai ⊗ bi. Obviously, c(r) = Pi,j [ai, aj] ⊗ bi ⊗ bj + Pi,j ai ⊗ [bi, aj] ⊗ bj + Pi,j ai ⊗ aj ⊗ [bi, bj]. Definition 2.1 (1) A coboundary Lie bialgebra (L, δ, ∆, r) is a Lie bialgebra such that the cobracket ∆ is an inner derivation, i.e., there exists an element r ∈ L ⊗ L such that ∆(x) = x · r for all x ∈ L. (2.3) 2 ∆ is called a coboundary of r, denoted by ∆r. (2) A coboundary Lie bialgebra (L, δ, ∆, r) is called triangular if it satisfies the following classical Yang-Baxter Equation (CYBE): c(r) = 0. (2.4) (3) An element r ∈ Im( Id − τ ) ⊂ L ⊗ L is said to satisfy the modified Yang-Baxter equation (MYBE) if x · c(r) = 0, ∀ x ∈ L. (2.5) The following famous results are due to Drinfel'd [2], Michaelis [14] and Taft [20], respectively. We combine them into one theorem as follows: Theorem 2.2 (i) For a Lie algebra (L, [·, ·]) and r ∈ Im( Id − τ ) ⊂ L ⊗ L, the triple (L, [·, ·], ∆r) is a Lie bialgebra if and only if r satisfies MYBE. (ii) Let L be a Lie algebra containing two linear independent elements a, b satisfying [a, b] = kb for some nonzero k ∈ F, and set r = a ⊗ b − b ⊗ a. Then r is a solution of CYBE and equips L with a structure of triangular coboundary Lie bialgebra. (iii) Let L be a Lie algebra and r ∈ Im( Id − τ ) ⊂ L ⊗ L. Then for any x ∈ L, ( Id + ξ + ξ2) · (1 + ∆r) · ∆r(x) = x · c(r). §3. Structures of Lie bialgebra of the extended Schrodinger-Virasoro Lie algebra Regard V = L ⊗ L as a L-module under the adjoint diagonal action. A linear map D : L → V is called a derivation if D([x, y]) = x · D(y) − y · D(x) for all x, y ∈ L. (3.1) If there exists some v ∈ V such that D(x) = x · v, then D is called an inner derivation. Denote by vinn the inner derivation determined by v. Let Der(L, V) (resp. Inn(L, V)) be the set of all derivations (resp. inner derivations). Then it is well known that H 1(L, V) ∼= Der(L, V)/Inn(L, V), where H 1(L, V) is the first cohomology group of the Lie algebra L with coefficients in V. A derivation D ∈ Der(L, V) is homogeneous of degree α ∈ 1 2 Z if D(Lp) ⊂ Vα+p for all p ∈ 1 2 Z. Z, define a linear map Dα : L → V as follows: Let Der(L, V)α be the set of all the homogeneous derivations of degree α. For any D ∈ Der(L, V) and α ∈ 1 2 D(µ) = Pp∈ 1 have Z µp with µp ∈ Vp, then we set Dα(µ) = µq+α. Obviously, Dα ∈ Der(L, V)α and we 2 for any µ ∈ Lq with q ∈ 1 2 Z, write D = Pα∈ 1 2 Z Dα, (3.2) which holds in the sense that only finitely many Dα(u) 6= 0 and D(u) = Pα∈ 1 u ∈ L. Actually, for any D ∈ Der(L, V), (3.2) is a finite sum, referring to [8] for details. 2 Z Dα(u) for any 3 Lemma 3.1 H 1(L0, Vn/2) = 0 for all n ∈ Z∗. Proof. For any D ∈ Der(L, V), we have D = Pn∈Z Dn/2. Suppose n 6= 0, then the restriction of Dn/2 to L0 induces a derivation from L0 to the L0-module Vn/2. That is, Dn/2L0 ∈ Der(L0, Vn/2). Conveniently, we denote Dn/2L0 by Dn/2. Let r = 2 n Dn/2(L0) ∈ Vn/2. For any X0 ∈ L0, one has n 2 Dn/2(X0) = L0 · Dn/2(X0) = X0 · Dn/2(L0), since [L0, X0] = 0. It follows Dn/2(X0) = X0 · r, which implies Dn/2 is inner. (cid:3) Lemma 3.2 HomL0(Vm/2, Vn/2) = 0 for all m 6= n. Proof. Let f ∈ HomL0(Vm/2, Vn/2) = 0 with m 6= n. One has f ([X0, Em/2]) = [X0, f (Em/2)] for any X0 ∈ L0 and Em/2 ∈ Vm/2. In particular, f ([L0, Em/2]) = [L0, f (Em/2)]. That is, m 2 f (Em/2) = n 2 f (Em/2). It follows f (Em/2) = 0, since m 6= n. Consequently, f = 0. (cid:3) Taking these two Lemmas above into account, we can immediately derive the following result from Proposition 1.2 in [4]. Proposition 3.3 Der(L, V) = Der0(L, V) + Inn(L, V). Lemma 3.4 Let L⊗n = L ⊗ · · · ⊗ L be the tensor product of n copies of L, and regard L⊗n as an L-module under the adjoint diagonal action. Suppose r ∈ L⊗n satisfying x · r = 0, ∀ x ∈ L. Then r = 0. Proof. It is easy to see that L⊗n is 1 2 Z-graded by L⊗n p = Pp1+p2+···+pn=p Lp1 ⊗ Lp2 ⊗ · · · ⊗ Lpn, ∀ p, pi ∈ 1 2 Z, i = 1, 2, · · · n. Z rp as a finite sum with rp ∈ L⊗n p . By hypothesis, L0 · r = 0, which implies r = r0. Write r = Pp∈ 1 So r = 2 Pr1+r2+···+rn=0 cr1,r2,···rnEr1 ⊗ Er2 ⊗ · · · Ern for some cr1,r2,···rn ∈ F and Eri ∈ Lri with ri ∈ 1 2 Z. Since M0 · r = 0 by the assumption, all the coefficients of the terms containing Nj for j ∈ Z are zero, hence these terms in the sum vanish. Similarly, by N0 · r = 0, one can kill the coefficients of the terms containing Mj and Yj+1/2 with j ∈ Z. Now we can rewrite r by r = Pr1+r2+···+rn=0 cr1,r2,···rnLr1 ⊗ Lr2 ⊗ · · · Lrn for some cr1,r2,···rn ∈ F. But M1 · r = 0 forces all the coefficients cr1,r2,···rn are zero. This proves the lemma. (cid:3) Theorem 3.5 Der(L, V) = Inn(L, V). Proof. It suffices to show Der0(L, V) ⊆ Inn(L, V) by virtue of Proposition 3.3. For any 0 6= D ∈ Der0(L, V), we shall prove that the zero derivation is obtained after a number of steps in each of which D is replaced by D − uinn for some u ∈ V0. This will be done by a little bit complicated calculations. For clarity, we divide them into three claims. Claim 1. D(L0) = 0. 4 In fact, for any Xp ∈ L with p ∈ 1 2 Z, applying D to [L0, Xp] = pXp, one has Xp · D(L0) = 0. Then it follows from Lemma 3.4 that D(L0) = 0. Claim 2. D(L±1) = 0. For any n ∈ Z, one can write D(Ln), D(Mn), D(Nn) and D(Yn−1/2) as follows: D(Ln) = Pi∈Z +a(n) (a(n) 1,i Li⊗Ln−i+a(n) 2,i Li ⊗Mn−i+a(n) 3,i Mi ⊗Ln−i+a(n) 4,i Li⊗Nn−i+a(n) 5,i Ni ⊗Ln−i 6,iMi⊗Mn−i+a(n) 7,i Mi⊗Nn−i+a(n) 8,i Ni ⊗Mn−i+a(n) 9,i Ni⊗Nn−i+a(n) 10,iYi−1/2 ⊗Yn−i+1/2), D(Mn) = Pi∈Z (b(n) 1,i Li⊗Ln−i+b(n) 2,i Li⊗Mn−i+b(n) 3,i Mi ⊗Ln−i+b(n) 4,i Li⊗Nn−i+b(n) 5,i Ni ⊗Ln−i +b(n) 6,iMi ⊗Mn−i+b(n) 7,i Mi ⊗Nn−i+b(n) 8,i Ni⊗Mn−i+b(n) 9,i Ni⊗Nn−i+b(n) 10,iYi−1/2 ⊗Yn−i+1/2), D(Nn) = Pi∈Z (d(n) 1,i Li⊗Ln−i+d(n) 2,i Li⊗Mn−i+d(n) 3,i Mi⊗Ln−i+d(n) 4,i Li⊗Nn−i+d(n) 5,i Ni⊗Ln−i +d(n) 6,iMi⊗Mn−i+d(n) 7,iMi⊗Nn−i+d(n) 8,i Ni⊗Mn−i+d(n) 9,i Ni⊗Nn−i+d(n) 10,iYi−1/2 ⊗Yn−i+1/2), D(Yn−1/2) = Pi∈Z (αn,iLi⊗Yn−1/2−i+α† n,iYi−1/2 ⊗Ln−i+βn,iMi⊗Yn−1/2−i+β† n,iYi−1/2 ⊗Mn−i +γn,iNi ⊗ Yn−1/2−i + γ† n,iYi−1/2 ⊗ Nn−i). Note that all the sums are finite. For any n ∈ Z, one can easily get the following identities by (1.1): L1 · (Nn ⊗ N−n) = nNn+1 ⊗ N−n − nNn ⊗ N1−n, L1 · (Mn ⊗ N−n) = nMn+1 ⊗ N−n − nMn ⊗ N1−n, L1 · (Nn ⊗ M−n) = nNn+1 ⊗ M−n − nNn ⊗ M1−n, L1 · (Mn ⊗ M−n) = nMn+1 ⊗ M−n − nMn ⊗ M1−n, L1 · (Ln ⊗ N−n) = (n − 1)Ln+1 ⊗ N−n − nLn ⊗ N1−n, L1 · (Nn ⊗ L−n) = nNn+1 ⊗ L−n − (1 + n)Nn ⊗ L1−n, L1 · (Ln ⊗ M−n) = (n − 1)Ln+1 ⊗ M−n − nLn ⊗ M1−n, L1 · (Mn ⊗ L−n) = nMn+1 ⊗ L−n − (1 + n)Mn ⊗ L1−n, L1 · (Ln ⊗ L−n) = (n − 1)Ln+1 ⊗ L−n − (1 + n)Ln ⊗ L1−n, L1 · (Yn−1/2 ⊗ Y1/2−n) = (n − 1)Yn+1/2 ⊗ Y1/2−n − nYn−1/2 ⊗ Y3/2−n. Let Qi = max{p a(1) i,p 6= 0} for i = 1,· · · , 10. Applying D − uinn to L1, where u is a proper linear combination of Lp ⊗ L−p, Lp ⊗ M−p, Mp ⊗ L−p, Mp ⊗ M−p, Lp ⊗ N−p, Np ⊗ L−p, Mp ⊗ N−p, Np ⊗ M−p, Np ⊗ N−p and Yp−1/2 ⊗ Y1/2−p with p ∈ Z, and using induction on P10 i=1Qi, one can safely suppose a(1) 1,i = a(1) 2,k = a(1) a(1) 6,j = a(1) 4,k = a(1) 7,j = a(1) 10,k = a(1) 8,j = a(1) 3,n = a(1) 9,j = 0, 5,n = 0, for i 6= −1, 2, j 6= 0, 1, for k 6= 0, 2, n 6= ±1. (3.3) (3.4) 5 Applying D to [ L1, L−1] = −2L0 and using D(L0) = 0, we have (cid:16)(cid:0)(p − 2)a(−1) Pp∈Z + (cid:0)(p − 2)a(−1) + (cid:0)(p − 1)a(−1) + (cid:0)(p − 2)a(−1) + (cid:0)(p − 1)a(−1) + (cid:0)(p − 1)a(−1) + (cid:0)(p − 1)a(−1) + (cid:0)(p − 1)a(−1) + (cid:0)(p − 1)a(−1) + (cid:0)(p − 2)a(−1) 1,p−1 − (p + 2)a(−1) 2,p−1 − (p + 1)a(−1) 3,p−1 − (p + 2)a(−1) 4,p−1 − (p + 1)a(−1) 5,p−1 − (p + 2)a(−1) 6,p−1 − (p + 1)a(−1) 7,p−1 − (p + 1)a(−1) 8,p−1 − (p + 1)a(−1) 9,p−1 − (p + 1)a(−1) 10,p−1 − (p + 1)a(−1) 1,p + (p − 2)a(1) 2,p + (p − 1)a(1) 3,p + (p − 2)a(1) 4,p + (p − 1)a(1) 5,p + (p − 2)a(1) 6,p + (p − 1)a(1) 7,p + (p − 1)a(1) 8,p + (p − 1)a(1) 9,p + (p − 1)a(1) 10,p + (p − 2)a(1) 1,p − (p + 2)a(1) 2,p − (p + 2)a(1) 3,p − (p + 1)a(1) 4,p − (p + 2)a(1) 5,p − (p + 1)a(1) 6,p − (p + 1)a(1) 7,p − (p + 1)a(1) 8,p − (p + 1)a(1) 9,p − (p + 1)a(1) 10,p − (p + 1)a(1) 1,p+1(cid:1)Lp ⊗ L−p 2,p+1(cid:1)Lp ⊗ M−p 3,p+1(cid:1)Mp ⊗ L−p 4,p+1(cid:1)Lp ⊗ N−p 5,p+1(cid:1)Np ⊗ L−p 6,p+1(cid:1)Mp ⊗ M−p 7,p+1(cid:1)Mp ⊗ N−p 8,p+1(cid:1)Np ⊗ M−p 9,p+1(cid:1)Np ⊗ N−p 10,p+1(cid:1)Yp−1/2 ⊗ Y1/2−p(cid:17) = 0. In particular, one has (p − 2)a(−1) 1,p−1 − (p + 2)a(−1) 1,p + (p − 2)a(1) 1,p − (p + 2)a(1) 1,p+1 = 0, ∀ p ∈ Z, which together with the fact that {p ∈ Z a(−1) 1,p 6= 0} is finite and (3.3), forces a(−1) 1,p = 3a(−1) 1,−2 + a(−1) 1,−1 + 3a(1) 1,−1 = a(−1) 1,0 + 3a(−1) 1,1 + 3a(1) 1,2 = a(−1) 1,−1 + a(−1) 1,0 = 0, (3.5) for p ∈ Z\{−2, 0, ±1}. Similarly, comparing the coefficients of Lp ⊗ M−p, Mp ⊗ L−p ,Lp ⊗ N−p, Np ⊗ L−p, Mp ⊗ M−p, Mp ⊗ N−p, Np ⊗ M−p, Np ⊗ N−p and Yp−1/2 ⊗ Y1/2−p and taking (3.3) and (3.4) into account, one has a(−1) 2,0 + 2a(−1) 2,1 = a(−1) 2,0 + 2a(−1) 2,−1 = a(−1) 3,−1 + 2a(−1) 3,0 = a(−1) 3,−1 + 2a(−1) 3,−2 = 0, a(−1) 4,0 + 2a(−1) 4,1 = 2a(−1) 4,−1 + a(−1) 4,0 + a(1) 4,0 = a(−1) 5,−1 + 2a(−1) 5,0 = a(−1) 5,−1 + 2a(−1) 5,−2 = 0, a(−1) i,−1 + a(−1) 2,p = a(1) a(1) i,0 + a(1) 3,p = a(1) i,0 + a(1) i,1 = 2a(−1) 10,−1 +a(−1) 10,0 +2a(1) 10,0 = a(−1) 10,0 + 2a(−1) 10,1 +2a(1) 10,2 = 0, 4,p = a(1) 5,p = a(−1) 2,p2 = a(−1) 3,p3 = a(−1) 4,p4 = a(−1) 5,p5 = a(−1) i,pi = a(−1) 10,p10 = 0, (3.6) (3.7) (3.8) (3.9) for any p ∈ Z, p2 ∈ Z \ {0, ±1}, p3 ∈ Z \ {0, −1, −2}, p4 ∈ Z \ {0, ±1}, p5 ∈ Z \ {0, −1, −2}, pi ∈ Z\{−1, 0} with i = 6, 7, 8, 9 and p10 ∈ Z\{0, ±1}. By (3.3) and (3.4) as well as applying D to [L1, N0] = 0 and [L1, M0] = 0, respectively, we have 6,n = a(1) a(1) 7,n = a(1) 8,n = a(1) 9,n = a(1) 10,n = 0, for all n ∈ Z, d(0) 1,j1 = d(0) 2,j2 = d(0) 3,j3 = d(0) 4,j4 = d(0) 5,j5 1,j1 = b(0) b(0) d(0) 1,0 + 2d(0) 2,j2 = b(0) 1,−1 = d(0) 3,j3 = b(0) 1,0 + 2d(0) 4,j4 = b(0) 1,1 = d(0) b(0) 1,0 + 2b(0) 1,−1 = b(0) 1,0 + 2b(0) 1,1 = b(0) = d(0) 10,p = 0, i,j = d(0) i,j = b(0) l,1 = d(0) l,1 = b(0) 10,p = 0, k,0 + d(0) k,0 + b(0) 5,j5 = b(0) l,0 + d(0) l,0 + b(0) k,−1 = 0, k,−1 = 0, (3.10) (3.11) (3.12) (3.13) (3.14) 6 where j1 ∈ Z\{0, ±1}, j2 ∈ Z\{0, 1}, j3 ∈ Z\{0, −1}, j4 ∈ Z\{0, 1}, j5 ∈ Z\{0, −1}, j ∈ Z\{0}, p ∈ Z\{0, 1}, i = 6, 7, 8, 9, l = 2, 4, 10 and k = 3, 5. Then it follows from (3.3), (3.9) and (3.10) that D(L1) = Pi∈Z(cid:0)a(1) 1,i Li ⊗ L1−i(cid:1) = a(1) 1,−1L−1 ⊗ L2 + a(1) 1,2L2 ⊗ L−1. (3.15) Furthermore, applying D to [L1, Y1/2] = 0, we get D(L1) = 0 from (3.15). Similarly, applying D to [L−1, N0] = 0 and [L−1, M0] = 0, respectively, we obtain from (3.6)-(3.9) and (3.11)-(3.14) that a(−1) 6,i = a(−1) 7,i = a(−1) 8,i = a(−1) 9,i = a(−1) 10,i = b(0) 4,i = b(0) 5,i = d(0) 4,i = d(0) 5,i = 0, d(0) 2,1 − a(−1) 2,0 = d(0) 3,−1 − a(−1) 3,−1 = b(0) 2,1 + a(−1) 4,0 = b(0) 3,−1 + a(−1) 5,0 = 0, (3.16) (3.17) for all i ∈ Z. Set u := L1 ⊗ M−1 − L0 ⊗ M0. Observe that L1 · u = 0. Substitute D + a(−1) the expression of D(L−1), one can safely assume a(−1) 2,1 = 0, since such replacement would not affect the expression of D(L1). Similarly, set u(1) := M−1 ⊗ L1 − M0 ⊗ L0, u(2) := L1 ⊗ N−1 − L0 ⊗ N0, and u(3) := N−1 ⊗ L1 − N0 ⊗ L0, then replace D by D + a(−1) 5,0 u(3) in turn, one can assume a(−1) inn and D + a(−1) inn, D + a(−1) 2,1 uinn into 4,1 u(2) 3,0 u(1) 5,0 = 0. Hence we get 4,1 = a(−1) 3,0 = a(−1) inn D(L−1) = a(−1) 1,−2L−2 ⊗ L1 + a(−1) 1,−1L−1 ⊗ L0 + a(−1) 1,0 L0 ⊗ L−1 + a(−1) 1,1 L−1 ⊗ L2, by (3.5)-(3.7). Finally, using D([L−1, Y−1/2]) = 0 and (3.5), one has D(L−1) = 0. Claim 3. D(L±2) = D(N1) = D(Y1/2) = 0. It follows (3.14) and (3.16) that D(M0) = b(0) 1,−1L−1 ⊗ L1 + b(0) 8,0N0 ⊗ M0 + b(0) +b(0) 1,0L0 ⊗ L0 + b(0) 1,1L1 ⊗ L−1 + b(0) 6,0M0 ⊗ M0 + b(0) 7,0M0 ⊗ N0 9,0N0 ⊗ N0 + b(0) 10,0Y−1/2 ⊗ Y1/2 + b(0) 10,1Y1/2 ⊗ Y−1/2, D(N0) = d(0) 1,−1L−1 ⊗ L1 + d(0) 8,0N0 ⊗ M0 + b(0) 1,0L0 ⊗ L0 + d(0) 9,0N0 ⊗ N0 + d(0) 1,1L1 ⊗ L−1 + d(0) 10,0Y−1/2 ⊗ Y1/2 + d(0) +d(0) 10,1Y1/2 ⊗ Y−1/2. 6,0M0 ⊗ M0 + d(0) 7,0M0 ⊗ N0 (3.18) (3.19) Set v(1) := M0⊗M0, v(2) := M0⊗N0, v(3) := N0⊗M0 and v(4) := Y1/2⊗Y−1/2−Y−1/2⊗Y1/2. Observe 7,0v(2) inn, that L±1 · v(i) = 0, but N0 · v(i) 6= 0 for i = 1, 2, 3, 4. Replacing D by D − 1 inn, D − 1 4 d(0) 6,0 = d(0) 6,0v(1) 7,0 = d(0) 2 d(0) 8,0 = d(0) 10,0 = 0. D− 1 2 d(0) 8,0v(3) inn and D− 1 2 d(0) 10,0v(4) inn in turn in (3.19), one can assume that d(0) By applying D to [N0, N1] = 0 and using (3.13), we have d(0) follows from D([N0, M0]) = 2D(M0) and (3.18)-(3.19)that D(N0) = 0 and 1,−1 = d(0) 1,1 = d(0) 1,−1 = d(0) 10,1 = 0. Then it D(M0) = b(0) 7,0M0 ⊗ N0 + b(0) 8,0N0 ⊗ M0 + b(0) 10,0Y−1/2 ⊗ Y1/2 + b(0) 10,1Y1/2 ⊗ Y−1/2 . (3.20) 7 Now considering D([L±2, M0]) = 0 and D([L±2, N0]) = 0, one has D(L2) = Pia(2) 1,i Li ⊗ L2−i, and D(L−2) = Pia(−2) 1,i Li ⊗ L−2−i. (3.21) As a by-product, we also get b(0) 10,0 = b(0) 10,1 = 0. Replacing D by D + 1 2 b(0) 8,0(N0 ⊗ N0)inn in (3.20), one can assume b(0) 8,0 = 0. Now we get from (3.20) that D(M0) = b(0) 7,0M0 ⊗ N0. (3.22) Applying D to [L1, L−2] = −3L−1 and [L−1, L2] = 3L1, respectively, and using D(L±1) = 0, we have a(2) 1,p = a(−2) 1,q = 2a(2) 1,1 + 3a(2) 1,0 = a(2) 1,0 + 4a(2) 1,−1 = a(2) 1,1 + a(2) 1,2 = a(2) 1,2 + 4a(2) 1,3 = 0, 2a(−2) 1,−1 + 3a(−2) 1,0 = a(−2) 1,0 + 4a(−2) 1,1 = a(−2) 1,−1 + a(−2) 1,−2 = a(−2) 1,−2 + 4a(−2) 1,−3 = 0, (3.23) (3.24) 4 a(2) where p ∈ Z\{0, ±1, 2, 3} and q ∈ Z\{−3, −2, 0, ±1}. Set v := L−1 ⊗ L1 − 2L0 ⊗ L0 + L1 ⊗ L−1 and take D − 1 1,0 = 0. Then it follows (3.21) and (3.23) that D(L2) = 0. Consequently, one can easily get D(L−2) = 0 by applying D to [L−2, L2] = 4L0 and using (3.24). 1,0vinn in place of D in the first equation of (3.21), one can assume a(2) Applying D to [M0, Y1/2] = 0 and [M0, Y−1/2] = 0, respectively, one has γ† 1,i = γ† 0,i = γ0,j = γ0,j = 0, ∀ i ∈ Z, j ∈ Z\{0}. (3.25) Similarly, when D is applied to [N0, Y1/2] = Y1/2 and [N0, Y−1/2] = Y−1/2, respectively, it follows β1,i = β† 1,i = β0,i = β† 0,i = 0, for all i ∈ Z. Using D([L1, Y1/2]) = 0, D([L−1, Y−1/2]) = 0 and D(L±1) = 0, we have α1,i = α† 1,i = α† 0,i = α0,j = 0, ∀ i ∈ Z\{0, 1}, j ∈ Z\{0, −1}, α1,0 + α1,1 = α0,0 + α0,−1 = α† 1,0 + α† 1,1 = α† 0,0 + α† 0,1 = 0. (3.26) (3.27) Applying D to [L1, Y−1/2] = −Y1/2, one has α0,0 = α1,1, α† b = α† 0,0 and c = γ0,0 . Hence, we can rewrite D(Y±1/2) as follows: 0,0 = α† 1,0 and γ0,0 = γ1,0. Let a = α0,0, D(Y1/2) = −aL0 ⊗ Y1/2 + aL1 ⊗ Y−1/2 + bY−1/2 ⊗ L1 − bY1/2 ⊗ L0 + cN0 ⊗ Y1/2, (3.28) D(Y−1/2) = aL0 ⊗ Y−1/2 − aL−1 ⊗ Y1/2 + bY−1/2 ⊗ L0 − bY1/2 ⊗ L−1 + cN0 ⊗ Y−1/2. (3.29) When D is applied to [L2, Y−1/2] = − 3 0, since D(L±2) = 0. It follows c = d(0) D(Y±1/2) = D(M0) = 0 by (3.22), (3.28) and (3.29). 2 Y3/2 and [L−2, Y3/2] = 5 7,0 = 0 by applying D to [Y−1/2, Y1/2] = M0, which proves 2 Y−1/2, respectively, one has a = b = 8 Now it is left to calculate D(N1). Firstly, using D([N0, N1]) = 0 and D(N0) = 0, we have d(1) 2,i = d(1) 3,i = d(1) 6,i = d(1) 7,i = d(1) 8,i = d(1) 10,i = 0, ∀ i ∈ Z. Then applying D to [L−1, N1] = N0 and using D(N0) = 0, we obtain d(1) 1,i1 = d(1) 4,0 + 2d(1) d(1) 4,i2 = d(1) 4,1 = d(1) 5,i3 = d(1) 4,0 + 2d(1) 9,i4 = d(1) 4,−1 = d(1) 1,0 + d(1) 5,1 + 2d(1) 1,1 = d(1) 1,1 + 3d(1) 1,2 = d(1) 5,0 = d(1) 5,1 + 2d(1) 5,2 = d(1) 1,0 + 3d(1) 9,0 + d(1) 1,−1 = 0, 9,1 = 0, (3.30) (3.31) where i1 ∈ Z\{0, ±1, 2}, i2 ∈ Z\{0, ±1}, i3 ∈ Z\{0, 1, 2}, and i4 ∈ Z\{0, 1}. Finally, by applying D to [N1, Y−1/2] = Y1/2 and (3.31) as well as D(Y±1/2) = 0, we get d(1) 1,i = d(1) 4,i = d(1) 5,i = d(1) 9,i = 0, ∀ i ∈ Z, which together with (3.30), yields D(N1) = 0. Hence, the claim is proved, so is the theorem, since L is generated by L±1, L±2, N1 and Y1/2. (cid:3) The following lemma is very useful to the main theorem in the paper. Lemma 3.6 Suppose v ∈ V such that x · v ∈ Im( Id − τ ) for all x ∈ L. Then v ∈ Im( Id − τ ). Proof. First note that L · Im( Id − τ ) ⊂ Im( Id − τ ). We shall show that after several steps in each of which v is replaced by v − u for some u ∈ Im( Id − τ ), the zero element is obtained, which leads us to the result. Write v = Pn∈ 1 Z vn. Obviously, 2 v ∈ Im( Id − τ ) ⇐⇒ vn ∈ Im( Id − τ ), ∀ n ∈ 1 2 Z. (3.32) Z nvn = L0 · v ∈ Im( Id − τ ). By (3.32), nvn ∈ Im( Id − τ ). In particular, vn ∈ Im( Id − τ ) Then Pn∈ 1 if n 6= 0. Thus when replacing v by v − Pn∈ 1 2 2 Z∗ vn, one can suppose v = v0 ∈ V0. Write (aiLi ⊗ L−i + biLi ⊗ M−i + ciMi ⊗ L−i + diMi ⊗ M−i + eiYi−1/2 ⊗ Y1/2−i v = Pi∈Z + fiLi ⊗ N−i + giNi ⊗ L−i + hiNi ⊗ N−i + kiMi ⊗ N−i + riNi ⊗ M−i). Since all the elements of the forms Ei ⊗ F−i − F−i ⊗ Ei and Yi−1/2 ⊗ Y1/2−i − Y1/2−i ⊗ Yi−1/2 are contained in Im( Id − τ ), where {Ei, Fi} ⊂ {Li, Mi, Ni} for all i ∈ Z. Replacing v by v − u, where u is a combination of some of these elements, we can assume ci = gi = ri = 0, ∀ i ∈ Z; ai, di, hi 6= 0 =⇒ i > 0 or i = 0; ei 6= 0 =⇒ i > 0. (3.33) Then v can be rewritten as (aiLi ⊗ L−i + diMi ⊗ M−i + hiNi ⊗ N−i) v = Pi∈Z+ + Pi∈Z (biLi ⊗ M−i + fiLi ⊗ N−i + kiMi ⊗ N−i) + Pi∈Z>0 eiYi−1/2 ⊗ Y1/2−i. (3.34) 9 Assume ap 6= 0 for some p > 0. Choose q > 0 such that q 6= p. Then Lp+q ⊗ L−p appears in Lq · v, but (3.33) implies the term L−p ⊗ Lp+q does not appear in Lq · v, which contradicts the fact that Lq ·v ∈ Im( Id−τ ). Hence we get ai = 0, ∀ i ∈ Z∗. Similarly, one can suppose di = hi = 0, ∀ i ∈ Z∗ and ei = 0, ∀ i ∈ Z. Then (3.34) becomes v = Pi∈Z (biLi ⊗ M−i + fiLi ⊗ N−i + kiMi ⊗ N−i) + a0L0 ⊗ L0 + d0M0 ⊗ M0 + h0N0 ⊗ N0 . (3.35) By Im( Id − τ ) ⊂ Ker( Id + τ ) and our hypothesis L · v ⊂ Im( Id − τ ), we have 0 = ( Id + τ )M0 · v = −4h0(M0 ⊗ N0 + N0 ⊗ M0) − 2Pi∈Z fi(Li ⊗ M−i + M−i ⊗ Li) − 4Pi∈Z ki(Mi ⊗ M−i) . Comparing the coefficients, one gets h0 = 0 and fi = ki = 0, ∀ i ∈ Z. Similarly, ( Id + τ )(N0 · v) = 0 implies d0 = 0 and bi = 0 for all i ∈ Z; and ( Id + τ )(L1 · v) = 0 leads to a0 = 0. Then the lemma follows from (3.35). (cid:3) By now we have enough in hand to classify the Lie bialgebra structures on the extended Schrodinger-Virasoro Lie algebra. The following theorem is the central result of the paper. Theorem 3.7 Let (L, [·, ·]) be the extended Schrodinger-Virasoro Lie algebra. Then each Lie bial- gebra structure on L is triangular coboundary. Proof. Let (L, [·, ·], ∆) be a Lie bialgebra structure on L. Thanks to Theorem 3.5, there exists some r ∈ V such that ∆ = ∆r. By (2.1), Im(∆) ⊂ Im( Id − τ ). Then it follows from Lemma 3.6 that r ∈ Im( Id − τ ). But (2.1), Theorem 2.2(iii) and Lemma 3.4 show that c(r) = 0; as a result, (L, [·, ·], ∆) is a triangular coboundary Lie bialgebra by Definition 2.1. (cid:3) References [1] V.G. Drinfel'd, Constant quasiclassical solutions of the Yang-Baxter quantum equation, Soviet Math. Dokl. 28(3) (1983), 667 -- 671. [2] V.G. Drinfel'd, Quantum groups, in: Proceeding of the International Congress of Mathemati- cians, Vol. 1, 2, Berkeley, Calif. 1986, Amer. Math. Soc., Providence, RI, 1987, pp. 798 -- 820. [3] P. Etingof, D. Kazhdan, Quantization of Lie bialgebras, I, Selecta Math. (New Series) 2 (1996) 1-41. [4] R. Farnsteiner, Derivations and extensions of finitely generated graded Lie algebras, J. Algebra, 118(1) (1988), 34 -- 45. [5] S. Gao, C. Jiang, Y. Pei , Structure of the extended Schrodinger-Virasoro Lie algebra, Alg. Colloq, in press (2008). [6] M. Henkel, Schrodinger invariance and strongly anisotropic critical systems. J. Stat. Phys., 75 (1994), 1023 -- 1029. [7] M. Henkel, Unterberger J. Schrodinger invariance and space-time symmetries. Nucl. Phys. B, 660 (2003), 407 -- 412. 10 [8] J. Han, Y. Su, Lie bialgebra structures on the Schrodinger-Virasoro Lie algebra, J. Math. Phys. 50 (2009), no. 8, 083504, 12 pp. [9] J. Li, Y. Su, Representations of the Schrodinger-Virasoro algebras, J. Math. Phys, 49 (2008), 053512. [10] J. Li, Y. Su, The derivation algebra and automorphism group of the twisted Schrodinger- Virasoro algebra, arXiv:0801.2207v1, (2008). [11] J. Li, Y. Su, B, Xin, Lie bialgebras of a family of Block type, Chinese Annals of Math. (Series.B) 29 (2008), 487 -- 500. [12] J. Li, Y. Su, B. Xin, Lie Bialgebra Structures on the Centerless W -Algebra W (2; 2), Algebra Colloquium, accepted. [13] J. Li, Y. Su, L. Zhu, 2-cocycles of original deformative Schrodinger-Virasoro algebras, Sci- ence in China: Series A 51 (2008), 1989 -- 1999. [14] W. Michaelis, A class of infinite-dimensional Lie bialgebras containing the Virasoro algebras, Adv. Math. 107 (1994), 365 -- 392. [15] W. Michaelis, Lie coalgebras, Adv. Math. 38 (1980), 1 -- 54. [16] W. Michaelis, The dual Poincare-Birkhoff-Witt theorem, Adv.Math. 57 (1985), 93 -- 162. [17] S.H. Ng, E.J. Taft, Classification of the Lie bialgebra structures on the Witt and Virasoro algebras, J. Pure Appl. Alg. 151 (2000), 67 -- 88. [18] C. Roger, J. Unterberger, The Schrodinger-Virasoro Lie group and algebra: representation theory and cohomological study, Ann. Henri Poincar´e, 7 (2006), 1477 -- 1529. [19] G. Song, Y. Su, Lie bialgebras of generalized Witt type, Science in China: Series A 49 (2006), 533 -- 544. [20] E.J. Taft, Witt and Virasoro algebras as Lie bialgebras, J. Pure Appl. Al. 87 (1993), 301 -- 312. [21] S. Tan, X. Zhang, Automorphisms and Verma modules for Generalized Schrodinger-Virasoro algebras, arXiv:0804.1610v2. [22] J. Unterberger, On vertex algebra representations of the Schrodinger-Virasoro algebra. arXiv:cond-mat/0703 214v2, (2007). [23] Y. Wu, G. Song, Y. Su, Lie bialgebras of generalized Witt type. II. Comm. Algebra, 35(6) (2007), 1992-2007. [24] Y. Wu, G. Song, Y. Su, Lie bialgebras of generalized Virasoro-like type, Acta Mathematica Sinica, English Series, 22 (2006), 1915 -- 1922. [25] X. Zhang, S. Tan, Whittaker modules and a class of new modules similar as Whittaker modules for the Schrodinger-Virasoro algebra, arXiv:0812.3245v1. 11
1503.05364
2
1503
2016-06-13T12:15:29
Hochschild products and global non-abelian cohomology for algebras. Applications
[ "math.RA" ]
Let $A$ be a unital associative algebra over a field $k$, $E$ a vector space and $\pi : E \to A$ a surjective linear map with $V = {\rm Ker} (\pi)$. All algebra structures on $E$ such that $\pi : E \to A$ becomes an algebra map are described and classified by an explicitly constructed global cohomological type object ${\mathbb G} {\mathbb H}^{2} \, (A, \, V)$. Any such algebra is isomorphic to a Hochschild product $A \star V$, an algebra introduced as a generalization of a classical construction. We prove that ${\mathbb G} {\mathbb H}^{2} \, (A, \, V)$ is the coproduct of all non-abelian cohomologies ${\mathbb H}^{2} \, \, (A, \, (V, \cdot))$. The key object ${\mathbb G} {\mathbb H}^{2} \, (A, \, k)$ responsible for the classification of all co-flag algebras is computed. All Hochschild products $A \star k$ are also classified and the automorphism groups ${\rm Aut}_{\rm Alg} (A \star k)$ are fully determined as subgroups of a semidirect product $A^* \, \ltimes \bigl(k^* \times {\rm Aut}_{\rm Alg} (A) \bigl)$ of groups. Several examples are given as well as applications to the theory of supersolvable coalgebras or Poisson algebras. In particular, for a given Poisson algebra $P$, all Poisson algebras having a Poisson algebra surjection on $P$ with a $1$-dimensional kernel are described and classified.
math.RA
math
HOCHSCHILD PRODUCTS AND GLOBAL NON-ABELIAN COHOMOLOGY FOR ALGEBRAS. APPLICATIONS A. L. AGORE AND G. MILITARU Abstract. Let A be a unital associative algebra over a field k, E a vector space and π : E → A a surjective linear map with V = Ker(π). All algebra structures on E such that π : E → A becomes an algebra map are described and classified by an explicitly constructed global cohomological type object GH2 (A, V ). Any such algebra is isomorphic to a Hochschild product A ⋆ V , an algebra introduced as a generalization of a classical construction. We prove that GH2 (A, V ) is the coproduct of all non- abelian cohomologies H2 (A, (V, ·)). The key object GH2 (A, k) responsible for the classification of all co-flag algebras is computed. All Hochschild products A ⋆ k are also classified and the automorphism groups AutAlg(A⋆k) are fully determined as subgroups of a semidirect product A∗ ⋉ (cid:0)k∗ × AutAlg(A)(cid:1) of groups. Several examples are given as well as applications to the theory of supersolvable coalgebras or Poisson algebras. In particular, for a given Poisson algebra P , all Poisson algebras having a Poisson algebra surjection on P with a 1-dimensional kernel are described and classified. Introduction Introduced at the level of groups by Holder [28], the extension problem is a famous and still open problem to which a vast literature was devoted (see [1] and the references therein). Fundamental results obtained for groups [1, 15, 37] served as a model for studying the extension problem for several other fields such as Lie/Leibniz algebras [14, 31], super Lie algebras [6], associative algebras [17, 26], Hopf algebras [8], Poisson algebras [24], Lie-Rinehart algebras [12, 25] etc. The extension problem is one of the main tools for classifying 'finite objects' and has been a source of inspiration for developing cohomology theories in all fields mentioned above. We recall the extension problem using the language of category theory. Let C be a category having a zero (i.e. an initial and final) object 0 and for which it is possible to define an exact sequence. Given A, B two fixed objects of C, the extension problem consists of the following question: Describe and classify all extensions of A by B, i.e. all triples (E, i, π) consisting of an object E of C and two morphisms in C that fit into an exact sequence of the form: 0 / B i / E π / A / 0 2010 Mathematics Subject Classification. 16D70, 16S70, 16E40. Key words and phrases. The extension problem, non-abelian cohomology, classification of algebras. A.L. Agore is Postdoctoral Fellow of the Fund for Scientific Research-Flanders (Belgium) (F.W.O. Vlaanderen). This work was supported by a grant of the Romanian National Authority for Scientific Research, CNCS-UEFISCDI, grant no. 88/05.10.2011. 1 / / / / 2 A. L. AGORE AND G. MILITARU Two extensions (E, i, π) and (E′, i′, π′) of A by B are called equivalent if there exists an isomorphism ϕ : E → E′ in C that stabilizes B and co-stabilizes A, i.e. ϕ ◦ i = i′ and π′ ◦ ϕ = π. The answer to the extension problem is given by explicitly computing the set Ext(A, B) of all equivalence classes of extensions of A by B via this equiva- lence relation. The simplest case is that of extensions with an 'abelian' kernel B for which a Schreier type theorem proves that all extensions of A by an abelian object B are classified by the second cohomology group H2(A, B) - the result is valid for groups, Lie/Leibniz/associative/Poisson/Hopf algebras, but the construction of the second co- homology group is different for each of the above categories [8, 14, 15, 26, 37]. The difficult part of the extension problem is the case when B is not abelian: as a general principle, the Schreier type theorems remain valid, but this time the classifying object of all extensions of A by B is not the cohomology group of a given complex anymore, but only a pointed set called the non-abelian cohomology H2 nab(A, B). For its construction in the case of groups we refer to [7], while for Lie algebras to [19] where it was proved that the non-abelian cohomology H2 nab(A, B) is the Deligne groupoid of a suitable differ- ential graded Lie algebra. The difficulty of the problem consists in explicitly computing H2 nab(A, B): lacking an efficient cohomology tool as in the abelian case [35, 38], it needs to be computed 'case by case' using different computational and combinatorial approaches. This paper deals, at the level of associative algebras, with a generalization of the ex- tension problem, called the global extension (GE) problem, introduced recently in [3, 33] for Poisson/Leibniz algebras as a categorical dual of the extending structures problem [2, 4, 5]. The GE-problem can be formulated for any category C using a simple idea: in the classical extension problem we drop the hypothesis 'B is a fixed object in C' and replace it by a weaker one, namely 'B has a fixed dimension'. For example, if C is the category of unital associative algebras over a field k, the GE-problem can be formulated as follows: for a given algebra A, classify all associative algebras E for which there exists a surjective algebra map E → A → 0 whose kernel has a given dimension c as a vector space. Of course, any such algebra has A× V as the underlying vector space, where V is a vector space such that dim(V ) = c. Among several equivalent possibilities for writing down the GE-problem for algebras, we prefer the following: Let A be a unital associative algebra, E a vector space and π : E → A a linear epi- morphism of vector spaces. Describe and classify the set of all unital associative algebra structures that can be defined on E such that π : E → A becomes a morphism of algebras. By classification of two algebra structures ·E and ·′ E on E we mean the classification up to an isomorphism of algebras (E, ·E) ∼= (E, ·′ E) that stabilizes V := Ker(π) and co-stabilizes A: we shall denote by Gext(A, E) the set of equivalence classes of all algebra structures on E such that π : E → A is an algebra map. Let us explain now the significant differences between the GE-problem and the classical extension problem for associative algebras whose study was initiated in [17, 26]. Let (E, ·E) be a unital algebra structure on E such that π : (E, ·E) → A is an algebra map. Then (E, ·E) is an extension of the unital algebra A by the associative algebra V = Ker(π), which is a non-unital subalgebra (in fact a two-sided ideal) of (E, ·E). However, the multiplication on V is not fixed from the input data, as in the case of the classical extension problem: it depends essentially on the algebra structures on E which we are looking for. Thus the HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 3 classical extension problem is in some sense the 'local' version of the GE-problem. The partial answer and the best result obtained so far for the classical extension problem was given in [26, Theorem 6.2]: all algebra structures ·E on E such that V is a two-sided ideal of null square (i.e. x ·E y = 0, for all x, y ∈ V - that is V is an 'abelian' algebra) are classified by the second Hochschild cohomological group H2(A, V ). The result, as remarkable as it is, has its limitations: for example, if A := Mn(k) is the algebra of n × n-matrices then there is no associative algebra E of dimension 1 + n2 for which we have a surjective algebra map A → Mn(k) with a null square kernel - however, there is a large family of such algebras with a projection on Mn(k), one of them being of course the direct product of algebras Mn(k) × k (more details are given in Example 2.13). This example provides enough motivation for studying the GE-problem and the fact that it covers the missing part in the classical Hochschild approach of the extension problem. The paper is organized as follows. Section 1 gives the theoretical answer to the GE- problem in three steps. First of all, in Proposition 1.2 we introduce a new product A ⋆ V = A ⋆(⊳, ⊲, ϑ, ·) V , associated to an algebra A and a vector space V connected by two 'actions' of A on V , a 'cocycle' and an associative multiplication · on V satisfying several axioms. We call the algebra A ⋆ V the Hochschild product since, in the particu- lar case when · is the trivial multiplication on V the above product reduces to the one in this case the axioms involved in the construction introduced by Hochschild in [26]: of A ⋆ V come down to the fact that V is an A-bimodule and ϑ : A × A → V is an usual normalized 2-cocycle. On the other hand, if the cocycle ϑ is the trivial map then the associated Hochschild product A ⋆ V is just the semidirect product A# V of algebras and the corresponding axioms show that (V, ·) is an associative algebra in the monoidal category (AMA, − ⊗A −, A) of A-bimodules. The canonical surjection A ⋆ V → A is an algebra map having the kernel V . Proposition 1.4 proves the converse: any algebra structure ·E which can be defined on the vector space E such that π : (E,·E ) → A is a morphism of algebras is isomorphic to a Hochschild product A ⋆ V . Based on these results and a technical lemma, the theoretical answer to the GE-problem is given in Theorem 1.9: the classifying set Gext(A, E) is parameterized by an explicitly con- structed global cohomological object GH2 (A, V ) and the bijection between the elements of GH2 (A, V ) and Gext(A, E) is given. On the route, Corollary 1.5 proves that any finite dimensional algebra is isomorphic to an iteration of Hochschild products of the form (cid:0)···(cid:0)(S ⋆ V1) ⋆ V2(cid:1)⋆··· ⋆ Vt(cid:1), where S is a finite dimensional simple algebra and V1,··· , Vt are finite dimensional vector spaces. Corollary 1.11 provides a decomposition of GH2 (A, V ) as the coproduct of all non-abelian cohomologies H2(cid:0)A, (V, ·V )(cid:1), which are classifying objects for the extensions of A by all associative algebra structures · on V -- the second Hochschild cohomological group H2 (A, V ) is the most elementary piece among all components of GH2 (A, V ). Computing the classifying object GH2 (A, V ) is a highly nontrivial task: if A is finite dimensional and V := kn this object parameterizes the equivalence classes of all unital associative algebras of dimension n + dim(A) that admit an algebra surjection on A. In Section 2 we shall identify a way of computing this object for a class of algebras called co-flag algebras over A, i.e. algebras E that have a finite π1−→ A0 := A, chain of surjective morphisms of algebras An := E such that dim(Ker(πi)) = 1, for all i = 1,··· , n. All co-flag algebras over A can be πn−→ An−1 ··· π2−→ A1 4 A. L. AGORE AND G. MILITARU completely described and classified by a recursive reasoning whose key step is given in Proposition 2.6 and Corollary 2.7 where GH2 (A, k) is computed and all Hochschild prod- ucts A ⋆ k are described by generators and relations. The less restrictive classification of these algebras, i.e. only up to an agebra isomorphism, is given in Theorem 2.8 where the second classifying object HOC (A, k) is computed: it parameterizes the isomorphism classes of all Hochschild products A ⋆ k, that is, it classifies up to an isomorphism, all algebras B which admit a surjective algebra map B → A with a 1-dimensional kernel. As a bonus of our approach, the automorphism groups AutAlg(A⋆k) are fully determined in Corollary 2.12 as subgroups of a semidirect product A∗ ⋉(cid:0)k∗ × AutAlg(A)(cid:1) of groups. At this point we should mention that determining the structure of the automorphism group of a given algebra is an old problem, intensively studied and very difficult, arising from invariant theory (see [10, 13] and the references therein). Several examples where both classifying objects GH2 (A, k) and HOC (A, k) are explicitly computed for different algebras A are worked out in details. For instance, if A = k[Cn], is the group algebra of the cyclic group Cn of order n, then GH2 (k[Cn], k) ∼= (cid:0)Un(k) × Un(k)(cid:1) ⊔ k∗, where Un(k) is the group of n-th roots of unity in k. The classification of these algebras, by de- scribing the classifying object HOC (k[Cn], k), is also indicated and reduces the question to a challenging number theory problem which depends heavily on the arithmetics of n and the base field k -- it is also related to two intensively studied problems in the theory of group rings, namely the description of all invertible elements and the automorphism group of a group algebra [23, 32, 34]. An intriguing example is A := Tn(k), the algebra of upper triangular (n × n)-matrices. The global cohomological object GH2 (Tn(k), k) is computed in Example 2.19 being described by a very interesting set of matrices of trace 0. In particular, HOC (T2(k), k) = 8, i.e. up to an isomorphism of algebras there exist exactly eight 4-dimensional algebras that have an algebra projection on the Heisenberg algebra T2(k). Applications for coalgebras and Poisson algebras are given in Section 3 based on the same idea: namely, that of rephrasing the concepts and results of this paper for coalgebras (resp. Poisson manifolds) via two different contravariant functors (−)∗ := Homk (−, k) (resp. C ∞(−)) from the category of coalgebras (resp. Poisson manifolds) to the category of algebras (resp. Poisson algebras). Having the theory of supersolvable Lie algebras [9] as a source of inspiration we introduce the concept of a supersolvable coalgebra in such a way that a coalgebra C is supersolvable if and only if the convolution algebra C ∗ is a co-flag algebra. In particular, Corollary 2.18 classifies all 3-dimensional supersolvable coalgebras over a field of characteristic 6= 2. On the other hand, for a given Poisson algebra P , Theorem 3.3 classifies up to an isomorphism all Poisson algebras Q which admit a Poisson surjection Q → P → 0 with a 1-dimensional kernel. The result is the algebraic counterpart of the classification problem of all Poisson manifolds containing a given Poisson manifold M of codimension 1. As an example, we show that there exist exactly six families of 4-dimensional Poisson algebras with a Poisson algebra surjection of the Heisenberg-Poisson algebra H(3, k). For applications and further motivation for studying Poisson algebras we refer to [21, 22, 30]. HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 5 1. The global extension problem Notations and terminology. For two sets X and Y we shall denote by X ⊔ Y their coproduct in the category of sets, i.e. X ⊔ Y is the disjoint union of X and Y . Unless otherwise specified, all vector spaces, linear or bilinear maps are over an arbitrary field k. A map f : V → W between two vector spaces is called the trivial map if f (v) = 0, for all v ∈ V . By an algebra A we always mean a unital associative algebra over k whose unit will be denoted by 1A. All algebra maps preserve units and any left/right A-module is unital. For an algebra A, AutAlg(A) denotes the group of algebra automorphisms of A, Alg (A, k) is the space of all algebra maps A → k while AMA stands for the category of A-bimodules. If (V, ⊲, ⊳) ∈ AMA is an A-bimodule, then the trivial extension of A by V is the algebra A× V , with the multiplication defined for any a, b ∈ A, x, y ∈ V by: (1) Let A be an algebra, E a vector space, π : E → A a linear epimorphism of vector spaces with V := Ker(π) and denote by i : V → E the inclusion map. We say that a linear map ϕ : E → E stabilizes V (resp. co-stabilizes A) if the left square (resp. the right square) of the following diagram (a, x) · (b, y) := (cid:0)ab, a ⊲ y + x ⊳ b(cid:1) V Id V i i E π A ϕ Id / E π / A (2) is commutative. Two unital associative algebra structures · and ·′ on E such that π : E → A is a morphism of algebras are called cohomologous and we denote this by (E,·) ≈ (E,·′), if there exists an algebra map ϕ : (E,·) → (E,·′) which stabilizes V and co- stabilizes A. We can easily prove that any such morphism is bijective and thus, ≈ is an equivalence relation on the set of all algebra structures on E such that π : E → A is an algebra map and we denote by Gext (A, E) the set of all equivalence classes via the equivalence relation ≈. Gext (A, E) is the classifying object for the GE-problem. In what follows we will prove that Gext (A, E) is parameterized by a global cohomological object GH2 (A, V ) which will be explicitly constructed. To start with, we introduce the following: Definition 1.1. Let A be an algebra and V a vector space. A Hochschild data of A by V is a system Θ(A, V ) = (⊲, ⊳, ϑ, ·) consisting of four bilinear maps ⊲ : A × V → V, ⊳ : V × A → V, ϑ : A × A → V, · : V × V → V For a Hochschild data Θ(A, V ) = (⊲, ⊳, ϑ, ·) we denote by A ⋆ V = A ⋆(⊳, ⊲, ϑ, ·) V the vector space A × V with the multiplication defined for any a, b ∈ A and x, y ∈ V by: (a, x) ⋆ (b, y) := (ab, ϑ(a, b) + a ⊲ y + x ⊳ b + x · y) (3) A ⋆ V is called the Hochschild product associated to Θ(A, V ) if it is an associative algebra with the multiplication given by (3) and the unit (1A, 0V ). In this case Θ(A, V ) = (⊲, ⊳, ϑ, ·) is called a Hochschild system of A by V . The multiplication defined by (3) is more general than the one appearing in the proof of [26, Theorem 6.2] -- the latter arises / /   / /     / / 6 A. L. AGORE AND G. MILITARU as a special case of A ⋆ V for · : V × V → V the trivial map, that is x · y = 0, for all x, y ∈ V . Moreover, the GE-problem is the dual, in the sense of category theory, of the extending structures problem studied for algebras in [5]: hence, from this viewpoint the Hochschild product A ⋆ V can be seen as a categorical dual of the unified product A ⋉ V introduced in [5, Theorem 2.2]. The necessary and sufficient conditions for A ⋆ V to be a Hochschild product are given in the following: Proposition 1.2. Let A be an algebra, V a vector space and Θ(A, V ) = (⊲, ⊳, ϑ, ·) a Hochschild data of A by V . Then A ⋆ V is a Hochschild product if and only if the following compatibility conditions hold for any a, b, c ∈ A and x, y ∈ V : (H0) ϑ(a, 1A) = ϑ(1A, a) = 0, x ⊳ 1A = x, 1A ⊲ x = x (H1) (x · y) ⊳ a = x · (y ⊳ a) (H2) (x ⊳ a) · y = x · (a ⊲ y) (H3) a ⊲ (x · y) = (a ⊲ x) · y (H4) (a ⊲ x) ⊳ b = a ⊲ (x ⊳ b) (H5) ϑ(a, bc) − ϑ(ab, c) = ϑ(a, b) ⊳ c − a ⊲ ϑ(b, c) (H6) (ab) ⊲ x = a ⊲ (b ⊲ x) − ϑ(a, b) · x (H7) x ⊳ (ab) = (x ⊳ a) ⊳ b − x · ϑ(a, b) (H8) The bilinear map · : V × V → V is associative. Before going into the proof, we make some comments on the relations (H0)-(H8). The first relation in (H0) together with (H5) show that ϑ is a normalized Hochschild 2- cocycle. (H6) and (H7) are deformations of the usual left and respectively right A-module conditions: together with (H4) and the last two relations of (H0) they measure how far (V, ⊲, ⊳) is from being an A-bimodule. Finally, axioms (H1)-(H3) are compatibilities between the associative multiplication · on V and the 'actions' (⊲, ⊳) of A on V which are missing in the classical theory [26] since · is the trivial map and thus they are automatically fulfilled. When ϑ is the trivial map, axioms (H1)-(H3) together with (H6)-(H8) imply that (V,·) is an associative algebra in the monoidal category AMA = (AMA, − ⊗A −, A) of A-bimodules (see Example 1.3 below). Proof. To start with, we can easily prove that (1A, 0V ) is the unit for the multiplication defined by (3) if and only if (H0) holds. The rest of the proof relies on a detailed analysis of the associativity condition for the multiplication given by (3). Since in A ⋆ V we have (a, x) = (a, 0) + (0, x), it follows that the associativity condition holds if and only if it holds for all generators of A⋆V , i.e. for the set {(a, 0) a ∈ A}∪{(0, x) x ∈ V }. To save space we will illustrate only a few cases, the rest of the details being left to the reader. For instance, the associativity condition for the multiplication given by (3) holds in {(0, (a, 0)} if and only if (H1) holds. Similarly, the associativity condition holds x), in {(0, x), (a, 0), (0, y)} if and only if (H2) holds while, the associativity condition holds in {(0, x), From now on a Hochschild system of A by V will be viewed as a system of bilinear maps Θ(A, V ) = (⊲, ⊳, ϑ, ·) satisfying the axioms (H0)-(H8) and we denote by HS (A, V ) the set consisting of all Hochschild systems of A by V . (0, z)} if and only if · : V × V → V is associative. (cid:3) (0, y), (0, y), HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 7 Examples 1.3. 1. By applying Proposition 1.2 we obtain that a Hochschild data (⊲, ⊳, ϑ, ·) for which · is the trivial map is a Hochschild system if and only if (V, ⊲, ⊳) is an A-bimodule and ϑ : A × A → V is a normalized 2-cocycle. Furthermore, if ϑ is also the trivial map, then the associated Hochschild product is just the trivial extension of the algebra A by the A-bimodule V as defined by (1). 2. A Hochschild system Θ(A, V ) = (⊲, ⊳, ϑ, ·) for which ϑ is the trivial map is called a semidirect system of A by V . In this case ϑ will be omitted when writing down Θ(A, V ) and axioms in Proposition 1.2 take a simplified form: Θ(A, V ) = (⊲, ⊳, ·) is a semidirect system if and only if (V, ⊲, ⊳) ∈ AMA is an A-bimodule, (V,·) is an associative algebra and a ⊲ (x · y) = (a ⊲ x) · y, (x ⊳ a) · y = x · (a ⊲ y) (x · y) ⊳ a = x · (y ⊳ a), (4) for all a ∈ A, x, y ∈ V . The Hochschild product associated to a semidirect system Θ(A, V ) = (⊲, ⊳, ·) is called a semidirect product of algebras and will be denoted by A#V := A#(⊳, ⊲, ·)V . The terminology will be motivated below in Corollary 1.6: exactly as in the case of groups or Lie algebras, the semidirect product of algebras describes split epimorphisms in the category of algebras. We will rephrase the axioms of a semidirect system Θ(A, V ) = (⊲, ⊳, ·) of A by V using the language of monoidal categories. The first and the second axioms of (4) are equivalent to the fact that the bilinear map · : V × V → V is an A-bimodule map, while the last one is the same as saying that the map is A-balanced. The space of these maps is in one-to-one correspondence with the set of all A-bimodule maps V ⊗A V → V . This fact together with the other two axioms can be rephrased as follows: Θ(A, V ) = (⊲, ⊳, ·) is a semidirect system of A by V if and only if (V,·) is a (not-necessarily unital) associative algebra in the monoidal category AMA = (AMA, − ⊗A −, A) of A-bimodules. The Hochschild product is the tool to answer the GE-problem. Indeed, first we observe that the canonical projection πA : A ⋆ V → A, πA(a, x) := a is a surjective algebra map with kernel {0} × V ∼= V . Hence, the algebra A ⋆ V is an extension of the algebra A by the associative algebra (V,·) via / V (5) 0 iV / / A ⋆ V πA / A / 0 where iV (x) = (0, x). Conversely, we have: Proposition 1.4. Let A be an algebra, E a vector space and π : E → A an epimorphism of vector spaces with V = Ker(π). Then any algebra structure · which can be defined on the vector space E such that π : (E,·) → A becomes a morphism of algebras is isomorphic to a Hochschild product A ⋆ V and moreover, the isomorphism of algebras (E,·) ∼= A ⋆ V can be chosen such that it stabilizes V and co-stabilizes A. Thus, any unital associative algebra structure on E such that π : E → A is an algebra map is cohomologous to an extension of the form (5). Proof. Let · be an algebra structure of E such that π : (E,·) → A is an algebra map. Since k is a field we can pick a k-linear section s : A → E of π, i.e. π ◦ s = IdA and s(1A) = 1E. Then ϕ : A × V → E, ϕ(a, x) := s(a) + x is an isomorphism of vector / / / 8 A. L. AGORE AND G. MILITARU spaces with the inverse ϕ−1(y) = (cid:0)π(y), y − s(π(y))(cid:1), for all y ∈ E. Using the section s we define three bilinear maps given for any a, b ∈ A and x ∈ V by: : V × A → V, x ⊳ a := x · s(a) ⊳ = ⊳s ⊲ = ⊲s : A × V → V, a ⊲ x := s(a) · x ϑ = ϑs : A × A → V, ϑ(a, b) := s(a) · s(b) − s(ab) and let ·V : V × V → V be the restriction of · at V , i.e. x ·V y := x · y, for all x, y ∈ V . We can easily see that they are well-defined maps. The key step is the following: using the system (⊳, ⊲, ϑ, ·V = ·) connecting A and V we can prove that the unique algebra structure ⋆ that can be defined on the direct product of vector spaces A × V such that ϕ : A × V → (E,·) is an isomorphism of algebras is given by: (6) for all a, b ∈ A, x, y ∈ V . Indeed, let ⋆ be such an algebra structure on A × V . Then: (a, x) ⋆ (b, y) := (ab, ϑ(a, b) + a ⊲ y + x ⊳ b + x · y) (a, x) ⋆ (b, y) = ϕ−1(cid:0)ϕ(a, x) · ϕ(b, y)(cid:1)= ϕ−1(cid:0)(s(a) + x) · (s(b) + y)(cid:1) = ϕ−1(s(a) · s(b) + s(a) · y + x · s(b) + x · y) = (cid:0)ab, s(a) · s(b) − s(ab) + s(a) · y + x · s(b) + x · y(cid:1) = (cid:0)ab, ϑ(a, b) + a ⊲ y + x ⊳ b + x · y) as needed. Thus, ϕ : A ⋆ V → (E,·) is an isomorphism of algebras and we can see that it stabilizes V and co-stabilizes A. (cid:3) Using Proposition 1.4 we obtain the following result concerning the structure of finite dimensional algebras which indicates the crucial role played by Hochschild products. We can survey all algebras of a given dimension if we are able to compute various Hochschild systems starting with a simple algebra (whose structure is well-known due to the Wederburn-Artin theorem) and the associated Hochschild products. It is the associative algebra counterpart of a similar result from group theory [36, pages 283-284]. Corollary 1.5. Any finite dimensional algebra is isomorphic to an iteration of Hochschild products of the form (cid:16)···(cid:0)(S ⋆ V1) ⋆ V2(cid:1)⋆··· ⋆ Vt(cid:17), where S is a finite dimensional simple k-algebra, t is a positive integer and V1,··· , Vt are finite dimensional vector spaces. Proof. Let A be an algebra of dimension n. The proof goes by induction on n. If n = 1 then A ∼= k ∼= k ⋆ {0} and k is a simple algebra. Assume now that n > 1. If A is simple there is nothing to prove. On the contrary, if A has a proper two-sided ideal {0} 6= Vt 6= A, let π : A → A1 := A/Vt be the canonical projection. It follows from Proposition 1.4 that A ∼= A1 ⋆ Vt, for some Hochschild system of A1 by Vt. If A1 is simple the proof is finished; if A1 is not simple, we apply induction since dimk(A1) < n. (cid:3) The semidirect products of algebras characterize split epimorphism in this category: Corollary 1.6. An algebra map π : B → A is a split epimorphism in the category of algebras if and only if there exists an isomorphism of algebras B ∼= A#V , where V = Ker(π) and A#V is a semidirect product of algebras. HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 9 Proof. First we note that for a semidirect product A#V , the canonical projection pA : A#V → A, pA(a, x) = a has a section that is an algebra map defined by sA(a) = (a, 0), for all a ∈ A. Conversely, let s : A → B be an algebra map such that π ◦ s = IdA. Then, the bilinear map ϑs constructed in the proof of Proposition 1.4 is the trivial map and hence the corresponding Hochschild product A ⋆ V is a semidirect product A#V . (cid:3) Proposition 1.4 shows that the classification part of the GE-problem reduces to the classification of all Hochschild products associated to all Hochschild systems of A by V . This is what we will do next. Lemma 1.7. Let Θ(A, V ) = (⊲, ⊳, ϑ, ·) and Θ′(A, V ) = (⊲′, ⊳′, ϑ′, ·′) be two Hochschild systems and A⋆V , respectively A⋆′ V , the corresponding Hochschild products. Then there exists a bijection between the set of all morphisms of algebras ψ : A ⋆ V → A ⋆′ V which stabilize V and co-stabilize A and the set of all linear maps r : A → V with r(1A) = 0 satisfying the following compatibilities for all a, b ∈ A, x, y ∈ V : (CH1) x · y = x ·′ y; (CH2) x ⊳ a = x ⊳′ a + x ·′ r(a); (CH3) a ⊲ x = a ⊲′ x + r(a) ·′ x; (CH4) ϑ(a, b) + r(ab) = ϑ′(a, b) + a ⊲′ r(b) + r(a) ⊳′ b + r(a) ·′ r(b) Under the above bijection the morphism of algebras ψ = ψr : A⋆V → A⋆′V corresponding to r : A → V is given by ψ(a, x) = (a, r(a) + x), for all a ∈ A, x ∈ V . Moreover, ψ = ψr is an isomorphism with the inverse given by ψ−1 r = ψ−r. Proof. It is an elementary fact that a linear map ψ : A × V → A × V stabilizes V and co-stabilizes A if and only if there exists a uniquely determined linear map r : A → V such that ψ(a, x) = (a, r(a) + x), for all a ∈ A, x ∈ V . Let ψ = ψr be such a linear map. We will prove that ψ : A ⋆ V → A ⋆′ V is an algebra map if and only if r(1A) = 0 and the compatibility conditions (CH1)-(CH4) hold. To start with it is straightforward to see that ψ preserve the unit (1A, 0) if and only if r(1A) = 0. The proof will be finished if we check that the following compatibility holds for all generators of A × V : ψ(cid:0)(a, x) ⋆ (b, y)(cid:1)= ψ(cid:0)(a, x)(cid:1) ⋆′ ψ(cid:0)(b, y)(cid:1) (7) By a straightforward computation it follows that (7) holds for the pair (a, 0), (b, 0) if and only if (CH4) is fulfilled while (7) holds for the pair (0, x), (a, 0) if and only if (CH2) is satisfied. Finally, (7) holds for the pair (a, 0), (0, x) and respectively (0, x), (0, y) if and only if (CH3) and respectively (CH1) hold. (cid:3) Lemma 1.7 leads to the following: Definition 1.8. Let A be an algebra and V a vector space. Two Hochschild systems Θ(A, V ) = (⊲, ⊳, ϑ, ·) and Θ′(A, V ) = (⊲′, ⊳′, ϑ′, ·′) are called cohomologous, and we denote this by Θ(A, V ) ≈ Θ′(A, V ), if and only if · = ·′ and there exists a linear map 10 A. L. AGORE AND G. MILITARU r : A → V such that r(1A) = 0 and for any a, b ∈ A, x, y ∈ V we have: x ⊳ a = x ⊳′ a + x ·′ r(a) a ⊲ x = a ⊲′ x + r(a) ·′ x ϑ(a, b) = ϑ′(a, b) − r(ab) + a ⊲′ r(b) + r(a) ⊳′ b + r(a) ·′ r(b) (8) (9) (10) As a conclusion of this section, we obtain the theoretical answer to the GE-problem: Theorem 1.9. Let A be an algebra, E a vector space and π : E → A a linear epi- morphism of vector spaces with V = Ker(π). Then ≈ defined in Definition 1.8 is an equivalence relation on the set HS(A, V ) of all Hochschild systems of A by V . If we denote by GH2 (A, V ) := HS(A, V )/ ≈, then the map GH2 (A, V ) → Gext (A, E), (⊲, ⊳, ϑ, ·) 7−→ A ⋆(⊳, ⊲, ϑ, ·) V (11) is bijective, where (⊲, ⊳, ϑ, ·) denotes the equivalence class of (⊲, ⊳, ϑ, ·) via ≈. Proof. Follows from Proposition 1.2, Proposition 1.4 and Lemma 1.7. (cid:3) ′ Computing the classifying object GH2 (A, V ), for a given algebra A and a given vector space V is a very difficult task. The first step in decomposing this object is suggested by the way the equivalence relation ≈ was introduced in Definition 1.8: it shows that two different associative algebra structures · and · on V give two different equivalence classes of the relation ≈ on HS(A, V ). Let us fix ·V an associative multiplication on V and denote by HS·V (A, V ) the set of all triples (cid:0)⊳, ⊲, ϑ(cid:1) such that (cid:0)⊲, ⊳, ϑ, ·V(cid:1)∈ HS(A, V ). Two triples (cid:0)⊳, ⊲, ϑ(cid:1) and (cid:0)⊳′, ⊲′, ϑ′(cid:1)∈ HS·V (A, V ) are ·V -cohomologous and we denote this by (cid:0)⊳, ⊲, ϑ(cid:1)≈·V (cid:0)⊳′, ⊲′, ϑ′(cid:1) if there exists a linear map r : A → V such that r(1A) = 0 and the compatibility conditions (8)-(10) are fulfilled for ·′ = ·V . Then ≈·V is an equivalence relation on HS·V (A, V ) and we denote by H2(cid:0)A, (V, ·V )(cid:1) the quotient set HS·V (A, V )/ ≈·V . The non-abelian cohomology H2(cid:0)A, (V, ·V )(cid:1) classifies all extensions of the unital associative algebra A by a fixed associative algebra (V, ·V ). This can be seen as a Schreier type theorem for associative algebras: we mention that [26, Theorem 6.2] (see also [35, Proposition 3.7]) follows as a special case of Corollary 1.10 if we let ·V to be the trivial map. Corollary 1.10. Let A be a unital associative algebra and (V,·V ) an associative multi- plication on V . Then, the map (⊲, ⊳, ϑ) 7−→ A ⋆(⊳, ⊲, ϑ, ·V ) V H2(cid:0)A, (V, ·V )(cid:1)→ Ext (A, (V, ·V )), (12) is bijective, where Ext (A, (V, ·V )) is the set of equivalence classes of all unital associa- tive algebras that are extensions of the algebra A by (V,·V ) and (⊲, ⊳, ϑ) denotes the equivalence class of (⊲, ⊳, ϑ) via ≈l. The above considerations give also the following decomposition of GH2 (A, V ): Corollary 1.11. Let A be an algebra, E a vector space and π : E → A an epimorphism of vector spaces with V = Ker(π). Then GH2 (A, V ) = ⊔·V H2(cid:0)A, (V, ·V )(cid:1) (13) HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 11 where the coproduct on the right hand side is in the category of sets over all possible associative algebra structures ·V on the vector space V . By looking at formula (13) one can see that computing GH2 (A, V ) is a very laborious task in which the first major barrier is describing all associative multiplications on V . The complexity of the computations involved increases along side with dim(V ). Among all components of the coproduct in (13) the simplest one is that corresponding to the trivial associative algebra structure on V , i.e. x ·V y := 0, for all x, y ∈ V . We shall denote this trivial algebra structure on V by V0 := (V, ·V = 0) and we shall prove that H2(cid:0)A, V0(cid:1) is the coproduct of all classical second cohomological groups. Indeed, let HS0(A, V0) be the set of all triples (cid:0)⊳, ⊲, ϑ(cid:1) such that (cid:0)⊲, ⊳, ϑ, ·V := 0(cid:1)∈ HS(A, V ). Example 1.3 shows that a triple (cid:0)⊳, ⊲, ϑ(cid:1)∈ HS0(A, V0) if and only if (V, ⊲, ⊳) is an A- bimodule and ϑ : A × A → V is a normalized 2-cocycle. Two triples (cid:0)⊳, ⊲, ϑ(cid:1) and (cid:0)⊳′, ⊲′, ϑ′(cid:1)∈ HS0(A, V0) are 0-cohomologous (cid:0)⊳, ⊲, ϑ(cid:1)≈0 (cid:0)⊳′, ⊲′, ϑ′(cid:1) if and only if ⊳ = ⊳′, ⊲ = ⊲′ and there exists a linear map r : A → V such that r(1A) = 0 and ϑ(a, b) = ϑ′(a, b) − r(ab) + a ⊲ r(b) + r(a) ⊳ b (14) for all a, b ∈ A -- these are the conditions remaining from Definition 1.8 applied for the trivial multiplication · := 0. The equalities ⊳ = ⊳′ and ⊲ = ⊲′ show that two different A-bimodule structures over V give different equivalence classes in the classifying object H2(cid:0)A, V0(cid:1). Thus, for computing it we can also fix (V, ⊳, ⊲) an A-bimodule structure over V and consider the set Z2 i.e. bilinear maps ϑ : A × A → V satisfying (H5) and the first condition of (H0). Two normalized 2-cocycles ϑ and ϑ′ are cohomologous ϑ ≈0 ϑ′ if and only if there exists a linear map r : A → V such that r(1A) = 0 and (14) holds. ≈0 is an equivalence relation on the set Z2 (⊳, ⊲) (A, V0)/ ≈0 is just the classical second Hochschild cohomological group which we denote by H2 (⊳, ⊲) (A, V0). All the above considerations prove the following: (⊳, ⊲) (A, V0) of all normalized Hochschild 2-cocycles: (⊳, ⊲) (A, V0) and the quotient set Z2 Corollary 1.12. Let A be an algebra and V a vector space viewed with the trivial asso- ciative algebra structure V0. Then: where the coproduct on the right hand side is in the category of sets over all possible A-bimodule structures (⊳, ⊲) on the vector space V . H2(cid:0)A, V0(cid:1) = ⊔(⊳, ⊲) H2 (⊳, ⊲) (A, V0) (15) 2. Co-flag algebras. Examples. In this section we apply the theoretical results obtained in Section 1 for some concrete examples: more precisely, for a given algebra A we shall classify all unital associative algebras B such that there exists a surjective algebra map π : B → A having a 1- dimensional kernel, which as a vector space will be assumed to be k. First, we shall compute GH2 (A, k): it will classify all these algebras up to an isomorphism which stabilizes k and co-stabilizes A. Then, we will compute the second classifying object, denoted by HOC (A, k), which will provide the classification of these algebras only up 12 A. L. AGORE AND G. MILITARU to an isomorphism. Computing both classifying objects is the key step in a recursive algorithm for describing and classifying the new class of algebras defined as follows: Definition 2.1. Let A be an algebra and E a vector space. A unital associative algebra structure ·E on E is called a co-flag algebra over A if there exists a positive integer n and a finite chain of surjective morphisms of algebras An := (E,·E ) (16) such that dimk(Ker(πi)) = 1, for all i = 1,··· , n. A finite dimensional algebra is called a co-flag algebra if it is a co-flag algebra over the unital algebra k. π1−→ A0 := A πn−→ An−1 πn−1−→ An−2 ··· π2−→ A1 By applying successively Proposition 1.4 we obtain that a co-flag algebra over an algebra A is isomorphic to an iteration of Hochschild products of the form(cid:0)···(cid:0)(A⋆k)⋆k(cid:1)⋆···⋆k(cid:1), where the 1-dimensional vector space k appears n times in the above product. The tools used for describing co-flag algebras are the following: Definition 2.2. Let A be an algebra. A co-flag datum of the first kind of A is a triple (λ, Λ, ϑ) consisting of two algebra maps1 λ, Λ : A → k and a bilinear map ϑ : A× A → k satisfying the following compatibilities for any a, b, c ∈ A: ϑ(a, 1A) = ϑ(1A, a) = 0, ϑ(a, bc) − ϑ(ab, c) = ϑ(a, b)Λ(c) − ϑ(b, c)λ(a) (17) A co-flag datum of the second kind of A is a pair (λ, u) consisting of a linear map λ : A → k such that λ(1A) = 1 and a non-zero scalar u ∈ k∗. We denote by CF1 (A) (resp. CF2 (A)) the set of all co-flag data of the first (resp. second) kind of A and by CF (A) := CF1 (A) ⊔ CF2 (A) their coproduct; the elements of CF (A) are called co-flag data of A. The set of co-flag data CF (A) parameterizes the set of all Hochschild systems of A by a 1-dimensional vector space. The next result also describes the first algebra A1 from the exact sequence (16) in terms depending only on A. Proposition 2.3. Let A be an algebra. Then there exists a bijection HS (A, k) ∼= CF (A) between the set of all Hochschild systems of A by k and the set of all co-flag data of A given such that the Hochschild product A ⋆ k associated to (λ, Λ, ϑ) ∈ CF1 (A) is the algebra denoted by A(λ,Λ,ϑ) with the multiplication given for any a, b ∈ A, x, y ∈ k by: (a, x) ⋆ (b, y) = (cid:0)ab, ϑ(a, b) + λ(a)y + Λ(b)x(cid:1) (18) while the Hochschild product A ⋆ k associated to (λ, u) ∈ CF2 (A) is the algebra denoted by A(λ,u) with the multiplication given for any a, b ∈ A, x, y ∈ k by: (a, x) ⋆ (b, y) = (cid:0)ab, u−1(cid:0)λ(a)λ(b) − λ(ab)(cid:1)+λ(a)y + λ(b)x + u xy(cid:1) (19) Proof. We have to compute the set of all bilinear maps ⊲ : A × k → k, ⊳ : k × A → k, ϑ : A × A → k and · : k × k → k satisfying the compatibility conditions (H0)-(H8) of Proposition 1.2. Since k has dimension 1 there exists a bijection between the set of all Hochschild datums (cid:0)⊲, ⊳, ϑ, ·(cid:1) of A by k and the set of all 4-tuples (Λ, λ, ϑ, u) consisting of two linear maps Λ, λ : A → k, a bilinear map ϑ : A × A → k and a scalar 1Recall that we assume the algebra maps λ : A → k to be unit preserving, i.e. λ(1A) = 1. HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 13 u ∈ k. The bijection is given such that the Hochschild datum (cid:0)⊲, ⊳, ϑ, ·(cid:1) corresponding to (Λ, λ, ϑ, u) is defined as follows: a ⊲ x := λ(a)x, x ⊳ a := Λ(a)x, x · y := u xy for all a ∈ A and x, y ∈ k. Now, axiom (H0) holds if and only if ϑ(a, 1A) = ϑ(1A, a) = 0 and λ(1A) = Λ(1A) = 1. Axioms (H1), (H3), (H4) and (H8) are trivially fulfilled. Axiom (H5) is equivalent to ϑ(a, bc) − ϑ(ab, c) = ϑ(a, b)Λ(c) − ϑ(b, c)λ(a), axiom (H6) is equivalent to (20) while axiom (H7) is equivalent to Λ(ab) = Λ(a)Λ(b) − u ϑ(a, b). Finally, axiom (H2) is equivalent to uΛ(a) = uλ(a), for all a ∈ A. A discussion on u is imposed by the last compatibility condition and the conclusion follows easily: CF1 (A) corresponds to the case when u = 0 and this will give rise to the algebras A ⋆ k = A(λ,Λ,θ). The case CF2 (A) corresponds to u 6= 0; in this case Λ = λ and the cocycle ϑ is implemented by u and λ via the formula ϑ(a, b) := u−1(cid:0)λ(a)λ(b) − λ(ab)(cid:1), for all a, b ∈ A, that arises from (20). Moreover, we can easily check that axiom (17) is trivially fulfilled for ϑ defined as above. The algebra A(λ,u) is just the Hochschild product A ⋆ k associated to this context. (cid:3) λ(ab) = λ(a)λ(b) − u ϑ(a, b) Remarks 2.4. (1) The first family of Hochschild products A(λ,Λ,θ) constructed in Propo- sition 2.3 corresponds to the classical case in which k ∼= 0 × k is a two-sided ideal of null square in the algebra A(λ,Λ,θ). The algebras A(λ,Λ,θ) will be classified up to an isomor- phism in Theorem 2.8 below. For the new families of algebras A(λ,u) the kernel of the canonical projection πA : A(λ,u) → k is equal to k ∼= 0 × k and this is not a null square ideal since (0, 1) ⋆ (0, 1) = (0, u) 6= (0, 0). Let (λ, u) ∈ CF2 (A) be a co-flag datum of the second kind of A. Taking into account the multiplication on A(λ, u) given by (19) we can easily prove that the map: ϕ : A(λ, u) → A × k, ϕ(a, x) := (a, λ(a) + u x) (21) for all a ∈ A and x ∈ k is an isomorphism of algebras (which does not stabilize k, if u 6= 1), where A × k is the usual direct product of algebras. The inverse of ϕ is given by ϕ−1(a, x) = (cid:0)a, u−1(x − λ(a)(cid:1), for all a ∈ A and x ∈ k. We will now describe the algebra A(λ,Λ,ϑ) and A(λ,u) by generators and relations. The elements of A will be seen as elements in A × k via the identification a = (a, 0) and we denote by f := (0A, 1) ∈ A × k. Let {ei i ∈ I} be a basis of A as a vector space over k. Then the algebra A(λ,Λ,ϑ) is the vector space having {f, ei i ∈ I} as a basis and the multiplication ⋆ given for any i ∈ I by: ei ⋆ ej = ei ·A ej + ϑ(ei, ej) f, f 2 = 0, ei ⋆ f = λ(ei) f, f ⋆ ei = Λ(ei) f (22) where ·A denotes the multiplication on A. The algebra A(λ,u) is the vector space having {f, ei i ∈ I} as a basis and the multiplication ⋆ given for any i ∈ I by: ei ⋆ej = ei·A ej +u−1(cid:0)λ(ei)λ(ej)−λ(ei·A ej)(cid:1) f, f 2 = u f, ei ⋆f = f ⋆ei = λ(ei) f (23) Using Proposition 2.3, Proposition 1.4 and the isomorphism A(λ, u) ≃ A × k we obtain: 14 A. L. AGORE AND G. MILITARU Corollary 2.5. Let A be an algebra. A unital associative algebra B has a surjective algebra map B → A → 0 whose kernel is 1-dimensional if and only if B is isomorphic to A × k or A(λ,Λ,ϑ), for some (λ, Λ, ϑ) ∈ CF1 (A). We are now able to compute the classifying object GH2 (A, k). Proposition 2.6. Let A be an algebra. Then, GH2 (A, k) ∼= (cid:16)CF1 (A)/ ≈1 (cid:17) ⊔ k∗ where ≈1 is the following equivalence relation on CF1 (A): (λ, Λ, ϑ) ≈1 (λ′, Λ′, ϑ′) if and only if λ = λ′, Λ = Λ′ and there exists a linear map t : A → k such that for any a, b ∈ A: (24) ϑ(a, b) = ϑ′(a, b) − t(ab) + λ′(a)t(b) + Λ′(b)t(a) Proof. It follows from Theorem 1.9 and Proposition 2.3 that GH2 (A, k) ∼= (cid:16)CF1 (A)/ ≈1 (cid:17) ⊔ (cid:16)CF2 (A)/ ≈2 (cid:17) where the equivalence relation ≈i on CFi (A), for i = 1, 2, is just the equivalence relation ≈ from Definition 1.8 written for the sets CFi (A) via the bijection HS (A, k) ∼= CF (A) given in Proposition 2.3. The equivalence relation ≈ written on the set of all co-flag data of the first kind takes precisely the form from the statement -- we mention that a linear map t satisfying (24) has the property that t(1A) = 0. The equivalence relation ≈ written on CF2 (A) takes the following form: (λ, u) ≈2 (λ′, u′) if and only if u = u′ and there exists a linear map t : A → k such that for any a ∈ A we have: λ(a) = λ′(a) + t(a) u′ (25) Now, if we fix a unit preserving linear map λ0 : A → k we obtain that the set {(λ0, u) u ∈ k∗} is a system of representatives for the equivalence relation ≈2 on CF2 (A) and hence CF2 (A)/ ≈2 ∼= k∗, which finishes the proof. The way ≈1 is defined in Proposition 2.6 indicates the decomposition of (cid:16)CF1 (A)/ ≈1 (cid:17) as follows: for two fixed algebra maps (λ, Λ) ∈ Alg(A, k) we shall denote by Z2 (λ, Λ) (A, k) the set of all normalized (λ, Λ)-cocycles; that is, the set of all bilinear maps ϑ : A×A → k satisfying the following compatibilities for any a, b, c ∈ A: (cid:3) ϑ(a, 1A) = ϑ(1A, a) = 0, ϑ(a, bc) − ϑ(ab, c) = ϑ(a, b)Λ(c) − ϑ(b, c)λ(a) Two (λ, Λ)-cocycles ϑ, ϑ′ : A × A → k are equivalent ϑ ≈(λ, Λ) exists a linear map t : A → k such that 1 ϑ′ if and only if there ϑ(a, b) = ϑ′(a, b) − t(ab) + λ(a)t(b) + Λ(b)t(a) If we denote H2 (λ, Λ) (A, k) := Z2 (λ, Λ) (A, k)/ ≈(λ, Λ) 1 for all a, b ∈ A. following decomposition of GH2 (A, k): (26) we obtain the HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 15 Corollary 2.7. Let A be an algebra. Then, GH2 (A, k) ∼= (cid:16)⊔(λ,Λ) H2 (λ, Λ) (A, k)(cid:17)⊔ k∗ (27) where the coproduct on the right hand side is in the category of sets over all possible algebra maps λ, Λ : A → k. The classifying object GH2 (A, k) computed in Corollary 2.7 classifies all Hochschild products A ⋆ k up to an isomorphism of algebras which stabilizes k and co-stabilizes A. In what follows we will consider a less restrictive classification: we denote by HOC (A, k) the set of algebra isomorphism classes of all Hochschild products A⋆k. Two cohomologous Hochschild products A ⋆ k and A ⋆′ k are of course isomorphic and therefore there exists a canonical projection GH2 (A, k) ։ HOC (A, k) between the two classifying objects. Next we compute HOC (A, k). Theorem 2.8. Let A be an algebra. Then there exists a bijection: HOC (A, k) ∼= (cid:16)CF1 (A)/ ≡ (cid:17)⊔{ A × k } where ≡ is the equivalence relation on CF1 (A) defined by: (λ, Λ, ϑ) ≡ (λ′, Λ′, ϑ′) if and only if there exists a triple (s0, ψ, r) ∈ k∗ × AutAlg(A) × Homk(A, k) consisting of a non-zero scalar s0 ∈ k∗, an algebra automorphism ψ of A and a linear map r : A → k such that for any a, b ∈ A we have: (28) (29) (30) (31) (32) λ = λ′ ◦ ψ, ϑ(a, b) s0 = ϑ′(cid:0)ψ(a), ψ(b)(cid:1)+λ(a)r(b) + Λ(b)r(a) − r(ab) Λ = Λ′ ◦ ψ Proof. Corollary 2.5 shows that any Hochschild product A⋆k is isomorphic to A(λ,Λ,ϑ), for some (λ, Λ, ϑ) ∈ CF1 (A) or to A(λ′,u′), for some (λ′, u′) ∈ CF2 (A). Since A(λ′,u′) ∼= A×k, the proof relies on the following two steps: (1) Let (λ, Λ, ϑ) and (λ′, Λ′, ϑ′) ∈ CF1 (A). Then, there exists a bijection between the set of all algebra isomorphisms ϕ : A(λ,Λ,ϑ) → A(λ′,Λ′,ϑ′) and the set of all triples (s0, ψ, r) ∈ k∗ × AutAlg(A)× Homk(A, k) satisfying the compatibility conditions (29) and (30). The bijection is given such that the algebra isomorphism ϕ = ϕ(s0, ψ, r) associated to (s0, ψ, r) is defined for any a ∈ A and x ∈ k by: ϕ(s0, ψ, r)(a, x) = (cid:0)ψ(a), r(a) + xs0(cid:1) (2) The algebras A(λ,Λ,ϑ) and A(λ′,u′) ∼= A × k are not isomorphic. We start by proving (1); although this is more than we need for proving our theorem, this more general statement will be used later on in computing the automorphism groups for the algebras A(λ,Λ,ϑ). First we note that there exists a bijection between the set of all linear maps ϕ : A × k → A × k and the set of quadruples (s0, β0, ψ, r) ∈ k × A × Homk(A, A)× Homk(A, k) given such that the linear map ϕ = ϕ(s0, β0, ψ, r) associated to (s0, β0, ψ, r) is given for any a ∈ A and x ∈ k by: ϕ(a, x) = (cid:0)ψ(a) + x β0, r(a) + x s0(cid:1) 16 A. L. AGORE AND G. MILITARU We will prove now the following technical fact: a linear map given by (32) is an iso- morphism of algebras from A(λ,Λ,ϑ) to A(λ′,Λ′,ϑ′) if and only if β0 = 0, s0 6= 0, ψ is an algebra automorphism of A and (29)-(30) hold. Taking into account the multiplication on A(λ,Λ,ϑ) given by (18), we can easily obtain that ϕ(cid:0)(0, x) ⋆ (0, y)(cid:1)= ϕ(0, x) ⋆′ ϕ(0, x) if and only if β0 = 0, where by ⋆′ we denote the multiplication of A(λ′,Λ′,ϑ′). Hence, in order for ϕ to be an algebra map it should take the following simplified form for any a ∈ A and x ∈ k: (33) for some triple (s0, ψ, r) ∈ k × Homk(A, A) × Homk(A, k). Next we prove that a linear map given by (33) is an algebra morphism from A(λ,Λ,ϑ) to A(λ′,Λ′,ϑ′) if and only if ψ : A → A is an algebra map and the following compatibilities are fulfilled for any a, b ∈ A: ϕ(a, x) = (cid:0)ψ(a), r(a) + x s0(cid:1) λ(a) s0 = λ′(cid:0)ψ(a)(cid:1) s0, r(ab) + ϑ(a, b) s0 = ϑ′(cid:0)ψ(a), ψ(b)(cid:1)+λ′(ψ(a))r(b) + Λ′(ψ(b))r(a) Λ(a) s0 = Λ′(cid:0)ψ(a)(cid:1) s0 (34) (35) Indeed, ϕ preserves the unit (1A, 0) if and only if ψ(1A) = 1A and r(1A) = 0. On the other hand we can prove that the first (resp. the second) compatibility of (34) is exactly the 0 , ψ−1, −(r◦ψ−1)s−1 condition ϕ(cid:0)(a, 0) ⋆ (0, x)(cid:1)= ϕ(a, 0) ⋆′ ϕ(0, x) (resp. ϕ(cid:0)(0, x) ⋆ (a, 0)(cid:1)= ϕ(0, x) ⋆′ ϕ(a, 0)). Finally, the condition ϕ(cid:0)(a, 0) ⋆ (b, 0)(cid:1)= ϕ(a, 0) ⋆′ ϕ(b, 0) is equivalent to the fact that ψ is an algebra endomorphism of A and (35) holds. Finally, the condition r(1A) = 0 follows by taking a = b = 1A in (35). Step (1) is finished if we prove that an algebra map ϕ = ϕ(s0, ψ, r) given by (33) is bijective if and only if s0 6= 0 and ψ is an automorphism of A. Assume first that s0 6= 0 and ψ is bijective with the inverse ψ−1. Then, we can see that ϕ(s0, ψ, r) is an isomorphism of algebras with the inverse given by ϕ−1 (s0, ψ, r) := 0 ). Conversely, assume that ϕ is bijective. Then its inverse ϕ−1 is ϕ(s−1 an algebra map and thus has the form ϕ−1(a, x) = (ψ′(a), r′(a) + xs′ 0), for some triple 0, r′, ψ′). If we write ϕ−1 ◦ ϕ(0, 1) = (0, 1) we obtain that s0s′ (s′ 0 = 1 i.e. s0 is invertible in k. In the same way ϕ−1 ◦ ϕ(a, 0) = (a, 0) = ϕ ◦ ϕ−1(a, 0) gives that ψ is bijective and ψ′ = ψ−1. We will prove now the assertion from step (2). Assume that ϕ : A(λ,Λ,ϑ) → A(λ′,u′) is an algebra map. Thus, ϕ is given by (32), for some quadruple (s0, β0, ψ, r). Now, we can see that the algebra map condition ϕ(cid:0)(0, x) ⋆ (0, y)(cid:1)= ϕ(0, x) ⋆′ ϕ(0, y) holds if and only if β0 = 0 and s0 = 0, where ⋆′ denotes the multiplication on the algebra A(λ′,u′). Hence, ϕ takes the form ϕ(a, x) = (cid:0)ψ(a), r(a)(cid:1), for all a ∈ A and x ∈ k. Such a map is never an isomorphism of algebras since is not injective and thus two algebras of the form A(λ,Λ,ϑ) and A(λ′,u′) are never isomorphic. The theorem is now completely proved. (cid:3) Remark 2.9. The compatibility condition (30) of Theorem 2.8 highlights the difficulty of classifying co-flag algebras over a given algebra A: it generalizes the classical Kroneker- Williamson equivalence of bilinear forms whose classification was started in [39] and finished in [27] over algebraically closed fields. We recall that two bilinear forms ϑ and ϑ′ on a vector space A are called isometric if there exists a linear automorphism ψ ∈ Autk(A) such that ϑ(x, y) = ϑ′(ψ(x), ψ(y)), for all x, y ∈ A. If the cocycles ϑ and ϑ′ are isometric as bilinear forms on A and ψ is an algebra automorphism of A, then HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 17 (30) holds by taking s0 := 1 and r := 0, the trivial map. For future references to the problem of classifying bilinear forms up to an isometry we refer to [27]. Theorem 2.8 can be applied to classify all semidirect products of algebras of the form A#k. We recall from Example 1.3 that a semidirect product A#k is just a Hochschild product A(λ,Λ,ϑ) = A ⋆ k having a trivial cocycle. The algebra obtained in this way will be denoted by A(λ, Λ). Directly from the proof of Theorem 2.8 we obtain: Corollary 2.10. Let A be an algebra, (λ, Λ) and (λ′, Λ′) two pairs consisting of algebra maps from A to k. Then there exists an isomorphism of algebras A(λ, Λ) ∼= A(λ′, Λ′) if and only if there exists ψ ∈ AutAlg(A) such that λ = λ′ ◦ ψ and Λ = Λ′ ◦ ψ. An interesting special case occurs for the algebras A such that there is no algebra map A → k (e.g. the classical Weyl algebra W1(k) = k < x, y xy − yx = 1 > or the matrix algebra Mn(k), for n ≥ 2). Using Proposition 2.6 and Theorem 2.8 we obtain: Corollary 2.11. Let A be an algebra for which there is no algebra map A → k. Then GH2 (A, k) ∼= k∗, HOC (A, k) = { A × k } In particular, up to an isomorphism, the only algebra B for which there exists a surjective algebra map B → A having a 1-dimensional kernel is the direct product A × k. Determining the automorphism group of a given algebra is an old and very difficult problem, intensively studied in invariant theory (see [13] and their references). As already mentioned, the first step proved in the proof of Theorem 2.8 allows us to compute the automorphism group AutAlg (A(λ,Λ,ϑ)), for any (λ, Λ, ϑ) ∈ CF1 (A). Let k∗ be the units group of k, k∗ × AutAlg(A) the direct product of groups and (A∗, +) the underlying abelian group of the linear dual A∗ = Homk(A, k). Then the map given for any s0 ∈ k∗, ψ ∈ AutAlg(A) and r ∈ A∗ by: ζ : k∗ × AutAlg(A) → AutGr (A∗, +), ζ(s0, ψ) (r) := s−1 0 r ◦ ψ is a morphism of groups. Thus, we can construct the semidirect product of groups A∗ ⋉ζ (cid:0)k∗ × AutAlg(A)(cid:1) associated to ζ. The next result shows that AutAlg(A(λ,Λ,ϑ)) is isomorphic to a certain subgroup of the semidirect product A∗ ⋉ζ (cid:0)k∗ × AutAlg(A)(cid:1). Corollary 2.12. Let A be an algebra, (λ, Λ, ϑ) ∈ CF1 (A) a co-flag datum of the first kind of A and let G(cid:0)A, (λ, Λ, ϑ)(cid:1) be the set of all triples (s0, ψ, r) ∈ k∗ × AutAlg(A)× A∗ such that for any a, b ∈ A: λ = λ ◦ ψ, Λ = Λ ◦ ψ, ϑ(a, b) s0 = ϑ(cid:0)ψ(a), ψ(b)(cid:1)+λ(a)r(b) + Λ(b)r(a) − r(ab) Then, there exists an isomorphism of groups AutAlg(A(λ,Λ,ϑ)) ∼= G(cid:0)A, (λ, Λ, ϑ)(cid:1), where G(cid:0)A, (λ, Λ, ϑ)(cid:1) is a group with respect to the following multiplication: 0, ψ ◦ ψ′, r ◦ ψ′ + s0r′) for all (s0, ψ, r), (s′ (s0, ψ, r) · (s′ 0, ψ′, r′) ∈∈ G(cid:0)A, (λ, Λ, ϑ)(cid:1). Moreover, the canonical map 0, ψ′, r′) := (s0s′ (36) G(cid:0)A, (λ, Λ, ϑ)(cid:1)−→ A∗ ⋉ζ (cid:0)k∗ × AutAlg(A)(cid:1), in an injective morphism of groups. (s0, ψ, r) 7→ (cid:0)s−1 0 r, (s0, ψ)(cid:1) 18 A. L. AGORE AND G. MILITARU Proof. The fact that G(cid:0)A, (λ, Λ, ϑ)(cid:1) is a group with respect to the multiplication (36) follows by a straightforward computation which is left to the reader: the unit is (1, IdA, 0) and the inverse of (s0, ψ, r) is (s−1 0 (r ◦ ψ−1)). The first statement follows from the proof of Theorem 2.8, step (1), since ϕ(s0,ψ,r)◦ ϕ(s′ 0, ψ◦ψ′, r◦ψ′+s0r′), where ϕ(s0,ψ,r) is an automorphism of A(λ,Λ,ϑ) given by (31). The last assertion follows by a routine computation. (cid:3) 0 , ψ−1, −s−1 0,ψ′,r′) = ϕ(s0s′ (n,n) denote the Kroneker symbols. Now we shall provide some explicit examples. The first example shows the limitations of the classical approach for the extension problem: there is no (1 + n2)-dimensional algebra with an algebra projection on the matrix algebra Mn(k) whose kernel is a null square ideal, but there exists a family of (1 + n2)-dimensional algebras which project on the matrix algebra Mn(k). We denote by {eij i, j = 1,··· , n} the canonical basis of Mn(k), i.e. eij is the matrix having 1 in the (i, j)th position and zeros elsewhere while j and δ(i,j) δk Example 2.13. Let n ≥ 2 be a positive integer. Then, GH2 (Mn(k), k) ∼= k∗ and the equivalence classes of all (1 + n2)-dimensional algebras with an algebra projection on Mn(k) are the following algebras denoted by Mn(k)u and defined for any u ∈ k∗ as the vector space having {f, eij i, j = 1,··· , n} as a basis and the multiplication given for any i, j = 1,··· , n by: f 2 := u f, eij ⋆ f = f ⋆ eij := δ(i,j) eij ⋆ ekl := δj (n,n) f, Furthermore, HOC (Mn(k), k) = {Mn(k) × k}. The result follows by applying Proposition 2.6 and Corollary 2.11 since there is no unitary algebra map Mn(k) → k. If we consider λ0 : Mn(k) → k defined by λ0(eij) := δ(i,j) (n,n), for all i, j = 1,··· , n, then {(λ0, u) u ∈ k∗} is a system of representatives for the equivalence relation ≈2. The algebra Mn(k)u associated to the pair (λ0, u) is the vector space having {f, eij i, j = 1,··· , n} as a basis while the multiplication given by (23) comes down to the one in the statement. k eil + u−1(cid:0)δ(i,j) (n,n)δ(k,l) (n,n) − δk j δ(i,l) (n,n)(cid:1) f An interesting example through the subtle arithmetics involved in the classification of the corresponding Hochschild products is the group algebra k[Cn], where for a positive integer n ≥ 2 we denote by Cn the cyclic group of order n generated by d. We introduce the following notation: for any i, j = 1,··· , n − 1 we shall denote by i ∗ j the positive integer given by i ∗ j := (cid:26) i + j if i + j − n if j + i < n j + i ≥ n In what follows Un(k) := {ω ∈ k ωn = 1} denotes the cyclic group of n-th roots of unity in k and A(n, k) := {x ∈ U (k[Cn]) ψ : k[Cn] → k[Cn], ψ(di) = xi, i = 0, 1,··· , n − 1, is an algebra automorphism}. Example 2.14. Let k be a field such that n is invertible in k. Then: GH2 (k[Cn], k) ∼= (cid:0)Un(k) × Un(k)(cid:1) ⊔ k∗ HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 19 and the equivalence classes of (n + 1)-dimensional algebras with an algebra projection on k[Cn] are the families of algebras having {f, di i = 1,··· , n} as a basis over k and the multiplication ⋆ defined for any (α, β) ∈ Un(k) × Un(k), u ∈ k∗ and i, j = 1,··· , n by: k[Cn](α, β) : k[Cn]u : di ⋆ dj = di+j, di ⋆ dj = di+j + u−1(δn f 2 = 0, di ⋆ f = αi f, f ⋆ di = βi f i δn j − δn i+j)f, f 2 = uf, di ⋆ f = f ⋆ di = δn i f Furthermore, there exists a bijection HOC (k[Cn], k) ∼= (cid:0)Un(k) × Un(k)/ ≡ (cid:1)⊔{k[Cn] × k} where ≡ is the following equivalence relation on Un(k)× Un(k): two pairs (α, β), (α′, β′) of n-th roots of unity in k are equivalent (α, β) ≡ (α′, β′) if and only if there exists x0 + x1 d + ··· + xn−1 dn−1 ∈ A(n, k) such that α′ = x0 + x1 α + ··· + xn−1 αn−1, β′ = x0 + x1 β + ··· + xn−1 βn−1 (37) To start with we point out that the algebra maps k[Cn] → k are parameterized by the cyclic group of n-th roots of unity in k. Consider α, β ∈ Un(k) which implement λ and respectively Λ, i.e. λ(d) = α and Λ(d) = β. We are left to compute the set of all (λ, Λ)- cocycles. To this end we denote ϑ(di, d) := ξi, i = 1,··· , n − 1 and we will see that these elements will allow us to completely determine the cocycle ϑ : k[Cn] × k[Cn] → k. Indeed, by writing down (17) for triples of the form (di, dj, d) and using induction we obtain the following general formula: ϑ(di, dj) = j−1 Xk=0 ξi∗k βj−1−k −(cid:0) j−1 Xl=1 ξl βj−1−l(cid:1)αi for all i, j = 1,··· , n − 1, where ξ0 := 0. Furthermore, by writing down (17) for triples of the form (di, dn−i, di) and using the above formula for ϑ we obtain the following compatibility which needs to be fulfilled for any i = 1,··· , n − 1: (αi − βi)(ξn−1 + ξn−2 β + ... + ξ1 βn−2) = 0 Therefore we distinguish two cases, namely: α = β or α 6= β and ξn−1 + ξn−2 β + ... + ξ1 βn−2 = 0. It follows that CF1 (k[Cn]) ∼= (Un(k) × kn−1) ∪ {(α, β, ξ1, ξ2, ..., ξn−2) ∈ Un(k)× Un(k)× kn−2 α 6= β} and the bijection associates to any (α, δ1, δ2, ..., δn−1) ∈ Un(k)×kn−1 the co-flag datum of the first kind (λα, Λα, ϑδ) given for all i, j = 1,··· , n−1 by: λ(d) = Λ(d) := α, ϑδ(di, dj) := j−1 Xk=0 j−1 δi∗k αj−1−k −(cid:0) Xl=1 δl αi+j−1−l(cid:1) where δ0 = 0, and to any (β, γ, ξ1, ξ2, ..., ξn−2) ∈ Un(k) × Un(k) × kn−2, with β 6= γ, associates the co-flag datum of the first kind (λβ, Λγ, ϑξ) given for any i, j = 1,··· , n−1 by: λβ(d) := β, Λγ(d) := γ, ϑξ(di, dj) := j−1 Xk=0 ξi∗k γj−1−k −(cid:0) j−1 Xl=1 ξl γj−1−l(cid:1)βi 20 A. L. AGORE AND G. MILITARU where ξ0 = 0 and ξn−1 = −(cid:0)ξn−2 β + ... + ξ1 βn−2(cid:1). It is now obvious that a (λα, Λα)- cocycle is never equivalent to a (λβ, Λγ)-cocycle for any α, β, γ ∈ Un(k), β 6= γ. Fur- thermore, by a rather long but straightforward computation it can be easily seen that for all α ∈ Un(k), any (λα, Λα)-cocycle, say ϑδ, is equivalent (in the sense of (26)) to the trivial cocycle via the linear map t : k[Cn] → k defined by t(1) := 0 and for any i = 2,··· , n − 1: t(d) := n−1 n−1 Xj=1 αjδn−j, t(di) := n−1iαi−1 n−1 Xj=1 αjδn−j − i−2 Xj=0 αjδi−1−j (λα, Λα) (k[Cn], k) ∼= {(α, α) α ∈ Un(k)}. A similar state- Therefore we have ⊔(λα,Λα) H2 ment holds for the second family of co-flag data of the first kind: for all β, γ ∈ Un(k), with β 6= γ, any (λβ, Λγ)-cocycle, say ϑξ, is equivalent to the trivial cocycle via the linear map t : k[Cn] → k defined by t(1) := t(d) := 0 and t(di) := −Pi−2 j=0 ξi−1−j γj, for all (k[Cn], k) ∼= {(α, β) ∈ Un(k) × Un(k) α 6= β}. i = 2,··· , n − 1. Thus ⊔(λβ ,Λγ ) H2 Therefore, we have proved that (cid:16)CF1 (k[Cn])/ ≈1 (cid:17)∼= Un(k)×Un(k) and the correspond- ing co-flag algebras are those denoted by k[Cn](α, β). For the co-flag data of the second kind of k[Cn] we choose the set of representatives {(λ0, u) u ∈ k∗} for the equivalence relation ≈2, where λ0 : k[Cn] → k is given by λ0(di) = δn i , for all i = 1,··· , n. They give rise to the co-flag algebras denoted by k[Cn]u. The conclusion now follows from Corollary 2.7. Finally, the assertion regarding HOC (k[Cn], k) is an easy consequence of Corollary 2.10. (λβ , Λγ ) Remark 2.15. Example 2.14 shows that any Hochschild product k[Cn] ⋆ k is isomorphic either to the direct product k[Cn] × k, or to a semi-direct product k[Cn](α, β), parame- terized by the group Un(k) × Un(k). The explicit description of the isomorphism classes of the algebras k[Cn](α, β) indicated by the equivalence relation (37) is a difficult number theory problem which relies heavily on the arithmetics of the positive integer n as well as on the base field k. Furthermore, the problem is also related to other two intensively studied problems in the theory of group algebras, namely the description of all invertible elements and the automorphism group of a group algebra [23, 32, 34]. Indeed, the key set A(n, k) which appears in the description of the classifying object HOC (k[Cn], k) parameterizes in fact the automorphism group AutAlg(k[Cn]). Any element of A(n, k) is invertible in k[Cn] and has order n in the group U (k[Cn]). These elements depend es- sentially on n and the base field k. Indeed, let X n − 1 = f1f2 ··· ft be the decomposition of X n − 1 as a product of irreducible polynomials in k[X]. If we denote by εi a root of fi in a fixed algebraic closure of k, we obtain that there exists a canonical isomorphism of k-algebras k[Cn] ∼= k(ε1)×··· × k(εt) that maps the generator d of Cn to (ε1,··· , εt). Thus, AutAlg(k[Cn]) is isomorphic to a direct product between all wreath product of Aut(cid:0)k(εi)(cid:1) and the symmetric groups [34]. algebras with an algebra projection on k[C2] ∼= k × k. Applying Example 2.14 for n = 2, we obtain the classification of all 3-dimensional HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 21 Example 2.16. If k a field of characteristic 6= 2, then: GH2 (k[C2], k) ∼= (cid:0){±1} × {±1}(cid:1) ⊔ k∗ HOC (k[C2], k) ∼= {k3, k[X, Y ]/(X 2 − 1, Y 2, XY − Y ), A21} (38) (39) where A21 is the 3-dimensional non-commutative algebra having {1, d, f} as a basis and the multiplication given by d2 = 1, f 2 = 0, df = −f d = f . Now we highlight the efficiency of our methods in order to classify co-flag algebras of a given dimension. If k is a field of characteristic 6= 2, then, up to an isomorphism, there exists only two co-flag algebras of dimension 2: the algebras k[X]/(X 2) and k[C2] ∼= k×k [5, Corollary 4.5]. If k 6= k2, we mention that the other family of 2-dimensional algebras, namely the quadratic field extension k(√d), for some d ∈ k \ k2 does not contain co-flag algebras since there is no algebra map k(√d) → k. The co-flag algebras over k[C2] are classified by (39) and thus, in order to classify all 3-dimensional co-flag algebras we need to classify the co-flag algebras over k[X]/(X 2). Example 2.17. Let A := k[X]/(X 2). Then GH2 (k[X]/(X 2), k) ∼= k ⊔ k∗ and the equiv- alence classes of 3-dimensional algebras that have an algebra projection on k[X]/(X 2) are two families of algebras defined for any a ∈ k and u ∈ k∗ as follows: Aa := k[X, Y ]/(X 2 − a Y, Y 2, XY ), Au := k[X, Y ]/(X 2, Y 2 − u Y, XY ) Furthermore, HOC (k[X]/(X 2), k) = {A0, A1, A1}, i.e. up to an isomorphism there exist three co-flag algebras of dimension 3 over k[X]/(X 2). Indeed, A is the 2-dimensional algebra having 1 and x as a basis and x2 = 0. Thus A has only one algebra map A → k, namely the one sending x to 0. Hence, there exists a bijection CF1 (A) ∼= k such that the co-flag datum of the first kind (λ, Λ, ϑ) associated to a ∈ k is given by ϑ(x, x) := a, λ(x) = Λ(x) = ϑ(1, x) = ϑ(x, 1) = ϑ(1, 1) := 0 We can easily see that the equivalence relation ≈1 of Proposition 2.6 becomes equality, i.e. a ≈1 a′ if and only if a = a′ and hence CF1 (A)/ ≈1 ∼= k. The families of algebras as- sociated to such a co-flag datum of the first kind as defined by (22) are the 3-dimensional algebras having {f, 1, x} as a basis and the multiplication given by: x ⋆ x = af , f 2 = x⋆f = f ⋆x = 0, which is the algebra Aa. For the last part we apply Proposition 2.6 which proves that CF2 (A)/ ≈2 ∼= k∗: the algebra Au, for all u ∈ k∗, is precisely the alge- bra defined by (23) associated to the co-flag datum of the second king (λ0, u), where λ0 is the linear map given by λ0(x) := 0, λ0(1) := 1. The last statement follows from The- orem 2.8 or it can be proved directly as follows: we observe that, for any u ∈ k∗, there exists and isomorphism of algebras Au ∼= A1 = k[X, Y ]/(X 2, Y 2−Y, XY ). On the other hand, there exists an isomorphism of algebras Aa ∼= A1 = k[X, Y ]/(X 2 − Y, Y 2, XY ), for all a ∈ k∗ and any two algebras A0, A1 and A1 are not isomorphic to each other. To conclude, using Example 2.16 and Example 2.17 we obtain: 22 A. L. AGORE AND G. MILITARU k[X, Y ]/(X 2 − 1, Y 2, XY − Y ), Corollary 2.18. If k is a field of characteristic 6= 2 then, up to an isomorphism, there exist exactly six 3-dimensional co-flag algebras namely: k3, k < x, y x2 = 1, y2 = 0, xy = −yx = y > k[X, Y ]/(X 2, Y 2, XY ), k[X, Y ]/(X 2 − Y, Y 2, XY ), k[X, Y ]/(X 2, Y 2 − Y, XY ) In particular, if k := C the field of complex numbers, Corollary 2.18 shows that only 6 out of the 22 types of algebras of dimension 3 are co-flag algebras. Moreover, we also highlight the efficiency of Theorem 2.8 in classifying co-flag algebras by turning the problem into a purely computational one using a recursive method: if we consider A to be each of the algebras from Corollary 2.18 and using the results of this section we will arrive at the classification of 4-dimensional co-flag algebras. Of course the difficulty of the computations increases along side with the dimension. Very interesting and completely different from Mn(k) is the case when A := Tn(k) is the algebra of upper triangular matrices, i.e. Tn(k) is the subalgebra of Mn(k) having B := {eij i, j = 1, 2, ··· , n, i ≤ j} as the canonical basis over k. In order to write down the classifying object GH2 (Tn(k), k) we introduce the following three sets of matrices of trace zero, defined for any u, v, w = 1, 2,··· , n by: M u := {A = (aij) ∈ Mn(k) aii = 0, for all i = 1,··· , n and aur = 0, for all u < r} n M v,w := {A = (aij) ∈ Mn(k) v,w M := {A = (aij) ∈ Mn(k) Xi=1 Xi=1 n aii = 0, avv = 0, and aws = 0, for all w ≤ s} aii = 0, avv = 0, and aws = 0, for all w ≤ s 6= v} Example 2.19. Let k be a field of characteristic zero. Then: M u(cid:1)⊔(cid:0) GH2 (Tn(k), k) ∼= (cid:0) [u∈{1,2,··· ,n} [ × kn−w × kv−w−1. The equivalence where we denote: U := Sv,w∈{1,2,··· ,n}, v>w M classes of (cid:0) n(n+1) 2 + 1(cid:1)-dimensional algebras that have an algebra projection on Tn(k) are the families of algebras having {f, eij i, j = 1, 2,··· , n, i ≤ j} as a basis over k and the multiplication given below (we only write down the non-zero products): M v,w × kn−w(cid:1)⊔ U ⊔ k∗ v,w∈{1,2,··· ,n}, v<w v,w Tn(k)u A : Tn(k)v,w B,Γ : eit ⋆ ets = eil − αisf, euj ⋆ ejl = eul, euu ⋆ ekl = αklf, eij ⋆ euu = αijf, eij ⋆ ejj = eij − αijf, eiu ⋆ euu = eiu, euu ⋆ f = f ⋆ euu = f, where u ∈ {1, 2,··· , n}, A = (αpq)p,q=1,n ∈ M u, i, j 6= u, t 6= s; eip ⋆ epl = eil − βilf, ewi ⋆ eil = ewl − βlf, eww ⋆ ekl = ewlδw eit ⋆ evv = βitf, eij ⋆ ejj = eij − βij(1 − δv ewj ⋆ ejj = ewj + γj(1 − δw where v, w ∈ {1, 2,··· , n}, v < w, B = (βpq)p,q=1,n ∈ M v,w, Γ = (γr)w<r, i 6= w, p 6= l, i 6= l, t 6= v, s /∈ {v, w}; j )f, ews ⋆ evv = −γsf, j )f, evv ⋆ f = eww ⋆ f = f, k + βklf, HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 23 Tn(k)w,v C,Ψ,Ω : λTn(k) : eip ⋆ epl = eil − δilf, ewi ⋆ eij = ewj + ψjf, ewt ⋆ etv = ewv + ωtf, eww ⋆ ekl = ewlδw k + δklf, eij ⋆ ejj = eij − δijf, ewj ⋆ evv = −ψjf eiv ⋆ evv = eiv, evv ⋆ f = f ⋆ eww = f, where v, w ∈ {1, 2,··· , n}, v > w, C = (δpq)p,q=1,n ∈ M , Ψ = (ψr)w<r, Ω = (ωs)w<s<v, i 6= w, j 6= v, p 6= l, t /∈ {v, w}; eij ⋆ ejl = eil + λ−1δn where λ ∈ k∗. j − 1)f, enn ⋆ f = f ⋆ enn = f, f 2 = λf, v,w i δn l (δn Indeed, we start by discussing the algebra maps λ : Tn(k) → k. Denote λ(eij) = αij ∈ k, for all eij ∈ B. Since e2 ii = eii we have αii ∈ {0, 1}, for all i = 1,··· , n. Moreover, since char(k) = 0 and we assume λ to be unitary it follows that Σn i=1αii = 1. Therefore, αuu = 1, for some u ∈ {1, ··· , n} and αii = 0, for all i 6= u; we denote by λu this algebra map. As eij = eiieij, for all i ≤ j, we obtain that αij = 0, for all i 6= u and i ≤ j. Finally, since eujeuu = 0 and λu(euu) = 1, we obtain that αuj = 0, for any u < j. To conclude, the set of algebra maps Tn(k) → k are in bijection to the set {1,··· , n} and the algebra map corresponding to some j ∈ {1,··· , n} is given by λj(ejj) := 1 and λj(euv) := 0, for all (u, v) 6= (j, j). The next step of the proof is a computational one: namely, for any u, v ∈ {1, 2, ··· , n} we are left to compute the set of all (λv, Λu)-cocycles ϑ. This is achieved by straightforward but lengthy checking of (17) which in this case comes down to the following compatibility condition: ϑ(eij, ersepq) − ϑ(eijers, epq) = ϑ(eij, ers)Λu − ϑ(ers, epq)λv (40) with i ≤ j, r ≤ s and p ≤ q. Rather than including here the cumbersome computations we will just point out the main steps taken; the detailed proof can be provided upon request. First, notice that since (40) is not symmetric with respect to the maps λv and Λu we distinguish three cases, namely: u = v, u < v and respectively u > v. For the case u = v the (λu, Λu)-cocycles obtained are implemented by a family of (n− u) scalars and a matrix of trace zero with zeros on the line u strictly above the diagonal. Then, it can be proved that any such cocycle is equivalent (in the sense of (26)) to a cocycle implemented by a matrix in M u. The corresponding co-flag algebras are those denoted by Tn(k)u A. If u < v then any (λv, Λu)-cocycle is equivalent to a cocycle implemented by (n − v) scalars and a matrix in M u,v. The corresponding co-flag algebras are those denoted by Tn(k)u,v B,Γ. Finally, u > v then any (λv, Λu)-cocycle is equivalent to a cocycle implemented by two families of (n− v) and respectively (u− v − 1) scalars and a matrix C,Ψ,Ω. Finally, in M the last family of co-flag algebras, denoted by λTn(k), corresponds to a co-flag datum of the second kind associated (δn, λ), where δn(i) = δn is the Kronecker symbol and i λ ∈ k∗. Moreover, for n = 2 we can also write down in a transparent way the other classifying object, namely HOC (T2(k), k). By a long but straightforward computation it can easily be seen that HOC (T2(k), k) contains the algebras whose multiplication is depicted below together with the direct product of algebras T2(k) × k: . The corresponding co-flag algebras are those denoted by Tn(k)v,u u,v 24 A. L. AGORE AND G. MILITARU ⋆ e11 e12 e22 f ⋆ e11 e12 e22 f e11 e11 0 0 f e11 e11 0 0 0 e12 e12 0 0 0 e12 e12 0 0 0 e22 f 0 f 0 e12 0 e22 0 0 e22 f f 0 0 e12 e22 0 0 f ⋆ e11 e12 e22 f ⋆ e11 e12 e22 f e11 e11 0 0 0 e11 e11 f 0 0 e12 e12 0 0 0 e22 f 0 0 e12 0 e22 f f 0 ⋆ e11 e12 e22 f e11 e11 − f 0 −f 0 e12 e12 0 0 0 e22 f e12 e22 − f f f 0 0 f 0 e12 e12 − f 0 f 0 e22 0 e12 − f e22 f f f 0 0 0 ⋆ e11 e12 e22 f e11 e11 0 0 f e12 e12 0 0 0 e22 f 0 0 e12 0 e22 f 0 0 ⋆ e11 e12 e22 f e11 e11 0 0 f e12 e12 + f 0 0 0 e22 f 0 0 e12 0 e22 f 0 0 3. Applications to coalgebras and Poisson algebras In this section we shall present two applications of our results to the theory of coalgebras and respectively Poisson algebras, the latter being the algebraic counterpart of Poisson manifolds. Our strategy is to use two different contravariant functors which have both the category of algebras as a codomain, namely the linear dual functor (−)∗ := Homk (−, k) and respectively Fun (−) := C ∞(−) the real smooth functions on a Poisson manifold functor. Supersolvable coalgebras. We recall that a coalgebra C = (C, ∆, ε) is a vector space C equipped with a comultiplication ∆ : C → C ⊗ C and a counit ǫ : C → k such that (∆⊗ Id)◦ ∆ = (Id⊗ ∆)◦ ∆ and (Id⊗ ε)◦ ∆ = (ε⊗ Id)◦ ∆ = Id, where ⊗ = ⊗k and Id is the identity map on C. We use the Σ-notation for comultiplication: ∆(c) = c(1) ⊗ c(2), for all c ∈ C (summation understood). The base field k, with the obvious structures, is the final object in the category of coalgebras. We only provide some basic information of coalgebras, referring the reader to [11] for more detail. If C = (C, ∆, ε) is a colgebra, then the linear dual C ∗ = Homk(C, k) is an associative algebra under the convolution product (f ∗ g)(c) := f (c(1))g(c(2)), for all f , g ∈ C ∗ and c ∈ C having the unit 1C ∗ = ε. Conversely, if A is a finite dimensional algebra with a basis {ei i = 1,··· , n}, then the linear dual A∗ is a coalgebra with the comultiplication and the counit given for any i = 1,··· , n by: n ∆A∗(e∗ i ) := Xj,l=1 i (ej el) e∗ e∗ j ⊗ e∗ l , εA∗ (e∗ i ) := e∗ i (1A) (41) where {e∗ i i = 1,··· , n} is the dual basis of {ei i = 1,··· , n}. The contravariant functor (−)∗ := Homk (−, k) gives a duality between the category of all finite dimensional coalgebras and the category of finite dimensional algebras [11]. Having the supersolvable Lie algebras [9] as a source of inspiration we introduce the following concept: HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 25 Definition 3.1. A coalgebra C is called supersolvable if there exists a positive integer n such that C has a finite chain of subcoalgebras k ∼= C1 ⊂ C2 ⊂ ··· ⊂ Cn := C (42) such that Ci has codimension 1 in Ci+1, for all i = 1,··· , n − 1. Any supersolvable coalgebra is finite dimensional and the definition is equivalent to the fact that dim(Ci) = i, for all i = 1,··· , n. Furthermore, since any supersolvable coalgebra C contains a 1-dimensional subcolagebra, we obtain that G(C) 6= ∅, where G(C) is the space of group-like elements of C. Using the duality given by the functor (−)∗ it follows that a finite dimensional coalgebra C is supersolvable if and only if its convolution algebra C ∗ is a co-flag algebra in the sense of Definition 2.1 and vice- versa: a finite dimensional algebra A is a co-flag algebra if and only if its dual A∗ is a supersolvable coalgebra. Thus, the results obtained in the previous section can be applied for the classification problem of supersolvable coalgebras of a given dimension.2 Using the above facts, Corollary 2.18 classifies in fact all 3-dimensional supersolvable coalgebras: the isomorphism classes are the duals A∗ of the algebras listed in the statement. For example, the dual coalgebra associated to the noncommutative algebra k < x, y x2 = 1, y2 = 0, xy = −yx = y > is the non-cocommutative supersolvable coalgebra having {f1, f2, f3} as a basis and the comultiplication and the counit given by: ∆(f1) := f1 ⊗ f1 + f2 ⊗ f2, ∆(f2) := f1 ⊗ f2 + f2 ⊗ f1, ∆(f3) := f1 ⊗ f3 + f3 ⊗ f1 + f2 ⊗ f3 − f3 ⊗ f2, ε(f3) := 0 ε(f1) := 1, ε(f2) := 0 The coalgebra obtained in this way is indeed supersolvable by choosing C1 := k(f1 − f2) (we observe that f1± f2 is a group-like element) and C2 := kf1 + kf2 as the intermediary coalgebras of dimension 1 respectively 2 in the sequence (42). Another application of our theory of Section 1 is the following: let C be a finite di- mensional coalgebra, n a positive integer and V := kn. Then by taking the convolution algebra A := C ∗ we obtain that the object GH2 (C ∗, kn) classifies, up to an isomorphism which stabilizes C and costabilizes kn, all coalgebras which contain C as a subcoalgebra of codimension n. Moreover, a coalgebra D contains C as a subcoalgebra of codimension n if and only if D is isomorphic to the dual coalgebra (C ∗ ⋆ kn)∗ of a Hochschild product C ∗ ⋆ kn between the convolution algebra C ∗ and the vector space kn. The formula for the comultiplication of any such coalgebra (C ∗ ⋆ kn)∗ can be written down effectively by using (41) and (3). This observation shows that the GE-problem applied for finite dimensional algebras and finite dimensional vector spaces gives the answer at the level of finite dimensional coalgebras to what we have called the extending structures problem studied in [2, 4, 5] for Jacobi, Lie and respectively associative algebras. Applications to Poisson algebras. Commutative Poisson algebras are algebraic coun- terparts of Poisson manifolds from differential geometry: for a given smooth manifold M , there is a one-to-one correspondence between Poisson brackets on the commutative alge- bra P := C ∞(M ) of smooth functions on M and all Poisson structures on M [22]. The 2The classification of solvable Lie algebras [20], over arbitrary fields, was achieved up to dimension 4. 26 A. L. AGORE AND G. MILITARU [pq, r] = [p, r] q + p [q, r] importance of Poisson algebras in several areas of mathematics and physics (Hamilton- ian mechanics, differential geometry, Lie groups, noncommutative algebraic/diferential geometry, (super)integrable systems, quantum field theory, vertex operator algebras, quantum groups) it is also well known -- see [21, 22, 30] and the references therein. In fact, C ∞(−) gives a contravariant functor from the category of Poisson manifolds to the category of Poisson algebras and constitutes the tool through which geometrical prob- lems can be restated and approached at the level of Poisson algebras. In particular, the GE-problem, formulated for Poisson algebras, is just the algebraic counterpart of the following question from differential geometry: Let M be a Poisson manifold. Describe and classify all Poisson manifolds containing M as a manifold of a given codimension. We recall that a Poisson algebra is a triple P = (P, mP , [−, −]), where (P, mP ) is a unital associative algebra, (P, [−, −]) is a Lie algebra such that the Leibniz law holds for any p, q, r ∈ P : (43) Usually, a Poisson algebra P is by definition assumed to be commutative like the algebra P := C ∞(M ) of real smooth functions on a Poisson manifold M which is the typical example of a Poisson algebra. However, following [18, 29] in order to broaden the class of Poisson algebras and to be able to construct relevant examples, throughout this paper we do not impose this restriction. A morphism between two Poisson algebras P and P ′ is a linear map ϕ : P → P ′ that is a morphism of associative algebras as well as of Lie algebras; we will denote by AutPoss(P ) the group of automorphisms of a Poisson algebra P . For basic concepts and unexplained notions on Lie algebras we refer to [16] and to [30] for those concerning Poisson algebras. Let P = (P, mP ) be an algebra and u ∈ k. Then (P, mP , [−, −]u) is a Poisson algebra, where [a, b]u := u(ab − ba), for all a, b ∈ P . In particular, any associative algebra P = (P, mP ) is a Poisson algebra with the abelian Lie bracket, i.e. [a, b] := 0, for all a, b ∈ P . On the other hand, let g = (g, [−, −]g) be a Lie algebra with a linear basis {ei i ∈ I}. Then the symmetric algebra P := S(g) of g (i.e. the polynomial algebra k[ei i ∈ I]) is a Poisson algebra with the bracket defined by [ei, ej] := [ei, ej]g, for all i, j ∈ I and extended to the entire algebra k[ei i ∈ I] via the Leibniz law (43). If P is a Poisson algebra then the direct product P × k is a Poisson algebra with the direct product structures of associative/Lie algebra: that is the multiplication and the bracket is defined for any p, q ∈ P and x, y ∈ k by: (p, x) ⋆ (q, y) := (pq, xy), (44) Furthermore, the canonical projection πP : P × k → P , πP (p, x) := p is a surjective Poisson algebra map having a 1-dimensional kernel. It what follows we shall classify all Poisson algebras Q that admit a surjective Poisson algebra map Q → P → 0 with a 1-dimensional kernel. In order to do this we first recall from [3] the following concept: {(p, x), (q, y)} := (cid:0)[p, q], 0(cid:1) Definition 3.2. A co-flag datum of a Poisson algebra P is a 5-tuple (λ, Λ, ϑ, γ, f ), where λ, Λ, γ : P → k are linear maps, ϑ, f : P × P → k are bilinear maps such that: (CF1) (λ, Λ, ϑ) is a co-flag datum of the first kind of the associative algebra P (CF2) λ([p, q]) = Λ([p, q]) = γ([p, q]) = f (p, p) = 0 HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 27 (CF3) f (p, [q, r]) + f (q, [r, p]) + f (r, [p, q]) + γ(p)f (q, r) + γ(q)f (r, p) + γ(r)f (p, q) = 0 (CF4) f (pq, r) − Λ(q)f (p, r) − λ(p)f (q, r) = γ(r)ϑ(p, q) + ϑ([p, r], q) + ϑ(p, [q, r]) (CF5) γ(pq) = γ(p)Λ(q) + λ(p)γ(q) for all p, q, r ∈ P . We denote by F (P ) the set of all co-flag data of P . The above concept was introduced in [3, Definition 3.2] under the name of 'abelian co- flag datum' of P . We dropped the adjective 'abelian' since the other family of co-flag datum introduced in [3, Definition 3.4] will generate a family of Poisson algebras which are all isomorphic to the direct product P × k (see the proof of Theorem 3.3 below) -- hence, they are irrelevant from the classification view point. Let (λ, Λ, ϑ, γ, f ) ∈ F (P ) be a co-flag datum of a Poisson algebra P . Then we shall denote by P(λ, Λ, ϑ, γ, f ) := P × k the direct product of vector spaces which is a Poisson algebra with the multiplication ⋆ and the bracket {−, −} defined [3, Section 3] for any p, q ∈ P , x, y ∈ k by: (p, x) ⋆ (q, y) := (pq, ϑ(p, q) + λ(p)y + Λ(q)x) {(p, x), (q, y)} := (cid:0)[p, q], f (p, q) + γ(p)y − γ(q)x(cid:1) (45) (46) Now we can prove the following classification result: it is the Poisson version of The- orem 2.8 and improves the classification given in [3, Theorem 3.6] where all Poisson algebras Q having a Poisson surjection Q → P → 0 with a 1-dimensional kernel are classified in a more restrictive fashion: up to an isomorphism which stabilizes k and co-stabilizes P . Theorem 3.3. Let P be a Poisson algebra. Then: (1) A Poisson algebra Q has a surjective Poisson algebra map Q → P → 0 with a 1- dimensional kernel if and only if Q ∼= P×k or Q ∼= P(λ, Λ, ϑ, γ, f ), for some (λ, Λ, ϑ, γ, f ) ∈ F (P ). (2) Two Poisson algebras P(λ, Λ, ϑ, γ, f ) and P(λ′, Λ′, ϑ′, γ ′, f ′) are isomorphic if and only if there exists a triple (s0, ψ, r) ∈ k∗×AutPoss(P )×Homk(P, k) such that for any p, q ∈ P : (47) (48) λ = λ′ ◦ ψ, ϑ(p, q) s0 = ϑ′(cid:0)ψ(p), ψ(q)(cid:1)+λ(p)r(q) + Λ(q)r(p) − r(pq) f (p, q) s0 = f ′(cid:0)ψ(p), ψ(q)(cid:1)+γ(p)r(q) − γ(q)r(p) − r([p, q]) (49) Λ = Λ′ ◦ ψ, γ = γ′ ◦ ψ (3) The Poisson algebras P(λ, Λ, ϑ, γ, f ) and P × k are not isomorphic. Proof. (1) Let Q be a Poisson algebra having a surjective Poisson algebra map Q → P → 0 with 1-dimensional kernel. Then, using [3, Proposition 2.4 and Proposition 3.5] we obtain that Q ∼= P(λ, Λ, ϑ, γ, f ), for some (λ, Λ, ϑ, γ, f ) ∈ F (P ) or Q ∼= P (λ, ϑ, u), where u ∈ k \ {0}, λ : P → k is a unit preserving linear map, ϑ : P × P → k is a bilinear map satisfying the following two compatibilities for any p, q, r ∈ P : λ(pq) = λ(p)λ(q) − u θ(p, q), θ(p, qr) − θ(pq, r) = θ(p, q)λ(r) − θ(q, r)λ(p) (50) 28 A. L. AGORE AND G. MILITARU which we called in [3, Definition 3.4] a non-abelian co-flag datum of P . The Poisson algebra P (λ, ϑ, u) is the vector space P × k having the multiplication and the Poisson bracket defined by: (p, x) ⋆ (q, y) := (pq, ϑ(p, q) + λ(p)y + λ(q)x + u xy) (51) {(p, x), (q, y)} := (cid:0)[p, q], −u−1 λ([p, q])(cid:1) (52) for all p, q ∈ P and x, y ∈ k. Since u 6= 0 we obtain from the first equation of (50) that ϑ is implemented by u and λ by the formula ϑ(p, q) = u−1(cid:16)λ(p)λ(q)− λ(pq)(cid:17) and hence the multiplication of the Poisson algebra P (λ, u) given by (51) takes the form: (p, x) ⋆ (q, y) = (pq, u−1(cid:16)λ(p)λ(q) − λ(pq)(cid:17)+λ(p)y + λ(q)x + u xy) which is precisely (19). The first part is finished once we observe that the map given by the formula (21), namely ϕ : P (λ, u) → P × k, ϕ(p, x) := (p, λ(p) + u x), for all p ∈ P and x ∈ k is an isomorphism of Poisson algebras. Indeed, Remark 2.4 shows that ϕ is an isomorphism of associative algebras; hence we only have to prove that it is also a Lie algebra map, where the bracket on P (λ, u) is given by (52). A straightforward compu- tation shows that ϕ(cid:16){(p, x), (q, y)}(cid:17)= [ϕ(p, x), ϕ(q, y)]P ×k = (cid:0)[p, q], 0(cid:1) and thus any Poisson algebra P (λ, u) is in fact isomorphic to the direct product of Poisson algebras P × k. (2) The first step in proving Theorem 2.8 gives a bijection between all associative algebra isomorphism corresponding to the Poisson algebras P(λ, Λ, ϑ, γ, f ) and P(λ′, Λ′, ϑ′, γ ′, f ′) and the set of all triples (s0, ψ, r) ∈ k∗ × AutAlg(P ) × Homk(P, k) satisfying (48) and the first two compatibilities of (47). The bijection is given such that the associative algebra isomorphism ϕ = ϕ(s0, ψ, r) : P(λ, Λ, ϑ, γ, f ) → P(λ′, Λ′, ϑ′, γ ′, f ′) associated to (s0, ψ, r) is given by the formula (33), that is ϕ(p, x) = (cid:0)ψ(p), r(p) + x s0(cid:1), for all p ∈ P and x ∈ k. The proof will be finished if we show that such a map ϕ = ϕ(s0, ψ, r) is also a morphism of Lie algebras if and only if ψ is an automorphism of the Lie algebra P = (P, [−, −]) and the last equation of (47) and (49) hold. This is an elementary fact: by a straightforward computation we can show that ϕ(cid:16){(p, 0), (q, 0)}(cid:17)= {ϕ(p, 0), ϕ(q, 0)} if and only if ψ : P → P is a Lie algebra map and (49) holds. ϕ(cid:16){(p, 0), (0, x)}(cid:17)= {ϕ(p, 0), ϕ(0, x)} if and only if γ = γ′ ◦ ψ. The rest of the details In a similar fashion are left to the reader. (3) Follows from step (2) of the proof of Theorem 2.8 which proves that the associative algebras P(λ, Λ, ϑ, γ, f ) and P × k are never isomorphic. (cid:3) Corollary 3.4. Let P be a Poisson algebra for which there is no algebra map P → k or P is perfect as a Lie algebra, i.e. P = [P, P ]. Then, up to an isomorphism, the only Poisson algebra Q for which there exists a surjective algebra map Q → P → 0 having a 1-dimensional kernel is the direct product P × k of Poisson algebras. Proof. The proof follows from Theorem 3.3 since in both cases the set F (P ) is empty. Indeed, the first case follows form Corollary 2.11, while if P is perfect as a Lie algebra HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 29 then, using the compatibilities (CF2) we obtain that λ = Λ ≡ 0, the trivial maps, which contradicts the fact that the algebra maps λ and Λ are unit preserving. (cid:3) The geometrical meaning of Corollary 3.4 is the following: if M is a real Poisson manifold such that the algebra C ∞(M ) of all real smooth functions on M is perfect as a Lie algebra, then up to an isomorphism, there is only one Poisson manifold containing P as a sub-manifold of codimension 1. The group of Poisson algebra automorphisms of P(λ, Λ, ϑ, γ, f ) can also be described. Using the proof of Theorem 3.3, the Poisson version of Corollary 2.12 takes the following form: Corollary 3.5. Let P be a Poisson algebra, (λ, Λ, ϑ, γ, f ) ∈ F (P ) a co-flag datum of P and let GP(cid:0)P, (λ, Λ, ϑ, γ, f )(cid:1) be the set of all triples (s0, ψ, r) ∈ k∗ × AutPoss(P ) × P ∗ satisfying the compatibility conditions (47)-(49) written for λ′ = λ, Λ′ = Λ, γ′ = γ, ϑ′ = ϑ and f ′ = f . Then, there exists an isomorphism of groups AutPoss(cid:0)P(λ, Λ, ϑ, γ, f )(cid:1)∼= GP (cid:0)P, (λ, Λ, ϑ, γ, f )(cid:1) where the latter is a group with respect to the following multiplication: 0, ψ ◦ ψ′, r ◦ ψ′ + s0r′) 0, ψ′, r′) := (s0s′ for all (s0, ψ, r), (s′ (s0, ψ, r) · (s′ 0, ψ′, r′) ∈∈ GP (cid:0)P, (λ, Λ, ϑ, γ, f )(cid:1). Moreover, the map (s0, ψ, r) 7→ (cid:0)s−1 GP (cid:0)P, (λ, Λ, ϑ, γ, f )(cid:1)−→ P ∗ ⋉ζ (cid:0)k∗ × AutPoss(P )(cid:1), 0 r, (s0, ψ)(cid:1) is an injective morphism of groups. We end the paper with a relevant example which follows by a long computation based on Theorem 3.3; the detailed proof can be provided upon request. Example 3.6. Let k be a field of characteristic zero and P := H(3, k) the 3-dimensional i.e., H(3, k) is the set of all upper tri- non-commutative Heisenberg-Poisson algebra: angular 2 × 2 matrices with the usual multiplication and the Lie bracket given by [x, y] := xy − yx. Consider {e11, e12, e22} a basis of H(3, k) over k. Then the set of isomorphism types of all 4-dimensional Poisson algebras which admit a surjective Poisson algebra map on H(3, k) are the ones listed below together with the usual direct product H(3, k) × k (we only write down the non-zero products): P1 : P2 : P3 : e11 ⋆ e11 = e11, e11 ⋆ e12 = e12, e12 ⋆ e22 = e12, e22 ⋆ e22 = e22, e11 ⋆ f = f ⋆ e11 = f, {e11, e12} = e12, {e12, e22} = e12. e11 ⋆ e11 = e11, e11 ⋆ e12 = e12, e12 ⋆ e22 = e12, e22 ⋆ e22 = e22, e22 ⋆ f = f ⋆ e22 = f, {e11, e12} = e12, {e12, e22} = e12 e11 ⋆ e11 = e11, e11 ⋆ e12 = e12 − f, e12 ⋆ e11 = f, e12 ⋆ e22 = e12 − f e22 ⋆ e12 = f, e22 ⋆ e22 = e22, e11 ⋆ f = f ⋆ e22 = f, {e11, e12} = e12, {e12, e22} = e12, {e11, f} = f, {e22, f} = −f. 30 A. L. AGORE AND G. MILITARU P ω 4 : P τ 5 : e11 ⋆ e11 = e11, e11 ⋆ e12 = e12, e12 ⋆ e22 = e12, e22 ⋆ e22 = e22, e11 ⋆ f = f ⋆ e22 = f, {e11, e12} = e12, {e12, e22} = e12, {e11, f} = ωf, {e22, f} = −ωf, where ω ∈ k. e11 ⋆ e11 = e11, e11 ⋆ e12 = e12, e12 ⋆ e22 = e12, e22 ⋆ e22 = e22, e22 ⋆ f = f ⋆ e11 = f, {e11, e12} = e12, {e12, e22} = e12, {e11, f} = τ f, {e22, f} = −τ f, where τ ∈ k. We point out that, even if up to an isomorphism there are only 8 associative algebras of dimension 4 with a surjective algebra map on the algebra H(3, k) (indicated at the end of Example 2.19), the set of isomorphism types of Poisson algebras having the same algebra structure can be infinite due to the 1-parameter families P ω 4 and P τ 5 . Acknowledgement Parts of this work were undertaken while the first named author was visiting the Max Planck Institute for Mathematics in Bonn. Their hospitality and financial support is gratefully acknowledged. References [1] Adem, A. and Milgram, R. J. - Cohomology of finite groups, Springer, 2004. [2] Agore, A.L. and Militaru, G. - Jacobi and Poisson algebras, J. Noncommutative Geometry 9 (2015), 1295 -- 1342. [3] Agore, A.L. and Militaru, G. - The global extension problem, crossed products and co-flag non- commutative Poisson algebras, J. Algebra, 426 (2015), 1 -- 31. [4] Agore, A.L. and Militaru, G. - Extending structures for Lie algebras, Monatsh. fur Mathematik, 174 (2014), 169 -- 193. [5] Agore, A.L. and Militaru, G. - Extending structures, Galois groups and supersolvable associative algebras, Monatsh. fur Mathematik, DOI:10.1007/s00605-015-0814-8. [6] Alekseevsky, D., Michor, P. W. and Ruppert, W. - Extensions of super Lie algebras, J. Lie Theory 15 (2005), 125 -- 134. [7] Alperin, J.L. and Bell, R.R. - Groups and representations, Springer-Verlag, New York, 1995. [8] Andruskiewitsch, N. and Devoto, J. - Extensions of Hopf algebras, Algebra i Analiz 7 (1995), 22 -- 61. [9] Barnes, D.W. and Newell, M.L. - Some theorems on saturated homomorphs of soluble Lie algebras, Math. Z., 115 (1970) 179-187. [10] Bavula, V.V. and Jordan, D.A. - Isomorphism problems and groups of automorphisms for generalized Weyl algebras, Trans. Amer. Math. Soc., 353 (2001), 769-794. [11] Brzezi´nski, T. and Wisbauer, R. - Corings and comodules, London Math Soc. Lect. Note Ser., 309, Cambridge University Press, 2003 [12] Castiglioni, J. L., Garca-Martnez, X. and Ladra, M. - Universal central extensions of Lie-Rinehart algebras, arXiv:1403.7159 [13] Ceken, S., Palmieri, J., Wang Y.- H. and Zhang, J.J. - The discriminant controls automorphism groups of noncommutative algebras, Adv. Math., 269 (2015), 551 -- 584. [14] Chevalley, C. and Eilenberg S. - Cohomology theory of Lie groups and Lie algebras, Trans. Amer. Math. Soc., 63(1948), 85 -- 124. [15] Eilenberg, S. and Maclane, S. - Cohomology theory in abstract groups, II, Annals of Mathematics, 48(1947), 326 -- 341. [16] Erdmann, K. and Wildon, M.J. - Introduction to Lie algebras, Springer, 2006. HOCHSCHILD PRODUCTS AND NON-ABELIAN COHOMOLOGY FOR ALGEBRAS 31 [17] Everett, C. J., Jr. - An extension theory for rings, Amer. J. Math., 64 (1942), 363-370 [18] Farkas, D. R. and Letzter, G. - Ring theory from symplectic geometry, J. Pure Appl. Algebra, 125(1998), 155-190. [19] Fr´egier, Y. - Non-abelian cohomology of extensions of Lie algebras as Deligne groupoid, J. Algebra, 398 (2014), 243-257. [20] de Graaf, W.A. - Classification of Solvable Lie Algebras, Experiment. Math., 14 (2005), 15 -- 25. [21] Grabowski, J., Marmo, G. and Perelomov, A. M. - Poisson structures: towards a classification, Modern Phys. Lett. A 8(1993), 1719 -- 1733. [22] Grabowski, J. - Brackets, Int. J. Geom. Methods Mod. Phys., 10(8):1360001, 45, 2013. [23] Janusz, G. J. - Automorphism group of simple algebras and group algebras, Representation Theory of Algebras, Lecture Notes in Pure and Applied Mathematics, Vol. 37 (1976), 381-388. [24] Huebschmann, J. - Poisson cohomology and quantization, J. Reine Angew. Math., 408 (1990), 57-113. [25] Huebschmann, J., Perlmutter, M. and Ratiu, T.S. - Extensions of Lie-Rinehart algebras and cotan- gent bundle reduction, . Proc. London Math. Soc., 107 (2013), 1135 -- 1172. [26] Hochschild, G. - Cohomology and representations of associative algebras, Duke Math. J., 14(1947), 921 -- 948. [27] Horn, R. and Sergeichuk, V. - Canonical matrices of bilinear and sesquilinear forms, Linear Algebra and its Applications, 428 (2008), 193-223. [28] O. Holder, Bildung zusammengesetzter Gruppen, Math. Ann. 46(1895), 321 -- 422. [29] Kubo, F. - Finite-dimensional non-commutative Poisson algebras, J. Pure Applied Algebra, 113 (1996), 307 -- 314. [30] Laurent-Gengoux, C., Pichereau, A. and Vanhaecke, P. - Poisson Structures, Vol. 347, 2013, Springer. [31] Loday, J.-L. and Pirashvili, T. - Universal enveloping algebras of Leibniz algebras and (co)homology, Math. Ann., 296(1993), 139 -- 158. [32] Milies, C. P. and Sehgal S.K. - An introduction to group rings, Kluwer Academic Publishers, 2002. [33] Militaru, G. - The global extension problem, co-flag and metabelian Leibniz algebras, Linear Mul- tilinear Algebra 63 (2015), 601 -- 621. [34] Olivieri, A., del Rio, A. and Sim´on, J. J. - The Group of Automorphisms of the Rational Group Algebra of a Finite Metacyclic Group, Comm. in Algebra, 34 (2006), 3543-3567. [35] Redondo, M. J. - Hochschild cohomology: some methods for computations, IX Algebra Meeting USP/UNICAMP/UNESP (Sao Pedro, 2001), Resenhas IME-USP, 5(2001), 113 -- 137. [36] Rotman, J.J. - Advanced Modern Algebra, New York: Prentice Hall, 2nd Edition, 2003. [37] Schreier, O. - Uber die Erweiterung von Gruppen, I, Monatshefte fur Mathematik und Physik, 34 (1926), 165 -- 180. [38] Weibel, C.A. - An introduction to homological algebra, Cambridge University Press, 1994. [39] Williamson, J. - On the algebraic problem concerning the normal forms of linear dynamical systems, Amer. J. Math., 58 (1936), 141 -- 163. Faculty of Engineering, Vrije Universiteit Brussel, Pleinlaan 2, B-1050 Brussels, Belgium and "Simion Stoilow" Institute of Mathematics of the Romanian Academy, P.O. Box 1-764, 014700 Bucharest, Romania E-mail address: [email protected] and [email protected] Faculty of Mathematics and Computer Science, University of Bucharest, Str. Academiei 14, RO-010014 Bucharest 1, Romania E-mail address: [email protected] and [email protected]